BeyondTrust DevOps Secrets Safe vs CyberArk Endpoint Privilege Manager comparison

Cancel
You must select at least 2 products to compare!
Comparison Buyer's Guide
Executive Summary

We performed a comparison between BeyondTrust DevOps Secrets Safe and CyberArk Endpoint Privilege Manager based on real PeerSpot user reviews.

Find out in this report how the two Privileged Access Management (PAM) solutions compare in terms of features, pricing, service and support, easy of deployment, and ROI.
To learn more, read our detailed BeyondTrust DevOps Secrets Safe vs. CyberArk Endpoint Privilege Manager Report (Updated: March 2024).
771,170 professionals have used our research since 2012.
Featured Review
Quotes From Members
We asked business professionals to review the solutions they use.
Here are some excerpts of what they said:
Pros
"DevOps Secrets Safe allows you to customize a lot of rules.""The local administrator can manage all the user's logins in one, simple, straight-away account access. Additionally, the solution is user-friendly.""The most valuable features of BeyondTrust DevOps Secrets Safe are the ease of use and the API is very nice. Additionally, the interface is very good between AD and Unix.""A sophisticated and mature solution."

More BeyondTrust DevOps Secrets Safe Pros →

"Users can scale the solution.""It has drastically reduced the attack surface for local administrative rights and the chance of escalation of privilege. We've removed, at this point, close to 98 percent of the local administrative accounts on workstations. If there were an incident, it would stop at that point and we'd be able to know.""The most valuable feature of the solution is its performance.""The product is very flexible""The most valuable feature is that their database is completely encrypted and protected with multiple layers.""The feature called PTA, which stands for Privileged Threat Analytics keeps track of what admins are doing and works with Centimeters. If something fishy is going on with a user's credentials, it alerts the security team so they can act fast. Plus, it automates stuff like resetting credentials or blocking users. So, if there's a potential hack, CyberArk can change passwords and lock out users in a snap. It also gives you a heads-up if anything unusual is going on with server activities, like someone creating new users with uncontrolled credentials.""You can use it to strip users of their local admin rights and, at the same time, elevate applications for them.""What sets CyberArk apart is its continuous innovation, staying ahead of the competition."

More CyberArk Endpoint Privilege Manager Pros →

Cons
"You need to improvise many of the customized rules, which can lead to some errors. BeyondTrust should reduce the error rate.""We had some issues with the solution and once we contacted support they eventually solved the problem. They could improve their response time.""The support for the solution is not very good, they could improve by being quicker.""The product contains some bugs."

More BeyondTrust DevOps Secrets Safe Cons →

"The product's threat protection and defense capabilities need enhancement.""The price of the product is an area of concern where improvements are required. The product's price should be made more flexible.""The turnaround time of the support team is an area of concern where improvements are required.""Performance could be better. We have a couple of problems with CyberArk right now. One of the problems is performance in our environment. Support also takes a long time to respond. If the user already has local admin rights, then I can't collect any events in the console from this device. There are also some options in CyberArk that are not working properly, and are not helpful in this case. I can't collect any information to create a proper policy for the device. I have to investigate everything manually, or even disable the local admin from the device. I can collect the events only after this, and it's very time consuming. In my case, it's a waste of resources.""It is hard to deal with technical support if you are not certified.""The installation process is pretty difficult.""The tool should be more user-friendly.""The product needs a streamlined user interface; improvements to the user interface can enhance user experience and make the solution more intuitive to navigate."

More CyberArk Endpoint Privilege Manager Cons →

Pricing and Cost Advice
  • "There is an annual license required to use BeyondTrust DevOps Secrets Safe."
  • More BeyondTrust DevOps Secrets Safe Pricing and Cost Advice →

  • "licensing for this solution is based on the number of APV (privileged users), and the number of sessions that you want to record."
  • "I think that it was in the range of $200,000 that had to get approved."
  • "Pricing depends on how many devices you use. Right now, on-premise, it costs us a little, but it's worth it. It seems like the cloud solution is much more expensive. We got this solution one year ago, and it's like we bought the solution, and now they are not going to support it on-premise anymore. We are in the implementation phase, and we missed this, and we already paid for the licenses. This is wasted time from my perspective, and CyberArk should be more customer-friendly."
  • "The cost for CyberArk is very high."
  • "The price of CyberArk Endpoint Privilege Manager is expensive."
  • "The price of CyberArk Endpoint Privilege Manager is expensive. The solution is priced based on the number of accounts onboarded and the number of concurrent sessions. Everyone else is included in the price, such as support."
  • "We pay about $17 per user."
  • "CyberArk Endpoint Privilege Manager has a very high price, so it's a one out of ten for me in terms of pricing."
  • More CyberArk Endpoint Privilege Manager Pricing and Cost Advice →

    report
    Use our free recommendation engine to learn which Privileged Access Management (PAM) solutions are best for your needs.
    771,170 professionals have used our research since 2012.
    Questions from the Community
    Top Answer:The most valuable features of BeyondTrust DevOps Secrets Safe are the ease of use and the API is very nice. Additionally, the interface is very good between AD and Unix.
    Top Answer:There are still some bugs in the solution but a lot less than there used to be. Unfortunately, CyberArk and BeyondTrust are in fierce competition. Many customers have already adopted CyberArk, but… more »
    Top Answer:My advice to those wanting to implement BeyondTrust DevOps Secrets Safe is for them to plan it very well before making a decision. If they are changing from another solution to BeyondTrust DevOps… more »
    Top Answer:This is an inside-out --- outside-in --- inside-in question, as an insider can be an outsider as well. There is no short answer other than a blend of a PAM tool with Behavioral Analytics and Endpoint… more »
    Top Answer:The most valuable feature of the solution is its performance.
    Ranking
    Views
    97
    Comparisons
    68
    Reviews
    1
    Average Words per Review
    524
    Rating
    8.0
    Views
    1,604
    Comparisons
    1,084
    Reviews
    15
    Average Words per Review
    601
    Rating
    8.0
    Comparisons
    Also Known As
    Viewfinity
    Learn More
    Overview

    DevOps Secrets Safe is a highly scalable solution that adapts to the speed and agility required in dynamic DevOps workflows. It will help organizations limit the risk associated with substantial unmanaged privileged credentials and secrets without causing friction in highly dynamic environments such as DevOps.

    CyberArk Endpoint Privilege Manager, a critical and foundational endpoint control addresses the underlying weaknesses of endpoint defenses against a privileged attacker and helps enterprises defend against these attacks through removing local admin rights, enforcing least privilege, and implementing foundational endpoint security controls across all Windows, macOS and Linux endpoints from hybrid to cloud environments.

    Click here for a free 30 day trial: CyberArk Endpoint Privilege Manager free trial

    Sample Customers
    Starbucks, Ebay, CSC, RBC, Williams-Sonoma, Carbonite
    Top Industries
    VISITORS READING REVIEWS
    Financial Services Firm45%
    Computer Software Company10%
    Healthcare Company7%
    Engineering Company6%
    REVIEWERS
    Computer Software Company38%
    Manufacturing Company15%
    Comms Service Provider15%
    Wholesaler/Distributor8%
    VISITORS READING REVIEWS
    Computer Software Company14%
    Financial Services Firm14%
    Manufacturing Company10%
    Government8%
    Company Size
    VISITORS READING REVIEWS
    Small Business12%
    Midsize Enterprise15%
    Large Enterprise73%
    REVIEWERS
    Small Business41%
    Midsize Enterprise22%
    Large Enterprise38%
    VISITORS READING REVIEWS
    Small Business18%
    Midsize Enterprise13%
    Large Enterprise70%
    Buyer's Guide
    BeyondTrust DevOps Secrets Safe vs. CyberArk Endpoint Privilege Manager
    March 2024
    Find out what your peers are saying about BeyondTrust DevOps Secrets Safe vs. CyberArk Endpoint Privilege Manager and other solutions. Updated: March 2024.
    771,170 professionals have used our research since 2012.

    BeyondTrust DevOps Secrets Safe is ranked 19th in Privileged Access Management (PAM) with 4 reviews while CyberArk Endpoint Privilege Manager is ranked 6th in Privileged Access Management (PAM) with 28 reviews. BeyondTrust DevOps Secrets Safe is rated 7.6, while CyberArk Endpoint Privilege Manager is rated 8.2. The top reviewer of BeyondTrust DevOps Secrets Safe writes "Integrates well between AD and Unix, scalable, and easy to use". On the other hand, the top reviewer of CyberArk Endpoint Privilege Manager writes "Offers integrated solutions and expands its capabilities through strategic acquisitions". BeyondTrust DevOps Secrets Safe is most compared with HashiCorp Vault, BeyondTrust Password Safe, Delinea Secret Server and Azure Key Vault, whereas CyberArk Endpoint Privilege Manager is most compared with BeyondTrust Endpoint Privilege Management, Microsoft Defender for Endpoint, CrowdStrike Falcon, CyberArk Privileged Access Manager and Tanium. See our BeyondTrust DevOps Secrets Safe vs. CyberArk Endpoint Privilege Manager report.

    See our list of best Privileged Access Management (PAM) vendors.

    We monitor all Privileged Access Management (PAM) reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.