Try our new research platform with insights from 80,000+ expert users

Akeyless Secrets Management vs CyberArk Identity comparison

 

Comparison Buyer's Guide

Executive Summary

Review summaries and opinions

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
 

Categories and Ranking

Akeyless Secrets Management
Ranking in Enterprise Password Managers
13th
Average Rating
10.0
Reviews Sentiment
2.2
Number of Reviews
1
Ranking in other categories
Secrets Management Tools (5th), AI Security (14th)
CyberArk Identity
Ranking in Enterprise Password Managers
9th
Average Rating
8.2
Reviews Sentiment
6.7
Number of Reviews
29
Ranking in other categories
Authentication Systems (9th), Identity Management (IM) (9th), Authorization Software (3rd), User Entity Behavior Analytics (UEBA) (9th), Access Management (8th), Active Directory Management (6th), Cloud Resource Access Management (3rd), Customer Identity and Access Management (CIAM) (7th)
 

Mindshare comparison

As of March 2026, in the Enterprise Password Managers category, the mindshare of Akeyless Secrets Management is 1.1%, up from 0.6% compared to the previous year. The mindshare of CyberArk Identity is 1.2%, up from 1.0% compared to the previous year. It is calculated based on PeerSpot user engagement data.
Enterprise Password Managers Mindshare Distribution
ProductMindshare (%)
CyberArk Identity1.2%
Akeyless Secrets Management1.1%
Other97.7%
Enterprise Password Managers
 

Featured Reviews

reviewer2795433 - PeerSpot reviewer
Cloud Ops Lead at a tech vendor with 10,001+ employees
Short‑lived secrets have transformed our cloud access and now greatly reduce credential risk
I appreciate that Akeyless Secrets Management offers the ability for secrets to be automatically rotated. When interacting with it via code, Akeyless Secrets Management automatically rotates secrets to increase security. Additionally, I understand that Akeyless Secrets Management does not store the entire secret in one string on their side. The secret is split across different servers, which is extremely secure. The rotation of secrets aspect of Akeyless Secrets Management is excellent. It allows for much higher security and there is a great reduction in potential exploits or attacks to our infrastructure because it is very difficult to get compromised credentials when they rotate so regularly. Akeyless Secrets Management splitting secrets in terms of their storage also means that even if an attacker were to infiltrate Akeyless Secrets Management's infrastructure, it would be extremely difficult if not impossible to get the full credentials. This security is excellent for us and also for our customers. Using Akeyless Secrets Management has greatly increased our security posture, which is excellent and definitely reduces the risk of potential attacks or exploits. From a security-specific perspective, this is excellent when looking at things like data security. It has improved our data security posture. In terms of financial governance, if we were to be exploited in cloud environments, costs can very quickly ramp up. Using Akeyless Secrets Management actually saves potential costs as well.
Hariharan Thangasamy - PeerSpot reviewer
Cybersecurity Delivery Analyst at Accenture
Has strengthened privileged access control and improved audit visibility through session monitoring and password rotation
On the identity product side, it is awesome. However, they can improve in the documentation parts. For example, if there is a migration process, I can see the maximum customers are moving from self-hosted to on-premises or from on-premises to the cloud. It would be helpful if they released a generalized document for processes such as migration. A clear overview document would assist us in understanding more about the tool, configurations, and automations to enhance our security. Regarding the initial setup of CyberArk Identity, I faced some challenges. At some points, I could not find proper documentation for deploying, enhancing, or integrating with other components. I could not find the proper documentation in the community portal.
report
Use our free recommendation engine to learn which Enterprise Password Managers solutions are best for your needs.
884,933 professionals have used our research since 2012.
 

Top Industries

By visitors reading reviews
Pharma/Biotech Company
13%
Financial Services Firm
13%
Retailer
8%
Insurance Company
8%
Financial Services Firm
14%
Manufacturing Company
10%
Computer Software Company
10%
Healthcare Company
6%
 

Company Size

By reviewers
Large Enterprise
Midsize Enterprise
Small Business
No data available
By reviewers
Company SizeCount
Small Business20
Midsize Enterprise4
Large Enterprise10
 

Questions from the Community

What needs improvement with Akeyless Secrets Management?
I do not believe there are any improvements needed for Akeyless Secrets Management. It works excellently for what it aims to do. The UI on Akeyless Secrets Management is also very easy to use, whic...
What is your primary use case for Akeyless Secrets Management?
My main use case for Akeyless Secrets Management is using the static and dynamic secrets functionality. Rather than using static keys within cloud platforms such as AWS or GCP, we use Akeyless Secr...
What advice do you have for others considering Akeyless Secrets Management?
Akeyless Secrets Management was not purchased through the AWS Marketplace. It was purchased directly with the vendor, but it interacts with AWS because it links with the AWS cloud. I would recommen...
What do you like most about CyberArk Identity?
The integration capabilities, ability to integrate CyberArk into the overall IBB strategy of our current clients.
What is your experience regarding pricing and costs for CyberArk Identity?
I am not certain about CyberArk Identity's exact pricing model. For comparison, Okta was around five dollars per user. CyberArk Identity offers good discounts to some clients, which influences thei...
What needs improvement with CyberArk Identity?
We do not specifically use the password vaulting feature of CyberArk Identity. The centralized user dashboard of CyberArk Identity has not been that important for us. If it would be possible to sha...
 

Also Known As

No data available
Idaptive
 

Overview

 

Sample Customers

Cimpress
MLB, Citi, Pfizer, SulAmerica, GE Capital, Shiseido
Find out what your peers are saying about Microsoft, CyberArk, Amazon Web Services (AWS) and others in Enterprise Password Managers. Updated: February 2026.
884,933 professionals have used our research since 2012.