Discover what real users think of privileged identity management solutions From CyberArk to CA Privileged Access Manager, there are a wealth of tools available in the marketplace to help deal with privileged identity management. But which one works the best?This month, IT Central Station pulled a new, independent report based on real users’ feedback. The 32-page document includes an overview of the best solutions and a summary of the top 10 vendors.“The performance of this product needs to be improved. When the number of privileged accounts increases, i.e., exceeds 2000, then the performance of the system reduces,” criticises one user of a Tier 1 solution.Another adds: “With every version, I can see that the product wins on functionality and user experience. On the latter though, I hear from customers that on the UI level, things could be better.” Based on tens of thousands of comparisons and dozens of bespoke reviews, this short report offers unbiased feedback on the most widely used tools in the marketplace today. download Privileged identity management software user reviewsIT Central Station Related content opinion Preparing for the post-quantum cryptography environment today It’s a mistake to put off the creation of precautions against quantum threats, no matter how far in the future you might think quantum computing will become a reality. By Christopher Burgess Sep 26, 2023 5 mins CSO and CISO Encryption Threat and Vulnerability Management feature What is WorldCoin's proof-of-personhood system? What does the blockchain, AI, and custom hardware system featuring a shiny, eye-scanning orb mean for the future of identity access management? By Matthew Tyson Sep 26, 2023 12 mins Cryptocurrency Cryptocurrency Cryptocurrency news analysis DHS unveils one common platform for reporting cyber incidents Ahead of CISA cyber incident reporting regulations, DHS issued a report on harmonizing 52 cyber incident reporting requirements, presenting a model common reporting platform that could encompass them all. By Cynthia Brumfield Sep 25, 2023 10 mins Regulation Government Incident Response news Chinese state actors behind espionage attacks on Southeast Asian government The distinct groups of activities formed three different clusters, each attributed to a specific APT group. By Shweta Sharma Sep 25, 2023 4 mins Advanced Persistent Threats Cyberattacks Podcasts Videos Resources Events SUBSCRIBE TO OUR NEWSLETTER From our editors straight to your inbox Get started by entering your email address below. Please enter a valid email address Subscribe