Senior Data Engineer at a non-profit with 1,001-5,000 employees
Real User
Top 20
2024-10-29T13:05:27Z
Oct 29, 2024
It would be beneficial to have better control and alignment between frequent updates and improved communication regarding possible negative effects on existing customer bases. Also, documentation sometimes lags behind the new features which can be a problem.
Senior Devops Engineer at a transportation company with 51-200 employees
Real User
Top 20
2024-08-16T16:52:28Z
Aug 16, 2024
We started to use it as a client-side or split tunnel VPN. We are unable to overwrite the endpoints and direct traffic that way, but that's a technical limitation, and I understand why it's there.
Find out what your peers are saying about StrongDM, CyberArk, Keeper Security, Inc. and others in Privileged Access Management (PAM). Updated: January 2025.
Privileged Access Management (PAM) solutions provide organizations with the ability to secure, control, and monitor access to critical information and resources by privileged users.
PAM is crucial for businesses that need to safeguard sensitive data and maintain compliance with industry regulations. It restricts privileged access to only those users who need it and tracks their activities, helping prevent security breaches. Solutions in the PAM category offer comprehensive tools to manage...
It would be beneficial to have better control and alignment between frequent updates and improved communication regarding possible negative effects on existing customer bases. Also, documentation sometimes lags behind the new features which can be a problem.
We started to use it as a client-side or split tunnel VPN. We are unable to overwrite the endpoints and direct traffic that way, but that's a technical limitation, and I understand why it's there.