Tech Support Staff at a tech company with 51-200 employees
Access control will never disappoint you. It's just what you need for security.
What is most valuable?
Access Control is used for the management of privileged identities and helps to improve security of information.
• Facilitates temporary access to all devices, programs, or applications, as well as servers and audits, monitors and controls only privileged users from a management console at a central location.
• Addresses all requirements that are important in managing privileged users or identities.
• Automated privileged user logins to avoid theft of passwords and all user activities are logged and tracked thereby controlling what can be done in the system.
• Provides a high level of security and complexity and it is therefore difficult to hack business systems.
What needs improvement?
I have faced a few challenges due to the system complexity, as it involves two integrated authentication systems that have to be purchased. Access control is also very expensive. It takes time to deploy an authenticator to every privileged user but these can be overlooked because access control provides immense security benefits.
What other advice do I have?
New features that have been added to access control have immensely improved the management and access control of privileged users and therefore the safety of critical business information is guaranteed. Management of privileged users’ passwords for automated operations of application to databases and application to application, tracking and logging of privilege user sessions, integration that is advanced and automated, and PUPM logins, are the new features that have been added to access control. Access control has greatly prevented the misuse of administrator rights which is very rampant.
Disclosure: I am a real user, and this review is based on my own experience and opinions.
Buyer's Guide
Download our free Privileged Access Management (PAM) Report and find out what your peers are saying about Broadcom, CyberArk, BeyondTrust, and more!
Updated: November 2024
Product Categories
Privileged Access Management (PAM)Buyer's Guide
Download our free Privileged Access Management (PAM) Report and find out what your peers are saying about Broadcom, CyberArk, BeyondTrust, and more!
Quick Links
Learn More: Questions:
- When evaluating Privileged Identity Management, what aspect do you think is the most important to look for?
- Which is the best Privileged Account Management solution?
- What are the top 5 PAM solutions that can be implemented which cover both hybrid and cloud?
- What are the top 5 PAM solutions?
- How will AI and ML help or work with PIM/PAM?
- Is BeyondTrust Endpoint Privilege Management really expensive compared to other tools or software?
- What is the difference between PAM and PAS?
- What is the difference between IDAM , PIM and PAM?
- Which PAM tool do you prefer: CyberArk Privileged Access Manager, One Identity Safeguard, Delinea Secret Server, or BeyondTrust Privileged Remote A
- What is the best approach to limiting privileges for administrators?