Try our new research platform with insights from 80,000+ expert users

BeyondTrust DevOps Secrets Safe vs CyberArk Endpoint Privilege Manager comparison

 

Comparison Buyer's Guide

Executive SummaryUpdated on Oct 6, 2024

Review summaries and opinions

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
 

Categories and Ranking

BeyondTrust DevOps Secrets ...
Ranking in Privileged Access Management (PAM)
42nd
Average Rating
7.6
Reviews Sentiment
6.6
Number of Reviews
4
Ranking in other categories
Enterprise Password Managers (26th)
CyberArk Endpoint Privilege...
Ranking in Privileged Access Management (PAM)
3rd
Average Rating
8.2
Reviews Sentiment
6.8
Number of Reviews
38
Ranking in other categories
Endpoint Compliance (5th), Anti-Malware Tools (5th), Application Control (5th), Ransomware Protection (5th)
 

Mindshare comparison

As of October 2025, in the Privileged Access Management (PAM) category, the mindshare of BeyondTrust DevOps Secrets Safe is 0.6%, up from 0.3% compared to the previous year. The mindshare of CyberArk Endpoint Privilege Manager is 3.2%, down from 3.6% compared to the previous year. It is calculated based on PeerSpot user engagement data.
Privileged Access Management (PAM) Market Share Distribution
ProductMarket Share (%)
CyberArk Endpoint Privilege Manager3.2%
BeyondTrust DevOps Secrets Safe0.6%
Other96.2%
Privileged Access Management (PAM)
 

Featured Reviews

Stephen Hui - PeerSpot reviewer
Has all necessary functionalities, is sophisticated and mature; still contains some bugs
There are still some bugs in the solution but a lot less than there used to be. Unfortunately, CyberArk and BeyondTrust are in fierce competition. Many customers have already adopted CyberArk, but they need a proven remote access solution and are likely to go with BeyondTrust. Both solutions can be used, it's just more work for IT to manage them. CyberArk is still leading the market share globally, and BeyondTrust is always classified second, followed by Delinea or Thycotic.
Sumit Chavan - PeerSpot reviewer
Helps secure the infrastructure and control users with admin rights
There are many features that are currently missing. A customization option is required for certain policies. For instance, if we need to stop PowerShell scripting, we have to create a different policy for that. Being able to create a sub-level policy within a top-level policy would be good. Currently, no user-based policy option is available inside the EPM console. We can only create computer-based policies. The database is available, but there is a drawback in not being able to create local groups on the EPM console. We only have to depend on Active Directory. This limits infrastructure security as we depend on the Active Directory team to manage user groups. If they remove any users, we lose control. If we could create groups locally and block them or set specific policies, we would have more control. Local endpoint management is missing from the EPM site. Moreover, there is an issue with policies not running as expected when we make enhancements. We have to find multiple ways to whitelist applications or enhance policies.

Quotes from Members

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
 

Pros

"A sophisticated and mature solution."
"DevOps Secrets Safe allows you to customize a lot of rules."
"The most valuable features of BeyondTrust DevOps Secrets Safe are the ease of use and the API is very nice. Additionally, the interface is very good between AD and Unix."
"The local administrator can manage all the user's logins in one, simple, straight-away account access. Additionally, the solution is user-friendly."
"I am impressed with the product's seamless integration. The PAM wallet and enterprise password wallet are good also good."
"CyberArk Endpoint Privilege Manager is entirely cloud-based, so no further upkeep is required."
"It allows whitelisting."
"Our setup process is moving to the cloud, which is very good. It reduces complexity."
"The feature called PTA, which stands for Privileged Threat Analytics keeps track of what admins are doing and works with Centimeters. If something fishy is going on with a user's credentials, it alerts the security team so they can act fast. Plus, it automates stuff like resetting credentials or blocking users. So, if there's a potential hack, CyberArk can change passwords and lock out users in a snap. It also gives you a heads-up if anything unusual is going on with server activities, like someone creating new users with uncontrolled credentials."
"The password rotation and the session recording are the most valuable features."
"We did immediately begin to see results when using CyberArk."
"I like that you can remove the admin rights from the user's computer and have control over the environment. That means you can delete the local admins and grant them proper privileges with the console. So, they will get proper permissions for applications they need, but we don't have to do it. In the domain where we don't have control, the user can only do specified actions, but not all of them."
 

Cons

"You need to improvise many of the customized rules, which can lead to some errors. BeyondTrust should reduce the error rate."
"The product contains some bugs."
"We had some issues with the solution and once we contacted support they eventually solved the problem. They could improve their response time."
"The support for the solution is not very good, they could improve by being quicker."
"CyberArk meets clients' need very spot-on. It covers everything customers ask for. As for improvements, honestly, the feedback's been really positive. I haven't heard any specific areas that need work."
"The solution's pricing could be better."
"Compared to other tools like Linux, this solution isn't as user-friendly."
"One area that has room for improvement is in managing the credentials for network devices."
"CyberArk Endpoint Privilege Manager could be improved by simplifying the administration process, specifically when setting up policies and applications."
"The price of the product is an area of concern where improvements are required. The product's price should be made more flexible."
"CyberArk should consider whitelisting important applications like PowerShell and DLL that are currently not allowed due to some malicious content."
"The tool should be more user-friendly."
 

Pricing and Cost Advice

"There is an annual license required to use BeyondTrust DevOps Secrets Safe."
"The professional services for one eight-hour day would be $1,800."
"Although I do not deal directly with the pricing, CyberArk Endpoint Privilege Manager is costly compared to other solutions. However, it offers beneficial features."
"The tool's pricing is reasonable for customers."
"I rate the solution's pricing an eight out of ten since the price can be too high for smaller businesses."
"Pricing depends on how many devices you use. Right now, on-premise, it costs us a little, but it's worth it. It seems like the cloud solution is much more expensive. We got this solution one year ago, and it's like we bought the solution, and now they are not going to support it on-premise anymore. We are in the implementation phase, and we missed this, and we already paid for the licenses. This is wasted time from my perspective, and CyberArk should be more customer-friendly."
"It's not at the lower end of the market. I think the price is reasonable considering the quality it delivers. It is a top-notch solution at a fair price point."
"CyberArk Endpoint Privilege Manager has a very high price, so it's a one out of ten for me in terms of pricing."
"It is an expensive solution."
report
Use our free recommendation engine to learn which Privileged Access Management (PAM) solutions are best for your needs.
869,202 professionals have used our research since 2012.
 

Top Industries

By visitors reading reviews
Financial Services Firm
35%
Retailer
12%
Computer Software Company
10%
Government
10%
Computer Software Company
14%
Financial Services Firm
14%
Manufacturing Company
11%
Government
8%
 

Company Size

By reviewers
Large Enterprise
Midsize Enterprise
Small Business
No data available
By reviewers
Company SizeCount
Small Business17
Midsize Enterprise9
Large Enterprise18
 

Questions from the Community

Ask a question
Earn 20 points
Looking for recommendations and a pros/cons template for software to detect insider threats
This is an inside-out --- outside-in --- inside-in question, as an insider can be an outsider as well. There is no short answer other than a blend of a PAM tool with Behavioral Analytics and Endpo...
What do you like most about CyberArk Endpoint Privilege Manager?
The most valuable feature of the solution is its performance.
What is your experience regarding pricing and costs for CyberArk Endpoint Privilege Manager?
I believe it's quite a reasonably priced solution. It's not very common to use CyberArk because it's a niche solution, but customers who are willing to control administrative accounts are willing t...
 

Also Known As

No data available
Viewfinity
 

Overview

 

Sample Customers

Starbucks, Ebay, CSC, RBC, Williams-Sonoma, Carbonite
Information Not Available
Find out what your peers are saying about BeyondTrust DevOps Secrets Safe vs. CyberArk Endpoint Privilege Manager and other solutions. Updated: September 2025.
869,202 professionals have used our research since 2012.