Try our new research platform with insights from 80,000+ expert users
it_user705717 - PeerSpot reviewer
Senior Systems Administrator at a tech company with 5,001-10,000 employees
Vendor
The most valuable feature is the keystroke tracking feature

What is most valuable?

The most valuable element is the keystroke tracking feature.

We use the tool in our FedRAMP data centers. Whenever an employee does some work at the command line in the servers, app servers or database servers, we need to track what they do.

We use the tool to do just that. We bought it for that purpose. That is why this is the most important feature for us.

How has it helped my organization?

The product has not improved our organization. It is an intentionally limiting product. That’s why we have it.

What needs improvement?

It limits the number of CIs. Why not have unlimited CIs?

As I understand the licensing, we purchase the PAM product and pay for it based on the number of CIs. (A “CI” is a “configuration item”. It’s an ITIL term.)

That means the number of servers, routers, switches, etc. for which PAM controls access and tracks activity. Why not charge us a flat fee and give us unlimited CIs?

For how long have I used the solution?

We have been using the solution for around four years.

Buyer's Guide
Symantec Privileged Access Manager
December 2024
Learn what your peers think about Symantec Privileged Access Manager. Get advice and tips from experienced pros sharing their opinions. Updated: December 2024.
831,265 professionals have used our research since 2012.

What do I think about the stability of the solution?

We did not encounter any issues with stability.

What do I think about the scalability of the solution?

We had scalability issues, particularly in regards to the limit of CIs.

How are customer service and support?

The technical support is very good. They are very helpful. They are knowledgeable and follow-up when we have issues.

Which solution did I use previously and why did I switch?

We did not use a previous solution.

How was the initial setup?

I don’t know about the initial setup. I was not involved in the initial setup.

What's my experience with pricing, setup cost, and licensing?

I am not involved in pricing and licensing.

Which other solutions did I evaluate?

I don’t know about the evaluation of other products. I was not involved in that part of the process.

What other advice do I have?

Make sure you can track enough CIs and have room for growth.

Disclosure: PeerSpot contacted the reviewer to collect the review and to validate authenticity. The reviewer was referred by the vendor, but the review is not subject to editing or approval by the vendor.
PeerSpot user
it_user762522 - PeerSpot reviewer
Solution Architect at a tech services company with 10,001+ employees
Real User
More expensive than other solutions but the password vaulting and password management features are valuable
Pros and Cons
  • "We have received good support from the tech support team."
  • "I would like this solution to be simpler. It should have a one-click access that works together with AWS."

What is our primary use case?

We look to make sure that there are two HyperACCESS specifications: 

  1. Privileged managements: These are ordered to ensure that all the passwords assume one location so a user can enter and all their passwords are protected. Their passwords cannot be shared because they are rotated. 
  2. The odd user: This user has to go through the system and exercise a chair relay. This should be our Gateway for login. 

What is most valuable?

The most common features that I use are password vaulting and password management. 

What needs improvement?

I would like this solution to be simpler. It should have a one-click access that works together with AWS. 

For how long have I used the solution?

Less than one year.

What do I think about the scalability of the solution?

Scalability has been good. 

How are customer service and technical support?

We have received good support from the tech support team.

Which solution did I use previously and why did I switch?

We used IBM before.

How was the initial setup?

It was a challenge for our newer staff members to install. 

What's my experience with pricing, setup cost, and licensing?

It is more expensive than other solutions on the market.

Which other solutions did I evaluate?

We have been using IBM extensively because customers demand that we provide this option.

Disclosure: I am a real user, and this review is based on my own experience and opinions.
PeerSpot user
Buyer's Guide
Symantec Privileged Access Manager
December 2024
Learn what your peers think about Symantec Privileged Access Manager. Get advice and tips from experienced pros sharing their opinions. Updated: December 2024.
831,265 professionals have used our research since 2012.
it_user712038 - PeerSpot reviewer
Business Coach & Consultant
Vendor
When people are accessing our production environment as administrators or as non-end users, they use CA Privileged Access Manager​ to be able to access it
Pros and Cons
  • "The two factor authentication, and the single most important capability was it supported PIV and CAC as one of the two factors. That was pretty huge for us."
  • "It'd be great if you just stuck in your PIV card and Windows popped up, asked you for your password. You typed it in, then it remembered your credentials."

What is most valuable?

If I remember correctly, it was the two factor authentication, and the single most important capability was it supported PIV and CAC as one of the two factors. That was pretty huge for us.

How has it helped my organization?

Our organization does and uses cloud-based solutions. Those have to be very secure.

Specifically, administrative access needs to be highly secure. When people are accessing the production environment as administrators or as non-end users, they use CA Privileged Access Manager to be able to access it.

What needs improvement?

Trouble free installation and configuration and not even noticing that it's installed. There's too many steps involved in accessing the production network. Too many things you have to do to get on.

It'd be great if you just stuck in your PIV card and Windows popped up, asked you for your password. You typed it in, then it remembered your credentials.

For how long have I used the solution?

For about 10 months.

What do I think about the stability of the solution?

There were some issues with stability.

From what I remember, people would complain that every 30 minutes to an hour or so, their connection would drop and they'd have to reconnect, but it wasn't clear whether that was a problem with the network we were working on or whether that was a problem with Privileged Access Manager.

What do I think about the scalability of the solution?

We didn't run into any scale issues at all. The more people involved, the more it was able to handle.

How are customer service and technical support?

Yeah, we worked with technology support. They were actually pretty helpful. The couple of problems we had, they were able to identify and help us resolve.

Which solution did I use previously and why did I switch?

Yeah, we were using OpenVPN. We were using OpenVPN, and the biggest single reason was dual-factor authentication with PIV and CAC. That was the biggest single reason.

How was the initial setup?

I did not personally do the setup. From what I remember, it took a couple of weeks for the security lead to do the work. That's not out of the question or a surprise with a security product, because just getting it operating usually takes a little bit, then getting it fine tuned takes a whole another round of work.

Which other solutions did I evaluate?

We looked at about a half a dozen, and this one came out to be the best one. We filtered down.

What other advice do I have?

I would say, test it out in your environment, make sure it works out well. If it configures well, and then, assuming it works out fine, you're in good shape.

Disclosure: PeerSpot contacted the reviewer to collect the review and to validate authenticity. The reviewer was referred by the vendor, but the review is not subject to editing or approval by the vendor.
PeerSpot user
Vendor
The most valuable features are session manager, access manager, and credential manager. They don't offer multi-tenancy.

What is most valuable?

When you look at the whole PAM itself, session manager is very important. It records what happens. Access manager and credential manager are very important as well. Those are the key things. Session manager, access manager, and credential manager.

How has it helped my organization?

On the access management side, our system administrators, under privileged management, don't have to use their local tools to log on to the production servers.

They basically will log on, but they need access controls. They log on to a web interface, so that they will have access to the servers. From there, they can make the sessions.

What I'm saying is that on 443, with an extra cell connection, you log on to a web server and that web server will basically initiate the sessions from the web server to the production server. At that point, my session is secure because all that is happening inside that subnet or inside that network. All my end user is seeing is training the HTML-file interface.

That makes the access more secure. Even on the session side, the sessions are really between the production servers and the IA PAM. The sessions are not between the endpoint and the production server. So that makes it more secure by using a PAM.

What needs improvement?

When we look at CA PAM, the multi-tenant deployment is definitely an improvement that we want to see. They don't offer multi-tenancy.

If I have an enterprise, or if I am an MSP and I would like use an instantiation of CA PAM for multiple tenants, I can't do that.

I have to deploy a CA PAM for each tenant, which basically increases the cost and the management side of it. That's a very essential thing.

CyberArk does the multi-tenancy, but CA PAM doesn't have this.

For how long have I used the solution?

We have used it for two years.

What do I think about the stability of the solution?

Stability-wise, there were no issues. It met our SLAs. For the most part, it's really stable. There were no significant outages or issues with the stability of the product. We didn't have any of that experience with the solution.

What do I think about the scalability of the solution?

There were some scalability issues. Along with access manager, there's something called a credential manager. The way the CA PAM solution is designed, a credential manager is local to each of these boxes.

If you want to scale to multiple data centers and multiple end points, the credential manager is not centralized anymore. We need to have a way to synchronize that. That seems to be one of the biggest issues of scalability.

It has AD integration, but the way they do it is an issue, because it's not scalable. For every active directory identity, it basically creates a local user. It defeats the whole purpose of using a single identity store. That's not a scalable solution to manage identities itself. That's a big issue.

We did submit an enhancement request to CA on multi-tenancy and the active directory implementation, and we don't think they have released any updates. That's a big issue with this product.

How are customer service and technical support?

I would give tech support a rating of 7/10. They're not the best, because the product was acquired from a small company. Just updating the portal with the knowledge base and the support took a long time. We had a bad experience with that.

Once they got all the stuff integrated into the CA support structure, the responsiveness was there, but the relevant information of the tech staff to solve the problem was not there.

Which solution did I use previously and why did I switch?

There were no previous solutions. CA PAM is the new evolution of Privileged Management. We haven't used a PAM solution in the past, and this was our first generation PAM that we used. We didn't move from an existing solution.

How was the initial setup?

Once you have a network, then the reach-out is added. They have something called Outer Discovery, which discovers all the accounts and all the servers’ end points and groups.

I'm not going to say it's very easy, but on the flipside, I'm not going to say it's terribly hard to do it.

The reason it was not easy, was that the end points of the system administrators that have access to PAM needed a version of Java and some Java libraries on the end point.

With logged-on systems in the DOD space, or with the federal space, it's really tough to get those versions installed. The federal government, the central IT, update the Java versions and we don't have control over that. Every time we have an upgrade, it breaks the accessibility of the software.

Even though they say it's a web based tool, they still need a Java version that is compatible and libraries have to be on your client to do it. The Java competence has been a nightmare.

The product installation by itself is fairly easy, but the accessibility is very difficult.

We did reach out to CA and submitted a ticket with them, saying, "Okay, you need to get out of this Java thing, and then have something like HTML-file-based access, so that we don't have to have any of these Java things."

They said, "Great," but nothing has happened so far.

Which other solutions did I evaluate?

We did evaluate other solutions.

  • We did a market research of Xceedium, before CA bought Xceedium Xsuite
  • CyberArk
  • Dell had a tool to do privileged identity management
  • There's another company also, that starts with Cyber, but I don't remember the name

We evaluated these solutions, and Xceedium, which is now CA PAM, stood out.

What other advice do I have?

If you are going for a multi-tenant deployment as an MSP, I would work with CA to see when that feature will be available.

If the local end points are logged down with the Java versions, I would really tell them to pull out the HTML-file-based solution. The accessibility of this tool from the desktops is very, very difficult. Those are two big things for a use case.

I would recommend them to make sure they validate that these things are rolled out and then use it. Other than those two issues, everything else is good.

Asking me to rate the solution is a tough question, because the market research came out well. It stood out. The usability was good.

The accessibility and other issues were big blockers for our customer:

  • The local accounts with AD integration
  • Multi-tenant deployment
  • Java installation on the local machines

Those three elements were the biggest blockers. I would have rated it higher, but because of those three blockers, I'll had to rate it lower. They were very significant blockers for our project when we used it, and we were always putting out fires to do that.

Disclosure: PeerSpot contacted the reviewer to collect the review and to validate authenticity. The reviewer was referred by the vendor, but the review is not subject to editing or approval by the vendor.
PeerSpot user
it_user624780 - PeerSpot reviewer
Director, Managed Services - Analytics & Data Solutions at a tech services company with 51-200 employees
Consultant
We set a rule once, and it can be applied when we add new clients into our cloud environment.

What is most valuable?

  • Consolidates access to all the systems
  • Easy to deploy/virtual
  • Records access for troubleshooting issues

How has it helped my organization?

One example of how it has improved the way my organization functions is that before, we had to deal with the firewall rules between domains to control access. With CA PAM, we simply set the rule once, which can be applied when we add new clients into our cloud environment.

What needs improvement?

They need to improve how it scales. We end up adding new “appliances” to scale for large or complex environments.

I run a multi-tenant cloud environment so I cover multiple domains and environments. So, as we grow our customer base by adding more systems, new customers or have different security zones for new applications/systems for customers, we end up having to add more appliances….we can only scale the virtual resources so much before we start hitting the performance thresholds on the appliance and the thresholds we have set with a customer.

By segregating and/or adding new appliances we even out the load and still maintain the performance we want with our customers. Obviously, I am talking about customers that have a higher access than some other companies.

For how long have I used the solution?

I have used this solution for roughly a year.

What do I think about the stability of the solution?

At the beginning, we did have some stability issues, i.e., until we understood the product, and then the process was better.

What do I think about the scalability of the solution?

There were scalability issues. The architecture forces us to add systems - similar to a Cisco model.

How are customer service and technical support?

The technical support is above average.

Which solution did I use previously and why did I switch?

I have used different systems in the past with other companies that I worked for, so I have been able to compare several of these. CA PAM is the least expensive option than most and is easy to deploy.

How was the initial setup?

The initial setup/configuration was easy. It was more troublesome in finessing the rule sets/processes that needs to be used, which isn’t a product issue but an internal walkthrough of how we wanted the access to be controlled and in what manner.

What's my experience with pricing, setup cost, and licensing?

Negotiate well but more importantly, design your architecture and understand what you will need as you scale (build building blocks).

Which other solutions did I evaluate?

We also evaluated One Identity, Centrify and Microsoft PIM.

What other advice do I have?

Make sure you fully vet out what is needed for the complete process, and understand what you need up front for the initial set and what will be added at what trigger points.

Disclosure: My company has a business relationship with this vendor other than being a customer: We are a CA MSP Partner.
PeerSpot user
it_user589527 - PeerSpot reviewer
IT Infrastructure Manager at a tech services company
Consultant
Individual administrators have access to end points without needing to know passwords. We have had many complications during the implementation.

What is most valuable?

The most important feature is that we do not need to know the passwords any more; just having access to the end point; and that it’s easy to manage users and the account.

How has it helped my organization?

Since we implemented CA PAM in our company, we don't need to pass the passwords to every individual administrator. He just logs in using his own credentials and then searches for the end point he wants to access and that's it. We approve their access and they're ready to administer the end point. This is good because we don't need to change passwords every time one of our colleagues leaves the company.

What needs improvement?

There are many improvements needed. We are always searching for new features and new ways to improve the solution, because I'm just the local administrator. I have a support company which implements the solution. We are always constantly trying to improve new features to upgrade the solution, to understand more ways to facilitate our databases.

For how long have I used the solution?

We are going on the third year. We have had many complications during the implementation.

What do I think about the stability of the solution?

The current release that we are using is much faster than the old ones we were trying. We had several problems with performance and crashes, screens that wouldn’t load up. The final release we are using is much better and more stable.

What do I think about the scalability of the solution?

Now, it is scalable.

How are customer service and technical support?

I would give technical support a 2.5/5. I'm not sure if this is a problem with my local support or CA support, but when we opened a case, it took several days to get a response. It cost me time to get a reply. They'd come back to us to understand what is going on or what was necessary to give support. Between me opening the case and my local support trying to understand what we want; then, they don't know how to solve it and go to CA support and try to understand again; that takes a long time.

Which solution did I use previously and why did I switch?

This is the only one. We got this implementation by bid, so we couldn't choose any company. It was the lowest price and a quicker time to implement.

How was the initial setup?

The first setup was complex. The implementation, to me, was very bad.

Which other solutions did I evaluate?

We did a proof of concept with another solution.

What other advice do I have?

When they came for the proof of concept, we only had access to the system itself. I couldn't try to understand the complexity of implementation or support or all the features that the solution would have to offer. I just saw the main features.

Disclosure: PeerSpot contacted the reviewer to collect the review and to validate authenticity. The reviewer was referred by the vendor, but the review is not subject to editing or approval by the vendor.
PeerSpot user
it_user351294 - PeerSpot reviewer
Technical Director at a tech services company with 51-200 employees
Consultant
It adds another layer of security from the basic OS security of Linux and Windows, although the rule management portion and reporting is very weak on its own.

Valuable Features:

It consists of three components that work well together: access controls, SIEM, and password recording capabilities.

Improvements to My Organization:

The access control component is solid. It adds another layer of security from the basic OS security of Linux and Windows. A lot of customers use it. The segregation is difficult to achieve as different OS's require different skill sets, but in terms of admin, it’s the same cost, and that’s a key benefit.

Room for Improvement:

The rule management portion and reporting is very weak on its own. Also, the login part and visibility are not user friendly, as is management of the policies. Moreover, I can't easily generate the metrics. Once the rules increase, if you can’t cross-reference it becomes a challenge.

Deployment Issues:

With any deployment, you may have overkill, so it’s up to the business to get balance with rules.

Stability Issues:

It’s been in the market a long time, so thankfully it is stable.

Scalability Issues:

Scalability is not an issue because of the architecture. The management piece just manages policies, so you can still go the system and are not handicapped.

Initial Setup:

The initial set up is very straightforward. The complexity is not so much of a problem, but that’s up to the organization.

Other Solutions Considered:

There are not many players in this arena so there aren't many choices. IBM has a solution, but I don’t think they push it.

Other Advice:

Definitely you have to go for a tested solution. This solution doesn’t have bugs, but you should follow CA’s messaging that it’s always good to deploy in small chunks. Applications have problems, and sometimes it’s a process. You just have to expand over time.

Disclosure: I am a real user, and this review is based on my own experience and opinions.
PeerSpot user
Sudip Karmacharya - PeerSpot reviewer
Information Security Specialist at CAS Trading House
Real User
Top 10Leaderboard
A simple-to-integrate solution great for identity governance, but is difficult to configure our requirements
Pros and Cons
  • "It is great for identity governance."
  • "We have to do a lot of manual work to automate features."

What is our primary use case?

It is great for identity governance or identity PAM, CAPAM.

What is most valuable?

It is simple to integrate. For other solutions, we have to install a component that can directly deploy from the OVA in this system.

What needs improvement?

We have to do a lot of manual work to automate features. The initial phase is simple, but it is difficult to configure our requirements. In addition, the integration between Symantec Privileged Access Manager and identity governance has to be better.

For how long have I used the solution?

We have been using this solution for about three years, and it is deployed on-premises. We are planning to deploy on cloud this year.

What do I think about the stability of the solution?

It is a stable solution for PAM. We sometimes have issues with stability and identity governance.

What do I think about the scalability of the solution?

It is scalable because we can add and remove all the models. We have onboarded around 500 users, and actual users are around 100 to 500.

How are customer service and support?

The technical support is not satisfactory. I rate the technical support a four out of ten. Most of the time, they are not accessible, and we can't directly contact Symantec. There is a middle partner we can use to contact dot com support. We are waiting for a solution to the long wait times.

How would you rate customer service and support?

Neutral

What other advice do I have?

I rate this solution a seven out of ten. I recommend this solution because it is suitable for the initial phase and the small business plan.

Disclosure: I am a real user, and this review is based on my own experience and opinions.
PeerSpot user
Buyer's Guide
Download our free Symantec Privileged Access Manager Report and get advice and tips from experienced pros sharing their opinions.
Updated: December 2024
Buyer's Guide
Download our free Symantec Privileged Access Manager Report and get advice and tips from experienced pros sharing their opinions.