Our Top Picks

BeyondTrust Remote Control
BeyondTrust Privileged Remote Access
  • Deployment: Mac, Windows, web-based, iPhone/iPad, Android
  • Customer service: Email, phone, live support
  • Integrations

BeyondTrust Privileged Remote Access offers basic privileged remote access for businesses that don’t need lots of frills. The software allows users to remotely log in via Mac, Windows, web-based, iOS, or Android deployments, which makes it easy to use no matter what digital environment employees prefer. It also comes with live phone support so any unexpected issues can be quickly resolved.

The integrations and support are BeyondTrust Privileged Remote Access’s main features, but businesses that don’t have lots of other needs will find this pared-down software perfectly suitable.

Pros & Cons

Pros

  • Many options for desktop, remote, and mobile deployments
  • Both live phone and email support available
  • Multifactor authentication feature included

Cons

  • No application access control, multifactor authentication, or threat intelligence
  • Free trial is limited to only 7 days

Summary

BeyondTrust Remote Control
BeyondTrust Privileged Remote Access
  • Starting Price
    • Custom Quote
  • Free Trial/Demo
    Free Demo and 7-Day Free Trial
  • Deployment
    Mac, Windows, Web-Based, iPhone / iPad, Android
  • Support Options
    Email, Phone, Live Support
  • Application Access Control
    no
  • Threat Intelligence
    no
Features
  • Deployment: Mac, Windows, web-based, iPhone/iPad, Android
  • Customer service: Email, phone, live support
  • Integrations
Centrify-Identity-Service
Centrify Zero Trust Privilege
  • Deployment: Mac, Windows, web-based, iPhone/iPad, Android
  • Customer service: Email, phone, live support
  • Multifactor authentication

Centrify Zero Trust Privilege provides privileged access management with multifactor authentication for an added level of security. The company focuses on remote access for users via a cloud deployment, but it also supports Mac, Windows, iOS, and Android options for organizations that need them. The built-in integrations make setting up Centrify Zero Trust Privilege quick and easy, and there’s live support if help is needed.

Pros & Cons

Pros

  • Many options for desktop, remote, and mobile deployments
  • Both live phone and email support available
  • Multifactor authentication feature included

Cons

  • No application access control, threat intelligence, or password management

Summary

Centrify-Identity-Service
Centrify Zero Trust Privilege
  • Starting Price
    • Custom Quote
  • Free Trial/Demo
    Free Demo and 30-Day Free Trial
  • Deployment
    Mac, Windows, Web-Based, iPhone / iPad, Android
  • Support Options
    Email, Phone, Live Support
  • Application Access Control
    no
  • Threat Intelligence
    no
Features
  • Deployment: Mac, Windows, web-based, iPhone/iPad, Android
  • Customer service: Email, phone, live support
  • Multifactor authentication
CyberArk
CyberArk Privileged Access Security Solution
  • Deployment: Windows, web-based
  • Customer service: Email, phone, live support
  • Application access control

CyberArk Privileged Access Security Solution is a robust privileged access setup for organizations that use Windows. Application access control, least privilege, password management, and threat intelligence are all included, making this one of the most comprehensive Windows-based and web-based options. The software also comes with a 30-day free trial, so organizations have plenty of time to decide whether this truly is right for them.

Pros & Cons

Pros

  • Application access control, least privilege, and threat intelligence features included
  • Password management feature included
  • Both live phone and email support available

Cons

  • No multifactor authentication feature
  • Limited Windows and web-based deployment options

Summary

CyberArk
CyberArk Privileged Access Security Solution
  • Starting Price
    • Custom Quote
  • Free Trial/Demo
    Free Demo and 30-Day Free Trial
  • Deployment
    Windows, Web-Based
  • Support Options
    Email, Phone, Live Support
  • Application Access Control
    yes
  • Threat Intelligence
    yes
Features
  • Deployment: Windows, web-based
  • Customer service: Email, phone, live support
  • Application access control
Foxpass
Foxpass
  • Deployment: Mac, Windows, web-based
  • Customer service: Email, phone, live support
  • Password management

Foxpass provides privileged access to ensure only approved users gain access to networks, programs, and files. The software doesn’t include threat intelligence for preventing leaks by employees, but it does come with everything needed to stop other people from getting in. Application access control, least privilege, password management, and multifactor authentication provide a highly customizable access control system.

This solution doesn’t have a mobile deployment option for iOS and Android. Companies that only need computer-based and web-based deployment will have all of the controls they need, however. 

Pros & Cons

Pros

  • Application access control, least privilege, and multifactor authentication features included
  • Both live phone and email support available
  • Straightforward pricing structure available online

Cons

  • No threat intelligence feature
  • No mobile deployment options

Summary

  • Starting Price
    • Standard Users: $3/month/user
    • Posix Users: $5/month/user
    • Engineer Users: $7/month/user
  • Free Trial/Demo
    Free Demo and 30-Day Free Trial
  • Deployment
    Mac, Windows, Web-Based
  • Support Options
    Email, Phone, Live Support
  • Application Access Control
    yes
  • Threat Intelligence
    no
Features
  • Deployment: Mac, Windows, web-based
  • Customer service: Email, phone, live support
  • Password management
JumpCloudNewLogo
JumpCloud
  • Deployment: Web-based
  • Customer service: Email
  • Application access control

JumpCloud is a straightforward yet effective privileged access management control system. Organizations like the set pricing of $2.67 or $12 per user per month as it makes comparing prices and planning budgets easy. Features like application access control, multifactor authentication, and password management are all included for effective access control.

Some organizations may find the email-only support a drawback, but there’s a free plan for 10 users and 10 devices during which organizations can see whether that's an issue for them. Some may find email support is sufficient.

Pros & Cons

Pros

  • Application access control, password management, and multifactor authentication features
  • Straightforward pricing structure available online

Cons

  • No live phone support

Summary

JumpCloudNewLogo
JumpCloud
  • Starting Price
    • JumpCloud Free: $0 (10 users/10 devices)
    • JumpCloud SSO Package: $7/user/mo.
    • JumpCloud Core Directory: $11/user/mo.
    • JumpCloud Platform: $15/user/mo.
    • JumpCloud PlatformPlus: $18/user/mo.
    • A La Carte: $2/user/mo.
  • Free Trial/Demo
    Free Demo
  • Deployment
    Web-Based
  • Support Options
    Email
  • Application Access Control
    yes
  • Threat Intelligence
    no
Features
  • Deployment: Web-based
  • Customer service: Email
  • Application access control

How We Chose the Best Privileged Access Management (PAM) Software

There are many privileged access management software solutions available, and they offer a range of features that organizations might need. We researched the various programs available to identify which ones are the best, and we focused specifically on what matters most to businesses.

Privileged Access Management Features

Monitoring who has access to company software and data is a multifaceted task that requires several features. Without the most important ones, critical functions or information could be compromised by inappropriate access to a system or leaked files from a system.

To ensure these software programs effectively helped companies manage their network and system access, we checked for access control, multifactor authentication, and threat intelligence capabilities.

Built-In Integrations

Access management software is usually used in conjunction with other programs. We only considered programs that had extensive built-in integrations for IT support systems and other commonly used applications.

Reports

Reports are the key to knowing who’s accessing company systems and making sure no one is gaining unauthorized access. We made sure these privileged access management programs had reporting that gives businesses what they need to effectively manage user access.