No more typing reviews! Try our Samantha, our new voice AI agent.

Armis Centrix for OT/IoT Security vs CyberArk Privileged Access Manager comparison

 

Comparison Buyer's Guide

Executive SummaryUpdated on Mar 8, 2026

Review summaries and opinions

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
 

Categories and Ranking

Armis Centrix for OT/IoT Se...
Ranking in Operational Technology (OT) Security
8th
Average Rating
8.0
Reviews Sentiment
6.6
Number of Reviews
1
Ranking in other categories
IoT Security (8th)
CyberArk Privileged Access ...
Ranking in Operational Technology (OT) Security
3rd
Average Rating
8.6
Reviews Sentiment
6.8
Number of Reviews
230
Ranking in other categories
User Activity Monitoring (1st), Enterprise Password Managers (2nd), Privileged Access Management (PAM) (1st), Mainframe Security (1st)
 

Featured Reviews

reviewer2807997 - PeerSpot reviewer
Network and Security Engineer
Security monitoring has uncovered unauthorized devices and now protects client networks
I think the best feature of Armis Centrix for OT/IoT Security is that it ensures only the authorized devices and users are authorized to prevent any potential breaches. I think that clear definition is very essential for a lot of networks because it helps us understand who should be there and who shouldn't be. For our clientele, we were able to discover a lot of unauthorized devices that were on their network. This first of all helped them remove a lot of potential security breaches and cleared the bandwidth of the network as well. I think this has been one of the biggest cases that we have found. For most of the clients where we have deployed it, this has always been a common occurrence because a lot of people enter the network and then you don't know who is there, who has the access, and so on. I think this is the very reason I said what I said earlier.
Atul-Gujar - PeerSpot reviewer
CyberArk manager at a comms service provider with 10,001+ employees
Secures critical infrastructures with essential user session audit records
A potential area for improvement is enhancing support for cluster environments and distributed Vaults. Clients in multiple countries that need central access have different challenges that require better solutions from CyberArk. For financial services, CyberArk can improve incident response by ensuring fast support for critical priority tickets to meet compliance requirements. Providing more documentation on CyberArk is recommended for new team members to enhance their troubleshooting capabilities. I understand it's up to the client, but 99% fail to change the demo key, so it's crucial for CyberArk to emphasize changing the key and documenting it as part of the installation process.

Quotes from Members

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
 

Pros

"I think the best feature of Armis Centrix for OT/IoT Security is that it ensures only the authorized devices and users are authorized to prevent any potential breaches."
"If your business/organization has crown-jewel data, this is the tool to use."
"We are able to rotate privileged user passwords to eliminate fraudulent use."
"The integrations are the most valuable aspect of CyberArk Privileged Access Manager. The software offers pre-built integrations, and our team can also create custom connectors. This flexibility allows us to integrate with systems that we previously didn't consider integrating with, making it a significant advantage for us."
"It is one of the best solutions in the market, and ever since I started using this solution, there has not been any compromise when it comes to our lab."
"Because we now have the ability to grant access to management utilities like DNS Manager, Sequel Studio, and MMC, in a secure fashion, without system admins being required to continually reenter various passwords that are stored who knows where, it has really made the system admin's job much easier. It has made the PSM's job much easier. It has made the auditor's job and the security team's job and the access manager's job significantly easier, because we're able to move much more quickly toward a role-based access management system, and that is really streamlining the whole onboarding/offboarding management process."
"The most valuable feature of CyberArk Privileged Access Manager is the vault."
"The AI capabilities, including advanced threat detection features, are very helpful for us. They reduce human effort and errors, allowing us to quickly identify and respond to threats."
"It allows users to self-provision access to the accounts that they need."
 

Cons

"I'm not exactly sure how scalable it is if you're managing multiple locations, but I think it still has some potential for improvement for multiple locations."
"We'd like to see the creation of some kind of memo field for each device account, which could be used, in our network at least, to leave a note about the device for either the security or network engineering team members."
"The current interface doesn't scale that well, and has some screens still in the old layout."
"The product could be easier to use. More work needs to be done on this aspect; it is not good enough yet."
"The initial setup can get complex."
"It is currently a robust product, but we should be able to join together small components."
"They are sometimes not flexible with things. For instance, from one day to another, there might be something that had been done years ago by CyberArk, then they say, "We do not support that." You then have to initiate a complaint and start working with them. Things might become complicated and months pass while you are working with them. Usually, they are good and fast, but sometimes they seem to be blocked with problems, e.g., you will suddenly be working with another team instead of the team that you were working with the day before."
"There should be more models and licensing plans for this software."
"To get it to a ten it should give other possibilities to select if you could follow the keystrokes. It should have a flexibility with things where people can use it a lot faster."
 

Pricing and Cost Advice

Information not available
"Licensing fees are paid on a yearly basis."
"Its price can be reduced."
"CyberArk provides all the features bundled. This is compared to other vendors who provide them as a different license for each functionality."
"CyberArk Privileged Access Manager is more expensive than its competitors, such as BeyondTrust, Delinea, and ManageEngine PAM360."
"Our risk is definitely significantly lower. Also, our resources are low."
"I hope to learn how the pricing works so that I can understand it better, but I am certain it is not inexpensive."
"CyberArk is very expensive and there are additional fees for add-ons."
"CyberArk Privileged Access Manager is perceived to be somewhat overpriced compared to similar market products. It is a little bit overvalued. It could come down a little bit for my liking. However, the industry-leading reputation and the quality of service justify the high price point to some extent."
report
Use our free recommendation engine to learn which Operational Technology (OT) Security solutions are best for your needs.
890,124 professionals have used our research since 2012.
 

Top Industries

By visitors reading reviews
No data available
Financial Services Firm
13%
Manufacturing Company
10%
Computer Software Company
7%
Comms Service Provider
6%
 

Company Size

By reviewers
Large Enterprise
Midsize Enterprise
Small Business
No data available
By reviewers
Company SizeCount
Small Business60
Midsize Enterprise42
Large Enterprise174
 

Questions from the Community

What needs improvement with Armis Centrix for OT/IoT Security?
I think Armis Centrix for OT/IoT Security already has an active AI agent in there, but if the AI agent could be more diverse to help non-technical users handle their own interfaces or educate them ...
What is your primary use case for Armis Centrix for OT/IoT Security?
We have been using Armis Centrix for OT/IoT Security for approximately eight to nine months now. We use Armis Centrix for OT/IoT Security for our clientele, with some requiring their own security s...
What advice do you have for others considering Armis Centrix for OT/IoT Security?
I would rate Armis Centrix for OT/IoT Security an eight, which I think is a fair assessment based on its capabilities and ease of use. I would recommend it to others. It is a pretty good platform, ...
How does Sailpoint IdentityIQ compare with CyberArk PAM?
We evaluated Sailpoint IdentityIQ before ultimately choosing CyberArk. Sailpoint Identity Platform is a solution to manage risks in cloud enterprise environments. It automates and streamlines the m...
What do you like most about CyberArk Privileged Access Manager?
The most valuable features of the solution are control and analytics.
What is your experience regarding pricing and costs for CyberArk Privileged Access Manager?
My thoughts on the pricing of CyberArk Privileged Access Manager depend entirely on the vendors' requirements. If they want their things to be secure, they have to spend accordingly. We have four t...
 

Also Known As

No data available
CyberArk Privileged Access Security, CyberArk Enterprise Password Vault
 

Overview

 

Sample Customers

Information Not Available
Rockwell Automation
Find out what your peers are saying about Nozomi, Claroty, CyberArk and others in Operational Technology (OT) Security. Updated: March 2026.
890,124 professionals have used our research since 2012.