Senior Devops Engineer at a transportation company with 51-200 employees
Real User
Top 20
2024-08-16T16:52:28Z
Aug 16, 2024
We started to use it as a client-side or split tunnel VPN. We are unable to overwrite the endpoints and direct traffic that way, but that's a technical limitation, and I understand why it's there.
Find out what your peers are saying about StrongDM, CyberArk, Keeper Security, Inc. and others in Privileged Access Management (PAM). Updated: November 2024.
What is Privileged Access Management? Privileged access management (PAM) oversees requirements of critical, private accounts living in an enterprise’s IT infrastructure.
We started to use it as a client-side or split tunnel VPN. We are unable to overwrite the endpoints and direct traffic that way, but that's a technical limitation, and I understand why it's there.