Senior Data Engineer at a non-profit with 1,001-5,000 employees
Real User
Top 20
2024-10-29T13:05:27Z
Oct 29, 2024
It would be beneficial to have better control and alignment between frequent updates and improved communication regarding possible negative effects on existing customer bases. Also, documentation sometimes lags behind the new features which can be a problem.
Senior Devops Engineer at a transportation company with 51-200 employees
Real User
Top 20
2024-08-16T16:52:28Z
Aug 16, 2024
We started to use it as a client-side or split tunnel VPN. We are unable to overwrite the endpoints and direct traffic that way, but that's a technical limitation, and I understand why it's there.
Find out what your peers are saying about StrongDM, CyberArk, Keeper Security, Inc. and others in Privileged Access Management (PAM). Updated: December 2024.
What is Privileged Access Management? Privileged access management (PAM) oversees requirements of critical, private accounts living in an enterprise’s IT infrastructure.
It would be beneficial to have better control and alignment between frequent updates and improved communication regarding possible negative effects on existing customer bases. Also, documentation sometimes lags behind the new features which can be a problem.
We started to use it as a client-side or split tunnel VPN. We are unable to overwrite the endpoints and direct traffic that way, but that's a technical limitation, and I understand why it's there.