Average Ratings 1 Rating
Average Ratings 2 Ratings
Description
Ensure the security of your organization by actively thwarting the harmful exploitation of privileged accounts and credentials, which often serve as gateways to your most critical assets. The CyberArk PAM as a Service offers advanced automation technologies designed to safeguard your business during its expansion. Since cyber adversaries are constantly searching for vulnerabilities, effectively managing privileged access is essential to reduce potential risks. By preventing the exposure of credentials, you can protect vital resources from being compromised. Additionally, uphold compliance through thorough documentation of significant events and secure audits that resist tampering. The Privileged Access Manager seamlessly connects with a variety of applications, platforms, and automation tools, enhancing your overall security framework. This integration not only streamlines operations but also fortifies your defenses against ever-evolving threats.
Description
IT teams often face difficulties managing shared credentials and accounts securely, especially when multiple users need access to the same resources. Devolutions Server (DVLS) offers a self-hosted, shared account and credential management solution that helps organizations centralize, secure, and audit their credentials. By providing role-based access controls, encryption, and audit logs, DVLS ensures that only authorized users can access critical accounts, minimizing security risks and improving compliance.
In addition to core credential management, DVLS includes optional privileged access components for organizations needing enhanced control over sensitive accounts. Seamlessly integrated with Remote Desktop Manager, it allows IT professionals to manage both credentials and remote sessions securely from a single platform. With DVLS, organizations can optimize their credential management processes while maintaining the highest level of security and accountability.
API Access
Has API
API Access
Has API
Integrations
Devolutions Remote Desktop Manager
BackBox
Chef
CloudBees
Delinea Cloud Access Controller
Docker
Fortra Event Manager
InsightAppSec
Logsign
Microsoft 365
Integrations
Devolutions Remote Desktop Manager
BackBox
Chef
CloudBees
Delinea Cloud Access Controller
Docker
Fortra Event Manager
InsightAppSec
Logsign
Microsoft 365
Pricing Details
No price information available.
Free Trial
Free Version
Pricing Details
$3/month/user
Free Trial
Free Version
Deployment
Web-Based
On-Premises
iPhone App
iPad App
Android App
Windows
Mac
Linux
Chromebook
Deployment
Web-Based
On-Premises
iPhone App
iPad App
Android App
Windows
Mac
Linux
Chromebook
Customer Support
Business Hours
Live Rep (24/7)
Online Support
Customer Support
Business Hours
Live Rep (24/7)
Online Support
Types of Training
Training Docs
Webinars
Live Training (Online)
In Person
Types of Training
Training Docs
Webinars
Live Training (Online)
In Person
Vendor Details
Company Name
CyberArk
Founded
1999
Country
United States
Website
www.cyberark.com/products/privileged-access-manager/
Vendor Details
Company Name
Devolutions
Founded
2004
Country
Canada
Website
devolutions.net/server/
Product Features
Network Security
Access Control
Analytics / Reporting
Compliance Reporting
Firewalls
Internet Usage Monitoring
Intrusion Detection System
Threat Response
VPN
Vulnerability Scanning
Privileged Access Management
Application Access Control
Behavioral Analytics
Credential Management
Endpoint Management
For MSPs
Granular Access Controls
Least Privilege
Multifactor Authentication
Password Management
Policy Management
Remote Access Management
Threat Intelligence
User Activity Monitoring
Product Features
Password Management
Credential Management
Multifactor Authentication
Password Generator
Password Reset
Password Synchronization
Single Sign On
User Management
Privileged Access Management
Application Access Control
Behavioral Analytics
Credential Management
Endpoint Management
For MSPs
Granular Access Controls
Least Privilege
Multifactor Authentication
Password Management
Policy Management
Remote Access Management
Threat Intelligence
User Activity Monitoring