Overview
What is Symantec PAM?
Symantec Privileged Access Management (formerly CA Privileged Access Management, and before that Layer 7) is an identity and access management offering, from Broadcom. It is designed to prevent security breaches by providing granular authorization of users to systems and accounts,…
Pricing
Entry-level set up fee?
- No setup fee
Offerings
- Free Trial
- Free/Freemium Version
- Premium Consulting/Integration Services
Would you like us to let the vendor know that you want pricing?
15 people also want pricing
Alternatives Pricing
Product Details
- About
- Tech Details
What is Symantec PAM?
Symantec PAM Technical Details
Operating Systems | Unspecified |
---|---|
Mobile Application | No |
Comparisons
Compare with
Reviews
Community Insights
- Business Problems Solved
- Pros
- Cons
- Recommendations
Symantec PAM is a reliable solution used to manage privileged access to critical assets and can be deployed easily. By providing controls according to industry-standard compliance, the solution ensures comprehensive coverage of required features for the solution. This helps organizations meet emerging data privacy laws and regulations while protecting highly important administrative credentials.
Users appreciate Symantec PAM's API security offering as it helps solve access management issues for organizations. The product has helped many organizations secure, control, manage, and monitor privileged access to critical assets by controlling traffic on virtual machines and file access management with full security. It enables secure storage of privileged enterprise credentials and can integrate with several other platforms, ensuring extensibility. It is suitable for organizations that require a more robust solution that can stand up to SOX, PCI, and HIPAA audits. However, the product is incompatible with some system architectures, preventing its implementation in some cases.
Comprehensive Endpoint Security: Reviewers have found Symantec PAM to be a comprehensive and integrated platform for endpoint security, available in on-premises, hybrid, or cloud-based solutions. Some users appreciate the ease of application deployment and virtual environment that makes it the best option for any large or sensitive environment.
Unified Cloud-Based Management System: Users appreciate the unified cloud-based management system offered by Symantec PAM which simplifies the process of protecting, detecting, and responding to advanced threats targeting endpoints. Several reviewers liked the control they had in creating and modifying their security protection policies using features such as a credential vault, session recording, endpoint agent, and security analytics.
Scalability Options: The excellent scalability options offered by Symantec PAM were well-received by many reviewers who found it best suited for virtual environments. It prevents security breaches by protecting sensitive administrative credentials and controlling privileged user access.
Difficult to Use: Some users have found Symantec PAM difficult to use, requiring technical expertise and training. The software was not self-updating in terms of virus signatures or easy to configure and maintain, with some users needing additional training after not using the product for just two weeks.
Poor Customer Support: Several reviewers stated that customer support was hard to obtain and unhelpful when troubleshooting problems with Symantec PAM. This left some users feeling frustrated and unsupported while trying to use the software.
Compatibility Issues: A number of customers reported compatibility issues between Symantec PAM and their system's architecture, making it difficult or impossible to implement the solution. This issue caused inconvenience for those who were unable to use the software due to its lack of compatibility with their systems.
Users of Symantec Endpoint have made several recommendations based on their experiences. First, they suggest obtaining buy-in from top-level management before purchasing the software. This is seen as crucial to ensure the successful implementation and usage of Symantec Endpoint. Without this support, individuals may find reasons not to use the solution.
Second, users advise reminding others that implementing Symantec Endpoint properly could eliminate audit findings. By emphasizing the benefits of using the software, organizations can increase compliance and reduce potential risks identified during audits.
Lastly, users recommend trying Symantec Endpoint for a trial period. This allows organizations to assess its effectiveness and compatibility with their specific needs before making a long-term commitment.
Overall, these recommendations highlight the importance of proactive engagement with management, highlighting the potential benefits in terms of security and compliance, and conducting thorough evaluations before adopting Symantec Endpoint.