Hitachi ID Systems

Hitachi ID Privileged Access Manager


4 / 5
1 review

Who Uses This Software?

Chief information security officer (CISO). Chief security officer (CSO). Compliance officer. Identity management team lead.


Average Ratings

1 Review

  • 4 / 5
    Overall

  • 3 / 5
    Ease of Use

  • 5 / 5
    Customer Service

Product Details

  • Starting Price
    Not provided by vendor
  • Free Trial
  • Deployment
    Cloud, SaaS, Web
    Installed - Windows
  • Training
    Documentation
    Live Online
    In Person
  • Support
    Online

Vendor Details

  • Hitachi ID Systems
  • hitachi-id.com
  • Founded 1992
  • Canada

About Hitachi ID Privileged Access Manager

Privileged Access Manager secures access to elevated privileges. It eliminates shared and static passwords to privileged accounts. It enforces strong authentication and reliable authorization prior to granting access. User access is logged, creating strong accountability. PAM secures access at scale, supporting over a million password changes daily and access by thousands of authorized users. It is designed for reliability, to ensure continuous access to shared accounts and security groups.


Hitachi ID Privileged Access Manager Features

  • Application Access Control
  • Behavioral Analytics
  • Credential Management
  • Endpoint Management
  • Granular Access Controls
  • Least Privilege
  • Multifactor Authentication
  • Password Management
  • Policy Management
  • Remote Access Management
  • Threat Intelligence
  • User Activity Monitoring

Hitachi ID Privileged Access Manager Reviews Recently Reviewed!


HiPAM Review

Feb 06, 2019
4/5
Overall

3 / 5
Ease of Use

4 / 5
Features & Functionality

5 / 5
Customer Support

4 / 5
Value for Money
Likelihood to Recommend: 8.0/10 Not
Likely
Extremely
Likely

Pros: The fantastic support and service from Hitachi ID. Every issue is resolved in a professional manner.

Has a very deep feature set, with many options for configuration of capabilities.

A wide selection of agentless connectors for managing systems for password randomization.

Built-in data synchronization across nodes for geographic redundancy works well, so you don't have to rely on other database replication solutions.

Cons: With so many options related to the capabilities of the software, there can be complexity in the configuration thereof. The documentation can be lacking in detail in some areas, especially with regards to newer features and functionality. This can contribute to a dependence on Hitachi ID support and professional services to help with configuration.

Overall: Once the challenges of installation and configuration are dealt with, the system is stable and works well.