Learn More

Average Ratings 0 Ratings

Total
ease
features
design
support

No User Reviews. Be the first to provide a review:

Write a Review

Average Ratings 100 Ratings

Description

Netwrix Privilege Secure is a privileged access management solution built to secure critical systems by removing permanent administrative privileges. It follows a zero standing privilege model, where access is created only when needed and automatically removed after the task is complete. This approach helps reduce the attack surface and prevents unauthorized lateral movement within networks. The platform offers just-in-time access controls that allow users to perform tasks without maintaining constant elevated permissions. It includes session monitoring and recording features that provide visibility into privileged activities for auditing and compliance purposes. Netwrix Privilege Secure also enables secure remote access through browser-based sessions that are protected with multi-factor authentication. The software can scan environments to identify hidden accounts and eliminate unnecessary privileges quickly. It provides granular permission controls to ensure users receive only the access required for specific tasks. The solution integrates with existing IT systems and supports both on-premise and hybrid environments. Automation features simplify privilege management and reduce manual administrative work. With its focus on security and efficiency, it helps organizations manage privileged access more effectively while maintaining compliance standards.

Description

Access and access management today have become more complex and frustrating. strongDM redesigns access around the people who need it, making it incredibly simple and usable while ensuring total security and compliance. We call it People-First Access. End users enjoy fast, intuitive, and auditable access to the resources they need. Administrators gain precise controls, eliminating unauthorized and excessive access permissions. IT, Security, DevOps, and Compliance teams can easily answer who did what, where, and when with comprehensive audit logs. It seamlessly and securely integrates with every environment and protocol your team needs, with responsive 24/7 support.

API Access

Has API

API Access

Has API

Screenshots View All

Screenshots View All

Integrations

AWS Secrets Manager
Active Directory
Amazon CloudWatch
Amazon RDS
Amazon Redshift
Box
Datadog
Digital.ai Agility
DigitalOcean
Fedora
Google Cloud BigQuery
Greenplum
HashiCorp Vault
Jira Align
Microsoft Azure
MongoDB Atlas
Okta
Presto
Puppet Enterprise
Rackspace

Integrations

AWS Secrets Manager
Active Directory
Amazon CloudWatch
Amazon RDS
Amazon Redshift
Box
Datadog
Digital.ai Agility
DigitalOcean
Fedora
Google Cloud BigQuery
Greenplum
HashiCorp Vault
Jira Align
Microsoft Azure
MongoDB Atlas
Okta
Presto
Puppet Enterprise
Rackspace

Pricing Details

No price information available.
Free Trial
Free Version

Pricing Details

$70/user/month
Free Trial
Free Version

Deployment

Web-Based
On-Premises
iPhone App
iPad App
Android App
Windows
Mac
Linux
Chromebook

Deployment

Web-Based
On-Premises
iPhone App
iPad App
Android App
Windows
Mac
Linux
Chromebook

Customer Support

Business Hours
Live Rep (24/7)
Online Support

Customer Support

Business Hours
Live Rep (24/7)
Online Support

Types of Training

Training Docs
Webinars
Live Training (Online)
In Person

Types of Training

Training Docs
Webinars
Live Training (Online)
In Person

Vendor Details

Company Name

Netwrix

Founded

2006

Country

United States

Website

netwrix.com/en/products/privilege-secure/

Vendor Details

Company Name

StrongDM

Founded

2015

Country

United States

Website

www.strongdm.com/

Product Features

Privileged Access Management

Application Access Control
Behavioral Analytics
Credential Management
Endpoint Management
For MSPs
Granular Access Controls
Least Privilege
Multifactor Authentication
Password Management
Policy Management
Remote Access Management
Threat Intelligence
User Activity Monitoring

Product Features

Computer Security

Anti Spam
Antivirus
Audit Trail
Compliance Management
Database Security Audit
File Access Control
Financial Data Protection
Maintenance Scheduling
Real Time Monitoring
Security Event Log
Virus Definition Update
Vulnerability Protection

Customer Identity and Access Management (CIAM)

Access Certification
Access Management
Analytics / Reporting
Automatic User/Device Recognition
Behavioral Analytics
Credential Management
Data Security
Multi-Factor Authentication (MFA)
Privacy / Consent Management
Real Time Notifications
Self-Service Portal
Single Sign On
User Provisioning

Database

Backup and Recovery
Creation / Development
Data Migration
Data Replication
Data Search
Data Security
Database Conversion
Mobile Access
Monitoring
NOSQL
Performance Analysis
Queries
Relational Interface
Virtualization

Privileged Access Management

Application Access Control
Behavioral Analytics
Credential Management
Endpoint Management
For MSPs
Granular Access Controls
Least Privilege
Multifactor Authentication
Password Management
Policy Management
Remote Access Management
Threat Intelligence
User Activity Monitoring

Alternatives

Alternatives

Devolutions PAM Reviews

Devolutions PAM

Devolutions