What is ARCON PAM?
ARCON | Privileged Access Management (PAM) offers enterprise IT security, risk and compliance management teams with necessary safeguards to securely manage the lifecycle of privileged accounts. A highly scalable and enterprise-class solution, ARCON | PAM seamlessly works in all IT environments to secure privileged accounts. The solution implements the best privilege access management practices to build a foundation for robust identity and access control IT architecture.
Company Details
Need Assistance?
We're here to help you with understanding our reports and the data inside to help you make decisions.
Get AssistanceARCON PAM Ratings
Real user data aggregated to summarize the product performance and customer experience.
Download the entire Product Scorecard
to access more information on ARCON PAM.
87 Likeliness to Recommend
87 Plan to Renew
76 Satisfaction of Cost Relative to Value
1
Since last award
Emotional Footprint Overview
+91 Net Emotional Footprint
The emotional sentiment held by end users of the software based on their experience with the vendor. Responses are captured on an eight-point scale.
How much do users love ARCON PAM?
Pros
- Trustworthy
- Unique Features
- Inspires Innovation
- Transparent
Emotional Footprint
How to Read
Positive
Neutral
Negative
The Net Emotional Footprint measures high-level user sentiment towards particular product offerings. It aggregates emotional response ratings for various dimensions of the vendor-client relationship and product effectiveness, creating a powerful indicator of overall user feeling toward the vendor and product.
While purchasing decisions shouldn't be based on emotion, it's valuable to know what kind of emotional response the vendor you're considering elicits from their users.
Footprint
Feature Ratings
Multi-Factor Authentication (MFA)
Privileged Password Management
Compliance Reporting
Integration with Helpdesk Apps
Privileged Behavioural Analytics
Privileged Remote Access
Integration with SIEM Solutions
Password Vaulting
Privileged Account Life Cycle Management
Audit, Reporting & Compliance
Forensic Investigation Capability
Vendor Capability Ratings
Ease of Implementation
Business Value Created
Vendor Support
Product Strategy and Rate of Improvement
Quality of Features
Ease of Data Integration
Ease of IT Administration
Availability and Quality of Training
Usability and Intuitiveness
Ease of Customization
Breadth of Features
ARCON PAM Downloads
ARCON PAM Videos
ARCON- Our Story
Why should your organization invest in ARCON | PAM on priority?
How can Privileged Accounts be compromised?
Protect Privileged Accounts with ARCON | PAM to prevent Targeted Attacks
How secure are your IoT devices?
ARCON PAM Reviews
SMARANIKA H.
- Role: Information Technology
- Industry: Technology
- Involvement: IT Development, Integration, and Administration
Submitted Feb 2024
Robust and feature-rich solution
Likeliness to Recommend
What is your favorite aspect of this product?
Password Vaulting: Securely stores and manages privileged credentials, eliminating the need for manual storage or sharing. Least Privilege Principle: Enforces granular access controls, ensuring users only have the minimum access required for their tasks. Session Monitoring and Recording: Monitors and records privileged user activity, enabling auditability and investigation capabilities. Just-in-Time (JIT) Privileging: Grants temporary access to privileged accounts only when needed, minimizing risk exposure. Endpoint Privilege Management (EPM): Extends control to endpoint devices, managing local administrator accounts.
What do you dislike most about this product?
Cost: Can be expensive compared to some competitors, especially for smaller organizations. Potential Complexity: While user-friendly, managing complex IT environments might require additional expertise. Limited Vendor Awareness: Compared to well-established vendors, ARCON might have lower brand recognition. Integration Considerations: While offering integrations, thorough evaluation is crucial to ensure compatibility with your existing infrastructure.
What recommendations would you give to someone considering this product?
ARCON PAM is a robust and feature-rich solution for organizations seeking to tighten control over privileged access and enhance IT security. Its comprehensive protection capabilities, scalability, and ease of use make it a compelling option. However, it's important to consider the potential cost, complexity, and vendor awareness limitations before making a decision. ARCON offers various training and certification programs to help organizations and users gain expertise in using their PAM solution effectively. They also offer a range of support options to ensure customers receive the necessary assistance in implementing PAM Solution.
Pros
- Helps Innovate
- Reliable
- Respectful
- Altruistic
Katieren W.
- Role: Information Technology
- Industry: Other
- Involvement: IT Leader or Manager
Submitted Nov 2023
One of the best PAM tools with a lot of options.
Likeliness to Recommend
What differentiates ARCON PAM from other similar products?
The best thing about it is the security it provides; I have several servers and I can’t give everyone access, thus ARCON allows me to divide my user groups. The second feature is the recording feature, which can assist me in diagnosing any malicious activity that occurs. When I grant access to a user, I don’t have to sit there and see his activities; instead, I may view the recording to observe the activities.
What is your favorite aspect of this product?
The onboarding procedure is quite easy. They offer the device’s tags and some ID, which helps build the URL via which I can swiftly integrate the machine and allow the operation specified by the customer. My overall experience with this product is amazing. The web console is relatively simple to use; anyone can do so by following the web guide. Acron PAM is quite versatile and can be used in a multitude of situations, which is why I adore it. I can now protect and gain access to my essential infrastructure.
What do you dislike most about this product?
The element of this product that I despise is the implementation; the implementation is difficult, and being dependent on the database is a pain point.
What recommendations would you give to someone considering this product?
I can configure all servers in a single tool in one location, and no one can engage in illegal actions because every user’s activity is monitored, documented, and easily accessible. Various authentication methods, such as token authentication, are available. Filters are also supplied for accessing different operating systems (for example, Linux and Windows).
Pros
- Generous Negotitation
- Helps Innovate
- Continually Improving Product
- Reliable
Sarfaraz A.
- Role: Consultant
- Industry: Banking
- Involvement: Initial Implementation
Submitted Oct 2023
Likeliness to Recommend
Pros
- Helps Innovate
- Continually Improving Product
- Inspires Innovation
- Altruistic