17 years helping New Zealand businesses
choose better software
Capterra offers objective, independent research and verified user reviews. We may earn a referral fee when you visit a vendor through our links.
Learn more
Featured software
Most reviewed software
Explore the most reviewed products by our users on the Privileged Access Management Software
Filter Results (187)
Countries available
Countries where the product is available. Note: Customer support may not be accessible in that country.
New Zealand
Pricing Options
Product type
Show local products
187 results
Sort by
A privileged access management (PAM) solution that allows you to handle all requests with ease and strengthen your endpoint security.
Learn more about Heimdal Privileged Access Management
A PAM solution that gives system administrators complete visibility into each endpoint’s access rights from either the dashboard or mobile app. With this convenient setup, admins are able to view user requests, check request history, approve or decline escalation requests on the go, and block elevations. Enable Zero-trust execution or revoke local admin rights with a simple click. This effectively stops malicious insider threats from taking over your network and boosts your security.
Learn more about Heimdal Privileged Access Management
...
Read more
Features
- Access Controls/Permissions
- Application Access Control
- User Session Management
- Compliance Management
- Password Management
- User Activity Monitoring
- Credential Management
Stop ransomware with endpoint controls including Allowlisting and Ringfencing app containment.
Learn more about ThreatLocker
For IT Professionals to stop ransomware, you need to do more than look for threats. ThreatLocker helps you reduce your surface areas of attack with policy-driven endpoint security. Change the paradigm from only blocking known threats, to blocking everything that is not explicitly allowed. Combined with Ringfencing and additional controls, you enable a Zero Trust posture at the endpoint to block attacks that live off the land.
Learn more about ThreatLocker
...
Read more
Features
- Access Controls/Permissions
- Application Access Control
- User Session Management
- Compliance Management
- Password Management
- User Activity Monitoring
- Credential Management
ManageEngine PAM360 Complete privileged access security for enterprise IT
Learn more about ManageEngine PAM360
ManageEngine PAM360 is a comprehensive privileged access security solution for enterprise IT teams. It empowers businesses with complete privileged access governance and facilitates deep correlation of privileged access data with overall network data from a single, central console. Apart from warranting a tight privileged access security, PAM360 also aids businesses pass compliance audits by providing various out-of-the box compliance reports that relay organizational security.
Learn more about ManageEngine PAM360
...
Read more
Features
- Access Controls/Permissions
- Application Access Control
- User Session Management
- Compliance Management
- Password Management
- User Activity Monitoring
- Credential Management
Role based access control for Windows, Linux, network devices, cloud and more. Dynamically create web forms for PowerShell and Python.
Learn more about System Frontier
System Frontier enables organizations to easily delegate granular permissions to Tier 1 support staff, junior administrators, contractors and vendors without giving away admin rights. Every action is audited, including the output from command-line tools. Integrate with other IT support applications in multiple ways to support your workflow. Manage servers, workstations, network devices, Active Directory objects or anything that supports remote API connections.
Learn more about System Frontier
...
Read more
Features
- Access Controls/Permissions
- Application Access Control
- User Session Management
- Compliance Management
- Password Management
- User Activity Monitoring
- Credential Management
Boost productivity and protect your data with easy user management in both Google Workspace and Microsoft 365.
Learn more about Conecta Suite
Conecta Suite is the ideal solution for those looking to maximize the potential of Google Workspace and boost team productivity. With features that make management more efficient and secure, it offers advanced and customized control to meet your company's specific needs.
By integrating Conecta Suite, you enhance the use of the Admin Console with increased security and detailed resource management, allowing your team to collaborate and communicate more smoothly and securely.
Conecta Suite not only optimizes productivity but also strengthens security, safeguarding your data against threats and unauthorized access. Key features include:
✅ Automatic email signature reapplication;
✅ Access restrictions by time, system, browser, and IP;
✅ Custom shift scheduling;
✅ Automatic or manual device disconnection;
✅ Deactivation of licenses for former employees;
✅ Detailed reports on logins and file sharing;
✅ Custom login screen with company branding;
✅ Email and Drive file migration between users
Learn more about Conecta Suite
...
Read more
Features
- Access Controls/Permissions
- Application Access Control
- User Session Management
- Compliance Management
- Password Management
- User Activity Monitoring
- Credential Management
BeyondTrust Remote Support (formerly Bomgar Remote Support) securely accesses and supports any device or system, anywhere in the world.
BeyondTrust Remote Support (formerly Bomgar Remote Support) enables secure, instant remote support to customers using Windows, Mac, Android, iOS, or other devices, whether or not they are on the corporate network. Users can fix end systems or troubleshoot issues using screen sharing, remote control, unattended access, file sharing, annotations, and mobile device camera sharing. Real-time chat, canned scripts, collaboration and escalation tools improve technician efficiency.
Learn more about BeyondTrust Remote Support
...
Read more
Features
- Access Controls/Permissions
- Application Access Control
- User Session Management
- Compliance Management
- Password Management
- User Activity Monitoring
- Credential Management
Cloud-based solution that helps businesses manage workforce via multi-factor authentication, meta-directory, single sign-on and more.
Okta is The World’s Identity Company™. As the leading independent Identity partner, we free everyone to safely use any technology — anywhere, on any device or app. The most trusted brands trust Okta to enable secure access, authentication, and automation. With flexibility and neutrality at the core of our Okta Workforce Identity and Customer Identity Clouds, business leaders and developers can focus on innovation and accelerate digital transformation, thanks to customizable solutions and more than 7,000 pre-built integrations. We’re building a world where Identity belongs to you. Learn more at okta.com.
Learn more about Okta
...
Read more
Features
- Access Controls/Permissions
- Application Access Control
- User Session Management
- Compliance Management
- Password Management
- User Activity Monitoring
- Credential Management
Duo Security's multi-factor authentication gives your users easy, one-tap access to applications, securing against credential theft.
Our mission is to protect your mission. Duo Security makes security painless, so you can focus on what's important. Our scalable, cloud-based trusted access solution protects access to all applications for any user and device, from anywhere. Duo's multi-factor authentication (MFA) solution is easy to use, administer and deploy, while providing complete endpoint visibility and control. This combination of user and device trust builds the foundation for a zero-trust security model.
Learn more about Duo Security
...
Read more
Features
- Access Controls/Permissions
- Application Access Control
- User Session Management
- Compliance Management
- Password Management
- User Activity Monitoring
- Credential Management
Keeper is the leading Password Security Platform for preventing password-related data breaches and cyberthreats.
Keeper is the leading Password Security Platform for preventing password-related data breaches and cyberthreats. Small businesses can use Keeper as a 3-in-1 solution for password management, SSO, and PAM. Large enterprises can use it in combination with a dedicated PAM solution seamlessly.
Learn more about Keeper Security
...
Read more
Features
- Access Controls/Permissions
- Application Access Control
- User Session Management
- Compliance Management
- Password Management
- User Activity Monitoring
- Credential Management
The JumpCloud Directory Platform reimagines the directory as a complete platform for identity, access, and device management.
JumpCloud’s cloud directory enables internal IT departments, MSPs, VARs/distributors, and DevOps teams to securely and easily enable access to any IT resource, from anywhere. Take care of your privileged access management needs with JumpCloud’s conditional access policies, multi-factor authentication (MFA), and visibility into access attempts and other user activities.
Learn more about JumpCloud Directory Platform
...
Read more
Features
- Access Controls/Permissions
- Application Access Control
- User Session Management
- Compliance Management
- Password Management
- User Activity Monitoring
- Credential Management
SecureLink is the leader in providing privileged access management for vendors for both enterprise organizations and technology vendors
SecureLink is the leader in providing privileged access management for vendors and remote support solutions for both highly regulated enterprise organizations and technology vendors. SecureLink serves more than 30,000 organizations worldwide. World-class companies across multiple industries including healthcare, financial services, legal, gaming, and retail rely on SecureLink's secure, purpose-built platform. SecureLink is headquartered in Austin, Texas.
Learn more about SecureLink
...
Read more
Features
- Access Controls/Permissions
- Application Access Control
- User Session Management
- Compliance Management
- Password Management
- User Activity Monitoring
- Credential Management
Bitwarden is an open source solution that secures credentials with end-to-end encryption and manages account access.
Bitwarden is an open source solution that uses end-to-end encryption to store all of your company’s credentials in one secure location. Administrators can easily manage access to important applications by setting permissions on an individual or group basis. Quickly identify security risks and unauthorized access with exportable activity logs. Connect your Bitwarden organization to your existing directory service to automatically provision and de-provision accounts.
Learn more about Bitwarden
...
Read more
Features
- Access Controls/Permissions
- Application Access Control
- User Session Management
- Compliance Management
- Password Management
- User Activity Monitoring
- Credential Management
LogMeOnce Password Management & IAM software helps to effectively protect and manage passwords for teams, businesses, and enterprises.
While cyber criminals launch thousands of attacks, protecting security credentials is paramount. Your business continuity starts with protecting passwords. Not for the few, but the entire team. LogMeOnce helps you to transform your business, improve security, and reduce support cost. The powerful features of LogMeOnce improve security and take away frustration. Our security platform protects your teams and IT administrators. Our best practices help to protect your companys brand and identity.
Learn more about LogMeOnce
...
Read more
Features
- Access Controls/Permissions
- Application Access Control
- User Session Management
- Compliance Management
- Password Management
- User Activity Monitoring
- Credential Management
Veriato offers predictive behavior intelligence built with AI to help organizations manage insider risk and monitor employee activity.
Veriato has reinvented the category it created, using AI based user behavior analytics to help companies prevent risks and increase productivity in their remote, hybrid and in-office environments. Veriato’s platform offers solutions for Insider Risk Management (IRM), behavioral analytics, user activity monitoring (UAM) and data loss prevention (DLP) in a single powerful platform. Veriato delivers monitoring, alerts, reporting and screenshots, allowing customers to be predictive and proactive rather than reactive, critical in cybersecurity. The platform helps global Enterprises, SMBs and Government entities become more engaged, productive and safe.
Learn more about Veriato Workforce Behavior Analytics
...
Read more
Features
- Access Controls/Permissions
- Application Access Control
- User Session Management
- Compliance Management
- Password Management
- User Activity Monitoring
- Credential Management
Top-rated Zero Trust SASE/SSE for network security and regulatory compliance. Protect your business, anytime, anywhere.
GoodAccess is the world's most usable cybersecurity SaaS for enabling secure remote access to digital resources. 🛡️
● Deployable in just 10 minutes.
● Delivers SMEs the benefits of zero trust network access (ZTNA) without the complexities.
● Any company can mitigate the risks introduced by remote workforce, BYOD and distributed IT resources with no hassle.
GoodAccess is recognized by TechRadar as one of the best ZTNA solutions and acclaimed by leading review platforms such as G2 and Capterra for its excellence in customer support, simplicity, and ease of use.
As part of our mission, in 2022 we brought companies all around the world the first forever-free business VPN named GoodAccess Starter that helps them achieve secure remote access essentials with no constraints.
Companies in more than 120 countries use GoodAccess to secure access to their business systems, applications, clouds, and data.
Anytime, anywhere.
Start your 14-day full-featured free trial.
Learn more about GoodAccess
...
Read more
Features
- Access Controls/Permissions
- Application Access Control
- User Session Management
- Compliance Management
- Password Management
- User Activity Monitoring
- Credential Management
Identity management (IAM) and single sign-on (SSO) solution for companies of all sizes. Get started immediately with our free trial.
With OneLogin Identity Lifecycle Management, provision users easily and automate onboarding/offboarding. Connectors integrate OneLogin with your on-prem and cloud directories with real-time synchronization. Streamline entitlements through powerful rules to enforce intelligent access policies based on user location, role, privilege level, and more. Security policy enforcement and context aware adaptive authentication ensure only authorized users get access to valuable data.
Learn more about OneLogin
...
Read more
Features
- Access Controls/Permissions
- Application Access Control
- User Session Management
- Compliance Management
- Password Management
- User Activity Monitoring
- Credential Management
Ivanti Connect Secure offers a seamless SSL VPN for secure remote access from any web-enabled device and location.
Ivanti Connect Secure is a SSL VPN solution that grants remote and mobile users secure access to corporate networks from any web-enabled device. It provides a unified client for both remote and on-site access, integrating with directory and identity services, EMM/MDM, SIEM, and advanced firewalls. The solution features dynamic adaptive multi-factor authentication, including biometrics, TOTP, SAML 2.0, PKI, IAM, and digital certificates, ensuring secure connections. It enforces endpoint compliance, allowing only approved devices to connect.
Learn more about Ivanti Connect Secure
...
Read more
Features
- Access Controls/Permissions
- Application Access Control
- User Session Management
- Compliance Management
- Password Management
- User Activity Monitoring
- Credential Management
Encrypted cloud-based, integrated, automated password protection to store, manage, and retrieve customer credentials and knowledge.
N-able Passportal is an encrypted and efficient password and credential management solution built for MSPs, offering credential injection, reporting, auditing, password change automation, and privileged client documentation capabilities designed to streamline the technician's day by providing essential documentation at their fingertips to standardize service delivery and expedite issue resolution.
Learn more about Passportal
...
Read more
Features
- Access Controls/Permissions
- Application Access Control
- User Session Management
- Compliance Management
- Password Management
- User Activity Monitoring
- Credential Management
Teramind tracks employee behavior, detects threats, and optimizes your business for productivity with advanced employee monitoring.
Discover Teramind - the ultimate tool for businesses looking to optimize productivity, streamline workflows, and protect assets. Our customizable platform ensures regulatory compliance, detects and prevents insider threats, and monitors remote employees. Automated actions keep your business secure and efficient, while real-time alerts and logs provide all-around security. Experience the power of machine-learned behavior analytics to secure your company data. Ready to revolutionize your business?
Learn more about Teramind
...
Read more
Features
- Access Controls/Permissions
- Application Access Control
- User Session Management
- Compliance Management
- Password Management
- User Activity Monitoring
- Credential Management
Perimeter 81 is a leading network cybersecurity solution offering secure remote access.
Perimeter 81 is a leading Zero Trust Network Access platform, ensuring secure remote access from anywhere. With our Zero Trust approach, user access is segmented based on identity and context, significantly reducing the attack surface.
Secure your organization with both agent and agentless access as well as advanced security features such as device posture security and multi-factor authentication, ensuring access to only those you trust.
Learn more about Perimeter 81
...
Read more
Features
- Access Controls/Permissions
- Application Access Control
- User Session Management
- Compliance Management
- Password Management
- User Activity Monitoring
- Credential Management
Auth0 by Okta takes a modern approach to identity, enabling organizations to provide secure access to any application.
Auth0 is the first identity management platform for developers and application teams. It gives you a platform to authenticate and authorize, providing secure access to applications, devices, and users. Auth0 provides the simplicity, extensibility, and expertise to scale and protect any application, for any audience. Integrate Auth0 into any app, written in any language, and any framework.
Learn more about Auth0
...
Read more
Features
- Access Controls/Permissions
- Application Access Control
- User Session Management
- Compliance Management
- Password Management
- User Activity Monitoring
- Credential Management
ADManager Plus is a unified hybrid Active Directory, Microsoft 365, Exchange, and Google Workspace management and reporting solution.
ADManager Plus is a unified hybrid Active Directory, Microsoft 365, Exchange, and Google Workspace management and reporting solution that helps in granting JIT access, granular access control, remote access, and privileged group membership management. It helps with managing users’ file server access permissions along with identifying and granting only the least privileges needed. It also offers 200 reports, including reports to find privileged users' group memberships.
Learn more about ManageEngine ADManager Plus
...
Read more
Features
- Access Controls/Permissions
- Application Access Control
- User Session Management
- Compliance Management
- Password Management
- User Activity Monitoring
- Credential Management
ADAudit Plus is Active Directory, Azure AD, Windows Server, file server (including NAS devices), and workstation auditing software.
ManageEngine ADAudit Plus is an IT security and compliance solution. With over 200 reports and real-time alerts, it provides complete visibility into all the activities across your Active Directory (AD), Azure AD, file servers (Windows, NetApp, EMC, Synology, Hitachi, and Huawei), Windows servers, and workstations. ADAudit Plus helps you track user logon and logoff activity; analyze account lockouts; audit ADFS, ADLDS, and printers; monitor privileged user activities; and do much more.
Learn more about ManageEngine ADAudit Plus
...
Read more
Features
- Access Controls/Permissions
- Application Access Control
- User Session Management
- Compliance Management
- Password Management
- User Activity Monitoring
- Credential Management
Local product
Admin By Request
4.9
(43)
Local product
A comprehensive security solution for managing local admin rights which strikes the perfect balance between productivity & protection.
Admin By Request is a Privileged Access Management (PAM) security solution which enables organizations to manage, monitor, and control local admin rights across their endpoints. It offers Just-In-Time per-app and session elevation, logging of privileged activity, real-time anti-malware file scanning, temporary local admin accounts (LAPS replacement), integration with SIEM tools and ticketing systems, and a full software and hardware inventory - all accessible from within an intuitive web portal.
Learn more about Admin By Request
...
Read more
Features
- Access Controls/Permissions
- Application Access Control
- User Session Management
- Compliance Management
- Password Management
- User Activity Monitoring
- Credential Management
Azure Active Directory, part of Microsoft Entra, is a universal identity management and security platform with single sign-on and MFA.
Azure Active Directory (Azure AD) enterprise identity service, part of Microsoft Entra, provides single sign-on and multi-factor authentication (MFA) to help protect users from 99.9% of cybersecurity attacks. You get SSO, CA, a single identity platform, developer tools, and more.
Learn more about Azure Active Directory
...
Read more
Features
- Access Controls/Permissions
- Application Access Control
- User Session Management
- Compliance Management
- Password Management
- User Activity Monitoring
- Credential Management