Try our new research platform with insights from 80,000+ expert users

AWS Secrets Manager vs CyberArk Identity comparison

 

Comparison Buyer's Guide

Executive SummaryUpdated on Dec 16, 2024

Review summaries and opinions

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
 

Categories and Ranking

AWS Secrets Manager
Ranking in Enterprise Password Managers
3rd
Average Rating
8.8
Reviews Sentiment
7.1
Number of Reviews
15
Ranking in other categories
No ranking in other categories
CyberArk Identity
Ranking in Enterprise Password Managers
8th
Average Rating
8.2
Reviews Sentiment
7.1
Number of Reviews
24
Ranking in other categories
Authentication Systems (9th), Identity Management (IM) (9th), Authorization Software (3rd), User Entity Behavior Analytics (UEBA) (9th), Access Management (5th), Active Directory Management (8th), Cloud Resource Access Management (3rd), Customer Identity and Access Management (CIAM) (7th)
 

Mindshare comparison

As of August 2025, in the Enterprise Password Managers category, the mindshare of AWS Secrets Manager is 17.2%, down from 21.1% compared to the previous year. The mindshare of CyberArk Identity is 1.1%, up from 0.8% compared to the previous year. It is calculated based on PeerSpot user engagement data.
Enterprise Password Managers
 

Featured Reviews

Mahadev Metre - PeerSpot reviewer
Consistent security and efficiency improvements optimize IT infrastructure with effective management
When creating AWS Secrets Manager, it should be automated using tools such as Terraform, Puppet, or Ansible. With Terraform code, you specify the encryption key, secret name, rotation policy, and secret replication. Human error occurs when feeding secret values manually, especially with large amounts of secrets to input. Secrets should never be protected only by IAM. They should be protected by multiple layers, such as IAM and one or two KMS keys. Additional security measures could be beneficial if necessary. The rotation policy is crucial because some secrets may become obsolete, require updates, or get compromised. With a weekly rotation policy, if unauthorized access occurs, the exposure is limited to seven days. The rotation policy can be customized according to needs.
Julio Montero - PeerSpot reviewer
Access management system provides strong security and effortless user authentication
The solution can be deployed on cloud or on-premises. CyberArk is more on the cloud than on local hardware. The deployment is initially quite difficult. That said, when you are doing the implementation of CyberArk, there are so many tutorials that make the learning process very easy. The only complaint could be the language barrier. It's difficult if you don't have a very good level of English. Otherwise, it is very easy. You can have it set up within three months without much difficulty. It's hard to get started, however, once you get going, it gets easier. A full deployment takes half a year or less. There is some maintenance necessary. A company is constantly hiring and letting go of employees. The access is always changing, so access must always be adjusted. Or, if we need another law of filter, we would need to add those, or even take them away. That's another aspect of maintenance.

Quotes from Members

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
 

Pros

"The solution is very scalable."
"The most valuable feature is usability, as it is quite user-friendly."
"The most valuable feature is the management of credentials."
"The API is fine and works well."
"I would highly recommend AWS Secrets Manager for secret management in AWS."
"AWS Secrets Manager plays a significant role in optimizing IT infrastructure security and efficiency."
"Secrets Manager helps in retrieving the enrollment variables used by the code."
"The most valuable feature of AWS Secrets Manager is its seamless integration with various AWS services."
"The most valuable features of CyberArk Identity are its ability to control access to administrative staff."
"I like the RBAC (Role-Based Access Control). It basically involves defining various roles, and then simply assigning those roles to users."
"CyberArk Identity is a mature product."
"The solution helps with auditing, and monitoring, and integrates with Splunk for log analysis. User activity logs are captured in CyberArk Identity and sent to external tools like Splunk for analysis and monitoring."
"The most valuable feature of CyberArk Identity is the adaptive interface."
"The tool helps with authentication. It acts as an MFA for any kind of privileged access that occurs in our organization."
"I found the solution to be stable."
"The initial setup of CyberArk Identity was straightforward."
 

Cons

"If you add one more layer of security to AWS Secrets Manager, even the programmer will not be able to see the secrets."
"AWS Secrets Manager could support hybrid infrastructure."
"It would be good if the AWS Secrets Manager were more customizable."
"An area for improvement in AWS Secrets Manager could be expanding integration options beyond AWS services."
"There is a potential improvement in connecting AWS Secrets Manager to Jenkins CI/CD pipeline to automatically reflect changes in production."
"The sidecar feature has room for improvement."
"The solution's initial setup process is complicated."
"If you don't have enterprise support, then you will not be able to get through to them to get the help. It is not only applicable to AWS Secrets Manager. It is also applicable to any service on AWS."
"There is room for improvement in documentation. The documentation could be more specific about the changes needed to achieve specific goals."
"To enhance the product, they can consider improving the user interface of the software and possibly the customer support team. Sometimes, there is a delay in handling my inquiries via email, which could be addressed for better service."
"One area for improvement is the complexity of the learning curve for new users."
"The user interface could be improved."
"We would like to see an improvement in the ability to manage mobile devices."
"At the moment CyberArk needs to enrich Conjur and it needs to be made more viable so that its adoption can be made much faster."
"CyberArk Identity could improve by having the ability to better manage the network, such as Cisco. There seem to be some issues in this area."
"The product is not cheap, especially if you opt for an on-premise deployment requiring a complex server infrastructure. On the other hand, choosing the software as a service version simplifies infrastructure requirements but necessitates being online all the time."
 

Pricing and Cost Advice

"The cost is somewhat high."
"We've observed that AWS Secrets Manager pricing is based on a per-secret-per-month model. As a result, we prefer to divide our secrets into individual pieces to increase security and grant specific access permissions to certain secrets, systems, or individuals. However, this approach results in higher costs. Therefore, we have been exploring ways to combine our secrets into groups to reduce expenses and simplify management. Nonetheless, we acknowledge that this issue may not be related to the secret manager's functionality."
"We purchase a monthly license for the product."
"The solution is expensive."
"I don't believe there is a license cost for the solution."
"Their pricing is obviously a lot higher than many vendors in the marketplace but their service is also unmatched."
"There could be some additional costs apart from the licensing costs of the solution when you want to develop connectors in CyberArk Identity."
"The pricing of CyberArk Identity is competitive."
"I would rate the tool’s pricing a seven out of ten. The product’s pricing is expensive and is on a yearly basis. You will need to pay around 10,000 GBP for 500 users."
"It's not that affordable compared to Delinea or other products. They're less expensive and allow more customization. For the cost, it is expensive."
"I think it is a fairly priced tool. I rate the tool between six and seven on a scale of one to ten where one is expensive, and ten is cheap."
"We find that the pricing and licensing of this solution is adequate, as compared to the other competitors in the market."
"In terms of pricing, BeyondTrust and CyberArk tend to be more expensive, with CyberArk receiving an eight out of ten, in this regard."
report
Use our free recommendation engine to learn which Enterprise Password Managers solutions are best for your needs.
864,574 professionals have used our research since 2012.
 

Top Industries

By visitors reading reviews
Computer Software Company
14%
Financial Services Firm
12%
Manufacturing Company
8%
Government
6%
Financial Services Firm
15%
Computer Software Company
12%
Manufacturing Company
11%
Healthcare Company
6%
 

Company Size

By reviewers
Large Enterprise
Midsize Enterprise
Small Business
 

Questions from the Community

Which is better - Azure Key Vault or AWS Secrets Manager?
Azure Key Vault is a SaaS solution. You can easily store passwords and secrets securely and encrypt them. Azure Key Vault is a great solution to ensure you are compliant with security and governanc...
Which is better - HashiCorp Vault or AWS Secrets Manager?
HashiCorp Vault was designed with your needs in mind. One of the features that makes this evident is its ability to work as both a cloud-agnostic and a multi-cloud solution. As a cloud-agnostic sol...
What do you like most about AWS Secrets Manager?
The most valuable feature of AWS Secrets Manager is its seamless integration with various AWS services.
What do you like most about CyberArk Identity?
The integration capabilities, ability to integrate CyberArk into the overall IBB strategy of our current clients.
What is your experience regarding pricing and costs for CyberArk Identity?
The pricing is acceptable. It is worth considering what we are protecting with the amount charged.
What needs improvement with CyberArk Identity?
Some areas experience slowness based on the workload. There's a need to enhance network performance despite the good user experience with access management.
 

Also Known As

No data available
Idaptive
 

Overview

 

Sample Customers

Autodesk, Clevy, Stackery
MLB, Citi, Pfizer, SulAmerica, GE Capital, Shiseido
Find out what your peers are saying about AWS Secrets Manager vs. CyberArk Identity and other solutions. Updated: July 2025.
864,574 professionals have used our research since 2012.