No more typing reviews! Try our Samantha, our new voice AI agent.

BeyondTrust DevOps Secrets Safe vs CyberArk Privileged Access Manager comparison

 

Comparison Buyer's Guide

Executive SummaryUpdated on Oct 6, 2024

Review summaries and opinions

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
 

Categories and Ranking

BeyondTrust DevOps Secrets ...
Ranking in Enterprise Password Managers
22nd
Ranking in Privileged Access Management (PAM)
39th
Average Rating
7.6
Reviews Sentiment
6.6
Number of Reviews
4
Ranking in other categories
Secrets Management Tools (7th)
CyberArk Privileged Access ...
Ranking in Enterprise Password Managers
3rd
Ranking in Privileged Access Management (PAM)
1st
Average Rating
8.6
Reviews Sentiment
6.8
Number of Reviews
230
Ranking in other categories
User Activity Monitoring (1st), Mainframe Security (1st), Operational Technology (OT) Security (3rd)
 

Mindshare comparison

As of May 2026, in the Privileged Access Management (PAM) category, the mindshare of BeyondTrust DevOps Secrets Safe is 1.1%, up from 0.3% compared to the previous year. The mindshare of CyberArk Privileged Access Manager is 10.4%, down from 18.5% compared to the previous year. It is calculated based on PeerSpot user engagement data.
Privileged Access Management (PAM) Mindshare Distribution
ProductMindshare (%)
CyberArk Privileged Access Manager10.4%
BeyondTrust DevOps Secrets Safe1.1%
Other88.5%
Privileged Access Management (PAM)
 

Featured Reviews

YB
Contractor at a financial services firm with 5,001-10,000 employees
Integrates well between AD and Unix, scalable, and easy to use
BeyondTrust DevOps Secrets Safe stability in the AD Bridge has been not good, we have had many issues. I recently received a new version a few weeks ago and it looks like they solved most of the problems. Some of the issues we had, lasted a very long time until they found a solution.
Atul-Gujar - PeerSpot reviewer
CyberArk manager at a comms service provider with 10,001+ employees
Secures critical infrastructures with essential user session audit records
A potential area for improvement is enhancing support for cluster environments and distributed Vaults. Clients in multiple countries that need central access have different challenges that require better solutions from CyberArk. For financial services, CyberArk can improve incident response by ensuring fast support for critical priority tickets to meet compliance requirements. Providing more documentation on CyberArk is recommended for new team members to enhance their troubleshooting capabilities. I understand it's up to the client, but 99% fail to change the demo key, so it's crucial for CyberArk to emphasize changing the key and documenting it as part of the installation process.

Quotes from Members

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
 

Pros

"The local administrator can manage all the user's logins in one, simple, straight-away account access, and the solution is user-friendly."
"They've done a great job implementing all possible features; it's the best tool there is and no competitors come close to the level of sophistication and maturity of the product."
"The most valuable features of BeyondTrust DevOps Secrets Safe are the ease of use and the API is very nice. Additionally, the interface is very good between AD and Unix."
"Secrets Safe is highly scalable without interruptions to the current infrastructure."
"BeyondTrust DevOps Secrets Safe has made companies a lot safer."
"A sophisticated and mature solution."
"DevOps Secrets Safe allows you to customize a lot of rules."
"The local administrator can manage all the user's logins in one, simple, straight-away account access. Additionally, the solution is user-friendly."
"There are two main ways CyberArk Privileged Access Manager Server Control has been helpful to us."
"I appreciate the ease of use for support analysts."
"The most valuable features of CyberArk Privileged Access Manager include quick access, ease of use, and a variety of connection methods beyond the web portal."
"What I found most valuable in CyberArk Privileged Access Manager is the Session Manager as it allows you to split the connection between the administrator site and the target site. I also found the Password Manager valuable as it lets you rotate the passwords of privileged users."
"It is one of the best solutions in the market. Ever since I started using this solution, there has not been any compromise when it comes to our lab."
"We could see the benefits of CyberArk Privileged Access Manager immediately after we deployed it and started using it."
"CyberArk's GUI is user friendly."
"The password rotation and cyber gateway have been quite useful."
 

Cons

"We had some issues with the solution and once we contacted support they eventually solved the problem. They could improve their response time."
"The product contains some bugs."
"The solution is relatively stable, but not all bugs have been fixed."
"You need to improvise many of the customized rules, which can lead to some errors. BeyondTrust should reduce the error rate."
"The support for the solution is not very good, they could improve by being quicker."
"The support for the solution is not very good, they could improve by being quicker."
"You need to improvise many of the customized rules, which can lead to some errors. BeyondTrust should reduce the error rate."
"BeyondTrust DevOps Secrets Safe stability in the AD Bridge has been not good, we have had many issues."
"CyberArk PAM is a very broad product as everyone's requirements for implementation are different. In our particular case, the initial implementation was planned and developed by people who didn't know our specific network requirements, so the initial implementation needed to be tweaked over time. While this is normal, at the time all these "major" changes required CyberArk professional services to come in-plant and "assist" with the changes."
"We require IAM (identify and access management) capability at the administrator level because we need more identification."
"The solution that they proposed was not straightforward because of the backend processes of CyberArk."
"They can do a better job in the PSM space."
"The current process for accessing RDP through the CyberArk or administrative portal involves downloading an RDP file. This is inconvenient for users and problematic due to security restrictions that prevent accessing servers via downloaded RDP files."
"When something comes out, it's generally airtight and works as advertised. However, sometimes they are a little bit slow to keep up with what's coming out. In 2017, for example, they released support for Windows Server 2016, which had been out for a year or so."
"Additionally, I think the user experience needs to improve."
"There were a lot of manual steps in the initial setup which could have been automated. I read the 10.4 release that was sent out about a month or two ago, and I saw the steps required for upgrade have been reduced by about 90%. That was a big thing for me, but I still haven't seen that yet because we have not upgrade past 9.9.5."
 

Pricing and Cost Advice

"There is an annual license required to use BeyondTrust DevOps Secrets Safe."
"CyberArk Privileged Access Manager is more expensive than its competitors, such as BeyondTrust, Delinea, and ManageEngine PAM360."
"I do not have any opinions to add about the pricing of the product."
"The cost is high compared to other products."
"CyberArk DNA is free if you purchase the CyberArk solution. There is no additional charge for CyberArk DNA, which is great."
"With reducing the privileged account access, there has been a huge improvement. They are now bringing more accounts on a little at a time."
"I focus more on the technical side, but I hear customers say that if CyberArk was more affordable, they might have acquired more licenses. Some clients consider alternative solutions due to pricing concerns."
"There are additional features added to our CyberArk Privileged Access Manager license. For example, features that allow us to integrate into various kinds of platforms."
"Pricing is quite high and it could be improved."
report
Use our free recommendation engine to learn which Privileged Access Management (PAM) solutions are best for your needs.
894,738 professionals have used our research since 2012.
 

Top Industries

By visitors reading reviews
Financial Services Firm
34%
Comms Service Provider
9%
Construction Company
8%
University
6%
Financial Services Firm
13%
Manufacturing Company
10%
Computer Software Company
7%
Comms Service Provider
6%
 

Company Size

By reviewers
Large Enterprise
Midsize Enterprise
Small Business
No data available
By reviewers
Company SizeCount
Small Business59
Midsize Enterprise42
Large Enterprise174
 

Questions from the Community

Ask a question
Earn 20 points
How does Sailpoint IdentityIQ compare with CyberArk PAM?
We evaluated Sailpoint IdentityIQ before ultimately choosing CyberArk. Sailpoint Identity Platform is a solution to manage risks in cloud enterprise environments. It automates and streamlines the m...
What do you like most about CyberArk Privileged Access Manager?
The most valuable features of the solution are control and analytics.
What is your experience regarding pricing and costs for CyberArk Privileged Access Manager?
My thoughts on the pricing of CyberArk Privileged Access Manager depend entirely on the vendors' requirements. If they want their things to be secure, they have to spend accordingly. We have four t...
 

Also Known As

No data available
CyberArk Privileged Access Security, CyberArk Enterprise Password Vault
 

Overview

 

Sample Customers

Starbucks, Ebay, CSC, RBC, Williams-Sonoma, Carbonite
Rockwell Automation
Find out what your peers are saying about BeyondTrust DevOps Secrets Safe vs. CyberArk Privileged Access Manager and other solutions. Updated: April 2026.
894,738 professionals have used our research since 2012.