We performed a comparison between ARCON Privileged Access Management and CyberArk Privileged Access Manager based on real PeerSpot user reviews.
Find out in this report how the two Privileged Access Management (PAM) solutions compare in terms of features, pricing, service and support, easy of deployment, and ROI."The deployment process for the solution was easy...The solution's technical support team was good."
"Logging, particularly screen recording for Windows RDP sessions. Also, command-logging for SSH sessions. This really helps us to see what commands/changes have been executed in a particular service at a given point of time, and by whom."
"One important feature is the administrator access, mainly for Windows machines as well as Linux machines. It is important for us because there is accountability associated with each user ID. And the recordings are also helpful."
"It was very easy for us to move this application and database from on-premise to cloud, as well as configure new things, such as load balancing. The product is very compatible."
"One of the main benefits we've experienced is that Arcon helps us manage all our team's tasks and provides recording capabilities."
"The video logs help us to identify any misuse of privileged accounts."
"Technical support is good. I rate the technical support an eight out of ten."
"The initial setup was very simple. There was only one server we had to setup. We needed to store all the passwords, and a secure database is used."
"AIM has been a great help in automating password retrieval which removes the need for hard-coded credentials."
"It has a centralized page where you can manage everything. This makes work easier. You don't have to remember different module URLs or browser applications. It is very easy to get all the secure identities of other environments into a single page, which is very important for us as it helps a lot in terms of operations, e.g., reduces management time. This is a single page where you can manage all accounts and onboard them to the CyberArk. You can then secure and see passwords from everywhere. So, there is a single pane of glass where you can manage all the identities across environments as well as across different types of identities."
"If any intruder gets inside, they would not be able to move around nor do lateral movements. It minimize any attack problems within our network."
"Performance-wise, it is excellent."
"CyberArk has helped us to identify, store, protect, and monitor the usage of privileged accounts."
"We have been able to manage application credentials in CyberArk, whether they come as a custom plugin or straight out-of-the-box."
"We've written over a hundred custom connectors ourselves that allow us to do all types of privileged session management for various applications. On top of that, the rest of the API-based central credential providers allow us to get away from credentials that may be hard-coded in the script or some application."
"We are able to rotate credentials and have privileged account access."
"There are some features lacking but they typically are added when the upgrades are released."
"We would like to see support for privileged accounts used in web-based systems like Blue Coat Secure Web Gateway, VMware ESXI management tools, etc."
"It should be browser-agnostic and, frankly, it is working well on Internet Explorer. It should work on popular browsers like Mozilla and Firefox."
"There are no APIs readily available... I'm working on automation for ARCON so that whatever the ARCON administrator is doing will be automated, rather than having to do it manually. For that, I had to spend months to get the API developed myself. Having that handy out of the box, that would really help..."
"I would like for it to be dependent on Windows as opposed to Linux."
"One thing which needs improvement is where it is keeping video logs of Windows Servers, whatever activities are being carried out by the administrator. Because Windows logs are a video, they are unsearchable, so if you need to search for a specific administrator and what he has done on a server, right now you need to go through different video logs of that particular timeframe. I think they are coming up with an additional feature where in it can be indexed and can be searchable."
"A few areas for improvement in ARCON would be performance optimization, ensuring smoother management."
"I would like to see a "wild card" kind of a feature or something that would enable us to search the video."
"New functionalities and discovered bugs take longer to patch. We would greatly appreciate quicker development of security patches and bug corrections."
"I'm not a fan of technical support with CyberArk. It's like jumping through red tape and hoops. Quite frankly, it's almost like when you call CyberArk you get the Help Desk or the level-one. I'm a level-one. I got the CCD, I know how to do the initial troubleshooting. When I call CyberArk it's because I can't figure the problem out. So I need a level-two, three, four. I don't need you to tell me, "Hey, open a ticket and then give me logs.""
"In the beginning, CyberArk Privileged Access Manager didn't have a multifactor authentication feature, so that was an area for improvement, but now it's part of the solution. Having just one console for two CyberArk products would be good, particularly for the CyberArk Privileged Access Manager and the CyberArk Endpoint Privilege Manager, with the latter being a product for endpoint management that supports the workstations and allows you to manage workstations. In the next update of CyberArk Privileged Access Manager, it would be good to have a local agent where you can manage all users and processes, and have an agent on the servers such as Linux and Windows."
"It is easily customized, and that customization makes it very easy to start trying to shoehorn the solution into roles it was never intended to fill."
"We don't often contact technical support, but when we do it, the response could be faster and better."
"The current user interface is a little dated. However, I hear there are changes coming in the next version."
"Initial setup is complex. Lots of architecture, lots of planning, and lots of education and training are needed."
"The usual workload is sometimes delayed by the solution."
More ARCON Privileged Access Management Pricing and Cost Advice →
More CyberArk Privileged Access Manager Pricing and Cost Advice →
ARCON Privileged Access Management is ranked 8th in Privileged Access Management (PAM) with 32 reviews while CyberArk Privileged Access Manager is ranked 1st in Privileged Access Management (PAM) with 142 reviews. ARCON Privileged Access Management is rated 7.8, while CyberArk Privileged Access Manager is rated 8.8. The top reviewer of ARCON Privileged Access Management writes "Offers good session monitoring and recording features". On the other hand, the top reviewer of CyberArk Privileged Access Manager writes "Lets you ensure relevant, compliant access in good time and with an audit trail, yet lacks clarity on MITRE ATT&CK". ARCON Privileged Access Management is most compared with Cisco ISE (Identity Services Engine), BeyondTrust Endpoint Privilege Management, ManageEngine PAM360, Delinea Secret Server and WALLIX Bastion, whereas CyberArk Privileged Access Manager is most compared with Cisco ISE (Identity Services Engine), Microsoft Entra ID, Delinea Secret Server, WALLIX Bastion and CyberArk Identity. See our ARCON Privileged Access Management vs. CyberArk Privileged Access Manager report.
See our list of best Privileged Access Management (PAM) vendors.
We monitor all Privileged Access Management (PAM) reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.