Home > Awards > Privileged Access Management

Data Quadrant Awards 2024

Privileged Access Management


SoftwareReviews names senhasegura, Microsoft Entra PIM, Osirium PAM, CyberArk Privileged Access Manager, AWS Secrets Manager, and ARCON PAM as Privileged Access Management Data Quadrant Award Winners.


View Category

Privileged Access Management

Data Quadrant

Data Quadrants are proudly founded in 100% user review data and are free of traditional "magical" components such as market presence and analyst opinion, which are opaque in nature and may be influenced by vendor pressure, financial or otherwise.

The SoftwareReviews Data Quadrant evaluates and ranks products based on feedback from IT and business professionals. The placement of a software in the Data Quadrant indicates its relative ranking as well as its categorization.

Read The In-Depth Report

A thorough evaluation and ranking of all software in an individual category to compare software across every dimension.

  • user satisfaction rankings
  • |
  • vendor capability comparisons
  • |
  • business value scores
  • |
  • individual feature evaluations
  • |
  • emotional connection to products
Download Now

30+ pages

Privileged Access Management  Data Quadrant

Note Software product placement is based on the scores provided by users, recency of the reviews, and review volume. Axes are dynamically adjusted based on the minimum and maximum values in the data set.

Evaluate the Complete

Software Experience

When distilled down, the software experience is shaped by both the experience with the software and the relationship with the vendor. Evaluating enterprise software along these two dimensions provides a comprehensive understanding of the product and helps identify vendors that can deliver on both.

Product Features and Satisfaction

The satisfaction is captured in the overall satisfaction score, which is driven by the likelihood of users to recommend the software, combined with user satisfaction across top product features.

Vendor Experience and Capabilities

The vendor relationship is calculated in a weighted average of the satisfaction scores tied to vendor capabilities (e.g. software implementation, training, customer support, product roadmap) as well as emotional response ratings toward the vendor (e.g. trustworthy, respectful, fair).

Gold Medalists


senhasegura USA LLC

senhasegura

senhasegura Privileged Access Management protects and controls the use of credentials, providing secure storage and full traceability. The solution allows companies to implement credential access controls with credentials, eliminating privilege abuse and protecting the IT infrastructure from data and compliance breaches. senhasegura PAM provides an all-in-one solution, recognized by its easy deployement and excellent customer service. Manage Accounts, Sessions, Endpoints, DevOps Secret, Certificates, Third Party access, and Cloud environments. The solution also helps companies to comply with market and business requirements, such as GDPR, PCI DSS, SOX, NIST, HIPAA, ISO 27001 and ISA 62443.

8.8

Composite
Score

Composite
Score

+93

Emotional
Footprint

Emotional
Footprint

97%

Likeliness to
Recommend

Likeliness
to Recommend

Badge Winner
26Reviews

Microsoft Corporation

Microsoft Entra PIM

Microsoft Entra ID ( Formerly Azure AD) Protect access to resources and data using strong authentication and risk-based adaptive access policies without compromising user experience. Provide a fast, easy sign-in experience across your multi cloud environment to keep your users productive, reduce time managing passwords, and increase productivity. Manage all your identities and access to all your applications in a central location, whether they’re in the cloud or on-premises, to improve visibility and control.

8.6

Composite
Score

Composite
Score

+91

Emotional
Footprint

Emotional
Footprint

87%

Likeliness to
Recommend

Likeliness
to Recommend

Badge Winner
34Reviews

SailPoint Technologies Holdings, Inc.

Osirium PAM

Privileged Access Management and Automation to protect vital IT assets and securely automate business and IT processes.

8.5

Composite
Score

Composite
Score

+90

Emotional
Footprint

Emotional
Footprint

88%

Likeliness to
Recommend

Likeliness
to Recommend

Badge Winner
26Reviews

CyberArk Software Ltd

CyberArk Privileged Access Manager

The Core Privileged Access Security Solution unifies Enterprise Password Vault, Privileged Session Manager and Privileged Threat Analytics to protect an organization’s most critical assets.

8.4

Composite
Score

Composite
Score

+91

Emotional
Footprint

Emotional
Footprint

92%

Likeliness to
Recommend

Likeliness
to Recommend

Badge Winner
27Reviews

Amazon

AWS Secrets Manager

Easily rotate, manage, and retrieve database credentials, API keys, and other secrets through their lifecycle

8.2

Composite
Score

Composite
Score

+87

Emotional
Footprint

Emotional
Footprint

90%

Likeliness to
Recommend

Likeliness
to Recommend

Badge Winner
21Reviews

ARCON Company

ARCON PAM

ARCON | Privileged Access Management (PAM) offers enterprise IT security, risk and compliance management teams with necessary safeguards to securely manage the lifecycle of privileged accounts. A highly scalable and enterprise-class solution, ARCON | PAM seamlessly works in all IT environments to secure privileged accounts. The solution implements the best privilege access management practices to build a foundation for robust identity and access control IT architecture.

8.2

Composite
Score

Composite
Score

+89

Emotional
Footprint

Emotional
Footprint

86%

Likeliness to
Recommend

Likeliness
to Recommend

Badge Winner
30Reviews

Vendor Capability Awards


Availability and Quality of Training

AWS Secrets Manager

Badge Winner

Breadth of Features

senhasegura

Badge Winner

Business Value Created

RSA SecurID

Badge Winner

Ease of Customization

Microsoft Entra PIM

Badge Winner

Ease of Data Integration

Osirium PAM

Badge Winner

Ease of IT Administration

RSA SecurID

Badge Winner

Ease of Implementation

senhasegura

Badge Winner

Product Strategy and Rate of Improvement

Osirium PAM

Badge Winner

Quality of Features

RSA SecurID

Badge Winner

Usability and Intuitiveness

AWS Secrets Manager

Badge Winner

Vendor Support

Osirium PAM

Badge Winner

Vendor Capability Awards


Availability and Quality of Training

AWS Secrets Manager


Breadth of Features

senhasegura


Business Value Created

RSA SecurID


Ease of Customization

Microsoft Entra PIM


Ease of Data Integration

Osirium PAM


Ease of IT Administration

RSA SecurID


Ease of Implementation

senhasegura


Product Strategy and Rate of Improvement

Osirium PAM


Quality of Features

RSA SecurID


Usability and Intuitiveness

AWS Secrets Manager


Vendor Support

Osirium PAM


Other Evaluated Vendors


RSA

RSA SecurID

RSA SecurID Suite enables organizations of all sizes to mitigate identity risk and maintain compliance without impeding user productivity. It ensures users have appropriate access and confirms they are who they say they are with a modern, convenient user experience. In addition, RSA SecurID Suite provides unified visibility and control across organizations’ many islands of identity.

8.1

Composite
Score

Composite
Score

+91

Emotional
Footprint

Emotional
Footprint

93%

Likeliness to
Recommend

Likeliness
to Recommend

15Reviews

JumpCloud

JumpCloud

At the intersection of devices, identities, and access, JumpCloud's cloud directory platform unifies the IT resources in any company's infrastructure.

8.1

Composite
Score

Composite
Score

+88

Emotional
Footprint

Emotional
Footprint

92%

Likeliness to
Recommend

Likeliness
to Recommend

35Reviews

WALLIX

WALLIX Bastion

Centralized control and monitoring of privileged access to sensitive assets. Secure your strategic data and critical assets. Ensure protection of your infrastructure against cyber risks.

8.0

Composite
Score

Composite
Score

+99

Emotional
Footprint

Emotional
Footprint

88%

Likeliness to
Recommend

Likeliness
to Recommend

19Reviews

Delinea

Delinea Secret Server

Delinea Secret Server (Formerly Thycotic) - Protect your privileged accounts with our enterprise-grade Privileged Access Management (PAM) solution.

7.7

Composite
Score

Composite
Score

+87

Emotional
Footprint

Emotional
Footprint

89%

Likeliness to
Recommend

Likeliness
to Recommend

19Reviews

BeyondTrust Corporation

BeyondTrust

BeyondTrust Privilege Management approach to cyber security secures every user, asset, and session across your enterprise. Deployed as SaaS or on-premises, BeyondTrust's Universal Privilege Management approach simplifies deployments, reduces costs, improves usability, and reduces privilege risks.

7.7

Composite
Score

Composite
Score

+90

Emotional
Footprint

Emotional
Footprint

85%

Likeliness to
Recommend

Likeliness
to Recommend

19Reviews

Quest Software

One Identity Privileged Management

One Identity Privileged Access Management (PAM) solutions mitigate security risks and enable your organization to achieve compliance by securing, controlling, monitoring, analyzing and governing privileged access. Our PAM solutions enable you to provide the full credential when necessary or limit access with granular delegation for least-privileged access. The result is enhanced security and compliance with more efficient administration and governance of privileged access.

7.3

Composite
Score

Composite
Score

+82

Emotional
Footprint

Emotional
Footprint

82%

Likeliness to
Recommend

Likeliness
to Recommend

18Reviews

For the full list of vendors in this space, click here.

About Gold Medal Awards and Software Reports

SoftwareReviews Gold Medal Awards recognize outstanding vendors in the technology marketplace as evaluated by their users. Gold Medals are the capstone of an in-depth software evaluation report, and awarded using a proprietary, transparent methodology based on a composite satisfaction score that averages four different areas of evaluation: Net Emotional Footprint, Vendor Capabilities, Product Features, and Likeliness to Recommend. The Net Emotional Footprint Score measures user emotional response ratings of the vendor (e.g. trustworthy, respectful, fair).

Software Reports present comprehensive evaluations of software vendors on the above elements. Software buyers can use this data to make more informed, data-driven software purchasing and renewal decisions.

Contact Us

* Starred fields are required

Or, email us at hello@softwarereviews.com