Try our new research platform with insights from 80,000+ expert users

Akamai Enterprise Application Access vs CyberArk Privileged Access Manager comparison

 

Comparison Buyer's Guide

Executive Summary

Review summaries and opinions

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
 

Categories and Ranking

Akamai Enterprise Applicati...
Average Rating
9.0
Reviews Sentiment
7.5
Number of Reviews
4
Ranking in other categories
Cloud Access Security Brokers (CASB) (18th), Access Management (22nd), ZTNA as a Service (20th), Secure Access Service Edge (SASE) (26th)
CyberArk Privileged Access ...
Average Rating
8.6
Reviews Sentiment
6.9
Number of Reviews
221
Ranking in other categories
User Activity Monitoring (1st), Enterprise Password Managers (2nd), Privileged Access Management (PAM) (1st), Mainframe Security (2nd), Operational Technology (OT) Security (3rd)
 

Featured Reviews

Bill Lee - PeerSpot reviewer
Very scalable, convenient, and stable protection against attacks
Our company uses the solution as a cloud perimeter and VPN. We don't need to use on-premises devices to open firewalls to inbound or outbound traffic.  The solution is very convenient and stable because you don't have to worry about attacks to public IPs or public networks.  The solution has two…
Lasantha Wijesinghe - PeerSpot reviewer
We have visibility and control through real-time user behavior analytics
It took us some time to realize its benefits because there was a learning curve for us. It took us about a year to get our heads around this product and start effectively using it. It is a journey. It takes at least five years for any company to make this product very useful and reach maturity. It is not only the product's fault. The company needs to have a vision, and the company culture needs to go with it. Senior leadership needs to support the vision. You need to have lots of ingredients for success. If everything is in place, you will see success after one year. In the first year, it is a struggle for everybody. My company was bought by a bigger company, and they were very new to privileged access management. Everybody was struggling. The advice I would give is to have a good vision for privileged access management. You need dedicated teams, senior management support, and proper company policies and standards before implementing the solution. Start building knowledge slowly and avoid jumping into the deep end without preparation. I would rate CyberArk Privileged Access Manager a nine out of ten.

Quotes from Members

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
 

Pros

"My favorite part of the Akamai Enterprise Application Access service is its SSO and auto-scaling capabilities."
"Application Access's most valuable feature is the accessibility of enterprise tech protection."
"The capability of Akamai Enterprise Application Access is what you're looking for, it's giving you the service that you're looking for. It's simple and doesn't use an agent. It uses LCSD responders, and they have a lot of services around the globe. That's the reason that we were very interested in using it because it has a lot of coverage. This is because it's under the GDS umbrella."
"The solution is very convenient and stable because you don't have to worry about attacks to public IPs or public networks."
"CyberArk Privileged Access Manager's main benefit is it provides secure access to our servers. There are features to capture the user activity, it provides video recording processing. If the users are logged in to the server, we can see what activities they are performing. It's a very nice tool for Privileged Access Management. They have plenty of useful services and the solution has fulfilled our needs."
"The logs and reporting features are impressive."
"The credentials management capability is key to ensuring that the credentials are kept secure and that access to them is done on a temporary and event-driven basis."
"CyberArk Privileged Access Manager is cool."
"We utilize PTA, and we are now integrating that into our risk management program so we can identify the uses of the vault which are outside of the norm, e.g., people accessing after hours. It has reduced the amount of time that we are looking through logs and audit logs."
"CyberArk's GUI is user friendly."
"Password rotation is the most valuable feature"
"The password vault and session monitoring are useful."
 

Cons

"The solution has two agents so should combine its enterprise application and security access into one agent."
"We need another approach to bring the solution to the cloud. In addition to Access Management, we would like to see if we can jump into Directories. I think ADs are going to go away and everything is going to be cloud-based and minimize the use of ADs because of the cost and some other dependencies to the cloud. Every time you buy AD it is more hardware, and everything's changing to software. The network's changing, the applications are changing, and for IT it is hard to keep up with it."
"The pricing could be lower for Akamai Enterprise Application Access."
"The technical enablement sessions are quite limited, and Akamai could help by providing more of them."
"Improved user-friendliness, granularity, and functionality would enhance the product further."
"In the beginning, CyberArk Privileged Access Manager didn't have a multifactor authentication feature, so that was an area for improvement, but now it's part of the solution. Having just one console for two CyberArk products would be good, particularly for the CyberArk Privileged Access Manager and the CyberArk Endpoint Privilege Manager, with the latter being a product for endpoint management that supports the workstations and allows you to manage workstations. In the next update of CyberArk Privileged Access Manager, it would be good to have a local agent where you can manage all users and processes, and have an agent on the servers such as Linux and Windows."
"It needs better documentation with more examples for the configuration files and API/REST integration"
"PAM could be more user-friendly and CyberArk could update the documentation to include more real-world examples. You have to learn it yourself through trial and error. In particular, the online documentation should have more information about troubleshooting."
"Online help needs to be looked into with live agent support."
"The solution could improve by adding more connectors."
"It is complicated to deploy for Windows servers compared to other vendors."
"If CyberArk wants people to pay for cloud services, they need to make the cloud services much more real-time."
 

Pricing and Cost Advice

"The license can be shared based on the number of active users."
"The price is great it is all-inclusive, they use an enterprise cost model. That's what we like compared to other users. This is one of the main attractions of Akamai Enterprise Application Access. It's already an enterprise cost model established with us for services."
"Licensing is based on user count."
"It's an affordable platform."
"Compared to other solutions, it is costly."
"CyberArk is good at what they do, and the price reflects that. You have to pay the price for the same."
"It is not a cheap solution. It is expensive as compared with other solutions. However, it is one of the best solutions in their domain."
"This solution is considered to be more expensive than others out there on the market today."
"I rate the tool's pricing an eight out of ten."
"I would rate CyberArk's pricing a nine out of ten, with one being cheap and ten being expensive. It's one of the most expensive solutions in the market, but it's worth it."
"With reducing the privileged account access, there has been a huge improvement. They are now bringing more accounts on a little at a time."
report
Use our free recommendation engine to learn which Access Management solutions are best for your needs.
849,686 professionals have used our research since 2012.
 

Top Industries

By visitors reading reviews
Manufacturing Company
17%
Computer Software Company
15%
Financial Services Firm
10%
Healthcare Company
5%
Educational Organization
33%
Financial Services Firm
12%
Computer Software Company
11%
Manufacturing Company
6%
 

Company Size

By reviewers
Large Enterprise
Midsize Enterprise
Small Business
No data available
 

Questions from the Community

What needs improvement with Akamai Enterprise Application Access?
The pricing is a bit expensive for our market. Although it is cheaper compared to alternatives, Akamai Enterprise Application Access offers a more robust solution overall, particularly for authenti...
What is your primary use case for Akamai Enterprise Application Access?
We use Akamai Enterprise Application Access ( /products/akamai-enterprise-application-access-reviews ) for centralized authentication for our global customers. It provides a solution for consolidat...
How does Sailpoint IdentityIQ compare with CyberArk PAM?
We evaluated Sailpoint IdentityIQ before ultimately choosing CyberArk. Sailpoint Identity Platform is a solution to manage risks in cloud enterprise environments. It automates and streamlines the m...
What do you like most about CyberArk Privileged Access Manager?
The most valuable features of the solution are control and analytics.
What is your experience regarding pricing and costs for CyberArk Privileged Access Manager?
With the current model of licensing, for my use cases, sometimes it's hard to convince the management and get budget approvals for it. It's expensive and you're not getting anything new. It's just ...
 

Also Known As

Soha
CyberArk Privileged Access Security, CyberArk Enterprise Password Vault
 

Overview

 

Sample Customers

Bugcrowd, InPowered, Spirent Communications
Rockwell Automation
Find out what your peers are saying about Akamai Enterprise Application Access vs. CyberArk Privileged Access Manager and other solutions. Updated: April 2025.
849,686 professionals have used our research since 2012.