Try our new research platform with insights from 80,000+ expert users

ARCON Privileged Access Management vs BeyondTrust Privileged Remote Access vs CyberArk Privileged Access Manager comparison

 

Comparison Buyer's Guide

Executive Summary

Review summaries and opinions

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
 

Mindshare comparison

As of August 2025, in the Privileged Access Management (PAM) category, the mindshare of ARCON Privileged Access Management is 4.0%, down from 4.2% compared to the previous year. The mindshare of BeyondTrust Privileged Remote Access is 4.3%, down from 4.5% compared to the previous year. The mindshare of CyberArk Privileged Access Manager is 16.9%, down from 22.0% compared to the previous year. It is calculated based on PeerSpot user engagement data.
Privileged Access Management (PAM)
 

Featured Reviews

PRAVINKHISMATRAO - PeerSpot reviewer
Enhanced compliance and security through detailed action recordings
We have used ARCON Privileged Access Management for recording videos of user actions taken after logging into systems. Around thirty people, including network engineers, server engineers, and application engineers, use it in the company There hasn't been a notable financial benefit for our…
Hahn Rolf - PeerSpot reviewer
Securely manage high-privilege remote access with granular configurations
I recommend that we improve integration with other products like PasswordSafe, aiming for smoother integration. Better alignment between products would enhance manageability from a single point. Additionally, BeyondTrust should focus on automating the update process to reduce unnecessary ticket creation. Improved quality control for non-English language versions is needed to avoid translation and layout errors.
Abdul Durrani - PeerSpot reviewer
Enables granular and secure access with just-in-time access and Zero Trust model
CyberArk provides a good amount of control over access types. However, as a future enhancement, having additional features for cross-platform integration would be beneficial. It would be good to have integrations with other tools and firewalls, such as Zscaler and CrowdStrike. Although I am not fully aware of recent updates, more cross-platform integration would be valuable. A SOC analyst would like to have centralized access in terms of information flowing in even for privileged access management. They would like to have control over everything instead of opening four to five tabs for different sorts of information. Cross-platform integration would help with that. Customers also want CyberArk's pricing to be better so that they can implement it further and have more licenses. Implementing a privileged access management solution can be challenging. It would be great if CyberArk could provide recommendations based on the compliance standards of an organization. It would help system admins ensure that all the required ports are closed and the systems are being managed properly. If any system is not being used anymore, any ports opened for that system need to be closed. Having such recommendations would be helpful.

Quotes from Members

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
 

Pros

"Recording all videos of commands entered into devices is highly valuable."
"The best part of this product is the administrator convenience. The portal is very user-friendly. An administrator can use it very easily."
"Overall, I would rate ARCON Privileged Access Management nine out of ten."
"The most valuable feature of ARCON Privileged Access Management is the recording of sessions. It has all the basic features we need to fulfill our use case."
"Video and audio logs are there for any activities that the privileged admin carries out."
"One of the main benefits we've experienced is that Arcon helps us manage all our team's tasks and provides recording capabilities."
"After storing the administrator password in this password vault of the solution, the solution can automatically go and change the password based on the defined frequency with the defined complexity."
"It was very easy for us to move this application and database from on-premise to cloud, as well as configure new things, such as load balancing. The product is very compatible."
"The scalability is excellent."
"One of the features that I really like about it is the ability to set a start date, time, and end date for the access. For example, you can set the access for a person from tomorrow, Monday, or Tuesday and ending on a specific period of the day or a specific date. That's really quite helpful."
"The most valuable feature is that this solution can be implemented regardless of the operating system."
"Its security, simplicity, and ease of deployment and maintenance are the most valuable. It is FIPS compliant, so it goes through severe penetration testing every one year or two years. They have to maintain this compliance. It is very safe. Customers have been using it in the last eight years because of the simplicity of getting it deployed quickly. Most of the people using the solution had been hacked already, so they needed it quickly. As compared to the other solutions in the market, it can be turned on in production very quickly. You don't really need to have a server. It can be deployed very rapidly on VMware or Hyper-V, and you don't need to do an installation. It is a kind of an all-included package that you just deploy in a VM environment. It is basically a VM that is specifically built for a customer. The way the PRA data solutions work is that you need to build them for each customer because of being hard-coded with their SSL certificate, their web page name, and all that."
"It's a stable product. Based on the demos and interaction with it, it was stable."
"I like all of it. You can access computers that are on a DMZ. You can access computers that are off the network and on the network. You pretty much have access to computers wherever they are. As long as they have the client on them, you can get to them. So, it is convenient, but its main feature is that you can use your smart card to elevate your privileges remotely. That's a great feature."
"I like the enterprise credential manager. It's a connector that sits in PRA and tests the credentials for the end user with a process that will clean the password. This is one of PRA's primary features and simplifies user onboarding. There aren't many restrictions or complications. We can add the user while only opening one port, which is more than enough to access the PRA server. Every organization requires only four critical servers out of a hundred and some 50 production servers."
"I'd rate the solution ten out of ten."
"CyberArk is a pioneer for PAM; they've always been the leader in terms of research and development and bringing new capabilities to the PAM."
"We found the initial setup to be easy."
"We know when passwords will be expiring so we can force users to change their passwords, as well as requiring specific password requirements for length, complexity, etc."
"One of the best features of CyberArk Privileged Access Manager is the capability of Privileged Session Manager (PSM) because it provides visibility into user activities, audit ability, and traceability."
"CyberArk has been easy for us to implement and the adoption has been good. We've been able to standardize a bunch of things. We've been able to standardize relatively easily with the use of the platforms and managing the policies."
"I appreciate CyberArk's real-time capabilities. I can secure critical sessions, such as SSH or database sessions. As a security professional, I have real-time visibility into ongoing sessions. If anything suspicious occurs, I can terminate or freeze the session, which is part of user behavior analytics."
"All access to our servers by both staff and vendors is monitored and recorded."
"CPM helps keep the password policy up to date."
 

Cons

"Scalability could be improved."
"The solution needs more work on the password management side of things. Password management is a big challenge for us, and I would like to improve this aspect. We're finding that BeyondTrust is better in this regard, which is why we're probably going to migrate over. It will offer better security I think."
"For the in-house built applications, they need to provide good, solid access through their portal."
"ARCON Privileged Access Management is not a user-friendly solution, and the application flow from one screen to another is very complex."
"Initially, there were some issues with .NET applications in Windows 10 systems."
"The deployment process is a bit complex because no document is available."
"I suggest implementing password rotation for service-based accounts, as that should be included."
"The auto-password change feature which was recently added. It is supposed to change the password. However, in some cases, while changing the password, it has caused me to lose to connection due to network-related issues or something similar. What we need to have is a type of log for failure of password change."
"I recommend that we improve integration with other products like PasswordSafe, aiming for smoother integration."
"With the current scenario of BeyondTrust Privileged Remote Access, some analytics should come with an AI/ML base and highlight if someone is doing something risky during access."
"Changing your password should be simplified, and there should not be a charge for it."
"Multiple areas can be improved. We've seen lots of updates in the past year. They have a portal where we can submit our ideas. BeyondTrust is immediately implementing user suggestions. The UI could be more informative. Initially, there were two or three connectors, and now we have five or six. It would be nice if they added a few more connectors for third-party integration. There are multiple tools, but the clients may require more for their convenience."
"Some of the capabilities in the solution were not as available or not as outstanding as CyberArk. We had to manage whatever little was available for us, especially its recording capabilities, logs, and a number of things."
"In terms of the ability to automate the creation of new accounts within it, it's still a bit laborious."
"There is no connectivity to the appliance side. There is no API, and it is just difficult for me to capture what version the device is on without going in and doing screenshots. It is a little too secure in that regard, where they don't even trust their product owner. Since a lot of hacks come from the inside, they are probably doing what they need to do out of necessity. It is just that I have to work pretty hard to produce compliance data on the box."
"At the moment, I don't see any major problems with it. If anything, they can just change the look and feel of the login screen because it looks too simple to me. It does not have so much information. When you get to the login screen of the solution, you should have more information. We also have BeyondTrust Remote Support, and the login page looks similar to BeyondTrust Privilege Remote Access. I would love to see more rich information on the login screen or landing page so that rather than having a regular sign-in screen or page where you just provide a username and password and get into the solution, you should have more insight into what the solution does. I've mentioned this to them every time I have had an opportunity."
"Improved user-friendliness, granularity, and functionality would enhance the product further."
"Having a centralized place to manage the solution has been something that I have always wanted, and they are starting to understand that and bring things back together."
"CyberArk definitely needs to improve user experience and reduce complexity."
"As they grow, the technical support is having growing pains. One of the things is just being able to get somebody on the phone sometimes."
"The documentation is rather basic and it is missing many use cases."
"One thing that could be improved is to create of a better alternative for fixing group policy fees. We currently use Microsoft, but they have introduced new policies that may not be compatible."
"It is very complex and difficult to set up the solution."
"The admin interface of the Password Vault Web Access (PVWA) is moving from an old style (the classic interface) to a new style (the v10 interface) and unfortunately, this process is quite slow."
 

Pricing and Cost Advice

"The product's pricing is good value. Go for user-based licensing, without any limit on the target servers."
"They do have some licenses, which are required for things like Linux servers. However, in my environment, we do not have Linux servers."
"The pricing and licensing model is very economical."
"The product's pricing is a good value. It's appropriately priced. The product has all the required features. It doesn't work in some of the areas but, right now overall, it's pretty good."
"It is good value for our business. According to me, their competitors are more costly. Therefore, it is quite affordable. I find the ARCON to be much cheaper than the other products in the market."
"I am not in a position to give any financials, but whatever we have paid, it is value for money. Their licensing model is good. They have been flexible for us."
"The solution’s pricing is neither cheap nor expensive."
"Product pricing is based on users and connections. We did not have to pay more for additional features."
"I wish it was a little bit cheaper, but when a product is as solid as this, I understand what the cost does. It helps them to make sure it stays that way. If you want a reliable, solid product, you're going to pay more."
"My client found the solution a bit expensive but considering their use case and requirements, they didn't have any other choice. As far as I know, implementation and licensing are the only costs."
"The price is pretty expensive, but you get what you pay for and this is a great product."
"I rate the product's pricing a four on a scale of one to ten, where one is high, and ten is low. It is an expensive product."
"PRA's pricing is competitive."
"PRA was one of the cheapest solutions that we evaluated."
"Though the solution was a bit expensive, the overall pricing was average."
"I wasn't directly involved in the licensing and pricing, but I can say that PRA is licensed per endpoint added to the Vault. I would advise users to take frequent exports of their license usage package; it's a simple feature that provides a spreadsheet of every machine in the Vault. This helps to cut down on duplicate licenses, which can happen by adding the same endpoint using an IP address and a fully qualified domain name, for instance. The implementation is an additional cost, and they offer several tiers, so the price varies. There are also some optional add-ons, so I would advise people to research the product well and find out precisely what they need regarding features. The Advanced Web Access add-on provides some required functionality when interfacing with websites; that's one to consider."
"Quite expensive"
"It is not a cheap solution. It is expensive as compared with other solutions. However, it is one of the best solutions in their domain."
"CyberArk Privileged Access Manager is perceived to be somewhat overpriced compared to similar market products. It is a little bit overvalued. It could come down a little bit for my liking. However, the industry-leading reputation and the quality of service justify the high price point to some extent."
"No, I do not have any advice on the price of the product."
"The solution is very expensive and requires a license. We pay for an enterprise license."
"Network and security licenses are currently being managed by other outsource vendors, so they are facing some type of problems in the digital aspect."
"Compared to other solutions, it is costly."
"The solution is costly but we get what we pay for."
report
Use our free recommendation engine to learn which Privileged Access Management (PAM) solutions are best for your needs.
864,574 professionals have used our research since 2012.
 

Top Industries

By visitors reading reviews
Computer Software Company
20%
Financial Services Firm
8%
Manufacturing Company
7%
Government
7%
Computer Software Company
17%
Manufacturing Company
11%
Financial Services Firm
9%
Government
7%
Computer Software Company
15%
Financial Services Firm
15%
Manufacturing Company
9%
Government
6%
 

Company Size

By reviewers
Large Enterprise
Midsize Enterprise
Small Business
 

Questions from the Community

What needs improvement with ARCON Privileged Access Management?
From an end-user point of view, it would be beneficial if the system could provide information about the last login. ...
What do you like most about BeyondTrust Privileged Remote Access?
The product has improved remote support capabilities since it works fine.
What needs improvement with BeyondTrust Privileged Remote Access?
With the current scenario of BeyondTrust Privileged Remote Access, some analytics should come with an AI/ML base and ...
What is your primary use case for BeyondTrust Privileged Remote Access?
The use case for BeyondTrust Privileged Remote Access ( /products/beyondtrust-privileged-remote-access-reviews ) is t...
How does Sailpoint IdentityIQ compare with CyberArk PAM?
We evaluated Sailpoint IdentityIQ before ultimately choosing CyberArk. Sailpoint Identity Platform is a solution to m...
What do you like most about CyberArk Privileged Access Manager?
The most valuable features of the solution are control and analytics.
 

Also Known As

ARCON ARCOS, ARCON PAM
Bomgar Privileged Access
CyberArk Privileged Access Security, CyberArk Enterprise Password Vault
 

Overview

 

Sample Customers

RAK Bank, AXIS Bank, Reliance Capital, Kotak Life Insurance, MTS
Horizon Beverage, Air Liquide, Gateway Bank of Florida
Rockwell Automation
Find out what your peers are saying about CyberArk, Delinea, One Identity and others in Privileged Access Management (PAM). Updated: July 2025.
864,574 professionals have used our research since 2012.