WARNINGThis page is considered a work in progress and is more for example than truth.
Endpoint Privilege Management/Identity Product Matrix
Feature Matrix - Core Updated: Mar 2025 / Feature Data is updated daily.
Company |
Parent Parent Company |
Employee Size Size of the company or division |
Founded Year the company was founded |
Headquarters Location of company headquarters |
Public/Private Whether the company is publicly traded or privately held |
Acquisition Details about any acquisitions |
Architecture & Deployment |
Cloud Cloud-based deployment option |
On Premises On-premises deployment option |
Hybrid Supports both cloud and on-premises deployment options |
SaaS Software as a Service delivery model |
Private Cloud Ability to deploy in a private cloud environment |
Multi-Tenant Multi-tenant architecture for MSPs |
High Availability Redundancy and failover capabilities |
Disaster Recovery Built-in disaster recovery capabilities |
Scalability Ability to scale with increasing demand |
Containerized Deployment Support for containerized deployment (Docker, Kubernetes) |
API Access Provides API for custom integrations |
Microservices Architecture Built on a microservices architecture |
Privileged Account Management |
Password Vault Secure storage for privileged credentials |
Automatic Password Rotation Automatically rotate passwords on a schedule |
Password Complexity Rules Enforce password complexity requirements |
Shared Account Management Management of shared privileged accounts |
Service Account Management Management of service accounts |
Administrative Account Management Management of administrative accounts |
Emergency/Break-Glass Access Emergency access to privileged accounts |
Credential Checkout Workflow Process for checking out privileged credentials |
Checkout Approval Approval workflow for credential checkout |
Checkout Time Limits Time limits for credential checkout |
Checkout Reason Require reason for credential checkout |
Credential Discovery Automatically discover privileged accounts |
Credential Onboarding Process for onboarding new privileged accounts |
Password Reconciliation Verify and reconcile password changes |
Password Verification Verify password validity |
Account Dependencies Track dependencies between accounts |
Account Grouping Group accounts by function or system |
SSH Key Management Management of SSH keys |
API Key Management Management of API keys |
Cloud Key Management Management of cloud service keys |
Certificate Management Management of digital certificates |
Privileged Session Management |
Session Monitoring Real-time monitoring of privileged sessions |
Session Recording Record privileged sessions for audit |
Session Isolation Isolate privileged sessions from user endpoints |
Session Termination Ability to terminate suspicious sessions |
Session Shadowing Allow administrators to view active sessions |
Command Filtering Filter commands during privileged sessions |
Keystroke Logging Log keystrokes during privileged sessions |
File Transfer Control Control file transfers during privileged sessions |
Clipboard Control Control clipboard usage during privileged sessions |
Jump Box Functionality Provide secure jump box for privileged access |
Web Session Management Management of privileged web sessions |
RDP Session Management Management of RDP sessions |
SSH Session Management Management of SSH sessions |
Database Session Management Management of database sessions |
Application Session Management Management of application sessions |
Protocol Handlers Support for various protocols (RDP, SSH, VNC, etc.) |
Session Proxy Proxy for privileged sessions |
Session Audit Audit of privileged sessions |
Session Analytics Analytics of privileged session activity |
Endpoint Privilege Management |
Least Privilege Enforcement Enforce principle of least privilege |
Application Control Control which applications can run |
Application Whitelisting Allow only approved applications to run |
Application Blacklisting Block specific applications from running |
Elevation on Demand Elevate privileges on demand for specific tasks |
Just-in-Time Administration Grant administrative privileges only when needed |
Admin Rights Removal Remove standing administrative rights |
Privilege Discovery Discover privileges across endpoints |
Privilege Analytics Analytics of privilege usage |
Privilege Recommendations Recommendations for privilege reduction |
Policy-Based Controls Controls based on defined policies |
Context-Aware Controls Controls based on context (time, location, etc.) |
Windows Support Support for Windows operating systems |
macOS Support Support for macOS operating systems |
Linux Support Support for Linux operating systems |
Unix Support Support for Unix operating systems |
Sudo Management Management of sudo privileges |
UAC Management Management of User Account Control |
Driver Management Control over driver installation |
Script Control Control over script execution |
Child Process Control Control over child processes |
File Integrity Monitoring Monitor changes to critical files |
Registry Control Control over registry changes |
Local Account Management Management of local accounts |
Identity and Access Management |
Single Sign-On Single sign-on capabilities |
Multi-Factor Authentication Support for multi-factor authentication |
Adaptive MFA Context-based multi-factor authentication |
Passwordless Authentication Support for passwordless authentication |
Biometric Authentication Support for biometric authentication |
Mobile Authentication Support for mobile-based authentication |
Social Login Support for social login providers |
Federation Identity federation capabilities |
Directory Integration Integration with directory services |
Active Directory Integration Integration with Microsoft Active Directory |
Azure AD Integration Integration with Microsoft Azure Active Directory |
LDAP Integration Integration with LDAP directories |
SAML Support Support for SAML authentication |
OAuth Support Support for OAuth authentication |
OpenID Connect Support Support for OpenID Connect |
User Provisioning Automated user provisioning |
User Deprovisioning Automated user deprovisioning |
User Lifecycle Management Management of user lifecycle |
Role-Based Access Control Access control based on roles |
Attribute-Based Access Control Access control based on attributes |
Policy-Based Access Control Access control based on policies |
Dynamic Access Policies Access policies that adapt to context |
Access Certification Periodic certification of access rights |
Access Request Workflow Workflow for requesting access |
Access Approval Workflow Workflow for approving access requests |
Segregation of Duties Enforce separation of responsibilities |
Identity Governance Governance of identity and access |
Identity Analytics Analytics of identity and access patterns |
Cloud Privilege Management |
Cloud IAM Integration Integration with cloud IAM services |
AWS IAM Integration Integration with AWS Identity and Access Management |
Azure IAM Integration Integration with Azure Identity and Access Management |
GCP IAM Integration Integration with Google Cloud IAM |
Cloud Entitlement Management Management of cloud entitlements |
Cloud Access Security Broker Control access to cloud services |
Cloud Privilege Analytics Analytics of cloud privilege usage |
Cloud Security Posture Management Management of cloud security posture |
Multi-Cloud Support Support for multiple cloud providers |
Cloud Account Protection Protection of cloud service accounts |
Infrastructure as Code Support Support for infrastructure as code |
DevOps Integration Integration with DevOps tools and processes |
Container Security Security for containerized environments |
Kubernetes Integration Integration with Kubernetes |
Security & Compliance |
Audit Logging Comprehensive audit logging |
SIEM Integration Integration with Security Information and Event Management systems |
SOC Integration Integration with Security Operations Center |
Threat Analytics Analytics to detect threats |
User Behavior Analytics Analytics of user behavior to detect anomalies |
Risk Scoring Score risk of users and activities |
Compliance Reporting Reports for compliance purposes |
Compliance Frameworks Support for compliance frameworks |
SOC 2 Compliance Service Organization Control 2 compliance |
HIPAA Compliance Health Insurance Portability and Accountability Act compliance |
GDPR Compliance General Data Protection Regulation compliance |
PCI DSS Compliance Payment Card Industry Data Security Standard compliance |
NIST Framework Support National Institute of Standards and Technology framework support |
ISO 27001 Compliance ISO 27001 compliance |
Custom Compliance Support for custom compliance requirements |
Data Sovereignty Controls for data sovereignty requirements |
Encryption Data encryption capabilities |
Key Management Management of encryption keys |
Secrets Management Management of application secrets |
Vulnerability Management Management of vulnerabilities |
Patch Management Management of security patches |
Management & Monitoring |
Centralized Management Single console for management |
Dashboard Visual dashboard for status and analytics |
Reporting Comprehensive reporting capabilities |
Custom Reporting Ability to create custom reports |
Scheduled Reports Automatically generate and send reports |
Alerting Configurable alerts for security events |
Notification Options Options for receiving notifications |
Health Monitoring Monitoring of system health |
Performance Monitoring Monitoring of system performance |
Capacity Planning Tools for capacity planning |
Log Management Management of system logs |
Event Correlation Correlation of security events |
Mobile App Mobile application for management and monitoring |
Integration |
Ticketing System Integration Integration with ticketing systems |
ITSM Integration Integration with IT Service Management tools |
RMM Integration Integration with Remote Monitoring and Management tools |
PSA Integration Integration with Professional Services Automation tools |
ConnectWise Manage Integration with ConnectWise Manage |
Autotask Integration with Autotask PSA |
ServiceNow Integration with ServiceNow |
Jira Integration with Jira |
Webhook Support Support for webhooks for custom integrations |
ChatOps Integration Integration with chat platforms for operations |
Slack Integration Integration with Slack |
Microsoft Teams Integration Integration with Microsoft Teams |
Email Integration Integration with email systems |
Custom Integrations Support for custom integrations |
MSP Features |
White Label Ability to rebrand the solution with your own branding |
Multi-Tenant Management Tools for managing multiple client tenants |
Client Reporting Client-specific reporting capabilities |
Client Onboarding Tools for onboarding new clients |
MSP Dashboard Centralized dashboard for MSP management |
MSP Billing Integration Integration with MSP billing systems |
Service Tiers Support for different service tiers |
MSP Pricing Special pricing for Managed Service Providers |
MSP-Specific Support Dedicated support for MSPs |
MSP Training Training resources for MSPs |
Client Isolation Isolation between client environments |
Delegation Ability to delegate administration to clients |
Pricing & Licensing |
Per User Pricing based on number of users |
Per Administrator Pricing based on number of administrators |
Per Endpoint Pricing based on number of endpoints |
Per Account Pricing based on number of managed accounts |
Per Server Pricing based on number of servers |
Tiered Pricing Pricing based on tiers of functionality |
Free Tier Availability of a free tier or version |
Trial Available Availability of a free trial |
Monthly Billing Option for monthly billing |
Annual Billing Option for annual billing |
Volume Discounts Discounts for volume purchases |
Perpetual License One-time purchase option |
Subscription License Recurring subscription model |