You are on page 1of 2

Feature Description BeyondTrus CyberArK Delinea One Identity

t
Comprehensiv Secure and automate the Available Available Available Available
e Password process for discovering,
Management managing, and cycling
privileged account passwords.
Enhanced Live session management Available Available Does not allow to lock the Does not allow to
Privileged enables true dual control, session. lock the session.
Session allowing admins to record, lock,
Management and document suspicious
behavior without killing
sessions.
Secure SSH Automatically rotate SSH keys Limited Available Available Limited
Management according to a defined schedule
and enforce granular access
control and workflow.
App-to-App Eliminate hard-coded or Available Extra charge for Available Available
Password embedded application this feature.
Management credentials that includes an
unlimited number of password
caches.
Discovery- Leverages a distributed Available Beyond trust uses Available. Also includes Limited to Network
Driven network discovery engine to Smart Rules for service accounts. scan only and group
Dynamic Policy scan, identify, and profile dynamic policy. assignment.
assets
Adaptive Evaluate just-in-time context Available BeyondTrust Available, however access Limited to time-
Access Control and simplify access requests, access policies can policies cannot be driven by based policy no
considering the day, date, time be driven by date, geo location. location-based policy
and location when a user location.
accesses resource.
Advanced Correlates the data, connects Only Limited reporting Available for user risk. Available for extra
Threat the evidence, and reveals clear available for Response actions enforced cost, needs high
Analytics cases of user and asset risk. user risk? by secret server: resources for
Notification actions, dynamic processing.
actions

You might also like