Book Demo!

Thinking about implementing a privileged access management solution?  With security threats on the rise and more people working remotely, it’s critical that companies lock down and monitor privileged accounts. This makes it harder for hackers to access your most sensitive data and systems.

You might think PAM software is complicated and costly. But today’s next-generation PAM solutions have changed all that. PAM software is now easier to install, implement, maintain and it’s affordable.

Before you get started with a PAM implementation, take into consideration ease of implementation, product features, pricing, and support. Here are 20 questions to consider when evaluating PAM solutions.

PAM Checklist – Top 20 Questions


  1. How is the privileged account management solution deployed and does it require any changes to your environment?
  2. Can it work on-premises or in the cloud in physical or virtual environments, hosted on Windows or Linux OS?
  3. How long does it take to implement? What is the client install, server footprint, and is it agentless?
  4. Can the software easily integrate with other IT management, security, and IAM software such as MFA?
  5. Can you implement it gradually starting with basic PAM functionality and build towards advanced just-in-time access strategies?

Features / Functionality

  1. Is it easy to use?  Is the user interface and application interface intuitive?
  2. Are you able to discover, detect, and onboard existing privileges accounts?
  3. Does it include vaulting and strong password management for protecting credentials and secrets (including SSH keys)?
  4. Can you log and record privileged sessions with playback indexed by keystrokes, file, and clipboard transfer events?
  5. Can you automate tasks such as password resets, discovery for servers, and network devices?
  6. Does it offer a full audit trail for all privileged access and permissions? Extensive logging and reports, as well as integration into other systems.
  7. Can you create automated alerts in case of abnormal use of the credentials?
  8. Does it support just-in-time access strategies where accounts are granted privileges on a time-bound basis?
  9. Does the software offer advanced proxy support for RDP, SSH, and web proxies for secure, high trust remote sessions?
  10. Does the solution provide out-of-the-box controls to meet GDPR, HIPAA, NIST 800-171 or ISO 27001?


  1. What is the solution’s pricing model? Is it a unified pricing model? And are all features included or do you have to buy separate modules?
  2. Can it be maintained using existing IT resources or will you need additional consulting services?
  3. Is the software scalable?
  4. How responsive is the customer support team?
  5. What is the product’s road map and how often is the product updated?

Consider Xton Access Manager (XTAM)

XTAM for Privileged Access Management is the only solution that combines privileged accounts, passwords, sessions, and task management in one product at an unbeatable price. XTAM uses a modern architecture, is completely agentless, and is built around the principle of least privileged. XTAM software can be used as a PAM solution or a secure remote employee gateway. XTAM can be installed quickly allowing companies to begin securing privileged accounts immediately. Download a free trial today or contact us for a personalized demo.

Check vector created by stories – []

Related Posts


Improving Database Security with Privileged Access Management

Cybercriminals and hackers want access to your most sensitive information and systems. Customer data, PPI, and company secrets are often kept in databases. With cyber threats on the rise, database security has never been more Read more…


The Challenge with Jump Servers and Privileged Accounts

A lot of companies rely on jump servers as part of their security strategy.  It’s common for a company to create a jump server for IT administrators to connect to SSH and RDP as part Read more…


Insider Abuse, Google and Privileged Users

Recent news reports found that Google fired dozens of employees from 2018 -2020 for abusing their access to company data. While insider abuse is not new, it is a growing threat and one that companies Read more…

Copyright © 2020 Xton Technologies, LLC. All rights reserved.