Skip to main content
TrustRadius
Symantec PAM

Symantec PAM
Formerly CA Privileged Access Manager

Overview

What is Symantec PAM?

Symantec Privileged Access Management (formerly CA Privileged Access Management, and before that Layer 7) is an identity and access management offering, from Broadcom. It is designed to prevent security breaches by providing granular authorization of users to systems and accounts,…

Read more
Recent Reviews

TrustRadius Insights

Symantec PAM is a reliable solution used to manage privileged access to critical assets and can be deployed easily. By providing controls …
Continue reading
TrustRadius

Leaving a review helps other professionals like you evaluate Privileged Access Management Solutions

Be the first one in your network to review Symantec PAM, and make your voice heard!

Return to navigation

Pricing

View all pricing
N/A
Unavailable

What is Symantec PAM?

Symantec Privileged Access Management (formerly CA Privileged Access Management, and before that Layer 7) is an identity and access management offering, from Broadcom. It is designed to prevent security breaches by providing granular authorization of users to systems and accounts, constantly…

Entry-level set up fee?

  • No setup fee

Offerings

  • Free Trial
  • Free/Freemium Version
  • Premium Consulting/Integration Services

Would you like us to let the vendor know that you want pricing?

15 people also want pricing

Alternatives Pricing

What is ManageEngine ADManager Plus?

ManageEngine ADManager Plus simplifies enterprise-wide Windows Active Directory management and reporting.

N/A
Unavailable
What is Delinea Server PAM?

Delinea Server PAM solution (Cloud Suite and Server Suite) secures privileged access for servers on both on-premise and cloud/multi-cloud environments. It allows humans and machines to seamlessly authenticate, enforcing least privilege with just-in-time privilege elevation, increasing…

Return to navigation

Product Details

What is Symantec PAM?

Symantec PAM Technical Details

Operating SystemsUnspecified
Mobile ApplicationNo
Return to navigation

Comparisons

View all alternatives
Return to navigation

Reviews

Community Insights

TrustRadius Insights are summaries of user sentiment data from TrustRadius reviews and, when necessary, 3rd-party data sources. Have feedback on this content? Let us know!

Symantec PAM is a reliable solution used to manage privileged access to critical assets and can be deployed easily. By providing controls according to industry-standard compliance, the solution ensures comprehensive coverage of required features for the solution. This helps organizations meet emerging data privacy laws and regulations while protecting highly important administrative credentials.

Users appreciate Symantec PAM's API security offering as it helps solve access management issues for organizations. The product has helped many organizations secure, control, manage, and monitor privileged access to critical assets by controlling traffic on virtual machines and file access management with full security. It enables secure storage of privileged enterprise credentials and can integrate with several other platforms, ensuring extensibility. It is suitable for organizations that require a more robust solution that can stand up to SOX, PCI, and HIPAA audits. However, the product is incompatible with some system architectures, preventing its implementation in some cases.

Comprehensive Endpoint Security: Reviewers have found Symantec PAM to be a comprehensive and integrated platform for endpoint security, available in on-premises, hybrid, or cloud-based solutions. Some users appreciate the ease of application deployment and virtual environment that makes it the best option for any large or sensitive environment.

Unified Cloud-Based Management System: Users appreciate the unified cloud-based management system offered by Symantec PAM which simplifies the process of protecting, detecting, and responding to advanced threats targeting endpoints. Several reviewers liked the control they had in creating and modifying their security protection policies using features such as a credential vault, session recording, endpoint agent, and security analytics.

Scalability Options: The excellent scalability options offered by Symantec PAM were well-received by many reviewers who found it best suited for virtual environments. It prevents security breaches by protecting sensitive administrative credentials and controlling privileged user access.

Difficult to Use: Some users have found Symantec PAM difficult to use, requiring technical expertise and training. The software was not self-updating in terms of virus signatures or easy to configure and maintain, with some users needing additional training after not using the product for just two weeks.

Poor Customer Support: Several reviewers stated that customer support was hard to obtain and unhelpful when troubleshooting problems with Symantec PAM. This left some users feeling frustrated and unsupported while trying to use the software.

Compatibility Issues: A number of customers reported compatibility issues between Symantec PAM and their system's architecture, making it difficult or impossible to implement the solution. This issue caused inconvenience for those who were unable to use the software due to its lack of compatibility with their systems.

Users of Symantec Endpoint have made several recommendations based on their experiences. First, they suggest obtaining buy-in from top-level management before purchasing the software. This is seen as crucial to ensure the successful implementation and usage of Symantec Endpoint. Without this support, individuals may find reasons not to use the solution.

Second, users advise reminding others that implementing Symantec Endpoint properly could eliminate audit findings. By emphasizing the benefits of using the software, organizations can increase compliance and reduce potential risks identified during audits.

Lastly, users recommend trying Symantec Endpoint for a trial period. This allows organizations to assess its effectiveness and compatibility with their specific needs before making a long-term commitment.

Overall, these recommendations highlight the importance of proactive engagement with management, highlighting the potential benefits in terms of security and compliance, and conducting thorough evaluations before adopting Symantec Endpoint.

Sorry, no reviews are available for this product yet

Return to navigation