Try our new research platform with insights from 80,000+ expert users

BeyondTrust DevOps Secrets Safe vs CyberArk Secrets Management comparison

 

Comparison Buyer's Guide

Executive Summary

Review summaries and opinions

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
 

Categories and Ranking

BeyondTrust DevOps Secrets ...
Ranking in Enterprise Password Managers
23rd
Average Rating
7.6
Reviews Sentiment
6.6
Number of Reviews
4
Ranking in other categories
Privileged Access Management (PAM) (42nd)
CyberArk Secrets Management
Ranking in Enterprise Password Managers
16th
Average Rating
7.2
Reviews Sentiment
6.0
Number of Reviews
5
Ranking in other categories
Access Management (19th)
 

Featured Reviews

Stephen Hui - PeerSpot reviewer
Has all necessary functionalities, is sophisticated and mature; still contains some bugs
There are still some bugs in the solution but a lot less than there used to be. Unfortunately, CyberArk and BeyondTrust are in fierce competition. Many customers have already adopted CyberArk, but they need a proven remote access solution and are likely to go with BeyondTrust. Both solutions can be used, it's just more work for IT to manage them. CyberArk is still leading the market share globally, and BeyondTrust is always classified second, followed by Delinea or Thycotic.
RJ
Helps with compliance and improves operational flexibility
We have had both on-premises and SaaS models. The on-premise setup was a little difficult, but now that it has been moved to the SaaS model, everything is controlled by CyberArk. We just go and do our work. The initial on-premises setup took two weeks because it was an integrated effort. I had to spin up the servers and bring in the CyberArk Secrets Management resource to deploy the scripts. I then had to open networks and firewalls between CyberArk Secrets Management's on-premise servers and the application server. In the initial phase, it took two to three weeks, but it became easier when moving to the SaaS model. In terms of maintenance, it requires patching or upgrades, which happens one day in a month. If there is a failure, we have to roll back and try once again, which takes more time, but if everything goes smoothly, there is three to five hours of downtime.

Quotes from Members

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
 

Pros

"DevOps Secrets Safe allows you to customize a lot of rules."
"The most valuable features of BeyondTrust DevOps Secrets Safe are the ease of use and the API is very nice. Additionally, the interface is very good between AD and Unix."
"A sophisticated and mature solution."
"The local administrator can manage all the user's logins in one, simple, straight-away account access. Additionally, the solution is user-friendly."
"CyberArk Secrets Management is a critical solution for strengthening our security posture."
"The automatic rotation of the password is the top feature."
"One of the most important features for us is the system's performance, particularly its speed of retrieving secrets."
"With CyberArk Secrets Management, we were able to resolve the automatic change of the passwords based on timelines. We were also able to retrieve the passwords in an encrypted format by utilizing the CyberArk platform, which was not provided to us by UiPath."
"It's vital for effectively managing and securing my credentials."
"The audit trails have been extremely important for us in helping our organization meet regulatory requirements."
"The granular controls of CyberArk Secrets Management are very niche in their development and very secure from the overall secret management perspective, offering high-level functionalities where we have control over user access, which can be tracked and monitored."
"CyberArk's support team is knowledgeable and helpful, consistently responding on time."
 

Cons

"You need to improvise many of the customized rules, which can lead to some errors. BeyondTrust should reduce the error rate."
"We had some issues with the solution and once we contacted support they eventually solved the problem. They could improve their response time."
"The support for the solution is not very good, they could improve by being quicker."
"The product contains some bugs."
"There is room for improvement with better documentation and less need for CyberArk Secrets Management personnel to assist us with their presence."
"We did not have a good experience with technical support because their numerous processes caused delays in engaging, leading to project delays or issues with production."
"The password search feature and integration between different vaults could be enhanced. For instance, when updating passwords in both lower and higher environment vaults, improvement is required in search and upgrade functions."
"Improvements for CyberArk Secrets Management include enhanced documentation with more use cases and step-by-step integration guides."
"We occasionally experience incidents that delay password injection back into the script."
"Implementation was complex and required professional services."
"Implementing it and ensuring seamless password rotations present challenges."
 

Pricing and Cost Advice

"There is an annual license required to use BeyondTrust DevOps Secrets Safe."
"CyberArk Secrets Management has a moderate pricing structure based on a per-tenant licensing model rather than a per-user account model like their PAM solution."
"It is in the middle. It is neither very cheap nor very expensive, so I would place it in the middle."
report
Use our free recommendation engine to learn which Enterprise Password Managers solutions are best for your needs.
865,384 professionals have used our research since 2012.
 

Questions from the Community

Ask a question
Earn 20 points
What needs improvement with CyberArk Secrets Management?
The tool is very good, but the commercialized training, which is paid, could be improved. Regularizing those trainings as part of a global alliance between the customer, SI partner, and CyberArk wo...
What is your primary use case for CyberArk Secrets Management?
The main use case for CyberArk Secrets Management is application integrations and the CI and CD part. In CyberArk Secrets Management, there are a variety of tools that they cover, one being the Cre...
 

Overview

 

Sample Customers

Starbucks, Ebay, CSC, RBC, Williams-Sonoma, Carbonite
Information Not Available
Find out what your peers are saying about BeyondTrust DevOps Secrets Safe vs. CyberArk Secrets Management and other solutions. Updated: July 2025.
865,384 professionals have used our research since 2012.