What's brewing in PAM360?

The PAM360 roadmap provides you with an overview of what we are building currently, and what you can expect in our future releases. We would love your suggestions and feature requests to help us make PAM360 better!

  • Privileged Session Keystroke Logging & Process Auditing

    Keystroke logging in PAM360 records every command entered during a privileged session and captures the processes executed on the remote device. This gives administrators clear visibility into user actions, making it easier to detect suspicious activity, investigate incidents, and maintain compliance.

    In-Progress
  • CIEM for Azure: Automated Risk Mitigation & Entitlement Rightsizing

    This module helps administrators enforce least-privilege access across multi-cloud environments by providing continuous visibility into Entra ID (Azure) entitlements and permissions. It proactively identifies risks such as shadow admins, Non MFA, dormant identities, and excessive privileges to enable entitlement rightsizing.

    In-Progress
  • Self-Service Privilege Management for End users

    This will allow endpoint users to elevate themselves to privileged groups with granular access controls. This enables users to perform approved privileged operations for a defined period without permanent admin rights. The approach enforces least privilege access while reducing operational dependency on IT teams.

    In-Progress
  • Zero-Touch Certificate Lifecycle Management

    Certificate discovery, provisioning, renewal, revocation, and application restarts will be fully automated, eliminating manual intervention. This will help ensure certificates remain valid and correctly configured, supporting continuous compliance and uninterrupted service availability. As a result, organizations can reduce outage risk, operational overhead, and certificate related security exposure across enterprise environments.

    In-Progress
  • FIPS 140-2

    PAM360 will introduce a Bouncy Castle FIPS 140-2 validated build to enhance cryptographic security and compliance posture.

    In-Progress
  • Privileged access policy

    Allowing enterprises to define exactly what privileged users can access from one centralized control plane for granular access management. Through policy based approvals, Remote connection controls, JIT elevation, and fine-grained command and application controls, standing privileges are eliminated. The result is stronger least-privilege enforcement and reduced enterprise risk.

    In-Progress
  • Flexible TFA support

    Administrators will be able to enable different two-factor authentication options for users based on their needs and preferences.

    In-Progress
  • gRPC API

    In addition to the existing Password Management API list, we are introducing the gRPC API. Using this support, PAM admins and users can perform password operations in Application-to-Application(A-to-A) and Application-to-Database(A-to-DB) with enhanced performance and interoperability.

    In-Progress
  • Privileged Threat Detection and Response

    Provides real time privileged session risk detection, identifying unauthorized privilege misuse, suspicious command execution, anomalous behavior, and potential data exposure. Risk visibility is enhanced through native agents and automated response playbooks that can terminate high-risk sessions in real time. This helps prevent lateral movement, insider threats, and breach escalation.

    Yet to start
  • Contextual MCP (Model Context Protocol) Security Connectors

    Standardize and secure the "Identity-First" interface between AI agents and privileged enterprise resources, ensuring that autonomous workflows operate within a governed Zero Trust framework. This roadmap focuses on enabling AI agents, copilots, and LLMs to interact with privileged resources safely, contextually, and with full governance through a protocol based architecture.

    Yet to start
  • AI-Powered Conversational Insights for PAM Analytics

    Eliminate the complexity of manual log analysis with a Natural Language Query (NLQ) interface that provides instant visibility into privileged behaviors and access trends. By transforming raw audit trails into actionable Identity Insights, administrators can now ask "Show privileged accounts that initiated connections to multiple critical systems within one session" to receive immediate, context-rich summaries. This AI-driven approach dramatically reduces Mean Time to Detect (MTTD).

    Yet to start
  • AI-Powered Privileged Incident Response

    Redefines incident response by combining identity intelligence with a human-in-the-loop conversational interface to significantly reduce Mean Time to Respond (MTTR). Real-time contextual insights enable administrators to trigger immediate remediation through agentic response actions directly within natural language conversations. This accelerates containment with one-click actions such as session termination, user lock and privilege revocation, minimizing attacker dwell time and breach impact.

    Yet to start
  • AI-Powered Insights

    AI-Powered Insights gives administrators quick visibility into remote sessions by summarizing activity and highlighting risky commands or over-privileged actions. It enhances visibility, strengthens risk assessment, and reduces manual review. As this capability evolves, it will address more use cases across PAM360, offering continuous security and intelligence improvements throughout the product.

    Released
  • One-click Login to Desktop Applications

    Single-click direct access to desktop applications is intended to simplify the authentication process for end users but is also aimed at improving security by helping eliminate the exposure of credentials in hard-coded or plain-text formats. This way, end users can effortlessly gain secure access to desktop applications.

    Released
  • Application gateway server

    Administrators have an option to set up an application gateway server using which they can discover Linux resources from environments that are not directly connected to PAM360. Using this application gateway server, admins can also perform password resets for remote hosts.

    Released
  • Privileged task automation (PTA)

    PTA helps IT administrators automate repetitive privileged tasks across multiple endpoints and applications, improving operational efficiency. PTA helps perform administrative tasks in a sequence, in parallel, or as a batch in multiple endpoints, such as executing custom SSH and PowerShell scripts, through seamless workflows.

    Released
  • PAM360 agent enhancements

    These enhancements to the PAM360 agent will feature self-upgrade and automatic installation, repair, and restart capabilities without human intervention.

    Released
  • Agent-based support for MAC resources

    We aim to extend agent-based features such as endpoint discovery, credential management, and more to all MAC-OS resources.

    Released
  • Web session recording

    This update includes recording website connections launched on PAM360. The session recording will be instantly available under Audits after every session.

    Released
  • Cloud Infrastructure Entitlements Management (CIEM)

    This module helps admins enforce least privilege access across multi-cloud environments by providing continuous visibility, improved risk assessment, cleanup the excessive privileges.

    ReleasedLearn more
  • Endpoint privilege management (EPM)

    Using EPM, IT administrators can enforce application access controls and manage privileged application access based on user requirements, establish detailed allow-lists and deny-lists for authorized users or applications. This also helps IT admins enable temporary privileged application access during critical situations. These features are powered by ManageEngine's native application control solution, Application Control Plus.

    ReleasedLearn more
  • System for Cross-domain Identity Management (SCIM)

    With the help of the SCIM API protocol, IT administrators can integrate PAM360 with any IAM or IGA tool to perform user management actions like user provisioning and deprovisioning, user role association, and user group allocation. These actions, once triggered in your IAM console, will then reflect within PAM360.

    Released
  • PAM SDK

    Administrators will make use of the SDK in various languages such as Java, Python and C# to pull the password from PAM360 vault for their legacy or internal or external applications to get the latest updated password of their privileged accounts. Apart from password retrieval, operations for managing accounts and managing resources will be provided in the SDK.

    Released
  • Policy-based access control (PBAC)

    PAM administrators will be able to create access policies based on the user and device trust score, conditions and criteria. Based on the criteria, administrators can configure actions such as setting a warning message or email, terminating a session, preventing the users from taking sessions in future, and more.

    ReleasedLearn more
  • Cortex XSOAR Integration

    This integration is aimed at enabling administrator to fetch the latest passwords from the PAM360 vault without breaking or changing the workflows created in the XSOAR platform.

    ReleasedLearn more
  • Kubernetes Integration

    This integration helps you to fetch secrets stored in the Kubernetes clusters and manage them from the PAM360 interface—you can fetch, manage, and periodically rotate secrets obtained from multiple Kubernetes clusters. Through the integration, you can achieve collaborative management of the Kubernetes secrets used in your enterprise.

    ReleasedLearn more
  • PAM360 Remote Connect

    Administrators and users of PAM360 are able to take RDP and SSH sessions in a single click via a native client from a windows operating system.

    ReleasedLearn more
  • PAM360 Read-Only Server

    Intending to provide uninterrupted access to passwords, we have introduced another functionality - the Read-Only (RO) server for the PostgreSQL database. Unlike the concept of High Availability, where there will be one Primary server and one Secondary server, the Read-Only server can be configured in multiple. The Read-Only servers function as mirror servers, synchronizing all of the Primary server's operations.

    ReleasedLearn more
  • Periodic discovery of Linux resources and network devices

    Enables administrator to create a periodic account and resource discovery such that he will set a time such as every 5 days, monthly, etc., to discover the new accounts and feed them into PAM360 automatically.

    ReleasedLearn more
  • Agent-based self service privilege elevation for Linux

    Administrators can configure a set of commands/applications such that lesser privileged users can execute/run them in an elevated privilege without knowing the password of that privilege account.

    ReleasedLearn more
  • Agentless SSH command filtering

    PAM administrators will have an option to authorize a set of commands for a particular resource, and users will be allowed to execute only the authorized commands during a remote SSH session. If the user executes any commands other than the configured one, it will throw an error.

    ReleasedLearn more
  • HTTPs Gateway Server

    Administrators will be able to configure their legacy web applications in PAM360, where they can add layers of PAM authentication before accessing the web application via PAM web console without providing direct access to the end users.

    ReleasedLearn more
  • Security Hardening Score in PAM360

    The Security Hardening Score feature validates the customer environment with security options given from PAM360 on a periodical basis to ensure whether the security measures are handled. Security Hardening Score would help the customers to ensure how securely they are using the privileged access management tool in order to avoid external security threats and unforeseen data losses.

    ReleasedLearn more