# ManageEngine PAM360 Software Pricing, Alternatives & More 2026 | Capterra

> With the help of Capterra, learn about ManageEngine PAM360 Software - reviews, pricing plans, popular comparisons to other Privileged Access Management products and more.

Source: https://www.capterra.com/p/239316/ManageEngine-PAM360

---

# 

 ManageEngine PAM360 Software Review 2026: Features, Reviews, Integrations, Pros & Cons

Last updated on March 13, 2026

Provider data verified by our Software Research team, and reviews moderated by our Reviews Verification team.

[Description](#description)[Use cases](#use-cases)[Alternatives](#alternatives)[Features](#features)[Pricing](#pricing)[Integrations](#integrations)[Support](#support)[Reviews](#reviews)

ManageEngine PAM360

## What is ManageEngine PAM360?

ManageEngine PAM360 is a privileged access management solution that secures and controls privileged access across IT infrastructures. It offers Privileged Account and Session Management for automated discovery, centralized account management, secure remote access, and session auditing. Its Privilege Elevation and Delegation Management enforces least privilege access with just-in-time elevation and command controls. PAM360 includes Cloud Infrastructure Entitlements Management to regulate cloud access and identify risks. AI-powered Privileged User Behavior Analytics detect suspicious activities, while Endpoint Privilege Management applies granular controls for critical applications. Additional features include Secrets Management, Encryption Key and Certificate Lifecycle Management, and Privileged Account Governance. The platform integrates with other ManageEngine tools and supports compliance with NIST, PCI-DSS, HIPAA, and ISO-IEC 27001.

## What is ManageEngine PAM360 used for?

[Privileged Access Management](https://www.capterra.com/privileged-access-management-software/)[Threat Intelligence](https://www.capterra.com/threat-intelligence-software/)[Access Governance](https://www.capterra.com/access-governance-software/)

Overall rating

Based on 9 user reviews

Reviews sentiment

Positive

\-

Neutral

\-

Negative

\-

Starting price

$7995

Flat Rate, One Time

Free trial  
available

Capterra Shortlist charts the highest-rated and most popular products...

Our "Best of" badge program showcases products with the highest ratings...

Our "Best of" badge program showcases products with the highest ratings...

## ManageEngine PAM360 alternatives

Highest Rated

[4.7 (929)](https://www.capterra.com/p/119653/Okta/reviews/)

Starting price

$6.00

Per User, Per Month

[4.7 (213)](https://www.capterra.com/p/210695/Bitwarden/reviews/)

Starting price

$4.00

Per User, Per Month

[4.6 (264)](https://www.capterra.com/p/175092/JumpCloud-DaaS/reviews/)

Starting price

$3.00

Per User, Per Month

[4.7 (505)](https://www.capterra.com/p/144637/Keeper/reviews/)

Starting price

Contact vendor for pricing

[View all alternatives](https://www.capterra.com/p/239316/ManageEngine-PAM360/alternatives/)

## Features

Features with the highest number of reviews are displayed first. Those that have no reviews appear next, sorted alphabetically.

Alerts/Notifications

4.7 (6)

100.00% of 6 reviewers that rated this feature as important or highly important

Alerts or notifications of various types such as pop-up messages, sounds, banners, or badges

Remote Monitoring & Management

5.0 (4)

100.00% of 4 reviewers that rated this feature as important or highly important

Remotely monitor and manage client networks, endpoints, systems, and devices via locally installed applications

Credential Management

4.7 (3)

133.33% of 3 reviewers that rated this feature as important or highly important

Manage usernames, account numbers, passwords, biometric data, public access keys, and other documentation

Multi-Factor Authentication

4.3 (3)

100.00% of 3 reviewers that rated this feature as important or highly important

Request two or more credentials to prove user's identity before granting access to systems

Secure Data Storage

5.0 (3)

100.00% of 3 reviewers that rated this feature as important or highly important

Securely stores data to prevent data loss or breaches

Threat Intelligence

4.7 (3)

100.00% of 3 reviewers that rated this feature as important or highly important

Information to prevent, understand and identify cyber threats

ManageEngine PAM360 79 features

Define levels of authorization for access to specific files or systems

Control and manage access to company resources

Integrates with Active Directory

Dashboard to view the status of ongoing processes, identify current incidents and track past activities

Track and report on everything that happens within the system or network

Track and document all activities across devices, networks, and other systems

Generate one-off reports that meet information requirements

System alerts about the need to escalate an issue or request

Alerts or notifications of various types such as pop-up messages, sounds, banners, or badges

Application programming interface that allows for integration with other systems/databases

Define levels of authorization for access to specific applications

Identify and respond to security threats to developed applications

Manage the process of evaluating documents or requests submitted for approval

Moving and separately storing data that is not actively used or continuous storage of data for compliance purposes

A record of all activities within the system, including user access, changes made, etc.

Verify the identity of users/devices to enable secure access

Data is backed up automatically to prevent data loss

Create backups and provide methods to recover deleted/lost data

Track and analyze user behavior within a system or network

Track and analyse user behavior within a system or network

Track and manage adherence to policies for any service, product, process, or supplier

Manage usernames, account numbers, passwords, biometric data, public access keys, and other documentation

Alter the layout and content of reports

Pre-designed layouts that can be customized to match preferences and requirements

Assembly of graphs and charts for visualizing and tracking statistics/metrics

Protect sensitive data for digital privacy

Manage and store data in a database

Synchronizing data between two or more devices/systems and automatically updating changes to maintain consistency

Receive and/or send email notifications for urgent updates, requests, or other information

Convert data into a code for security

Protect users working remotely and provide secure environments for personal devices to access company programs

A chronological record of actions or occurrences within a network, software, or process

Public or private sharing of digital files such as documents, audio/video, images, and more

Move files across different systems or networks

Compliant with HIPAA, which sets standards for sensitive patient data protection

Identify and respond to unexpected problems or failures (ie. "negative events")

Accounts held by members of an organization

Observe and track the demand, usage, progress or quality of a system, product, or user

Request two or more credentials to prove user's identity before granting access to systems

Allow multiple users with individual logins and varying permissions to use the same account, software, portal, or service

Set up and configure network resources to make them accessible for authorized users, devices and servers

Prevent and monitor unauthorized access, misuse, modification, or denial of a computer network and network-accessible resources

Generate and store passwords in an encrypted database and assist in retrieving lost or forgotten passwords

Store, process, and transmit cardholder data in compliance with the Payment Card Industry Data Security Standard (PCI DSS)

Create new policies or alter existing policies

Create, manage, and track policies and procedures within an organization

Scanning of users & devices to ensure there are no potential threats

Receive notification of issues as soon as they occur

Analyze and gain insights into data in real-time

Engage in direct, instant messaging with customers, users, etc.

Active monitoring of systems, applications, or networks

Notifications that are delivered to users as soon as an event occurs

Active reporting of data and metrics

Receive system updates as soon as any changes are made

Access work applications remotely, for when working away from the office and/or traveling

Remotely monitor and manage client networks, endpoints, systems, and devices via locally installed applications

Collection, analysis, and representation of numerical data and generation of reports to understand various patterns

View and track pertinent metrics to find patterns and gain insights from data

Notifying as a warning or reminder of a potential or imminent hazard

Set & manage permission levels based on user roles and restrict access to only authorized individuals

Automates and streamlines business processes by creating a sequence of predefined rules and actions that govern the flow of work

Digitally share screen view with others

Securely stores data to prevent data loss or breaches

At least a username and password is required to access the system

Systematic evaluation of the security of a company's overall security system and situation

Online portal through which end users can access the system, manage tasks, or obtain information

Continuously scan servers on a designated network to monitor health and search for any irregularities or failures

Record active support and chat sessions for auditing and training

Transfer a support session to another team member

Security protocol that ensures secure, encrypted communication over the internet, safeguarding sensitive data from unauthorized access

Set up connections to third-party platforms to improve business processes

Information to prevent, understand and identify cyber threats

Identifying, analyzing, and mitigating security issues and taking appropriate action to protect systems and data from potential harm

Extra layer of security that requires not only a password and username but also something specific to that user

Manage user accounts, profiles, roles, permissions, and other details across applications, devices or networks

Maintain and control user sessions (including session tracking, timeouts and termination) in a web application or system

Supports various video file formats

Discover patch statuses and vulnerabilities

Identify and respond to security threats to web applications

Features

4.8 (9)

4.8

Based on 9 reviews

## Pricing

Value for money

5.0 (7)

Free Trial

[View pricing plan details](https://www.capterra.com/p/239316/ManageEngine-PAM360/pricing/)

PAM360 Enterprise Edition

$7,995

Flat Rate,One Time

It includes:

-   Number Of Administrators
-   Number Of Keys
-   Unrestricted Resources And Users
-   Annual Maintenance And Support Included

PAM360 Enterprise Edition Multi-Language

$9,595

Flat Rate,One Time

It includes:

-   Number Of Administrators
-   Number Of Keys
-   Unrestricted Resources And Users
-   Annual Maintenance And Support Included

Value for money

5.0 (7)

5.0

Based on 7 reviews

## Integrations

[

Dropbox Business](https://www.capterra.com/p/143068/Dropbox-Business/)[

Jira](https://www.capterra.com/p/19319/JIRA/)[

Amazon S3](https://www.capterra.com/p/174285/Amazon-S3/)[

Okta](https://www.capterra.com/p/119653/Okta/)[

Jenkins](https://www.capterra.com/p/171026/Jenkins/)[

ServiceNow](https://www.capterra.com/p/254088/ServiceNow/)[

ManageEngine ServiceDesk Plus](https://www.capterra.com/p/179501/ManageEngine-Service-Desk-Plus/)[

Automation Anywhere](https://www.capterra.com/p/124575/Web-Data-Extraction/)

## Support, customer service and training options

Customer Service

4.4 (8)

Support

-   Email/Help Desk
-   FAQs/Forum
-   Knowledge Base
-   Phone Support
-   24/7 (Live rep)
-   Chat

Training

-   In Person
-   Live Online
-   Webinars
-   Documentation
-   Videos

Deployment

-   Web
-   Android
-   iPhone/iPad

Typical users

-   Freelancers
-   Small businesses
-   Mid size businesses
-   Enterprises

Customer Service

4.4 (8)

4.4

Based on 8 reviews

## User reviews

Overall rating

4.3

Based on 9 reviews

Filter by rating

5(3)

4(6)

3(0)

2(0)

1(0)

Mentioned topic

Sorted by most recent

DB

Duniemu B.

IT Project Manager

Hospitality

### "Minimized our risk posture without adding operational burden"

4.0

Overall Rating

4.0

4.0

Ease of Use

4.0

4.0

Features

5.0

5.0

Customer Service

5.0

5.0

Likelihood to Recommend

9/10

April 26, 2025

Pros

I liked how PAM360 brought all the privileged account credentials in an encrypted manner with proper access controls. The solid policy enabled me to control the granting of access rights to the extent that only users who needed passwords could access them.

Cons

Remote access service tunnel configuration involved more than what appeared to be involved when the network segments were different. The more common of the use-cases would benefit from less complex wizards.

Review source

Non-incentivized review: any software user can leave a review for any product listed on our site. All submitted reviews are subject to our verification process prior to publication.

CY

Chris Y.

Operations Manager

Construction

### "Assisted in offering protection for the restricted access rights"

5.0

Overall Rating

5.0

5.0

Ease of Use

5.0

5.0

Features

5.0

5.0

Customer Service

5.0

5.0

Likelihood to Recommend

10/10

April 26, 2025

Pros

I particularly enjoyed the service’s privileged session monitoring and recording functionalities of PAM360. Implementing the feature in a way logged every administrative session provided a great satisfaction when dealing with sensitive applications.

Cons

What I felt missing was that there was automatic password reset integration for some few third-party applications that were rare.

Review source

Non-incentivized review: any software user can leave a review for any product listed on our site. All submitted reviews are subject to our verification process prior to publication.

ME

Matthias E.

Software Engineer

Higher Education

### "Ensured efficient and integrated privileged access control"

4.0

Overall Rating

4.0

4.0

Ease of Use

4.0

4.0

Features

5.0

5.0

Customer Service

4.0

4.0

Likelihood to Recommend

9/10

April 26, 2025

Pros

ManageEngine PAM360 has distinguished itself in the area of managing the privileged accounts with powerful control that is very essential in our security of the systems. The session monitoring and real-time alerts are the most useful in minimizing on risk as well as identifying challenges early enough before they worsen.

Cons

I have faced challenges of reporting tools during the times when they are heavily utilized. Producing extensive reports sometimes became a problem because filtering information for large groups of users at times slowed down audits.

Review source

Non-incentivized review: any software user can leave a review for any product listed on our site. All submitted reviews are subject to our verification process prior to publication.

KJ

Kevyn J.

Systems Engineer

Information Technology and Services

### "Securely manage access credentials without risk of exposure"

5.0

Overall Rating

5.0

5.0

Ease of Use

5.0

5.0

Features

5.0

5.0

Customer Service

5.0

5.0

Likelihood to Recommend

10/10

April 26, 2025

Pros

Real-time monitoring of the privileged accounts by PAM360 has had positive impact and has been beneficial for us. Recording of the session with capabilities to log activities has been crucial in additional information given toward account usage that has enabled a higher level of security and compliance.

Cons

There were certain time lags in the response management because of configuring automated work flows.

Review source

Non-incentivized review: any software user can leave a review for any product listed on our site. All submitted reviews are subject to our verification process prior to publication.

AA

Abdullah A.

IT Technician

Hospital & Health Care

### "Auditing capabilities is vital and fruitful for compliance"

4.0

Overall Rating

4.0

4.0

Ease of Use

4.0

4.0

Features

5.0

5.0

Customer Service

4.0

4.0

Likelihood to Recommend

9/10

April 23, 2025

Pros

PAM360 has impressive features in password and privilege management provided that the company handle sensitive information. Privileged access management has been upped to several notches and real-time monitoring and control have greatly boosted our security standards.

Cons

I observed that there are existing access control configurations that were not well integrated with third-party application. There are moments when I had to make additional sync actions which impacted the sligtly the efficient of work.

Review source

Non-incentivized review: any software user can leave a review for any product listed on our site. All submitted reviews are subject to our verification process prior to publication.

MG

Margaux G.

Operations Director

Hospital & Health Care

### "Provided detail access control that has made our security stronger"

4.0

Overall Rating

4.0

4.0

Ease of Use

5.0

5.0

Features

4.0

4.0

Customer Service

4.0

4.0

Likelihood to Recommend

9/10

April 22, 2025

Pros

With the help of role-based access controls that exist in PAM360, I was able to grant some rights to users and make them have access only to certain systems. The prompt monitoring of users’ activity preventing security threats served as an advantage in this regard.​

Cons

I observed that integration with some other ticketing systems involved further settings which are not that easy to set. This added some level of complication into how access approvals could be automated.

Review source

Non-incentivized review: any software user can leave a review for any product listed on our site. All submitted reviews are subject to our verification process prior to publication.

PE

Paketleme E.

Technical Support officer

Automotive

### "Helped improve our privileged access management regarding control"

4.0

Overall Rating

4.0

4.0

Ease of Use

4.0

4.0

Features

5.0

5.0

Customer Service

4.0

4.0

Likelihood to Recommend

9/10

April 22, 2025

Pros

I found particularly useful the PAM360's ability to manage privileged session in real time. I was given the feature to monitor and record sessions where I could provide us with a clear audit trail and an improvement to our organization’s security posture.

Cons

There would be occasional latency issues with this peak hours, but that would affect the responsiveness of the session management feature. Those times caused delays in setting up remote sessions, but hindered our operations.

Review source

Non-incentivized review: any software user can leave a review for any product listed on our site. All submitted reviews are subject to our verification process prior to publication.

Melih C.

Team Leader

Information Technology and Services

### "Review of PAM360"

4.0

Overall Rating

4.0

4.0

Ease of Use

5.0

5.0

Features

4.0

4.0

Customer Service

4.0

4.0

Likelihood to Recommend

8/10

January 8, 2025

Generally, the product is user friendly and I like the smoothness. Additionally, it comes with PostgreSQL which is a plus that prevents customers to spend extra money for it. And finally because the product rely on too much resources, it's a plus.

Pros

I like the product's easy-to-use abilities. It's not complicated for some other products and this increase the end-user experience very much. For these types of products, security and usability should be considered both and they're almost equally important. I believe this product trying to keeps this balance adequally.

Cons

PAM360 has many features good to go but some integrations or failover configurations can be complex and it takes time. Additionally, as far as I know the OCR feature for remote connections has't been introduced yet but in progress. When these topics covered up, it will be much more better.

Review source

Non-incentivized review: any software user can leave a review for any product listed on our site. All submitted reviews are subject to our verification process prior to publication.

RE

Reda E.

CTO

Marketing and Advertising

### "Great privileged management access tool"

5.0

Overall Rating

5.0

5.0

Ease of Use

3.0

3.0

Features

5.0

5.0

Customer Service

0.0

0.0

Likelihood to Recommend

8/10

January 6, 2023

Pros

All access to your sensitive devices are grouped in the same tool. Every access is historized and recorded (video) that you can consult if needed.It also notify you if someone connect to one of your sensitive device. So you see live what the connected person do

Cons

Lots of features , so, a training is needed to master them

Review source

Incentivized review: software users are invited to submit an honest review and offered a nominal incentive for their time and effort. All incentivized reviews are subject to our verification process prior to publication.

Independent research methodology

Capterra's researchers use a mix of verified reviews, independent research and objective methodologies to bring you selection and ranking information you can trust. While we may earn a referral fee when you visit a provider through our links or speak to an advisor, this has no influence on our research or methodology.

[Learn more](https://www.capterra.com/resources/proprietary-data-research/)

How Capterra verifies reviews

Capterra carefully verified over 2.5 million+ reviews to bring you authentic software experiences from real users. Our human moderators verify that reviewers are real people and that reviews are authentic. They use leading tech to analyze text quality and to detect plagiarism and generative AI.

[Learn more](https://www.capterra.com/resources/how-we-verify-reviews/)

How Capterra ensures transparency

Capterra lists all providers across its website—not just those that pay us—so that users can make informed purchase decisions. Capterra is free for users. Software providers pay us for sponsored profiles to receive web traffic and sales opportunities. Sponsored profiles include a link-out icon that takes users to the provider's website.

[Learn more](https://www.capterra.com/resources/how-we-ensure-transparency/)