One of the most valuable items is the load balancing feature.
Security Consultant
One of the most valuable items is the load balancing feature
What is most valuable?
What needs improvement?
The live session recording is still not in the features.
For how long have I used the solution?
We have used this solution for over a year.
What do I think about the stability of the solution?
There were no issues with stability.
Buyer's Guide
Symantec Privileged Access Manager
October 2024
Learn what your peers think about Symantec Privileged Access Manager. Get advice and tips from experienced pros sharing their opinions. Updated: October 2024.
816,406 professionals have used our research since 2012.
What do I think about the scalability of the solution?
There were no issues with scalability.
How are customer service and support?
I would give technical support a rating of 7/10.
Which solution did I use previously and why did I switch?
This is the first solution.
How was the initial setup?
The setup is one of the advantages of CA PAM, as compared with the other solutions.
Which other solutions did I evaluate?
We evaluated CyberArk, BeyondTrust, and Dell.
What other advice do I have?
The implementation of this product is not a problem and is simple.
Disclosure: PeerSpot contacted the reviewer to collect the review and to validate authenticity. The reviewer was referred by the vendor, but the review is not subject to editing or approval by the vendor.
Engineer at a university with 51-200 employees
Great features that provide comprehensive coverage of what's required for the PAM solution
Pros and Cons
- "Comprehensive coverage of the required features for the PAM solution."
- "The management console could be improved."
What is our primary use case?
Our clients are generally enterprise businesses, mainly in the financial sectors. We are resellers and I'm head of the security business unit.
What is most valuable?
The best features are the comprehensive coverage of the required features for the PAM solution like a credential vault, a session recording, an endpoint agent, security analytics. All those things.
What needs improvement?
I think the management console could be improved. I have just watched a demo video for the management console and I think it may need to be simplified. I haven't yet had hands-on experience with the solution so it's difficult to comment on possible additional features.
For how long have I used the solution?
I've been using this solution for two months.
What do I think about the stability of the solution?
The stability looks okay.
What do I think about the scalability of the solution?
Scalability seems to be fine.
How are customer service and technical support?
I haven't used the support because I've relied on the documentation until now. I think there could be some improvement with that.
What other advice do I have?
I would recommend that anyone thinking of using this solution carry out a proof of concept first.
I would rate this solution an eight out of 10.
Which deployment model are you using for this solution?
On-premises
Disclosure: My company has a business relationship with this vendor other than being a customer: Reseller
Buyer's Guide
Symantec Privileged Access Manager
October 2024
Learn what your peers think about Symantec Privileged Access Manager. Get advice and tips from experienced pros sharing their opinions. Updated: October 2024.
816,406 professionals have used our research since 2012.
Especialista em CA at a computer software company with 201-500 employees
It offers access control of privileged accounts
What is most valuable?
It offers access control of privileged accounts.
How has it helped my organization?
It has simplified and unified the access of the users to a single point of access. It grants access identity to privileged accounts.
What needs improvement?
I would like to see improvements in branding customization and multi-tenancy.
For how long have I used the solution?
We have been using this solution for six months
What do I think about the stability of the solution?
The solution is not implemented for end users, so we haven't had any problems so far.
What do I think about the scalability of the solution?
There were no issues with scalability.
How are customer service and technical support?
Technical support is very good.
Which solution did I use previously and why did I switch?
We did not use a different solution before.
How was the initial setup?
The initial was setup straightforward and simple. The solution does not need any complex customization to deploy and start using it.
What's my experience with pricing, setup cost, and licensing?
Just measure all the necessities before starting and all will be okay.
What other advice do I have?
Keep in mind that the product can be implemented quickly, but it depends on how fast you can provide information.
Disclosure: My company has a business relationship with this vendor other than being a customer: We are partners.
Consultor Senior TI y Seguridad de Datos at a tech services company
The deployment was straightforward, the provisioning, too. In general, it's not complicated to work with this solution.
What is most valuable?
Session Recording: This feature is very useful and powerful. This application is very easy, fast, and trustworthy!
How has it helped my organization?
This product allows the administrator of users control of the vault of passwords, in the sense that is known who are the privileged users and who has the power to close the session for security issues.
The answer for the requirements of the users is faster and stable. The Session Recording function in audits is accurate and functional.
What needs improvement?
The integration with AS/400 Endpoint via Transparent Login could be better and useful for some users.
For how long have I used the solution?
Almost one year.
What do I think about the stability of the solution?
Not yet.
What do I think about the scalability of the solution?
Not yet.
How are customer service and technical support?
Good.
Which solution did I use previously and why did I switch?
No.
How was the initial setup?
The deployment was straightforward, and the provisioning, too. In general, it's not complicated to work with this solution.
What's my experience with pricing, setup cost, and licensing?
They can request a trial, and if the results are positive, make a PoC.
Which other solutions did I evaluate?
We are a partner of CA. The tests were only executed for this product (CA PAM).
What other advice do I have?
Try the product.
Disclosure: My company has a business relationship with this vendor other than being a customer: Partner.
Works
Monitoring privileged users’ actions is valuable because of the possible impact of an insider breach incident.
What is most valuable?
Monitoring privileged users’ actions is valuable because of the high level of trust and wide-ranging access insiders typically enjoy. The impact of an insider breach incident can be quite high.
How has it helped my organization?
- Integrates your management
What needs improvement?
Customers want simultaneous monitoring of users’ actions, so a manager can block the session immediately in case of a user violation.
For how long have I used the solution?
I have used it for six years.
What do I think about the stability of the solution?
We had some issues with the load balancing feature when configured for clustering.
What do I think about the scalability of the solution?
We have not encountered any scalability issues.
How are customer service and technical support?
Technical support is average.
Which solution did I use previously and why did I switch?
We did not previously use a different solution.
How was the initial setup?
Initial setup was simple because of the rule-based configuration.
What's my experience with pricing, setup cost, and licensing?
Reduce the price by subdividing the license bundle.
Which other solutions did I evaluate?
Before choosing this product, we did not evaluate other options.
What other advice do I have?
It is the best solution for managing privileged users.
Disclosure: PeerSpot contacted the reviewer to collect the review and to validate authenticity. The reviewer was referred by the vendor, but the review is not subject to editing or approval by the vendor.
Senior Engineer at a tech services company with 1,001-5,000 employees
It has been reliable down the line with new features and updates
What is most valuable?
Access management and security compliance.
How has it helped my organization?
It started with the basic features, and gradually they added SCP, FTP, and also the API calls that helped us to meet the Automation at our end.
What needs improvement?
Role mapping, high availability, coverage of more important AWS data centers in Frankfurt.
For how long have I used the solution?
I've used this solution for three years
What do I think about the stability of the solution?
It has been reliable down the line with new features and updates.
What do I think about the scalability of the solution?
Yeah, it still does not support HA in Multi AZ subnets.
How are customer service and technical support?
Yeah, it's great. I would give it a nine out of 10.
Which solution did I use previously and why did I switch?
We selected it after the evaluation of multiple products.
How was the initial setup?
It's easy to configure and with the help of their documentation, one can easily do that.
What's my experience with pricing, setup cost, and licensing?
Yeah, this is an expensive product.
Which other solutions did I evaluate?
It's confidential.
What other advice do I have?
I would say definitely to use it if you've got a high number of systems and are concern about security.
Disclosure: PeerSpot contacted the reviewer to collect the review and to validate authenticity. The reviewer was referred by the vendor, but the review is not subject to editing or approval by the vendor.
Systems/Software Engineer at a tech vendor with 10,001+ employees
Used for securing privileged accounts
What is most valuable?
Used for securing privileged accounts. This is the why people choose this particular product: To manage credentials and record sessions.
How has it helped my organization?
DXC has created a managed service offering based on it.
What needs improvement?
- The user interface and dependence on applets and Windows could use some improvement.
- Increased the compatibility with other browsers.
- Remove the Java applet dependency (it is being depreciated).
For how long have I used the solution?
We have been using this solution for 12 months.
What do I think about the stability of the solution?
We did not encounter any issues with stability.
What do I think about the scalability of the solution?
We did not encounter any issues with scalability.
How are customer service and technical support?
Technical support could be improved.
Which solution did I use previously and why did I switch?
We haven’t switched from a previous solution, but rather added an additional option to our offering catalog.
How was the initial setup?
The initial setup was straightforward.
Which other solutions did I evaluate?
Before choosing this product, we evaluated CyberArk PAM.
What other advice do I have?
Make sure you are certified from the official CA course.
Disclosure: My company has a business relationship with this vendor other than being a customer: We are partners.
Security and Governance Manager (Principal Director) at a tech services company with 201-500 employees
The solution has the capability to address hybrid eco-systems
What is most valuable?
The solution has the capability to address hybrid eco-systems, both on-premises and cloud services. Most of the high privileges now include tenant administrator credentials.
Integration with the AD RBAC model is also a great feature, as we can tie it to the central repository.
The FIPS-140-2 certification is really a nice option with every governmental response.
How has it helped my organization?
The solution allows us to ease the risks and headaches with administrators turning to our IT team.
What needs improvement?
I would like the ability to provision through a real REST API. Perhaps this could be SCIM-PAM, once it is certified.
For how long have I used the solution?
We have used this solution for more than a year for training, PoC, and laboratory use cases.
What do I think about the stability of the solution?
Some rollover credentials often do not work or you need a more complex configuration.
What do I think about the scalability of the solution?
There were no issues with scalability.
How is customer service and technical support?
Technical support has yet to be included completely in the CA Support.
How was the initial setup?
Some rollover scenarios can complex to achieve.
Which other solutions did I evaluate?
We evaluated Sudo-AD and CyberArk.
What other advice do I have?
Have a good view of their role model and critical assets.
Disclosure: My company has a business relationship with this vendor other than being a customer: We are a technological partner for reselling.
Buyer's Guide
Download our free Symantec Privileged Access Manager Report and get advice and tips from experienced pros
sharing their opinions.
Updated: October 2024
Product Categories
Privileged Access Management (PAM)Popular Comparisons
CyberArk Privileged Access Manager
Delinea Secret Server
BeyondTrust Endpoint Privilege Management
WALLIX Bastion
One Identity Safeguard
ARCON Privileged Access Management
MasterSAM PMS
Buyer's Guide
Download our free Symantec Privileged Access Manager Report and get advice and tips from experienced pros
sharing their opinions.
Quick Links
Learn More: Questions:
- When evaluating Privileged Identity Management, what aspect do you think is the most important to look for?
- Which is the best Privileged Account Management solution?
- What are the top 5 PAM solutions that can be implemented which cover both hybrid and cloud?
- What are the top 5 PAM solutions?
- How will AI and ML help or work with PIM/PAM?
- Is BeyondTrust Endpoint Privilege Management really expensive compared to other tools or software?
- What is the difference between PAM and PAS?
- What is the difference between IDAM , PIM and PAM?
- Which PAM tool do you prefer: CyberArk Privileged Access Manager, One Identity Safeguard, Delinea Secret Server, or BeyondTrust Privileged Remote A
- What is the best approach to limiting privileges for administrators?