We performed a comparison between CyberArk Privileged Access Manager and Sectona Privileged Access Management based on real PeerSpot user reviews.
Find out in this report how the two Privileged Access Management (PAM) solutions compare in terms of features, pricing, service and support, easy of deployment, and ROI."The combination of CPM and PSM resolves a lot of use cases."
"It has helped us with our adoption with other teams, and it has also helped us to integrate it at the ground level."
"This solution is quite stable."
"We've written over a hundred custom connectors ourselves that allow us to do all types of privileged session management for various applications. On top of that, the rest of the API-based central credential providers allow us to get away from credentials that may be hard-coded in the script or some application."
"The regulation of accounts is by far the most needed and valuable part of the application."
"With CyberArk, you can be fully confident that your existing accounts are secure. You will be 100 percent"
"You can write different types of policies for custom business needs or any developer needs. If they need certain functions allocated, they can be customized easily."
"The fact that I can put my vault here in a central location on one net for example, and I'll have a CPM in California, a CPM in Texas, a CPM in New York, a CPM in Florida, and actually be able to grow with my company and not necessarily have to continue to grow my vault until I get to a certain number accounts - yet I can still manage everything across the country, if not the world - I love that. I love the flexibility and the capability of being able to pull those components out."
"A key factor for my company is support, and Sectona Privileged Access Management has good support. Another valuable feature of Sectona Privileged Access Management is that it's easy to onboard."
"The most valuable features of Sectona Privileged Access Management include robust session monitoring for privileged users."
"The most valuable feature of Sectona Privileged Access Management for protecting Privileged accounts is its built-in launcher. Additionally, the single sign-on capability is good. Sectona's session recording feature is particularly noteworthy because it utilizes minimal storage. Instead of recording entire sessions, it captures activity only when necessary, optimizing storage space."
"The most valuable feature is the risk management. When a Privileged user performs a certain command, such as running a script, the system highlights it in the risk management section as high, critical, or medium risk."
"CyberArk Privileged Access Manager could improve the integration docking, it should have more layers. For example, integration with OpenShift."
"The documentation is rather basic and it is missing many use cases."
"The turnaround time for technical support is lengthy."
"This product needs professional consulting services to onboard accounts effectively based user profiles."
"We found a lot of errors during the initial setup. They should work to improve the implementation experience and to remove errors from the process."
"One of the main things that could be improved would be filtering accounts on the main page and increasing the functionality of the filters. There are some filters on the side which are very specific, but I feel there could be more."
"The solution could improve by adding more connectors."
"I would like to see better usability for non-technical people."
"Sectona needs to think about SaaS solutions and cloud use cases. For example, we need to be able to integrate Sectona PAM with next-generation applications such as Docker and Lambda, as well as ITD pipelines that use privileged user data."
"As I don't have at least one to two years of experience with Sectona Privileged Access Management, I cannot share areas for improvement in the solution. To me, Sectona Privileged Access Management has reasonable pricing, but it could still be improved. I'm also unsure if Sectona Privileged Access Management could cover the requirements of large-sized companies, but for small-sized to medium-sized companies, I'd recommend the solution."
"Sectona Privileged Access Management needs to improve its stability. It needs to enhance the product's stability because of frequent updates. This is crucial for a solution like Privileged Access Management, as organizations rely on stability. When it becomes unstable, it causes panic."
"I would like to see future updates include robust support for cloud environments as organizations increasingly move towards cloud-based solutions."
More CyberArk Privileged Access Manager Pricing and Cost Advice →
More Sectona Privileged Access Management Pricing and Cost Advice →
CyberArk Privileged Access Manager is ranked 1st in Privileged Access Management (PAM) with 144 reviews while Sectona Privileged Access Management is ranked 17th in Privileged Access Management (PAM) with 4 reviews. CyberArk Privileged Access Manager is rated 8.8, while Sectona Privileged Access Management is rated 7.8. The top reviewer of CyberArk Privileged Access Manager writes "Lets you ensure relevant, compliant access in good time and with an audit trail, yet lacks clarity on MITRE ATT&CK". On the other hand, the top reviewer of Sectona Privileged Access Management writes "Effective risk management, feature of recording all privileged user activities in a compressed format but limited SaaS capability". CyberArk Privileged Access Manager is most compared with Cisco ISE (Identity Services Engine), Microsoft Entra ID, Delinea Secret Server, WALLIX Bastion and One Identity Safeguard, whereas Sectona Privileged Access Management is most compared with ARCON Privileged Access Management. See our CyberArk Privileged Access Manager vs. Sectona Privileged Access Management report.
See our list of best Privileged Access Management (PAM) vendors.
We monitor all Privileged Access Management (PAM) reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.