Try our new research platform with insights from 80,000+ expert users

ARCON Privileged Access Management vs CyberArk Privileged Access Manager comparison

 

Comparison Buyer's Guide

Executive SummaryUpdated on Oct 6, 2024

Review summaries and opinions

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
 

Categories and Ranking

ARCON Privileged Access Man...
Ranking in Privileged Access Management (PAM)
8th
Average Rating
7.8
Reviews Sentiment
7.6
Number of Reviews
36
Ranking in other categories
No ranking in other categories
CyberArk Privileged Access ...
Ranking in Privileged Access Management (PAM)
1st
Average Rating
8.6
Reviews Sentiment
6.8
Number of Reviews
229
Ranking in other categories
User Activity Monitoring (1st), Enterprise Password Managers (3rd), Mainframe Security (2nd), Operational Technology (OT) Security (3rd)
 

Mindshare comparison

As of January 2026, in the Privileged Access Management (PAM) category, the mindshare of ARCON Privileged Access Management is 3.0%, down from 3.7% compared to the previous year. The mindshare of CyberArk Privileged Access Manager is 11.6%, down from 20.0% compared to the previous year. It is calculated based on PeerSpot user engagement data.
Privileged Access Management (PAM) Market Share Distribution
ProductMarket Share (%)
CyberArk Privileged Access Manager11.6%
ARCON Privileged Access Management3.0%
Other85.4%
Privileged Access Management (PAM)
 

Featured Reviews

DS
System and DBA at a energy/utilities company with 1,001-5,000 employees
Enhanced security through session monitoring and activity recording
From an end-user point of view, it would be beneficial if the system could provide information about the last login. This would help identify if the server was accessed by me or if someone has potentially stolen my credentials. It would provide a clearer picture of whether ARCON Privileged Access Management is accessed by an authentic user.
SI
Senior PAM Consultant at iC Consult GmbH
Makes privileged access management easy with automation and granular control
Many people underestimate the value of these tools because they treat them as simple automated password management. Once you realize the volume of passwords in your organization and factor in nonhuman passwords, you realize its value. Last year, CyberArk Impact cited 45 nonhuman passwords for every human password. If you have 10,000 employees, you can imagine the number of passwords. There are also many other operations. For example, you have a Qualys scanner that needs to reach out and touch all your endpoints and scan them for vulnerabilities. They use an API call to CyberArk to pull out a Privileged credential that allows them to log in to that target. This is an automated machine call. It is tapping into CyberArk to get that credential. There can be hundreds of thousands of those operations a day. You do not want to manage those passwords by hand. Some people marginalize the significance of such a solution by saying that it is just a fancy password changer. It goes well beyond that, especially with API calls and automation. Its importance extends beyond merely changing passwords; it involves automation, API calls, and process integration, crucial in agile environments for standing up new Amazon servers or other processes needing privileged credentials. CyberArk can automate these tasks into their build processes. Another critical feature is the proxy service via Privileged Session Manager (PSM), providing not only a proxy between your user and the target servers, protecting against malware but also offering session recording. Many companies I have worked with implemented a PAM product as a knee-jerk reaction to SOX audit requirements. They discovered they needed session recording and retention for regulatory compliance. This has become a major factor for clients instituting CyberArk, so PSM is a big deal in addition to regular password rotation.

Quotes from Members

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
 

Pros

"The most valuable feature is it is easy to use and the interface is intuitive."
"The user interface, overall, is really good. If I have some 20 servers in my ID, I can easily see for which servers I have read-only access, for which servers I have prompt-access, and for which servers I have server admin access."
"One of the main benefits we've experienced is that Arcon helps us manage all our team's tasks and provides recording capabilities."
"Video and audio logs are there for any activities that the privileged admin carries out."
"Previously, we had to go through some effort to change the credentials of our devices. The process was subject to human error... For things like managing credentials, some kind of register had to be maintained. With the Password Vault of ARCON, all these processes are automated. The credentials are changed, as per the schedule. The information is encrypted, kept in our vault, and sent to all the email addresses within the ARCON solution itself."
"The initial setup was very simple. There was only one server we had to setup. We needed to store all the passwords, and a secure database is used."
"For compliance, each change I do, in each of the servers, is clearly recorded. We recently faced an audit and this was an awesome feature. Even our auditor had praise for it saying, "This is really a good feature.""
"The most valuable feature of ARCON Privileged Access Management is the recording of sessions. It has all the basic features we need to fulfill our use case."
"It is a single tool that isolates possible kinds of malware. You get lateral movement blocking and auditing information, e.g., you know who is doing what. You are getting protections from the service as well as a useful environment. All your admins can easily go in and out of your company while accessing your servers in a secure way, even if they are working abroad."
"It is an extremely scalable solution."
"The password vault and session monitoring are useful."
"We utilize PTA, and we are now integrating that into our risk management program so we can identify the uses of the vault which are outside of the norm, e.g., people accessing after hours. It has reduced the amount of time that we are looking through logs and audit logs."
"This is a complete solution that can detect cyber attacks well."
"CyberArk Privileged Access Manager has made our operations more streamlined. There is an approval process, so it helps us keep tabs on who's working on what and for how long."
"If properly set up, CyberArk Enterprise Password Vault has good stability, and is a very solid tool. It can run by itself. Its most valuable features are auto password recycling and PSM."
"The established sessions on the target systems are fully isolated and the privileged account credentials are never exposed to the end-users or their client applications and devices."
 

Cons

"One common problem I faced with ARCON PAM was compatibility issues with certain software versions."
"If you take Microsoft hypervisor - which comes with its own interface, its own web layer, etc. - something like that also requires privileged IDs. As per our institution policy now, everything has to come through ARCON. We have demanded that these kind of advanced features also should be there."
"I would like to see a "wild card" kind of a feature or something that would enable us to search the video."
"Anti-bridging should be built into product."
"Scalability could be improved."
"Bulk password automation is not available in ARCON when compared to other products."
"Sometimes it gets stuck between servers and I would like to see this improved in the future."
"I would like for it to be dependent on Windows as opposed to Linux."
"Initial setup is complex. Lots of architecture, lots of planning, and lots of education and training are needed."
"They are taking two to three days for resolution are too slow. Customers, including myself, do not want to wait this long for solutions."
"The turnaround time for technical support is lengthy."
"I would like easier integrations for creating an online dashboard that executives would look at or are able to run reports from the tool."
"I would like to see an easier way to define delegated roles within the administration of the core product."
"The solution's architecture could be improved. It requires installation on four to five different servers. Each server has a purpose, but when you need to troubleshoot, it can be difficult because you need to access each of them. Reducing the number of servers would be helpful."
"The product documentation has to be more precise in certain aspects with explanations for functionality limitations along with reference material or screenshots."
"New functionalities and discovered bugs take longer to patch. We would greatly appreciate quicker development of security patches and bug corrections."
 

Pricing and Cost Advice

"Their licensing model is very simple, as it is based on the number of endpoints which you want to manage along with the number of users and administrators which you want to use."
"The cost of this product is very cheap, comparatively in the global market."
"The product's pricing is a good value. It's appropriately priced. The product has all the required features. It doesn't work in some of the areas but, right now overall, it's pretty good."
"Product pricing is based on users and connections. We did not have to pay more for additional features."
"The solution’s pricing is neither cheap nor expensive."
"I definitely feel the product's pricing is a good value. It is one of the best products we have. The licensing is server-based."
"ARCON Privileged Access Management's pricing is reasonable."
"The pricing and licensing model is very economical."
"CyberArk DNA is free if you purchase the CyberArk solution. There is no additional charge for CyberArk DNA, which is great."
"The price of CyberArk support could be a little bit less. Otherwise, pricing is fine."
"The solution is cost-effective for the features."
"There are no additional costs other than the standard licensing fees."
"Previously, the pricing was very meager. They started publicizing and advertising the solution, growing CyberArk, as an organization. They also changed their pricing with that growth, e.g., the pricier the product, the more people who will purchase it."
"I'm aware that the organization had purchased licensing for almost all of CyberArk's solutions including licensing for PTA, EPM, and the Application Identity Manager. But when it comes to PSM, this is one of the components where there's an additional charge for any extra PSMs that you want to deploy. I believe that there's some rider where the vendor has a bit of leeway to, at times, charge a premium on whatever additional services you may require above the board."
"I would rate the cost of CyberArk Privileged Access Manager seven out of ten with ten being the most expensive."
"It's an affordable platform."
report
Use our free recommendation engine to learn which Privileged Access Management (PAM) solutions are best for your needs.
879,455 professionals have used our research since 2012.
 

Top Industries

By visitors reading reviews
Computer Software Company
13%
Financial Services Firm
9%
Manufacturing Company
8%
Government
7%
Financial Services Firm
15%
Computer Software Company
11%
Manufacturing Company
10%
Government
6%
 

Company Size

By reviewers
Large Enterprise
Midsize Enterprise
Small Business
By reviewers
Company SizeCount
Small Business9
Midsize Enterprise11
Large Enterprise17
By reviewers
Company SizeCount
Small Business59
Midsize Enterprise40
Large Enterprise173
 

Questions from the Community

What needs improvement with ARCON Privileged Access Management?
From an end-user point of view, it would be beneficial if the system could provide information about the last login. This would help identify if the server was accessed by me or if someone has pote...
How does Sailpoint IdentityIQ compare with CyberArk PAM?
We evaluated Sailpoint IdentityIQ before ultimately choosing CyberArk. Sailpoint Identity Platform is a solution to manage risks in cloud enterprise environments. It automates and streamlines the m...
What do you like most about CyberArk Privileged Access Manager?
The most valuable features of the solution are control and analytics.
What is your experience regarding pricing and costs for CyberArk Privileged Access Manager?
My thoughts on the pricing of CyberArk Privileged Access Manager depend entirely on the vendors' requirements. If they want their things to be secure, they have to spend accordingly. We have four t...
 

Also Known As

ARCON ARCOS, ARCON PAM
CyberArk Privileged Access Security, CyberArk Enterprise Password Vault
 

Overview

 

Sample Customers

RAK Bank, AXIS Bank, Reliance Capital, Kotak Life Insurance, MTS
Rockwell Automation
Find out what your peers are saying about ARCON Privileged Access Management vs. CyberArk Privileged Access Manager and other solutions. Updated: December 2025.
879,455 professionals have used our research since 2012.