Deep Identity Privilege Identity Manager (PIM)

Overview
ProductRatingMost Used ByProduct SummaryStarting Price
Deep Identity Privilege Identity Manager (PIM)
Score 7.0 out of 10
N/A
Deep Privilege Identity Manager (Deep PIM) is presented by the vendor as a practical and nonintrusive solution to address privilege identity related challenges in any organizations. Deep PIM is built as plug-ins on top of Deep Identity Manager (Deep IM) and comes with Privilege Access Server, which will act as proxy for access to back-end Windows and Unix servers. Deep PIM is an integrated solution with Deep IACM and Deep IM. With it, the vendor states that organizations can…N/A
Pricing
Deep Identity Privilege Identity Manager (PIM)
Editions & Modules
No answers on this topic
Offerings
Pricing Offerings
Deep Identity Privilege Identity Manager (PIM)
Free Trial
No
Free/Freemium Version
No
Premium Consulting/Integration Services
No
Entry-level Setup FeeNo setup fee
Additional Details
More Pricing Information
Best Alternatives
Deep Identity Privilege Identity Manager (PIM)
Small Businesses
Dashlane Password Manager
Dashlane Password Manager
Score 9.1 out of 10
Medium-sized Companies
RSA Access Manager (Discontinued)
RSA Access Manager (Discontinued)
Score 10.0 out of 10
Enterprises
RSA Access Manager (Discontinued)
RSA Access Manager (Discontinued)
Score 10.0 out of 10
All AlternativesView all alternatives
User Testimonials
Deep Identity Privilege Identity Manager (PIM)
ScreenShots

Deep Identity Privilege Identity Manager (PIM) Screenshots

Screenshot of The industry’s most practical and non-intrusive solution to address privilege identity related challenges in any organizations.Screenshot of Deep PIM out-of-the-box integration with Deep IM allows usage of the access request and workflow technology for users in the organization to make request to access back-end servers with privilege identities.Screenshot of Secure Desktop functionality supports Microsoft Servers for privilege remote access. This secure desktop access allows users to connect to any windows servers without the need to know the privilege identity password of the target servers.Screenshot of Deep PIM provides comprehensive logging and recording of the privilege identity session. This logging and recording is done at the PIM-Gateway Server which acts as proxy for all access to target servers.