Privileged Account Management Solutions. PHOTO: Cybercrime Magazine.

Directory Of Privileged Account Management Vendors To Watch in 2019

Find the top PAM solutions in this annual guide

Steve Morgan, Editor-in-Chief

Sausalito, Calif. – Jul. 27, 2019

One out of three hackers says that accessing privileged accounts is the easiest and fastest way to get at sensitive data, according to a survey from Thycotic, a leading privileged account management (PAM) vendor.

A companion infographic to the survey, which was conducted at a Black Hat Conference in Las Vegas, indicates that the number one source of cyber fatigue is remembering and changing passwords.

As the threat to privileged accounts has grown, so has the market for PAM solutions. Our annual directory provides readers with a list of vendors in the U.S. and internationally.

The PAM vendors we follow, and you should too…

The first edition of the PAM List for 2019 provides an alphabetical listing of top privileged account management vendors we follow globally.

  • Bomgar, Atlanta, Ga.— The acquisition of Lieberman Software, a leading privileged identity and credential management technology provider, enables Bomgar to take a big leap forward to create a best-in-class Privileged Access and Identity portfolio.  
  • CA Technologies, New York City, N.Y. — Privileged Access Management solutions from CA are one of the critical technologies that businesses are implementing to combat insider threats and targeted breaches. 
  • Centrify, Mountain View, Calif.— Comprehensive privileged identity management for Infrastructure-as-a-Service (IaaS).
  • Core Security, Roswell, Ga. — SecureAuth + Core Security, provides enterprises with market-leading, threat-aware, identity, access and vulnerability management solutions that enable actionable intelligence and context needed to manage security risks across the enterprise.
  • Cyber Ark, Newton, Mass. — Privileged access security solution dedicated to stopping attacks before they stop business, CyberArk proactively secures against cyber threats before attacks can escalate and do irreparable damage.

  • Devolutions, Quebec City, Canada — See how the right PAM solution can diminish the risks posed by insider threats, data breaches, and meeting audit and compliance requirements. 
  • EKRAN System, Washington, D.C. — Record all terminal, remote, and local user sessions. Alert security personnel to suspicious events.
  • Hashi Corp, San Francisco, Calif. — Leverage any trusted source of identity to enforce access to systems, secrets, and applications.
  • Help Systems, Eden Prairie, Minn. — Secure your system, automate IT, and access the information you need.
  • Hitachi ID Systems, Calgary, Canada — comprehensive identity management and access governance, privileged access management and password management solutions.
  • Iraje, Pleasanton, Calif. — Manage Privileged Accounts within an organization to ensure every action/activity of these users is auditable.
  • Krontech, Jersey City, N.J. — Krontech helps enterprises secure their networks with Access Control Security software and solutions. We help organizations reduce risks and operate more efficiently.
  • Manage Engine (Zoho Corporation) Pleasanton, Calif. — Privileged access management (PAM) helps in maintaining the security of your network. ADManager Plus helps with PAM through its various reports and functionalities.
  • Micro Focus (Net IQ) Houston, Texas — Privileged Account Manager allows IT administrators to work on systems without exposing administrator or supervisor passwords, or root-account credentials.
  • MT4 Networks, São Paulo, Brazil — MT4networks emerged in 2010 as a division of MT4 Technology to meet the growing demand for specialized network solutions and services.
  • ObserveIT, New York City, N.Y. — To stop both malicious and accidental insider threats, you must continuously monitor all user activity. With ObserveIT’s comprehensive insider threat management solution, your organization can swiftly identify and eliminate risks.
  • Okta, San Francisco, Calif. — The Okta Identity Cloud is the foundation for secure connections between people and technology.
  • One Identity, Aliso Viejo, Calif. —  Provide appropriate access to privileged accounts, bolster security, achieve compliance, decrease risk, streamline administration, extend governance and more with One Identity Privileged Access Management solutions.
  • Raz-Lee Security — Raz-Lee has created a suite of solutions for IBM i-servers that help companies meet auditing, regulatory, and company security policy requirements as well as business intelligence tools for analyzing data and presenting actionable information. 
  • Red Hat, Raleigh, N.C. — Privileged User Manager® (“PUM ”) is a low cost, high-quality software application designed to manage and monitor the use of administrator accounts over a network of UNIX and Linux based systems.
  • Thycotic, Washington, D.C. — Extremely easy to manage security tools empower over 10,000 organizations, from mid-sized businesses to the Fortune 500, to limit privileged account risk, implement least privilege policies, control applications, and demonstrate compliance.
  • Wallix, Paris, France— Cybersecurity software vendor dedicated to defending and fostering organizations’ success and renown against the cyber threats they are facing. 
  • Xton Technologies, Feasterville-Trevose, Penn.  XTON Access Manager helps you maintain much-needed control and security of your privileged accounts and systems.

For information about this list, contact the editors at Cybersecurity Ventures.

Steve Morgan is founder and Editor-in-Chief at Cybersecurity Ventures.

Go here to read all of my blogs and articles covering cybersecurity. Go here to send me story tips, feedback and suggestions.