Try our new research platform with insights from 80,000+ expert users

CyberArk Privileged Access Manager vs ThreatConnect Threat Intelligence Platform (TIP) comparison

 

Comparison Buyer's Guide

Executive Summary

Review summaries and opinions

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
 

Categories and Ranking

CyberArk Privileged Access ...
Average Rating
8.6
Reviews Sentiment
6.8
Number of Reviews
224
Ranking in other categories
User Activity Monitoring (1st), Enterprise Password Managers (2nd), Privileged Access Management (PAM) (1st), Mainframe Security (2nd), Operational Technology (OT) Security (3rd)
ThreatConnect Threat Intell...
Average Rating
8.4
Reviews Sentiment
6.4
Number of Reviews
8
Ranking in other categories
Threat Intelligence Platforms (5th), Security Orchestration Automation and Response (SOAR) (13th)
 

Mindshare comparison

While both are Security Software solutions, they serve different purposes. CyberArk Privileged Access Manager is designed for Privileged Access Management (PAM) and holds a mindshare of 17.1%, down 22.3% compared to last year.
ThreatConnect Threat Intelligence Platform (TIP), on the other hand, focuses on Threat Intelligence Platforms, holds 5.6% mindshare, down 7.3% since last year.
Privileged Access Management (PAM)
Threat Intelligence Platforms
 

Featured Reviews

Abdul Durrani - PeerSpot reviewer
Enables granular and secure access with just-in-time access and Zero Trust model
CyberArk provides a good amount of control over access types. However, as a future enhancement, having additional features for cross-platform integration would be beneficial. It would be good to have integrations with other tools and firewalls, such as Zscaler and CrowdStrike. Although I am not fully aware of recent updates, more cross-platform integration would be valuable. A SOC analyst would like to have centralized access in terms of information flowing in even for privileged access management. They would like to have control over everything instead of opening four to five tabs for different sorts of information. Cross-platform integration would help with that. Customers also want CyberArk's pricing to be better so that they can implement it further and have more licenses. Implementing a privileged access management solution can be challenging. It would be great if CyberArk could provide recommendations based on the compliance standards of an organization. It would help system admins ensure that all the required ports are closed and the systems are being managed properly. If any system is not being used anymore, any ports opened for that system need to be closed. Having such recommendations would be helpful.
Harshal Pachpande - PeerSpot reviewer
Automating intelligence workflows significantly reduces false positives and enhances response efficiency
ThreatConnect Threat Intelligence Platform (TIP) offers valuable workflows that integrate with our SOAR platform. It performs dedicated threat scoring capabilities which enrich internal indicators and automate response actions. This has been a key feature in our environment, which we have utilized for picking IOCs. The platform can be domain-specific and customer-specific, allowing data isolation for each customer. The scoring capabilities of ThreatConnect Threat Intelligence Platform (TIP) deserve a rating of nine out of ten. Its scalability and threat scoring capabilities have reduced false positives in our detection, as we dynamically change the IOCs which are updated daily through scheduled polling time over QRadar and SOAR.

Quotes from Members

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
 

Pros

"CyberArk Privileged Access Manager is the best solution for safeguarding sensitive patient data in healthcare, providing visibility and traceability that enhance compliance."
"Customer support has been very helpful and responsive."
"CyberArk Privileged Access Manager's abilities to safeguard the infrastructure are important, as protecting credentials provides us with security and visibility."
"We've written over a hundred custom connectors ourselves that allow us to do all types of privileged session management for various applications. On top of that, the rest of the API-based central credential providers allow us to get away from credentials that may be hard-coded in the script or some application."
"The Vault offers great capabilities for structuring and accessing data."
"We can make a policy that affects everybody instantly."
"There are no issues with scalability. Our clients are very happy to use the product."
"It has a centralized page where you can manage everything. This makes work easier. You don't have to remember different module URLs or browser applications. It is very easy to get all the secure identities of other environments into a single page, which is very important for us as it helps a lot in terms of operations, e.g., reduces management time. This is a single page where you can manage all accounts and onboard them to the CyberArk. You can then secure and see passwords from everywhere. So, there is a single pane of glass where you can manage all the identities across environments as well as across different types of identities."
"The Playbook feature is a game-changer for us, as the integration is available with the SOAR."
"ThreatConnect has a highly user-friendly interface."
"The tool's installation, integration, and playbooks are very straightforward."
"The most valuable features are ease of use and the ability to customize it."
"ThreatConnect Threat Intelligence Platform (TIP) has positively impacted my organization by reducing our MTTD through enriching alerts and providing contextual threat intelligence in real-time, cutting down our triage time for high-priority incidents."
"I like their customer support."
"ThreatConnect Threat Intelligence Platform (TIP) has positively impacted my organization by reducing our MTTD through enriching alerts and providing contextual threat intelligence in real-time, cutting down our triage time for high-priority incidents."
"We have been able to see a return on investment as our clients believe in us more."
 

Cons

"More than the product itself, there is room for improvement in the documentation. The documentation should be very detailed and very structured. It has a lot of good information, on one level, but I feel that it could be more elaborate and more structured."
"The price is high compared to Azure Key Vault. It's the most expensive solution."
"There is room for improvement in the pricing model."
"Making the reports more editable would be beneficial."
"In CyberArk Privileged Access Manager, the UI has room for improvement, as does the dashboard reporting, which could be made better or easier to use."
"The session monitoring and recording feature is also a good feature feature, but we're currently experiencing an issue with session monitoring not working correctly. We're working with CyberArk to resolve it. We aren't able to view active sessions or historical recordings of sessions."
"I find it hard to mention a point of improvement because I'm happy with the platform. The only thing I would say is that they can improve their price."
"Online help needs to be looked into with live agent support."
"It would be good to have more feeds and more integrated sources for enrichment."
"They should make it a little bit easier to generate events and share them with the community"
"ThreatConnect Threat Intelligence Platform (TIP) could be improved by addressing challenges such as the customization over the tagging mechanism, where filtering based on individual tags is not available, limiting data export."
"Support is an area with which nobody is ever fully satisfied, so it can be improved."
"I would like to see improvements in the time zone support of their customer service, considering users are from different time zones."
"I couldn’t get any training videos online when I was working with the tool."
"ThreatConnect Threat Intelligence Platform (TIP) could be improved by addressing challenges such as the customization over the tagging mechanism, where filtering based on individual tags is not available, limiting data export."
"Integration is an area that could use some improvement."
 

Pricing and Cost Advice

"I'm a technician so I don't handle the licensing for CyberArk Privileged Access Manager, but I know that the price for the core license is about €140 per year. There's another type of license, the external vendor license, and that's about €600 and you can manage twenty devices. From what I know, the price for one device in a subscription is about €65 per year. You can buy the CyberArk Endpoint Privilege Manager too, or you can buy some other application or application license with CyberArk Privileged Access Manager, but all other features, such as the Analytics Server is included in the basic CyberArk license. With WALLIX, you need to buy separate licenses for the features."
"This solution is expensive."
"CyberArk Privileged Access Manager is more expensive than its competitors, such as BeyondTrust, Delinea, and ManageEngine PAM360."
"The main problem for the tool is its licensing. I work for a really big company. When you try to develop this as a service, usually you work with leverage teams who are formed with dozens of members. You might dedicate one FTE, or less, for something, e.g., an antivirus administrator. You might have half an FTE's effort dedicated to administering the antivirus, but then you have a team of about 30 users who might access that ticket. The problem is that CyberArk eliminated the possibility of concurrent users years ago. This is a big problem for companies who work with leverage teams. You need to pay for everyone. 40 licenses are used by 20 or 30 people. This is a big problem because licenses are not precisely cheap."
"In comparison to other products on the market, CyberArk is a more costly product."
"The pricing is slightly higher compared to other solutions, but it is reasonable because there are better security features."
"From a client perspective, CyberArk's pricing is fair but there is a significant increase each year. They should limit the price increase because this could potentially drive customers to other partners. Price changes should be at defined intervals. There should not be sudden jumps."
"No, I do not have any advice on the price of the product."
"The tool is expensive."
"I rate the product price as six on a scale of one to ten, where one is extremely expensive, and ten means it is cheap."
"The price could be better."
"The price of this product is in the mid-range, not too expensive, nor inexpensive."
report
Use our free recommendation engine to learn which Privileged Access Management (PAM) solutions are best for your needs.
862,499 professionals have used our research since 2012.
 

Top Industries

By visitors reading reviews
Financial Services Firm
15%
Computer Software Company
15%
Manufacturing Company
8%
Educational Organization
7%
Financial Services Firm
17%
Computer Software Company
11%
Manufacturing Company
9%
Government
8%
 

Company Size

By reviewers
Large Enterprise
Midsize Enterprise
Small Business
 

Questions from the Community

How does Sailpoint IdentityIQ compare with CyberArk PAM?
We evaluated Sailpoint IdentityIQ before ultimately choosing CyberArk. Sailpoint Identity Platform is a solution to manage risks in cloud enterprise environments. It automates and streamlines the m...
What do you like most about CyberArk Privileged Access Manager?
The most valuable features of the solution are control and analytics.
What do you like most about ThreatConnect Threat Intelligence Platform (TIP)?
The product automatically generated a threat score based on the maliciousness of an IP.
What is your experience regarding pricing and costs for ThreatConnect Threat Intelligence Platform (TIP)?
The pricing seems a bit high for smaller companies. It would be beneficial if they had pricing tailored to different client sizes.
What needs improvement with ThreatConnect Threat Intelligence Platform (TIP)?
The platform needs improvement in its customization of the tagging mechanism. Some filtering options are not available based on individual tags, and we cannot export more types of data. The initial...
 

Also Known As

CyberArk Privileged Access Security, CyberArk Enterprise Password Vault
No data available
 

Interactive Demo

Demo not available
 

Overview

 

Sample Customers

Rockwell Automation
Oracle, IBM, General Dynamics, Scotiabank, Sony, Athena Health, Berkshire Hathaway Energy, Workday, TikTok
Find out what your peers are saying about CyberArk, Delinea, One Identity and others in Privileged Access Management (PAM). Updated: June 2025.
862,499 professionals have used our research since 2012.