CyberArk Privileged Access Manager vs ThreatConnect Threat Intelligence Platform (TIP) comparison

 

Comparison Buyer's Guide

Executive Summary
 

Categories and Ranking

CyberArk Privileged Access ...
Average Rating
8.8
Number of Reviews
144
Ranking in other categories
User Activity Monitoring (1st), Privileged Access Management (PAM) (1st)
ThreatConnect Threat Intell...
Average Rating
8.0
Number of Reviews
4
Ranking in other categories
Threat Intelligence Platforms (4th), Security Orchestration Automation and Response (SOAR) (20th)
 

Market share comparison

As of June 2024, in the Privileged Access Management (PAM) category, the market share of CyberArk Privileged Access Manager is 22.3% and it decreased by 1.1% compared to the previous year. The market share of ThreatConnect Threat Intelligence Platform (TIP) is 0.2% and it increased by Infinity% compared to the previous year. It is calculated based on PeerSpot user engagement data.
Privileged Access Management (PAM)
Unique Categories:
User Activity Monitoring
22.2%
Threat Intelligence Platforms
6.6%
Security Orchestration Automation and Response (SOAR)
2.8%
 

Featured Reviews

reviewer0275214 - PeerSpot reviewer
Sep 13, 2023
Good reporting and MFA with easy integration capabilities
In my organization, we are using CyberArk Privileged Access Manager to enhance the security of an organization's critical systems, mainly by securing privileged accounts (e.g. administrator passwords, SSH keys, and API tokens).  We are also using Cyber-Ark for access control by ensuring that only…
Sai-Charan - PeerSpot reviewer
Nov 27, 2023
The tool could be integrated into any environment, but it was expensive, and the deployment process was complex
The solution was used for publishing artefacts and threat intel data. We gathered data from the internet and uploaded it to the platform. It was integrated into every aspect of our cybersecurity network, like endpoints, SOC management, patch management, and vulnerability management tools TIP and…

Quotes from Members

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
 

Pros

"I really like the PTA (Privileged Threat Analytics). I find this the best feature."
"For a while, there were individual IDs having privileged access. We wanted to restrict that. We implemented the solution so that it can be more of internal control. We can have session recordings happening and reduce our attacks."
"The solution helps our developers access internal systems. It also helps us in Privilege Access Management."
"Within the solution, I love the fact that everything is recorded. The configuration capabilities are great, too."
"I appreciate the ease of use for support analysts."
"The fact that I can put my vault here in a central location on one net for example, and I'll have a CPM in California, a CPM in Texas, a CPM in New York, a CPM in Florida, and actually be able to grow with my company and not necessarily have to continue to grow my vault until I get to a certain number accounts - yet I can still manage everything across the country, if not the world - I love that. I love the flexibility and the capability of being able to pull those components out."
"The most valuable features of the solution are control and analytics."
"The password vault and session monitoring are useful."
"The most valuable features are ease of use and the ability to customize it."
"It's a solid platform and is stable enough. It is not complicated and is easy to use."
"The product automatically generated a threat score based on the maliciousness of an IP."
"ThreatConnect has a highly user-friendly interface."
 

Cons

"Many of the infrastructure folks who use the product dislike it because it complicates their workflow. They get a little less control, and they have to go through a specific solution. It proactively logs in for them, which obfuscates some of the issues that they may be troubleshooting."
"We don't often contact technical support, but when we do it, the response could be faster and better."
"Its pricing is a big challenge here. When it started, the product came in at a very low cost. Now, they are the leaders in the market, so the cost has grown and is quite huge."
"It is very complex and difficult to set up the solution."
"CyberArk has a lot on the privileged access side but they have to concentrate more on the application side as well."
"It's a big program. To scale excessively, locally, on an on-prem application, takes a lot of servers."
"CyberArk Privileged Access Manager could improve the integration with other solutions and ease of use. Additionally, there should be a feature to have remote connections without a VPN."
"Initially, there was a lot of hiccups, because there were a lot of transitions due to manual installations."
"It would be good to have more feeds and more integrated sources for enrichment."
"I couldn’t get any training videos online when I was working with the tool."
"Integration is an area that could use some improvement."
"They should make it a little bit easier to generate events and share them with the community"
 

Pricing and Cost Advice

"CyberArk is one of the best PAM solutions and one of the most expensive, but it works better than the others, so the pricing is fair."
"If you are looking at implementing this solution, buy the training and go to it."
"Overall, its pricing is really good. The main difference from all the other vendors is that they have one package that covers all the functionality and modules of the basic PAM, except the add-on modules like adware and server protection. It also doesn't include the licenses for domain controller protection or maybe an API call-related feature. For the basic privileged access management, the bundle pricing is really good, but when it comes to an agent-based solution for advanced cyber protection or application identity managers, it is expensive. Services are also very expensive if you hire the services team from CyberArk, but these guys are really good. For a couple of large banking projects, we had an experience with them. The banks wanted to have things quickly and efficiently, so we had to hire them. If we take four weeks, these guys can do everything on a weekend. They charge quite a big sum of money, but they know the system well."
"I do not have any opinions to add about the pricing of the product."
"The solution is costly but we get what we pay for."
"Previously, the pricing was very meager. They started publicizing and advertising the solution, growing CyberArk, as an organization. They also changed their pricing with that growth, e.g., the pricier the product, the more people who will purchase it."
"No, I do not have any advice on the price of the product."
"Pricing and licensing depend on the environment."
"The price could be better."
"The price of this product is in the mid-range, not too expensive, nor inexpensive."
"The tool is expensive."
report
Use our free recommendation engine to learn which Privileged Access Management (PAM) solutions are best for your needs.
787,061 professionals have used our research since 2012.
 

Top Industries

By visitors reading reviews
Educational Organization
31%
Computer Software Company
12%
Financial Services Firm
11%
Manufacturing Company
5%
Computer Software Company
16%
Financial Services Firm
16%
Government
11%
Manufacturing Company
10%
 

Company Size

By reviewers
Large Enterprise
Midsize Enterprise
Small Business
No data available
 

Questions from the Community

How does Sailpoint IdentityIQ compare with CyberArk PAM?
We evaluated Sailpoint IdentityIQ before ultimately choosing CyberArk. Sailpoint Identity Platform is a solution to manage risks in cloud enterprise environments. It automates and streamlines the m...
What do you like most about CyberArk Privileged Access Manager?
The most valuable features of the solution are control and analytics.
What is your experience regarding pricing and costs for CyberArk Privileged Access Manager?
CyberArk Privileged Access Manager comes at a high cost. But the solution is worth its price.
What do you like most about ThreatConnect Threat Intelligence Platform (TIP)?
The product automatically generated a threat score based on the maliciousness of an IP.
What needs improvement with ThreatConnect Threat Intelligence Platform (TIP)?
The building of playbooks could be more refined. The training is not openly available. I couldn’t get any training videos online when I was working with the tool. With other tools, I could easily g...
 

Also Known As

CyberArk Privileged Access Security
No data available
 

Learn More

Video not available
 

Interactive Demo

Demo not available
 

Overview

 

Sample Customers

Rockwell Automation
Oracle, IBM, General Dynamics, Scotiabank, Sony, Athena Health, Berkshire Hathaway Energy, Workday, TikTok
Find out what your peers are saying about CyberArk, Delinea, BeyondTrust and others in Privileged Access Management (PAM). Updated: June 2024.
787,061 professionals have used our research since 2012.