No more typing reviews! Try our Samantha, our new voice AI agent.

Atos DirX Directory vs CyberArk Privileged Access Manager comparison

 

Comparison Buyer's Guide

Executive Summary

Review summaries and opinions

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
 

Categories and Ranking

Atos DirX Directory
Average Rating
6.8
Reviews Sentiment
6.7
Number of Reviews
4
Ranking in other categories
Application Infrastructure (22nd)
CyberArk Privileged Access ...
Average Rating
8.6
Reviews Sentiment
6.8
Number of Reviews
230
Ranking in other categories
User Activity Monitoring (1st), Enterprise Password Managers (3rd), Privileged Access Management (PAM) (1st), Mainframe Security (1st), Operational Technology (OT) Security (3rd)
 

Mindshare comparison

Atos DirX Directory and CyberArk Privileged Access Manager aren’t in the same category and serve different purposes. Atos DirX Directory is designed for Application Infrastructure and holds a mindshare of 1.2%, up 0.5% compared to last year.
CyberArk Privileged Access Manager, on the other hand, focuses on Privileged Access Management (PAM), holds 10.4% mindshare, down 18.5% since last year.
Application Infrastructure Mindshare Distribution
ProductMindshare (%)
Atos DirX Directory1.2%
Apache Web Server8.5%
NGINX Plus7.9%
Other82.4%
Application Infrastructure
Privileged Access Management (PAM) Mindshare Distribution
ProductMindshare (%)
CyberArk Privileged Access Manager10.4%
Delinea Secret Server4.5%
One Identity Safeguard4.4%
Other80.7%
Privileged Access Management (PAM)
 

Featured Reviews

EH
Head of Sales and Business Development at Axalon GmbH
Flexible with high performance and good reliability
The solution scales well. As an example, there has been an American telecom service provider that had 20 million users, and the data of those user profiles had been stored on Dirx Directory, and they don't have any issues in retrieving the data and using it for any kind of services. Regarding our clients, the amount of users depends on if you have end users that don't really use this Directory or not. They are stored in this Directory and make use of the services that are administered via this Directory. There we are talking about millions. Then, you have administrators who configure the Directory and there we're talking about, let's say, hundreds of users.
Atul-Gujar - PeerSpot reviewer
CyberArk manager at a comms service provider with 10,001+ employees
Secures critical infrastructures with essential user session audit records
A potential area for improvement is enhancing support for cluster environments and distributed Vaults. Clients in multiple countries that need central access have different challenges that require better solutions from CyberArk. For financial services, CyberArk can improve incident response by ensuring fast support for critical priority tickets to meet compliance requirements. Providing more documentation on CyberArk is recommended for new team members to enhance their troubleshooting capabilities. I understand it's up to the client, but 99% fail to change the demo key, so it's crucial for CyberArk to emphasize changing the key and documenting it as part of the installation process.

Quotes from Members

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
 

Pros

"The flexibility of the product."
"DirX Directory is the best feature of the product: a very fast, stable LDAP directory."
"The solution is extremely stable; typically if you don't change the setup, the configuration, or anything, it will be running for decades and nothing will happen as an issue."
"DirX Directory is the best feature of the product: a very fast, stable LDAP directory."
"The role and attribute-based access control has been greatly improved."
"The solution offers high performance."
"The most valuable feature is its knowledge."
"Since then, CyberArk's Privileged Access Management is still our central solution for the entire estate, including all our servers (Windows/Unix), databases, devices, and so on, with around 5,000 to 8,000 users globally."
"Within the solution, I love the fact that everything is recorded. The configuration capabilities are great, too."
"I help implement and train others on how to use it in a highly secure environment."
"BeyondTrust and ARCOS were introduced in market at that time; these tools are good but do not seem to be as user friendly as CyberArk PAM, which is more convenient in installing and deployment and easier to customize as per client requirement."
"We have been able to really transform how all of our sysadmins manage all our infrastructure."
"CyberArk PAS is our go-to solution for securing against the pass the hash attack vector and auditing privileged account usage."
"I haven't really thought about anything that I want to use it for, that I couldn't use it for."
"CyberArk has helped us to identify, store, protect, and monitor the usage of privileged accounts."
 

Cons

"The user interface could be more convenient for people that don't know the tool too intensively."
"The Self-Service Portal is old school and it lacks easy accessibility for users."
"The user interface could be more convenient for people that don't know the tool too intensively."
"The price could be better. It would be better if they developed a better endpoint solution in the next release."
"The Self-Service Portal is old school and it lacks easy accessibility for users."
"An overall modernization of the product is required in order to keep up with newer products."
"The product provides an excellent framework but could use some polish on the front end to reduce the amount of configuration required for basic tasks."
"Needs more available consultants and implementation partners."
"The reporting should be improved. There should be more customization. The report should show how we are going to mitigate the risk because we cannot show the system environment to each and every auditor."
"The web interface has come a long way, but the PrivateArk client seems clunky and not intuitive. It could use an update to be brought up to speed with the usability of PVWA."
"The stability depends on the infrastructure it is installed on, which is important because CyberArk does not have the hardware appliance."
"The solution is too complicated to use and should be simplified. It took me a long time to understand how to use it."
"The deployment architecture, the ability to locate and change credentials and the stability need to be improved."
"The solution is too complicated to use and should be simplified. It took me a long time to understand how to use it. There is a lot that the solution can improve for the future."
"The admin interface of the Password Vault Web Access (PVWA) is moving from an old style (the classic interface) to a new style (the v10 interface) and unfortunately, this process is quite slow."
"Sometimes, they are a hindrance, when you know you have been through the issue again, and they want to gather the same log files, start from the basics, and we already know we are past that."
 

Pricing and Cost Advice

"The price could be better."
"I would rate the tool’s pricing a six out of ten."
"CyberArk is good at what they do, and the price reflects that. You have to pay the price for the same."
"The solution is available at a high price"
"Although CyberArk Privileged Access Management is expensive, its protection capabilities outweigh the cost."
"I rate the tool's pricing an eight out of ten."
"Pricing is quite high and it could be improved."
"The pricing is slightly higher compared to other solutions, but it is reasonable because there are better security features."
"I'm aware that the organization had purchased licensing for almost all of CyberArk's solutions including licensing for PTA, EPM, and the Application Identity Manager. But when it comes to PSM, this is one of the components where there's an additional charge for any extra PSMs that you want to deploy. I believe that there's some rider where the vendor has a bit of leeway to, at times, charge a premium on whatever additional services you may require above the board."
report
Use our free recommendation engine to learn which Application Infrastructure solutions are best for your needs.
893,311 professionals have used our research since 2012.
 

Top Industries

By visitors reading reviews
Manufacturing Company
15%
Government
10%
Comms Service Provider
8%
Construction Company
8%
Financial Services Firm
13%
Manufacturing Company
11%
Computer Software Company
7%
Comms Service Provider
6%
 

Company Size

By reviewers
Large Enterprise
Midsize Enterprise
Small Business
No data available
By reviewers
Company SizeCount
Small Business59
Midsize Enterprise42
Large Enterprise174
 

Questions from the Community

Ask a question
Earn 20 points
How does Sailpoint IdentityIQ compare with CyberArk PAM?
We evaluated Sailpoint IdentityIQ before ultimately choosing CyberArk. Sailpoint Identity Platform is a solution to manage risks in cloud enterprise environments. It automates and streamlines the m...
What do you like most about CyberArk Privileged Access Manager?
The most valuable features of the solution are control and analytics.
What is your experience regarding pricing and costs for CyberArk Privileged Access Manager?
My thoughts on the pricing of CyberArk Privileged Access Manager depend entirely on the vendors' requirements. If they want their things to be secure, they have to spend accordingly. We have four t...
 

Also Known As

DirX Directory
CyberArk Privileged Access Security, CyberArk Enterprise Password Vault
 

Overview

 

Sample Customers

National Savings and Investments, Vehicle and Operator Services Agency
Rockwell Automation
Find out what your peers are saying about Microsoft, IBM, F5 and others in Application Infrastructure. Updated: April 2026.
893,311 professionals have used our research since 2012.