Try our new research platform with insights from 80,000+ expert users

ARCON Privileged Access Management vs BeyondTrust Privileged Remote Access vs CyberArk Privileged Access Manager comparison

 

Comparison Buyer's Guide

Executive Summary

Review summaries and opinions

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
 

Mindshare comparison

As of May 2025, in the Privileged Access Management (PAM) category, the mindshare of ARCON Privileged Access Management is 4.0%, down from 4.4% compared to the previous year. The mindshare of BeyondTrust Privileged Remote Access is 4.6%, down from 4.6% compared to the previous year. The mindshare of CyberArk Privileged Access Manager is 18.3%, down from 22.8% compared to the previous year. It is calculated based on PeerSpot user engagement data.
Privileged Access Management (PAM)
 

Featured Reviews

PRAVINKHISMATRAO - PeerSpot reviewer
Enhanced compliance and security through detailed action recordings
We have used ARCON Privileged Access Management for recording videos of user actions taken after logging into systems. Around thirty people, including network engineers, server engineers, and application engineers, use it in the company There hasn't been a notable financial benefit for our…
Hahn Rolf - PeerSpot reviewer
Securely manage high-privilege remote access with granular configurations
I recommend that we improve integration with other products like PasswordSafe, aiming for smoother integration. Better alignment between products would enhance manageability from a single point. Additionally, BeyondTrust should focus on automating the update process to reduce unnecessary ticket creation. Improved quality control for non-English language versions is needed to avoid translation and layout errors.
Abdul Durrani - PeerSpot reviewer
Enables granular and secure access with just-in-time access and Zero Trust model
CyberArk provides a good amount of control over access types. However, as a future enhancement, having additional features for cross-platform integration would be beneficial. It would be good to have integrations with other tools and firewalls, such as Zscaler and CrowdStrike. Although I am not fully aware of recent updates, more cross-platform integration would be valuable. A SOC analyst would like to have centralized access in terms of information flowing in even for privileged access management. They would like to have control over everything instead of opening four to five tabs for different sorts of information. Cross-platform integration would help with that. Customers also want CyberArk's pricing to be better so that they can implement it further and have more licenses. Implementing a privileged access management solution can be challenging. It would be great if CyberArk could provide recommendations based on the compliance standards of an organization. It would help system admins ensure that all the required ports are closed and the systems are being managed properly. If any system is not being used anymore, any ports opened for that system need to be closed. Having such recommendations would be helpful.

Quotes from Members

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
 

Pros

"The most valuable feature of ARCON Privileged Access Management is the recording of sessions. It has all the basic features we need to fulfill our use case."
"The product's deployment phase was easy."
"Session recording is the most valuable feature, as it covers compliance and it also covers our in-house applications."
"Overall, I would rate ARCON Privileged Access Management nine out of ten."
"It gives us a lot of comfort in terms of security level. Our infrastructure devices and servers are secured and nobody can have unauthorized access to them."
"Logging, particularly screen recording for Windows RDP sessions. Also, command-logging for SSH sessions. This really helps us to see what commands/changes have been executed in a particular service at a given point of time, and by whom."
"The entire conversation that is happening between the servers and the client is recorded. It is a good feature if you want to do some analysis, and for investigation."
"Previously, we had to go through some effort to change the credentials of our devices. The process was subject to human error... For things like managing credentials, some kind of register had to be maintained. With the Password Vault of ARCON, all these processes are automated. The credentials are changed, as per the schedule. The information is encrypted, kept in our vault, and sent to all the email addresses within the ARCON solution itself."
"Based on the feedback from my colleagues who have never complained about the technical support, I would say that the product's support team is good."
"This product is very stable and scalable. This is an excellent platform."
"One of the features that I really like about it is the ability to set a start date, time, and end date for the access. For example, you can set the access for a person from tomorrow, Monday, or Tuesday and ending on a specific period of the day or a specific date. That's really quite helpful."
"PRA stands on its own as a full solution. This is important because it reduces the need to maintain a lot of different services. Also, the integration between those services are sometimes not easy to maintain. So, having a solution like BeyondTrust Privileged Remote Access reducing our workload gives us enough time to work on our other issues. The system just runs and does what it is supposed to do."
"We like the integration with Active Directory. It allows us to discover the endpoints and user accounts that need protection. It's a good way of securing our privileged access."
"The product has improved remote support capabilities since it works fine."
"The privileged remote access platform is able to track and record everything that happens within a session."
"When it comes to the Privileged Remote Access (PRA) solution, instead of depending on a VPN client, from Cisco or any other vendor, we can directly use this product from the internet. It is very easy to do the implementation, and it is easy for every user to access the server from outside of their organization. They can open the URL and put their name and password, and it'll do the multi-factor authentication. They can easily access the server. Prior to this solution, the users had to log into the VPN, which is not required with BeyondTrust. Now, they can use their computer over the internet."
"With PAM in place, we've experienced a significant reduction in potential security breaches."
"The session recording and monitoring capabilities are valuable. We have real-time session management ability to record, audit, and monitor any privileged user activities. That is a big deal."
"CyberArk Privileged Access Manager indeed helps meet compliance and regulatory requirements for customers, especially in the financial sector, by aligning with PCI DSS standards."
"The users have the ability to rotate passwords on a daily basis with a Reconcile Account. Or, if they want to do one-time password checkouts, we can manage those, check in, check out. I like the flexibility of the changing of the password, specifically."
"Automatic password management, which will automatically change passwords based on compliance requirements."
"CyberArk is a pioneer for PAM; they've always been the leader in terms of research and development and bringing new capabilities to the PAM."
"Our privileged accounts are now stored in a more secure location and lateral movement within the network have been lessened."
"CPM helps keep the password policy up to date."
 

Cons

"Scalability could be improved."
"One thing which needs improvement is where it is keeping video logs of Windows Servers, whatever activities are being carried out by the administrator. Because Windows logs are a video, they are unsearchable, so if you need to search for a specific administrator and what he has done on a server, right now you need to go through different video logs of that particular timeframe. I think they are coming up with an additional feature where in it can be indexed and can be searchable."
"Bulk password automation is not available in ARCON when compared to other products."
"One common problem I faced with ARCON PAM was compatibility issues with certain software versions."
"They they should focus on support. The support needs to be very strong. Since the product is becoming stronger, their support team also should be equally strong. They should respond to open queries within the time limit they have set. Their support team should be more technical, to understand the issue or the set up."
"There are no APIs readily available... I'm working on automation for ARCON so that whatever the ARCON administrator is doing will be automated, rather than having to do it manually. For that, I had to spend months to get the API developed myself. Having that handy out of the box, that would really help..."
"The solution needs more work on the password management side of things. Password management is a big challenge for us, and I would like to improve this aspect. We're finding that BeyondTrust is better in this regard, which is why we're probably going to migrate over. It will offer better security I think."
"I'd also suggest adding a browser isolation feature to prevent cache storage on endpoints and mitigate cache-based attacks."
"It would be very nice if it has an enterprise vault. Currently, it can interact with Password Safe, which is a separate solution and equivalent to Thycotic Secret Server. Instead of having Password Safe as a separate entity, they should combine it with BeyondTrust Privileged Remote Access. They have done it in some way, but it is not an enterprise tech solution."
"When doing protocol panel jumps, the tool does not restrict what is recorded on the user's computer."
"I would love to have a web console and the ability to use the smart card with the web console to provide remote support. If you are on a computer that doesn't have the Bomgar console, you should be able to use the web console to provide support. That's the only thing right now. A web console is nice when you're jumping into a computer, but if you need to elevate the privileges, you currently can't do it with the smart card. If they could figure that out, that would be money."
"One of our gaps or pain points is having multi-factor authentication at the endpoint and using the PRA password injection from BeyondTrust, which does not work in our environment. We can only have MFA at the login of BeyondTrust to check out the password. Therefore, we can't meet our security requirements of having it on the endpoint."
"Changing your password should be simplified, and there should not be a charge for it."
"There is no connectivity to the appliance side. There is no API, and it is just difficult for me to capture what version the device is on without going in and doing screenshots. It is a little too secure in that regard, where they don't even trust their product owner. Since a lot of hacks come from the inside, they are probably doing what they need to do out of necessity. It is just that I have to work pretty hard to produce compliance data on the box."
"At the moment, I don't see any major problems with it. If anything, they can just change the look and feel of the login screen because it looks too simple to me. It does not have so much information. When you get to the login screen of the solution, you should have more information. We also have BeyondTrust Remote Support, and the login page looks similar to BeyondTrust Privilege Remote Access. I would love to see more rich information on the login screen or landing page so that rather than having a regular sign-in screen or page where you just provide a username and password and get into the solution, you should have more insight into what the solution does. I've mentioned this to them every time I have had an opportunity."
"The integration client, backup solution, and SSO setup and provisioning could be improved. There isn't any documented or supported user provisioning currently, which slows down the processes of onboarding and assigning permissions. I would like to see this improved soon."
"There is room for improvement in the pricing model."
"We'd like to see the creation of some kind of memo field for each device account, which could be used, in our network at least, to leave a note about the device for either the security or network engineering team members."
"The usual workload is sometimes delayed by the solution."
"Pricing is a problem. CyberArk is expensive compared to other products I know."
"Many of the infrastructure folks who use the product dislike it because it complicates their workflow. They get a little less control, and they have to go through a specific solution. It proactively logs in for them, which obfuscates some of the issues that they may be troubleshooting."
"In the next release, they could simplify the setup and I would like some tasks added like file sharing. When a client connects to CyberArk and wants to put a file on the server, they cannot."
"​It's hard to find competent resellers/support."
"The architecture needs to be improved."
 

Pricing and Cost Advice

"ARCON Privileged Access Management's pricing is reasonable."
"I am not in a position to give any financials, but whatever we have paid, it is value for money. Their licensing model is good. They have been flexible for us."
"The product's pricing is a good value. It's appropriately priced. The product has all the required features. It doesn't work in some of the areas but, right now overall, it's pretty good."
"The cost of this product is very cheap, comparatively in the global market."
"Their licensing model is very simple, as it is based on the number of endpoints which you want to manage along with the number of users and administrators which you want to use."
"The product is available with competitive pricing. Licensing is not complex. We calculated the license requirements by counting the number of admins and the number of devices which were going to integrate with it."
"They do have some licenses, which are required for things like Linux servers. However, in my environment, we do not have Linux servers."
"The solution’s pricing is neither cheap nor expensive."
"I wish it was a little bit cheaper, but when a product is as solid as this, I understand what the cost does. It helps them to make sure it stays that way. If you want a reliable, solid product, you're going to pay more."
"PRA's pricing is competitive."
"Don't get into a situation where you are licensing per desktop or per person until you fully understand the licensing."
"PRA was one of the cheapest solutions that we evaluated."
"Its price is pretty good for the features and services that it provides. It is not outrageous. I'm not aware of any additional charges or anything like that."
"The price is pretty expensive, but you get what you pay for and this is a great product."
"Though the solution was a bit expensive, the overall pricing was average."
"I rate the product's pricing a four on a scale of one to ten, where one is high, and ten is low. It is an expensive product."
"Pricing and licensing depend on the environment."
"CyberArk has been Gartner's number-one pick for the past ten years, so you can infer that their pricing is higher than everyone else. When you are the best, you will charge appropriately for it."
"The product's licensing is yearly. I would rate the solution's pricing a six out of ten."
"If you want a Ferrari, it will cost you. The solution is really nice, so it costs the client, but in the long run, it is very good. If you buy a solution that costs a lot to maintain because it is not stable, and you are frequently asking for consultant support, it costs more."
"I believe that this solution is priced well. It's the market leader and I think that it's the best solution."
"They have two types of licensing: purchase and subscription. You have to pay for each admin user, such as Microsoft admin, mail admin, database admin, etc."
"It's an affordable platform."
"There are no additional costs other than the standard licensing fees."
report
Use our free recommendation engine to learn which Privileged Access Management (PAM) solutions are best for your needs.
853,271 professionals have used our research since 2012.
 

Top Industries

By visitors reading reviews
Educational Organization
52%
Computer Software Company
12%
Financial Services Firm
4%
Retailer
3%
Computer Software Company
18%
Manufacturing Company
10%
Financial Services Firm
10%
Government
7%
Educational Organization
33%
Financial Services Firm
12%
Computer Software Company
11%
Manufacturing Company
6%
 

Company Size

By reviewers
Large Enterprise
Midsize Enterprise
Small Business
 

Questions from the Community

What needs improvement with ARCON Privileged Access Management?
From an end-user point of view, it would be beneficial if the system could provide information about the last login. ...
What do you like most about BeyondTrust Privileged Remote Access?
The product has improved remote support capabilities since it works fine.
What needs improvement with BeyondTrust Privileged Remote Access?
I recommend that we improve integration with other products like PasswordSafe, aiming for smoother integration. Bette...
What is your primary use case for BeyondTrust Privileged Remote Access?
We use the tool for vendor access, providing secure vendor access to manage systems. Most of our use cases involve se...
How does Sailpoint IdentityIQ compare with CyberArk PAM?
We evaluated Sailpoint IdentityIQ before ultimately choosing CyberArk. Sailpoint Identity Platform is a solution to m...
What do you like most about CyberArk Privileged Access Manager?
The most valuable features of the solution are control and analytics.
What is your experience regarding pricing and costs for CyberArk Privileged Access Manager?
The pricing for CyberArk Privileged Access Manager is quite expensive, and the pricing varies from region to region. ...
 

Comparisons

 

Also Known As

ARCON ARCOS, ARCON PAM
Bomgar Privileged Access
CyberArk Privileged Access Security, CyberArk Enterprise Password Vault
 

Overview

 

Sample Customers

RAK Bank, AXIS Bank, Reliance Capital, Kotak Life Insurance, MTS
Horizon Beverage, Air Liquide, Gateway Bank of Florida
Rockwell Automation
Find out what your peers are saying about CyberArk, Delinea, One Identity and others in Privileged Access Management (PAM). Updated: May 2025.
853,271 professionals have used our research since 2012.