+
+

Related Products

  • ThreatLocker
    499 Ratings
    Visit Website
  • ManageEngine Endpoint Central
    2,482 Ratings
    Visit Website
  • Keeper Security
    1,748 Ratings
    Visit Website
  • Airlock Digital
    35 Ratings
    Visit Website
  • JDisc Discovery
    27 Ratings
    Visit Website
  • DriveLock
    1 Rating
    Visit Website
  • ManageEngine ADAudit Plus
    483 Ratings
    Visit Website
  • StrongDM
    96 Ratings
    Visit Website
  • Uniqkey
    181 Ratings
    Visit Website
  • ManageEngine ADManager Plus
    587 Ratings
    Visit Website

About

Eliminate unnecessary privileges and elevate rights to Windows, Mac, Unix, Linux and network devices without hindering productivity. Our experience implementing across over 50 million endpoints has helped create a deployment approach with rapid time to value. Available on-premise or in the cloud, BeyondTrust enables you to eliminate admin rights quickly and efficiently, without disrupting user productivity or driving up service desk tickets. Unix and Linux systems present high-value targets for external attackers and malicious insiders. The same holds true for networked devices, such as IoT, ICS and SCADA. Gaining root or other privileged credentials makes it easy for attackers to fly under the radar and access sensitive systems and data. BeyondTrust Privilege Management for Unix & Linux is an enterprise-class, gold-standard privilege management solution that helps security and IT organizations achieve compliance.

About

Privilege Manager offers simple, secure, and centralized access rights management. Improved user productivity– by not having to wait for a simple task to be authorized by a service desk, users no longer need to wait and can continue to work on the task at hand. That’s just one more way our Privileged Access Management (PAM) services ultimately improve user productivity and reduce the need for a service desk. Most users will no longer need to submit a service desk ticket when they’re safely given the access they need just for the tasks they’re allowed. Faster equipment deployment-with predefined user profiles, they can be applied to machines across the enterprise. Our PAM solution reduces the burden of creating them one by one and applying each profile individually.

Platforms Supported

Windows
Mac
Linux
Cloud
On-Premises
iPhone
iPad
Android
Chromebook

Platforms Supported

Windows
Mac
Linux
Cloud
On-Premises
iPhone
iPad
Android
Chromebook

Audience

IT teams and anyone seeking a solution to manage privileges and elevate rights

Audience

Companies wanting a solution that enables tighter security policies for all devices and streamlined workflows

Support

Phone Support
24/7 Live Support
Online

Support

Phone Support
24/7 Live Support
Online

API

Offers API

API

Offers API

Screenshots and Videos

Screenshots and Videos

Pricing

No information available.
Free Version
Free Trial

Pricing

No information available.
Free Version
Free Trial

Reviews/Ratings

Overall 0.0 / 5
ease 0.0 / 5
features 0.0 / 5
design 0.0 / 5
support 0.0 / 5

This software hasn't been reviewed yet. Be the first to provide a review:

Review this Software

Reviews/Ratings

Overall 0.0 / 5
ease 0.0 / 5
features 0.0 / 5
design 0.0 / 5
support 0.0 / 5

This software hasn't been reviewed yet. Be the first to provide a review:

Review this Software

Training

Documentation
Webinars
Live Online
In Person

Training

Documentation
Webinars
Live Online
In Person

Company Information

BeyondTrust
Founded: 1985
United States
www.beyondtrust.com/privilege-management

Company Information

Recast Software
Founded: 2015
United States
www.recastsoftware.com/privilege-manager

Alternatives

Alternatives

Categories

Categories

Integrations

AriLinc
Axonius
InsightAppSec
Intellicta
Lucidum
Nucleus
Orchid Security
PangaeAPI
Proofpoint Identity Threat Defense
Qualys WAS
TCS ADD
TCS CHROMA
TCS HOBS
TCS MasterCraft DataPlus
TCS MasterCraft DevPlus
TCS MasterCraft TransformPlus
TCS Optumera
TCS TAP
Tenable One
ThreatAware

Integrations

AriLinc
Axonius
InsightAppSec
Intellicta
Lucidum
Nucleus
Orchid Security
PangaeAPI
Proofpoint Identity Threat Defense
Qualys WAS
TCS ADD
TCS CHROMA
TCS HOBS
TCS MasterCraft DataPlus
TCS MasterCraft DevPlus
TCS MasterCraft TransformPlus
TCS Optumera
TCS TAP
Tenable One
ThreatAware
Claim BeyondTrust Endpoint Privilege Management and update features and information
Claim BeyondTrust Endpoint Privilege Management and update features and information
Claim Recast Software Privilege Manager and update features and information
Claim Recast Software Privilege Manager and update features and information