WARNINGThis page is considered a work in progress and is more for example than truth.

Endpoint Privilege Management/Identity Product Matrix

Feature Matrix - Core Updated: Mar 2025 / Feature Data is updated daily.


Company
Parent
Parent Company
Employee Size
Size of the company or division
Founded
Year the company was founded
Headquarters
Location of company headquarters
Public/Private
Whether the company is publicly traded or privately held
Acquisition
Details about any acquisitions
Architecture & Deployment
Cloud
Cloud-based deployment option
On Premises
On-premises deployment option
Hybrid
Supports both cloud and on-premises deployment options
SaaS
Software as a Service delivery model
Private Cloud
Ability to deploy in a private cloud environment
Multi-Tenant
Multi-tenant architecture for MSPs
High Availability
Redundancy and failover capabilities
Disaster Recovery
Built-in disaster recovery capabilities
Scalability
Ability to scale with increasing demand
Containerized Deployment
Support for containerized deployment (Docker, Kubernetes)
API Access
Provides API for custom integrations
Microservices Architecture
Built on a microservices architecture
Privileged Account Management
Password Vault
Secure storage for privileged credentials
Automatic Password Rotation
Automatically rotate passwords on a schedule
Password Complexity Rules
Enforce password complexity requirements
Shared Account Management
Management of shared privileged accounts
Service Account Management
Management of service accounts
Administrative Account Management
Management of administrative accounts
Emergency/Break-Glass Access
Emergency access to privileged accounts
Credential Checkout Workflow
Process for checking out privileged credentials
Checkout Approval
Approval workflow for credential checkout
Checkout Time Limits
Time limits for credential checkout
Checkout Reason
Require reason for credential checkout
Credential Discovery
Automatically discover privileged accounts
Credential Onboarding
Process for onboarding new privileged accounts
Password Reconciliation
Verify and reconcile password changes
Password Verification
Verify password validity
Account Dependencies
Track dependencies between accounts
Account Grouping
Group accounts by function or system
SSH Key Management
Management of SSH keys
API Key Management
Management of API keys
Cloud Key Management
Management of cloud service keys
Certificate Management
Management of digital certificates
Privileged Session Management
Session Monitoring
Real-time monitoring of privileged sessions
Session Recording
Record privileged sessions for audit
Session Isolation
Isolate privileged sessions from user endpoints
Session Termination
Ability to terminate suspicious sessions
Session Shadowing
Allow administrators to view active sessions
Command Filtering
Filter commands during privileged sessions
Keystroke Logging
Log keystrokes during privileged sessions
File Transfer Control
Control file transfers during privileged sessions
Clipboard Control
Control clipboard usage during privileged sessions
Jump Box Functionality
Provide secure jump box for privileged access
Web Session Management
Management of privileged web sessions
RDP Session Management
Management of RDP sessions
SSH Session Management
Management of SSH sessions
Database Session Management
Management of database sessions
Application Session Management
Management of application sessions
Protocol Handlers
Support for various protocols (RDP, SSH, VNC, etc.)
Session Proxy
Proxy for privileged sessions
Session Audit
Audit of privileged sessions
Session Analytics
Analytics of privileged session activity
Endpoint Privilege Management
Least Privilege Enforcement
Enforce principle of least privilege
Application Control
Control which applications can run
Application Whitelisting
Allow only approved applications to run
Application Blacklisting
Block specific applications from running
Elevation on Demand
Elevate privileges on demand for specific tasks
Just-in-Time Administration
Grant administrative privileges only when needed
Admin Rights Removal
Remove standing administrative rights
Privilege Discovery
Discover privileges across endpoints
Privilege Analytics
Analytics of privilege usage
Privilege Recommendations
Recommendations for privilege reduction
Policy-Based Controls
Controls based on defined policies
Context-Aware Controls
Controls based on context (time, location, etc.)
Windows Support
Support for Windows operating systems
macOS Support
Support for macOS operating systems
Linux Support
Support for Linux operating systems
Unix Support
Support for Unix operating systems
Sudo Management
Management of sudo privileges
UAC Management
Management of User Account Control
Driver Management
Control over driver installation
Script Control
Control over script execution
Child Process Control
Control over child processes
File Integrity Monitoring
Monitor changes to critical files
Registry Control
Control over registry changes
Local Account Management
Management of local accounts
Identity and Access Management
Single Sign-On
Single sign-on capabilities
Multi-Factor Authentication
Support for multi-factor authentication
Adaptive MFA
Context-based multi-factor authentication
Passwordless Authentication
Support for passwordless authentication
Biometric Authentication
Support for biometric authentication
Mobile Authentication
Support for mobile-based authentication
Social Login
Support for social login providers
Federation
Identity federation capabilities
Directory Integration
Integration with directory services
Active Directory Integration
Integration with Microsoft Active Directory
Azure AD Integration
Integration with Microsoft Azure Active Directory
LDAP Integration
Integration with LDAP directories
SAML Support
Support for SAML authentication
OAuth Support
Support for OAuth authentication
OpenID Connect Support
Support for OpenID Connect
User Provisioning
Automated user provisioning
User Deprovisioning
Automated user deprovisioning
User Lifecycle Management
Management of user lifecycle
Role-Based Access Control
Access control based on roles
Attribute-Based Access Control
Access control based on attributes
Policy-Based Access Control
Access control based on policies
Dynamic Access Policies
Access policies that adapt to context
Access Certification
Periodic certification of access rights
Access Request Workflow
Workflow for requesting access
Access Approval Workflow
Workflow for approving access requests
Segregation of Duties
Enforce separation of responsibilities
Identity Governance
Governance of identity and access
Identity Analytics
Analytics of identity and access patterns
Cloud Privilege Management
Cloud IAM Integration
Integration with cloud IAM services
AWS IAM Integration
Integration with AWS Identity and Access Management
Azure IAM Integration
Integration with Azure Identity and Access Management
GCP IAM Integration
Integration with Google Cloud IAM
Cloud Entitlement Management
Management of cloud entitlements
Cloud Access Security Broker
Control access to cloud services
Cloud Privilege Analytics
Analytics of cloud privilege usage
Cloud Security Posture Management
Management of cloud security posture
Multi-Cloud Support
Support for multiple cloud providers
Cloud Account Protection
Protection of cloud service accounts
Infrastructure as Code Support
Support for infrastructure as code
DevOps Integration
Integration with DevOps tools and processes
Container Security
Security for containerized environments
Kubernetes Integration
Integration with Kubernetes
Security & Compliance
Audit Logging
Comprehensive audit logging
SIEM Integration
Integration with Security Information and Event Management systems
SOC Integration
Integration with Security Operations Center
Threat Analytics
Analytics to detect threats
User Behavior Analytics
Analytics of user behavior to detect anomalies
Risk Scoring
Score risk of users and activities
Compliance Reporting
Reports for compliance purposes
Compliance Frameworks
Support for compliance frameworks
SOC 2 Compliance
Service Organization Control 2 compliance
HIPAA Compliance
Health Insurance Portability and Accountability Act compliance
GDPR Compliance
General Data Protection Regulation compliance
PCI DSS Compliance
Payment Card Industry Data Security Standard compliance
NIST Framework Support
National Institute of Standards and Technology framework support
ISO 27001 Compliance
ISO 27001 compliance
Custom Compliance
Support for custom compliance requirements
Data Sovereignty
Controls for data sovereignty requirements
Encryption
Data encryption capabilities
Key Management
Management of encryption keys
Secrets Management
Management of application secrets
Vulnerability Management
Management of vulnerabilities
Patch Management
Management of security patches
Management & Monitoring
Centralized Management
Single console for management
Dashboard
Visual dashboard for status and analytics
Reporting
Comprehensive reporting capabilities
Custom Reporting
Ability to create custom reports
Scheduled Reports
Automatically generate and send reports
Alerting
Configurable alerts for security events
Notification Options
Options for receiving notifications
Health Monitoring
Monitoring of system health
Performance Monitoring
Monitoring of system performance
Capacity Planning
Tools for capacity planning
Log Management
Management of system logs
Event Correlation
Correlation of security events
Mobile App
Mobile application for management and monitoring
Integration
Ticketing System Integration
Integration with ticketing systems
ITSM Integration
Integration with IT Service Management tools
RMM Integration
Integration with Remote Monitoring and Management tools
PSA Integration
Integration with Professional Services Automation tools
ConnectWise Manage
Integration with ConnectWise Manage
Autotask
Integration with Autotask PSA
ServiceNow
Integration with ServiceNow
Jira
Integration with Jira
Webhook Support
Support for webhooks for custom integrations
ChatOps Integration
Integration with chat platforms for operations
Slack Integration
Integration with Slack
Microsoft Teams Integration
Integration with Microsoft Teams
Email Integration
Integration with email systems
Custom Integrations
Support for custom integrations
MSP Features
White Label
Ability to rebrand the solution with your own branding
Multi-Tenant Management
Tools for managing multiple client tenants
Client Reporting
Client-specific reporting capabilities
Client Onboarding
Tools for onboarding new clients
MSP Dashboard
Centralized dashboard for MSP management
MSP Billing Integration
Integration with MSP billing systems
Service Tiers
Support for different service tiers
MSP Pricing
Special pricing for Managed Service Providers
MSP-Specific Support
Dedicated support for MSPs
MSP Training
Training resources for MSPs
Client Isolation
Isolation between client environments
Delegation
Ability to delegate administration to clients
Pricing & Licensing
Per User
Pricing based on number of users
Per Administrator
Pricing based on number of administrators
Per Endpoint
Pricing based on number of endpoints
Per Account
Pricing based on number of managed accounts
Per Server
Pricing based on number of servers
Tiered Pricing
Pricing based on tiers of functionality
Free Tier
Availability of a free tier or version
Trial Available
Availability of a free trial
Monthly Billing
Option for monthly billing
Annual Billing
Option for annual billing
Volume Discounts
Discounts for volume purchases
Perpetual License
One-time purchase option
Subscription License
Recurring subscription model