Try our new research platform with insights from 80,000+ expert users

Anomali vs CyberArk Privileged Access Manager vs SafeBreach comparison

 

Comparison Buyer's Guide

Executive Summary

Review summaries and opinions

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
 

Mindshare comparison

Threat Intelligence Platforms (TIP) Market Share Distribution
ProductMarket Share (%)
Anomali4.8%
Recorded Future14.8%
CrowdStrike Falcon8.7%
Other71.7%
Threat Intelligence Platforms (TIP)
Privileged Access Management (PAM) Market Share Distribution
ProductMarket Share (%)
CyberArk Privileged Access Manager16.3%
Delinea Secret Server7.5%
WALLIX Bastion7.4%
Other68.8%
Privileged Access Management (PAM)
Breach and Attack Simulation (BAS) Market Share Distribution
ProductMarket Share (%)
SafeBreach7.2%
Pentera28.5%
Cymulate20.5%
Other43.8%
Breach and Attack Simulation (BAS)
 

Featured Reviews

CC
Enables automated threat intelligence sorting and enhances proactive threat hunting capabilities
You have to have at least a threat intelligence background or a SOC analyst background to use it, as that's the information you'll dig around with in there. If you don't have that kind of knowledge, it probably can be a little hard to use, but they do provide training. They offer training not only for how to use the platform but also some basic threat intelligence training to explain what these things are and what these terms mean. My company is a customer of Anomali. I would recommend it to other people. I would advise making sure you don't pick it without testing other products and have your use cases well thought out and documented before testing, so you know it will solve the problems you're trying to address. Keep an open mind with it and realize that whatever you can dream of, you can probably do with the platform. Overall, I would rate Anomali an eight out of ten.
Atul-Gujar - PeerSpot reviewer
Secures critical infrastructures with essential user session audit records
A potential area for improvement is enhancing support for cluster environments and distributed Vaults. Clients in multiple countries that need central access have different challenges that require better solutions from CyberArk. For financial services, CyberArk can improve incident response by ensuring fast support for critical priority tickets to meet compliance requirements. Providing more documentation on CyberArk is recommended for new team members to enhance their troubleshooting capabilities. I understand it's up to the client, but 99% fail to change the demo key, so it's crucial for CyberArk to emphasize changing the key and documenting it as part of the installation process.
Dmytro Petrashchuk - PeerSpot reviewer
Breach and attach simulation solution used to test security tools with a valuable library of hacking data
The most valuable feature is the huge library of hack attacks and breach methods. It can run different attacks in a safe manner without damaging anything inside the infrastructure. The great thing is that the database is constantly updating. It has signature attack playbooks to check if a company is protected against a potential attack.

Quotes from Members

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
 

Pros

"The most valuable aspect of Anomali is the threat modeling capability."
"The feature I have found most valuable is credential monitoring. This feature is easy and quick."
"We now have a very robust collection of threat intelligence based on the capabilities that Anomali provides."
"I have found Cyber threat intelligence (CTI) very useful and concise. The solution is easy to use."
"Our privileged accounts are now stored in a more secure location and lateral movement within the network have been lessened."
"It is one of the best solutions in the market. Ever since I started using this solution, there has not been any compromise when it comes to our lab."
"The ability to develop and deploy applications with no stored secrets is very valuable."
"Automates password management to remove the human chain weakness."
"The impact of CyberArk Privileged Access Manager on customer operational efficiency is quite positive."
"It is useful for protecting passwords. If you need to do access security management, you can first use the CyberArk console, and after that, you can connect the firewall interface or firewall command line. Similarly, if you need to do an RDP session, you need to first log in to CyberArk before connecting to the Windows RDP session. This way, the admin doesn't know the password, and that password is changed immediately. To change the password, you first discover the old password in the network, and after that, you can change the password."
"CyberArk Privileged Access Manager provides granularity. You can break things down into individual safes. You have specific access to safes by individual or group. The interface is with AD, with LDAP, or with local CyberArk passwords. You also have the ability to establish policies for your individual credentials."
"The most valuable feature is platform management. It is quite easy to manage privileged access for certain target platforms with CyberArk Privileged Access Manager as compared to other products I have worked with."
"The most valuable feature is the reporting database and attack protection."
"The most valuable feature is the huge library of hack attacks and breach methods."
 

Cons

"Less code in integration would be nice when building blocks."
"Support in the past has been top-notch, but recent trends indicate that it has taken a back seat, as we often don't get answers for days."
"A lot of tools can give you many features, such as CTI intelligence and a tax service reduction. However, many people are combining different tools together to have more capabilities. It is up to the consumer whether they want to have multiple tools or have one tool that serves the purpose. Anomali Enterprise could improve by combining all the other tools' features into one solution."
"An area for improvement is the intelligence sharing within the Anomali community. The tagging system can be inconsistent, as any company can use any tags for their reporting."
"The price is high compared to Azure Key Vault. It's the most expensive solution."
"We should be able to join small components."
"Its implementation was very complex. It needs different servers."
"Improved user-friendliness, granularity, and functionality would enhance the product further."
"Making the reports more editable would be beneficial."
"It could be more user-friendly. Sometimes I encounter issues, and I do not know what the issue is."
"It can be integrated with other systems, but it is not easy to integrate. It takes too long to integrate it. Its integration should be easier and simpler."
"In CyberArk Privileged Access Manager, the UI has room for improvement, as does the dashboard reporting, which could be made better or easier to use."
"There is room for improvement in the interface. It is not always easy to find the options that you need and not everything is customizable."
"I would like to see some integration on the customization and customer support."
 

Pricing and Cost Advice

"When comparing the price of Anomali Enterprise to other solutions it is in the medium to high range. However, I am satisfied with the price."
"I have heard from my leaders that CyberArk is costlier in terms of licensing. The support and maintenance are also costly. We use their premium support, but for the price we pay, we do not get the value."
"The license CyberArk Privileged Access Manager is on an annual basis."
"The pricing for CyberArk Privileged Access Manager is quite expensive, and the pricing varies from region to region. In APAC, CyberArk Privileged Access Manager can be obtained for less than in North America, according to my understanding."
"CyberArk is good at what they do, and the price reflects that. You have to pay the price for the same."
"It is in line with its competitors, but all such solutions cost too much money."
"CyberArk is one of the best PAM solutions and one of the most expensive, but it works better than the others, so the pricing is fair."
"This product is very expensive."
"If you want a Ferrari, it will cost you. The solution is really nice, so it costs the client, but in the long run, it is very good. If you buy a solution that costs a lot to maintain because it is not stable, and you are frequently asking for consultant support, it costs more."
"The pricing is more expensive than other options on the market today."
"The price starts from about $140,000 so this solution is expensive in my opinion. Maintenance and support is included in the license cost."
report
Use our free recommendation engine to learn which Threat Intelligence Platforms (TIP) solutions are best for your needs.
868,288 professionals have used our research since 2012.
 

Top Industries

By visitors reading reviews
Financial Services Firm
17%
Computer Software Company
12%
Government
8%
Educational Organization
7%
Financial Services Firm
15%
Computer Software Company
15%
Manufacturing Company
9%
Government
6%
Manufacturing Company
14%
Financial Services Firm
14%
Computer Software Company
12%
Retailer
8%
 

Company Size

By reviewers
Large Enterprise
Midsize Enterprise
Small Business
No data available
By reviewers
Company SizeCount
Small Business59
Midsize Enterprise41
Large Enterprise171
No data available
 

Questions from the Community

What needs improvement with Anomali ThreatStream?
An area for improvement is the intelligence sharing within the Anomali community. The tagging system can be inconsist...
What is your primary use case for Anomali ThreatStream?
I use Anomali ( /products/anomali-reviews ) for threat hunting, threat collection, operationalization of intelligence...
What advice do you have for others considering Anomali ThreatStream?
For new users, I recommend taking the training provided by Anomali as it is very well articulated. I advise reading t...
How does Sailpoint IdentityIQ compare with CyberArk PAM?
We evaluated Sailpoint IdentityIQ before ultimately choosing CyberArk. Sailpoint Identity Platform is a solution to m...
What do you like most about CyberArk Privileged Access Manager?
The most valuable features of the solution are control and analytics.
What is your experience regarding pricing and costs for CyberArk Privileged Access Manager?
Regarding costs, CyberArk Privileged Access Manager is not a cheap product; hence, many companies struggle with its h...
Ask a question
Earn 20 points
 

Also Known As

Match, Lens, ThreatStream, STAXX, Anomali Security Analytics
CyberArk Privileged Access Security, CyberArk Enterprise Password Vault
No data available
 

Overview

 

Sample Customers

Bank of England, First Energy, UBISOFT, Bank of Hope, Blackhawk Network
Rockwell Automation
PayPal, ICON, Netflix, Johnson & Johnson, CVS Health, Pepsi, Kellogg's, Cisco, Deloitte
Find out what your peers are saying about CrowdStrike, Recorded Future, VirusTotal and others in Threat Intelligence Platforms (TIP). Updated: August 2025.
868,288 professionals have used our research since 2012.