Try our new research platform with insights from 80,000+ expert users

Privileged Access Management as a Service (PAMaaS): benefits and service offerings

Shibu Babuchandran - PeerSpot reviewer
Regional Manager/ Service Delivery Manager at a tech services company with 201-500 employees
  • 33
Published:Jan 2, 2022
Search for a product comparison in Privileged Access Management (PAM)
PeerSpot user

2 Comments

Last commented on Jan 17, 2022
Shibu Babuchandran - PeerSpot reviewer
Regional Manager/ Service Delivery Manager at a tech services company with 201-500 employees
Real User
ModeratorTop 5
Jan 17, 2022
DM
Director at DNAX s.r.o.
User
Jan 12, 2022
Find out what your peers are saying about CyberArk, One Identity, Delinea and others in Privileged Access Management (PAM). Updated: November 2025.
879,768 professionals have used our research since 2012.
Related Questions
Ariel Lindenfeld - PeerSpot reviewer
VP Product at PeerSpot
Oct 6, 2024
Oct 6, 2024
Ensuring data security and minimizing risks are critical for businesses today. PAM plays a pivotal role by managing and monitoring access to sensitive information and systems. Organizations should consider the following aspects: Robust authentication mechanisms Comprehensive access logging User behavior analytics Automated provisioning and de-provisioning Integration with existing IT infrastruc...
See 1 answer
Rivka Alexander - PeerSpot reviewer
Content Specialist at PeerSpot
Oct 6, 2024
Ensuring data security and minimizing risks are critical for businesses today. PAM plays a pivotal role by managing and monitoring access to sensitive information and systems. Organizations should consider the following aspects: Robust authentication mechanisms Comprehensive access logging User behavior analytics Automated provisioning and de-provisioning Integration with existing IT infrastructure The importance of PAM lies in its ability to protect an organization from external and internal threats by controlling who has access to what within the digital environment. By implementing PAM, companies can safeguard their critical assets from unauthorized access, reducing the risk of data breaches and ensuring compliance with industry regulations. It grants visibility into user activities, helping in the early detection of any potential misuse of privileges.PAM solutions are designed to provide accountability and traceability of actions performed by privileged accounts. This is crucial for auditing purposes, as it records and reports on who accessed what, when, and how, addressing regulatory requirements and audit demands. As threats constantly evolve, the importance of having a dynamic and adaptive PAM strategy becomes evident in securing sensitive information while maintaining operational efficiency. Companies must ensure their PAM solutions evolve alongside the threat landscape to remain effective and secure.
Siby Ragh - PeerSpot reviewer
Practice Lead- Cyber Defense at Injazat Data Systems
Apr 2, 2023
Apr 2, 2023
Hello Siby, I suggest looking for PAM-leading solutions, both solutions you have mentioned are not recommended, Microsoft doesn't have a PAM solution and Arcon won't fulfill the local compliance requirements like NESA, etc.... check solutions that are leading in the PAM area.
See 1 answer
Hicham Barnoussi - PeerSpot reviewer
Managing Partner at Smpl ID
Apr 2, 2023
Hello Siby, I suggest looking for PAM-leading solutions, both solutions you have mentioned are not recommended, Microsoft doesn't have a PAM solution and Arcon won't fulfill the local compliance requirements like NESA, etc.... check solutions that are leading in the PAM area.
Download Free Report
Download our free Identity and Access Management as a Service (IDaaS) (IAMaaS) Report and find out what your peers are saying about Microsoft, SailPoint, Okta, and more! Updated: November 2025.
DOWNLOAD NOW
879,768 professionals have used our research since 2012.