Try our new research platform with insights from 80,000+ expert users

BeyondTrust DevOps Secrets Safe vs CyberArk Privileged Access Manager comparison

 

Comparison Buyer's Guide

Executive SummaryUpdated on Oct 6, 2024

Review summaries and opinions

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
 

Categories and Ranking

BeyondTrust DevOps Secrets ...
Ranking in Enterprise Password Managers
23rd
Ranking in Privileged Access Management (PAM)
42nd
Average Rating
7.6
Reviews Sentiment
6.6
Number of Reviews
4
Ranking in other categories
No ranking in other categories
CyberArk Privileged Access ...
Ranking in Enterprise Password Managers
2nd
Ranking in Privileged Access Management (PAM)
1st
Average Rating
8.6
Reviews Sentiment
6.8
Number of Reviews
225
Ranking in other categories
User Activity Monitoring (1st), Mainframe Security (2nd), Operational Technology (OT) Security (3rd)
 

Mindshare comparison

As of August 2025, in the Privileged Access Management (PAM) category, the mindshare of BeyondTrust DevOps Secrets Safe is 0.5%, up from 0.3% compared to the previous year. The mindshare of CyberArk Privileged Access Manager is 16.9%, down from 22.0% compared to the previous year. It is calculated based on PeerSpot user engagement data.
Privileged Access Management (PAM)
 

Featured Reviews

Stephen Hui - PeerSpot reviewer
Has all necessary functionalities, is sophisticated and mature; still contains some bugs
There are still some bugs in the solution but a lot less than there used to be. Unfortunately, CyberArk and BeyondTrust are in fierce competition. Many customers have already adopted CyberArk, but they need a proven remote access solution and are likely to go with BeyondTrust. Both solutions can be used, it's just more work for IT to manage them. CyberArk is still leading the market share globally, and BeyondTrust is always classified second, followed by Delinea or Thycotic.
Abdul Durrani - PeerSpot reviewer
Enables granular and secure access with just-in-time access and Zero Trust model
CyberArk provides a good amount of control over access types. However, as a future enhancement, having additional features for cross-platform integration would be beneficial. It would be good to have integrations with other tools and firewalls, such as Zscaler and CrowdStrike. Although I am not fully aware of recent updates, more cross-platform integration would be valuable. A SOC analyst would like to have centralized access in terms of information flowing in even for privileged access management. They would like to have control over everything instead of opening four to five tabs for different sorts of information. Cross-platform integration would help with that. Customers also want CyberArk's pricing to be better so that they can implement it further and have more licenses. Implementing a privileged access management solution can be challenging. It would be great if CyberArk could provide recommendations based on the compliance standards of an organization. It would help system admins ensure that all the required ports are closed and the systems are being managed properly. If any system is not being used anymore, any ports opened for that system need to be closed. Having such recommendations would be helpful.

Quotes from Members

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
 

Pros

"The most valuable features of BeyondTrust DevOps Secrets Safe are the ease of use and the API is very nice. Additionally, the interface is very good between AD and Unix."
"The local administrator can manage all the user's logins in one, simple, straight-away account access. Additionally, the solution is user-friendly."
"A sophisticated and mature solution."
"DevOps Secrets Safe allows you to customize a lot of rules."
"CyberArk has a lot of modules."
"It supports lots of requirements in the privileged access management area."
"For a while, there were individual IDs having privileged access. We wanted to restrict that. We implemented the solution so that it can be more of internal control. We can have session recordings happening and reduce our attacks."
"The best feature of CyberArk Privileged Access Manager is its core function: automatically managing and securing credentials."
"The flexibility of integrating with other technologies is important because of a lot of applications - a lot of COTS products - are not supported when we are bringing the application IDs. The CyberArk platform provides a lot of opportunities to do customization."
"On the customer accounts side, our account managers are responsive. If you ask them, they will get you whomever you need."
"The solution is very good for protecting full levels of data privacy."
"The features that are most effective, like every PAM solution, include monitoring and password rotations."
 

Cons

"The product contains some bugs."
"You need to improvise many of the customized rules, which can lead to some errors. BeyondTrust should reduce the error rate."
"We had some issues with the solution and once we contacted support they eventually solved the problem. They could improve their response time."
"The support for the solution is not very good, they could improve by being quicker."
"We found a lot of errors during the initial setup. They should work to improve the implementation experience and to remove errors from the process."
"Our DevOps team is looking in the direction of cloud, because we are not in it today. We are hoping to build it with Conjur from the ground up."
"There were a lot of manual steps in the initial setup which could have been automated. I read the 10.4 release that was sent out about a month or two ago, and I saw the steps required for upgrade have been reduced by about 90%. That was a big thing for me, but I still haven't seen that yet because we have not upgrade past 9.9.5."
"One area for improvement is the user interface. It needs significant enhancements."
"The solution should be able to mitigate internal threats"
"There is a little bit of confusion in the implementation part, especially when one tries to understand the actual working of the product."
"Improvements in CyberArk Privileged Access Manager should focus on simplifying installation and upgrade times, and also consider making professional services training more accessible to implementers and partners."
"The current interface doesn't scale that well, and has some screens still in the old layout."
 

Pricing and Cost Advice

"There is an annual license required to use BeyondTrust DevOps Secrets Safe."
"I do not have any opinions to add about the pricing of the product."
"The main problem for the tool is its licensing. I work for a really big company. When you try to develop this as a service, usually you work with leverage teams who are formed with dozens of members. You might dedicate one FTE, or less, for something, e.g., an antivirus administrator. You might have half an FTE's effort dedicated to administering the antivirus, but then you have a team of about 30 users who might access that ticket. The problem is that CyberArk eliminated the possibility of concurrent users years ago. This is a big problem for companies who work with leverage teams. You need to pay for everyone. 40 licenses are used by 20 or 30 people. This is a big problem because licenses are not precisely cheap."
"CyberArk is very expensive and there are additional fees for add-ons."
"It costs us around $200 per user."
"In comparison to other products on the market, CyberArk is a more costly product."
"The pricing for CyberArk Privileged Access Manager is quite expensive, and the pricing varies from region to region. In APAC, CyberArk Privileged Access Manager can be obtained for less than in North America, according to my understanding."
"CyberArk Privileged Access Manager is perceived to be somewhat overpriced compared to similar market products. It is a little bit overvalued. It could come down a little bit for my liking. However, the industry-leading reputation and the quality of service justify the high price point to some extent."
"CyberArk is good at what they do, and the price reflects that. You have to pay the price for the same."
report
Use our free recommendation engine to learn which Privileged Access Management (PAM) solutions are best for your needs.
864,574 professionals have used our research since 2012.
 

Top Industries

By visitors reading reviews
Financial Services Firm
33%
Computer Software Company
14%
Retailer
10%
Government
8%
Computer Software Company
15%
Financial Services Firm
15%
Manufacturing Company
9%
Government
6%
 

Company Size

By reviewers
Large Enterprise
Midsize Enterprise
Small Business
No data available
 

Questions from the Community

Ask a question
Earn 20 points
How does Sailpoint IdentityIQ compare with CyberArk PAM?
We evaluated Sailpoint IdentityIQ before ultimately choosing CyberArk. Sailpoint Identity Platform is a solution to manage risks in cloud enterprise environments. It automates and streamlines the m...
What do you like most about CyberArk Privileged Access Manager?
The most valuable features of the solution are control and analytics.
 

Also Known As

No data available
CyberArk Privileged Access Security, CyberArk Enterprise Password Vault
 

Overview

 

Sample Customers

Starbucks, Ebay, CSC, RBC, Williams-Sonoma, Carbonite
Rockwell Automation
Find out what your peers are saying about BeyondTrust DevOps Secrets Safe vs. CyberArk Privileged Access Manager and other solutions. Updated: July 2025.
864,574 professionals have used our research since 2012.