Try our new research platform with insights from 80,000+ expert users

CyberArk Privileged Access Manager vs ThreatConnect Threat Intelligence Platform (TIP) comparison

 

Comparison Buyer's Guide

Executive Summary

Review summaries and opinions

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
 

Categories and Ranking

CyberArk Privileged Access ...
Average Rating
8.6
Reviews Sentiment
6.8
Number of Reviews
227
Ranking in other categories
User Activity Monitoring (1st), Enterprise Password Managers (3rd), Privileged Access Management (PAM) (1st), Mainframe Security (2nd), Operational Technology (OT) Security (3rd)
ThreatConnect Threat Intell...
Average Rating
8.4
Reviews Sentiment
6.5
Number of Reviews
6
Ranking in other categories
Threat Intelligence Platforms (TIP) (7th), Security Orchestration Automation and Response (SOAR) (16th)
 

Mindshare comparison

While both are Security Software solutions, they serve different purposes. CyberArk Privileged Access Manager is designed for Privileged Access Management (PAM) and holds a mindshare of 15.8%, down 21.4% compared to last year.
ThreatConnect Threat Intelligence Platform (TIP), on the other hand, focuses on Threat Intelligence Platforms (TIP), holds 5.6% mindshare, down 6.5% since last year.
Privileged Access Management (PAM) Market Share Distribution
ProductMarket Share (%)
CyberArk Privileged Access Manager15.8%
WALLIX Bastion7.2%
Delinea Secret Server7.1%
Other69.9%
Privileged Access Management (PAM)
Threat Intelligence Platforms (TIP) Market Share Distribution
ProductMarket Share (%)
ThreatConnect Threat Intelligence Platform (TIP)5.6%
Recorded Future14.6%
CrowdStrike Falcon7.9%
Other71.9%
Threat Intelligence Platforms (TIP)
 

Featured Reviews

Atul-Gujar - PeerSpot reviewer
Secures critical infrastructures with essential user session audit records
A potential area for improvement is enhancing support for cluster environments and distributed Vaults. Clients in multiple countries that need central access have different challenges that require better solutions from CyberArk. For financial services, CyberArk can improve incident response by ensuring fast support for critical priority tickets to meet compliance requirements. Providing more documentation on CyberArk is recommended for new team members to enhance their troubleshooting capabilities. I understand it's up to the client, but 99% fail to change the demo key, so it's crucial for CyberArk to emphasize changing the key and documenting it as part of the installation process.
Aadarsh Dawn - PeerSpot reviewer
Offers features like response capabilities and automation response and automation orchestration
ThreatConnect aggregates and operationalizes Threat intelligence data and sources across internal client environments. It leverages Automation and built in Case Management to streamline and automate threat intelligence-driven processes and investigations within client environments ThreatConnect…

Quotes from Members

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
 

Pros

"The flexibility of integrating with other technologies is important because of a lot of applications - a lot of COTS products - are not supported when we are bringing the application IDs. The CyberArk platform provides a lot of opportunities to do customization."
"For a while, there were individual IDs having privileged access. We wanted to restrict that. We implemented the solution so that it can be more of internal control. We can have session recordings happening and reduce our attacks."
"The tool has safe vaults. We keep our passwords in the Vault. The tool’s recording feature is also valuable for us."
"CyberArk Privileged Access Manager makes it easy for users to retrieve and manage their passwords."
"We can make a policy that affects everybody instantly."
"We utilize PTA, and we are now integrating that into our risk management program so we can identify the uses of the vault which are outside of the norm, e.g., people accessing after hours. It has reduced the amount of time that we are looking through logs and audit logs."
"Allows secure, logged access to highly sensitive servers and services."
"CyberArk Privileged Access Manager’s ability to safeguard credentials is very important."
"We have been able to see a return on investment as our clients believe in us more."
"I like their customer support."
"The product automatically generated a threat score based on the maliciousness of an IP."
"The most valuable features are ease of use and the ability to customize it."
"The tool's installation, integration, and playbooks are very straightforward."
"ThreatConnect has a highly user-friendly interface."
"It's a solid platform and is stable enough. It is not complicated and is easy to use."
 

Cons

"The Vault's disaster recovery features need improvement."
"Pricing is a problem. CyberArk is expensive compared to other products I know."
"I would like to see better usability for non-technical people."
"We need a bit more education for our user community because they are not using it to its capabilities."
"CyberArk Privileged Access Manager can be improved because I have experienced one issue where a user connected through RDP to a Linux server and the PAM could not fetch any commands or key store logging from the Linux server, which works fine on Windows servers."
"If CyberArk wants people to pay for cloud services, they need to make the cloud services much more real-time."
"The continuous scanning of the assets is limited to Windows and Unix. We like to have the solution scan any databases, network devices, and security devices for privileged accounts. That would be very helpful."
"The one place where we found that this product really needs to improve is the cloud. Simple integrations don't exist, even today. We don't have anything specific on CyberArk for managing, SaaS products, SaaS vendors, SaaS credentials. I understand it's a vendor-based thing and that they have to coordinate with the other vendors to be able to do that, and there are integrations coming. But these are the major places where CyberArk definitely needs to invest some more time."
"Sometimes, when using the solution, it slows down, affecting our ability to mitigate threats."
"Integration is an area that could use some improvement."
"They should make it a little bit easier to generate events and share them with the community"
"I would like to see improvements in the time zone support of their customer service, considering users are from different time zones."
"It would be good to have more feeds and more integrated sources for enrichment."
"I couldn’t get any training videos online when I was working with the tool."
"Support is an area with which nobody is ever fully satisfied, so it can be improved."
 

Pricing and Cost Advice

"Before we bought it, they were licensing each function individually, which got complicated and very expensive. When we decided to buy it, it was much more straightforward and still quite expensive, but it brings a lot of value and risk reduction to the organization."
"The pricing for CyberArk Privileged Access Manager is quite expensive, and the pricing varies from region to region. In APAC, CyberArk Privileged Access Manager can be obtained for less than in North America, according to my understanding."
"The solution is costly but we get what we pay for."
"This solution is expensive."
"It is in line with its competitors, but all such solutions cost too much money."
"Pricing is quite high and it could be improved."
"The price of this solution is expensive."
"It costs us around $200 per user."
"The tool is expensive."
"I rate the product price as six on a scale of one to ten, where one is extremely expensive, and ten means it is cheap."
"The price could be better."
"The price of this product is in the mid-range, not too expensive, nor inexpensive."
report
Use our free recommendation engine to learn which Privileged Access Management (PAM) solutions are best for your needs.
872,008 professionals have used our research since 2012.
 

Top Industries

By visitors reading reviews
Financial Services Firm
15%
Computer Software Company
14%
Manufacturing Company
9%
Government
6%
Financial Services Firm
17%
Computer Software Company
8%
Government
7%
Educational Organization
6%
 

Company Size

By reviewers
Large Enterprise
Midsize Enterprise
Small Business
By reviewers
Company SizeCount
Small Business59
Midsize Enterprise41
Large Enterprise171
By reviewers
Company SizeCount
Small Business5
Midsize Enterprise23
Large Enterprise4
 

Questions from the Community

How does Sailpoint IdentityIQ compare with CyberArk PAM?
We evaluated Sailpoint IdentityIQ before ultimately choosing CyberArk. Sailpoint Identity Platform is a solution to manage risks in cloud enterprise environments. It automates and streamlines the m...
What do you like most about CyberArk Privileged Access Manager?
The most valuable features of the solution are control and analytics.
What is your experience regarding pricing and costs for CyberArk Privileged Access Manager?
Regarding costs, CyberArk Privileged Access Manager is not a cheap product; hence, many companies struggle with its high licensing cost. While it's valuable, it comes with a high price tag, making ...
What do you like most about ThreatConnect Threat Intelligence Platform (TIP)?
The product automatically generated a threat score based on the maliciousness of an IP.
What is your experience regarding pricing and costs for ThreatConnect Threat Intelligence Platform (TIP)?
The pricing seems a bit high for smaller companies. It would be beneficial if they had pricing tailored to different client sizes.
What needs improvement with ThreatConnect Threat Intelligence Platform (TIP)?
The platform needs improvement in its customization of the tagging mechanism. Some filtering options are not available based on individual tags, and we cannot export more types of data. The initial...
 

Also Known As

CyberArk Privileged Access Security, CyberArk Enterprise Password Vault
No data available
 

Interactive Demo

Demo not available
 

Overview

 

Sample Customers

Rockwell Automation
Customer Case Studies & Use Cases
Find out what your peers are saying about CyberArk, Delinea, WALLIX and others in Privileged Access Management (PAM). Updated: September 2025.
872,008 professionals have used our research since 2012.