Book Demo!

Thinking about implementing a privileged access management solution?  With security threats on the rise and more people working remotely, it’s critical that companies lock down and monitor privileged accounts. This makes it harder for hackers to access your most sensitive data and systems.

You might think PAM software is complicated and costly. But today’s next-generation PAM solutions have changed all that. PAM software is now easier to install, implement, maintain and it’s affordable.

Before you get started with a PAM implementation, take into consideration ease of implementation, product features, pricing, and support. Here are 20 questions to consider when evaluating PAM solutions.

PAM Checklist – Top 20 Questions


  1. How is the privileged account management solution deployed and does it require any changes to your environment?
  2. Can it work on-premises or in the cloud in physical or virtual environments, hosted on Windows or Linux OS?
  3. How long does it take to implement? What is the client install, server footprint, and is it agentless?
  4. Can the software easily integrate with other IT management, security, and IAM software such as MFA?
  5. Can you implement it gradually starting with basic PAM functionality and build towards advanced just-in-time access strategies?

Features / Functionality

  1. Is it easy to use?  Is the user interface and application interface intuitive?
  2. Are you able to discover, detect, and onboard existing privileges accounts?
  3. Does it include vaulting and strong password management for protecting credentials and secrets (including SSH keys)?
  4. Can you log and record privileged sessions with playback indexed by keystrokes, file, and clipboard transfer events?
  5. Can you automate tasks such as password resets, discovery for servers, and network devices?
  6. Does it offer a full audit trail for all privileged access and permissions? Extensive logging and reports, as well as integration into other systems.
  7. Can you create automated alerts in case of abnormal use of the credentials?
  8. Does it support just-in-time access strategies where accounts are granted privileges on a time-bound basis?
  9. Does the software offer advanced proxy support for RDP, SSH, and web proxies for secure, high trust remote sessions?
  10. Does the solution provide out-of-the-box controls to meet GDPR, HIPAA, NIST 800-171 or ISO 27001?


  1. What is the solution’s pricing model? Is it a unified pricing model? And are all features included or do you have to buy separate modules?
  2. Can it be maintained using existing IT resources or will you need additional consulting services?
  3. Is the software scalable?
  4. How responsive is the customer support team?
  5. What is the product’s road map and how often is the product updated?

Consider Xton Access Manager (XTAM)

XTAM for Privileged Access Management is the only solution that combines privileged accounts, passwords, sessions, and task management in one product at an unbeatable price. XTAM uses a modern architecture, is completely agentless, and is built around the principle of least privileged. XTAM software can be used as a PAM solution or a secure remote employee gateway. XTAM can be installed quickly allowing companies to begin securing privileged accounts immediately. Download a free trial today or contact us for a personalized demo.

Check vector created by stories – []

Related Posts


Is It Time to Replace VPNs?

Remote work is no longer the exception but the norm in our COVID-19 world. This is unlikely to change even after the pandemic. Already, many companies are adopting remote working policies and reducing physical office Read more…


Privileged Escalation – A Growing Problem for Governments

When it comes to the federal, state, and even local governments, security is paramount. Yet governments continue to struggle with privileged access management policies and privileged escalation. A report by Forcepoint and the Ponemon Institute brings Read more…


What is Just-in-time Privileged Access?

Access management is a top concern for companies – especially when it comes to sensitive customer data and systems. Which employees or systems should have privileged access to certain types of resources, data, the ability Read more…

Copyright © 2020 Xton Technologies, LLC. All rights reserved.