No more typing reviews! Try our Samantha, our new voice AI agent.

BeyondTrust Endpoint Privilege Management vs CyberArk Privileged Access Manager vs One Identity Active Roles comparison

 

Comparison Buyer's Guide

Executive Summary

Review summaries and opinions

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
 

ROI

Sentiment score
6.9
BeyondTrust Endpoint Privilege Management offers ROI through compliance, security, cost savings, and efficient PAM benefits on Microsoft Azure.
Sentiment score
6.6
CyberArk enhances security, reduces risks and costs, improves efficiency, and streamlines workflows, but ROI remains difficult to quantify.
Sentiment score
5.3
One Identity Active Roles increases operational efficiency and security, reduces costs, and enhances user satisfaction with automation and data consistency.
Money saving is the main part because every organization tries to reduce their costs.
System Engineer at Corporate Projukti Limited
The return on investment lies in improved security infrastructure, addressing over-privileged access, and reducing the risk of credential compromise, which is a major source of data breaches.
Cyber Security Engineer at Isolutions Associates Ltd (ISOLS)
The end users have the authority to reconcile the password or verify it before using session isolation, which is one of the unique features that can be enabled through Privileged Session Manager, preventing any attacks from happening within the organization when connected with sessions through CyberArk Privileged Access Manager.
Senior Engineer at a tech vendor with 1,001-5,000 employees
CyberArk Privileged Access Manager has helped customers save on costs primarily by reducing the number of engineering and information security personnel.
Head of Sales Services Department at a comms service provider with 51-200 employees
One Identity Active Roles provides excellent reporting and auditing functionality, allowing administrators to track permissions, actions, and responsibilities effectively.
solution architect/ engineer at APEX.IT Sp. z o.o.
It has saved 90% of the time compared to before.
IAM Specialist
One Identity has a theme that they want the right people to have the right set of access, and this is what they are able to provide with their tool.
Assistant Manager- Pre-sales ( IT-Enterprise Vertical ) at a tech vendor with 201-500 employees
 

Customer Service

Sentiment score
7.1
BeyondTrust Endpoint Privilege Management support is positively rated for expertise but could improve response times, especially in Pacific time.
Sentiment score
6.5
CyberArk Privileged Access Manager's customer service is knowledgeable but experiences delays and inconsistency in response times.
Sentiment score
7.0
One Identity Active Roles is praised for excellent customer service, proactive communication, and comprehensive support despite occasional issues.
Support is critical, especially when challenges arise related to PAM.
Solution Architect at FVC
They offer support around the clock, and responses are generally quick.
CEO at a non-tech company with 11-50 employees
BeyondTrust support is reliable.
System Engineer at Corporate Projukti Limited
CyberArk has been exceptional in coming back to us with immediate responses.
IT Cyber Security Lead at a mining and metals company with 1,001-5,000 employees
It could be forever until you talk to someone who knows what they are doing.
Senior PAM Consultant at iC Consult GmbH
Based on the issue resolution and support quality, I rate the support 10 out of 10.
Operation Specialists at a tech vendor with 10,001+ employees
Everything is good, and I can give One Identity technical support a rating of ten.
Assistant Manager- Pre-sales ( IT-Enterprise Vertical ) at a tech vendor with 201-500 employees
They are knowledgeable, and the response time is low.
IT Infrastructure & Cloud Manager at Softcell Technologies Limited
The customer support of One Identity Active Roles is very good and helps to balance policy enforcement capabilities while improving my approval workflow.
Cybersecurity Consultant at CyberBackbone
 

Scalability Issues

Sentiment score
7.3
BeyondTrust Endpoint Privilege Management scales effectively, supports large networks, and integrates easily, meeting enterprise-level needs efficiently.
Sentiment score
7.6
CyberArk Privileged Access Manager is scalable, supports diverse environments, but scaling decisions depend on licensing and proper planning.
Sentiment score
6.9
One Identity Active Roles efficiently supports large-scale Active Directory environments with flexibility and high scalability ratings.
The initial understanding of the environment is crucial, followed by a simple deployment process.
Solution Architect at FVC
The CPM can reportedly handle up to 50,000 accounts independently without issue.
Privileged Access Management Engineer at a hospitality company with 10,001+ employees
I would rate it a ten out of ten for scalability.
IT Cyber Security Lead at a mining and metals company with 1,001-5,000 employees
They had 40,000 passwords in this one safe, and it was saving the last ten iterations of each password object. That means they had 400,000 password objects in this safe. They exceeded the limit.
Senior PAM Consultant at iC Consult GmbH
It is very beneficial for large and complex environments.
Team Lead, Technical & Enterprise Directory Services Vita Program at AIS Network
If you are a major enterprise customer, it is a matter of scaling out on resources with more memory, disk, and CPU power.
IAM Specialist
The solution is highly scalable, with a scalability rating of nine.
IAM Product owner at a hospitality company with 10,001+ employees
 

Stability Issues

Sentiment score
7.6
BeyondTrust Endpoint Privilege Management is stable and excels in cloud deployments, with minor configuration-related issues noted.
Sentiment score
7.7
CyberArk Privileged Access Manager is highly reliable and stable, with minor issues mainly from older versions or configurations.
Sentiment score
7.6
One Identity Active Roles offers stable, reliable performance with minimal glitches, excelling in automation and compliance, rated 8-10 by users.
The appliances are stable, and there are no significant issues with backups or recovery.
CEO at a non-tech company with 11-50 employees
BeyondTrust Endpoint Privilege Management is very easy to use; if you know the process of cybersecurity, you will not experience downtime.
Presales Engineer at SAUDI PARAMOUNT COMPUTER SYSTEMS
Proper fine-tuning and expertise ensure the product performs well.
Cybersecurity Specialist at a comms service provider with 5,001-10,000 employees
Overall, the stability of the solution is high.
Senior Cybersecurity Manager at a financial services firm with 10,001+ employees
It has a large customer base and positive feedback within my network.
Senior Manager at a energy/utilities company with 1,001-5,000 employees
There were no major problems with One Identity Active Roles.
solution architect/ engineer at APEX.IT Sp. z o.o.
One Identity Active Roles has had no downtime and no major reliability issues so far.
IT Infrastructure & Cloud Manager at Softcell Technologies Limited
Regarding stability, One Identity Active Roles is mostly stable.
Director, Identity & M365 Engineering at a healthcare company with 10,001+ employees
 

Room For Improvement

BeyondTrust Endpoint Privilege Management needs UI enhancement, better OS integration, smoother deployment, improved support, and streamlined policy management.
CyberArk Privileged Access Manager needs improved navigation, reporting, automation, integration, platform compatibility, and pricing for enhanced user satisfaction.
One Identity Active Roles requires streamlined setup, modernized UI, better documentation, lower pricing, improved cloud integration, and enhanced customization.
The ability to view recorded live sessions of specific users is a crucial benefit.
Solution Architect at FVC
There is a need for better MQ integration with DevOps and improvements in architecture.
CEO at a non-tech company with 11-50 employees
This product is highly ranked on Gartner, Peers, and other review sites.
System Engineer at Corporate Projukti Limited
They want everything to be on the cloud, but even in the SaaS version of CyberArk Privileged Access Manager, they need to deploy some servers on-premises.
Presales Engineer at a computer software company with 201-500 employees
We cannot generate a plug-in for web-based applications.
Contractor at a pharma/biotech company with 5,001-10,000 employees
If they want clients to move to the cloud, they need to support them in real-time.
Senior Manager at a consultancy with 11-50 employees
I also want One Identity Active Roles to improve in their policy configuration area, which requires advanced expertise, and in the area of reporting, I want the reporting to be more basic, visible, and have the ability to export and customize options.
Cybersecurity Consultant at CyberBackbone
The current REST API feels like an afterthought, and my developers want the ability to operate through CI/CD pipelines instead of logging into the GUI.
Identity and Access Management Specialist at a university with 10,001+ employees
A way to connect to various directories and integrate with cloud directories would be beneficial.
Team Lead, Technical & Enterprise Directory Services Vita Program at AIS Network
 

Setup Cost

BeyondTrust Endpoint Privilege Management offers complex, competitive pricing with varying licensing models, recommended for negotiation and fixed-price deals.
CyberArk Privileged Access Manager is costly but valued for features and security, deemed worthwhile for large implementations.
Enterprise buyers view One Identity Active Roles as expensive but justified by its ROI, efficiency, and flexible user-based licensing.
If a solution fits a customer's budget, considerations must be made that it may not have all the features of more expensive solutions.
Solution Architect at FVC
CyberArk is expensive compared to other products I know.
Cybersecurity Specialist at a comms service provider with 5,001-10,000 employees
CyberArk is comparatively expensive compared to other PAM solutions, such as Delinea, especially during renewal.
Presales Engineer at a computer software company with 201-500 employees
CyberArk's SaaS solution is particularly expensive.
Senior Manager at a energy/utilities company with 1,001-5,000 employees
It is quite expensive, costing more than 50 euros per identity.
solution architect/ engineer at APEX.IT Sp. z o.o.
I think our total was in the seven-figure range for a couple of years of service.
Director, Identity & M365 Engineering at a healthcare company with 10,001+ employees
The pricing is high.
Team Lead, Technical & Enterprise Directory Services Vita Program at AIS Network
 

Valuable Features

BeyondTrust Endpoint Privilege Management enhances security with granular control, integration, and features like asset discovery and threat detection.
CyberArk Privileged Access Manager enhances security and efficiency with robust features, seamless integrations, and user-friendly, scalable architecture.
One Identity Active Roles streamlines management and enhances security through automation, role-based access, dynamic groups, and compliance features.
Another important aspect is the ability to move the solution to the cloud or install it on-premises, offering my customers flexibility.
CEO at a non-tech company with 11-50 employees
When any unauthorized user makes an attempt, it notifies the administrators.
System Engineer at Corporate Projukti Limited
For security purposes in BeyondTrust Endpoint Privilege Management, when employees are working in the system, we can make a recording of the video, showing the modifications and configurations they made, allowing us to see everything.
Presales Engineer at SAUDI PARAMOUNT COMPUTER SYSTEMS
CyberArk Privileged Access Manager helps ensure data privacy because we now know who is using which credentials and at what time.
Senior Cybersecurity Manager at a financial services firm with 10,001+ employees
It keeps a record of activities, allowing me to easily fetch screen recordings to detect any misuse and see who did what and what happened.
Senior Manager at a consultancy with 11-50 employees
It can integrate with Splunk, SNMP, and other solutions and technologies.
Technical Support Analyst at Capgemini
It's improved our security posture. It has limited access to our crown jewels, where all our identities lie within Active Directory.
IAM Specialist
It helps in removing custom Active Directory delegation, which enhances security by eliminating unnecessary privileges, addressing identity-based breaches by reducing the number of Active Directory delegations.
Head of Global Digital Identity Services at a hospitality company with 10,001+ employees
Dynamic groups are also one of the best features, eliminating the need to add or manage members manually.
Technical Specialist at LSEG
 

Mindshare comparison

Privileged Access Management (PAM) Mindshare Distribution
ProductMindshare (%)
BeyondTrust Endpoint Privilege Management2.9%
CyberArk Privileged Access Manager11.4%
Delinea Secret Server4.9%
Other80.8%
Privileged Access Management (PAM)
Privileged Access Management (PAM) Mindshare Distribution
ProductMindshare (%)
CyberArk Privileged Access Manager11.4%
Delinea Secret Server4.9%
One Identity Safeguard4.4%
Other79.3%
Privileged Access Management (PAM)
Active Directory Management Mindshare Distribution
ProductMindshare (%)
One Identity Active Roles12.2%
ManageEngine ADManager Plus11.5%
Netwrix Auditor9.9%
Other66.4%
Active Directory Management
 

Featured Reviews

Md Abdul Hakim - PeerSpot reviewer
System Engineer at Corporate Projukti Limited
Offers solid performance and user adaptability but needs better pricing options and local support
BeyondTrust is a strong, compliance-driven solution with excellent market recognition (Gartner, Peers, etc.), making it appealing for Bangladeshi enterprises. However, some key improvements could accelerate adoption: Areas for Improvement: Pricing & Local Affordability While the product’s capabilities justify its value, cost remains a barrier for many Bangladeshi organizations. Competitive pricing or regional discounts would make it more accessible. Local Support & Partnerships Currently, lack of local partners or trainers creates delays in support, implementation, and pricing negotiations. Establishing a Bangladesh-based support team or authorized resellers would improve responsiveness and trust. Enhanced Onboarding & Training Offering localized training programs (in Bengali/English) and documentation would help IT teams deploy and manage the solution more efficiently. Recommendations for Next Release: Introduce tiered pricing for emerging markets like Bangladesh. Develop a partner network in Bangladesh for faster service and sales. Add simplified dashboards for easier monitoring by non-technical staff. Final Note: BeyondTrust is already a top-tier PAM solution, but addressing these gaps would solidify its leadership in Bangladesh’s growing cybersecurity market.
Atul-Gujar - PeerSpot reviewer
CyberArk manager at a comms service provider with 10,001+ employees
Secures critical infrastructures with essential user session audit records
A potential area for improvement is enhancing support for cluster environments and distributed Vaults. Clients in multiple countries that need central access have different challenges that require better solutions from CyberArk. For financial services, CyberArk can improve incident response by ensuring fast support for critical priority tickets to meet compliance requirements. Providing more documentation on CyberArk is recommended for new team members to enhance their troubleshooting capabilities. I understand it's up to the client, but 99% fail to change the demo key, so it's crucial for CyberArk to emphasize changing the key and documenting it as part of the installation process.
SN
Identity and Access Management Specialist at a university with 10,001+ employees
Governed access has transformed user management and now reduces internal attack surface
The crown jewels of One Identity Active Roles that make my life as an architect easier are Access Templates, Virtual Attributes, Workflow and Approval Engine, and Managed Units, which allowed us to structure our directory into a policy-driven asset rather than constantly firefighting manual errors. Access Templates and Managed Units are the real secret sauce of One Identity Active Roles for us. Access Templates standardize permission settings, reducing security drift and allowing for the creation of modular permission bundles such as those I created for the Tier 1 help desk. Managed Units help me stay organized without rewriting the physical structure of the directory, saving me hours of cleanup. A critical feature that I found essential for a clean environment is Dynamic Group management, which prevents permission creep by using rule-defined group memberships rather than manual additions. One Identity Active Roles automatically manages group membership based on rules tied to the HR records. One Identity Active Roles has had a transformative impact on my organization, moving from controlled chaos to governed operations. The biggest win has been a reduction in the internal attack surface, achieving over a 40% reduction in unauthorized or accidental access attempts.
report
Use our free recommendation engine to learn which Privileged Access Management (PAM) solutions are best for your needs.
885,667 professionals have used our research since 2012.
 

Top Industries

By visitors reading reviews
Financial Services Firm
17%
Manufacturing Company
9%
Government
8%
Comms Service Provider
7%
Financial Services Firm
13%
Manufacturing Company
10%
Computer Software Company
8%
Government
5%
Computer Software Company
9%
Financial Services Firm
8%
Manufacturing Company
8%
Healthcare Company
7%
 

Company Size

By reviewers
Large Enterprise
Midsize Enterprise
Small Business
By reviewers
Company SizeCount
Small Business15
Midsize Enterprise3
Large Enterprise15
By reviewers
Company SizeCount
Small Business59
Midsize Enterprise42
Large Enterprise174
By reviewers
Company SizeCount
Small Business21
Midsize Enterprise7
Large Enterprise21
 

Questions from the Community

Looking for recommendations and a pros/cons template for software to detect insider threats
This is an inside-out --- outside-in --- inside-in question, as an insider can be an outsider as well. There is no sh...
What is your experience regarding pricing and costs for BeyondTrust Endpoint Privilege Management?
BeyondTrust's pricing is premium but negotiable for Bangladesh. Expect 20-30% extra costs from currency/import factor...
What needs improvement with BeyondTrust Endpoint Privilege Management?
In future updates of BeyondTrust Endpoint Privilege Management, I would prefer to see features for Password Safe and ...
How does Sailpoint IdentityIQ compare with CyberArk PAM?
We evaluated Sailpoint IdentityIQ before ultimately choosing CyberArk. Sailpoint Identity Platform is a solution to m...
What do you like most about CyberArk Privileged Access Manager?
The most valuable features of the solution are control and analytics.
What is your experience regarding pricing and costs for CyberArk Privileged Access Manager?
My thoughts on the pricing of CyberArk Privileged Access Manager depend entirely on the vendors' requirements. If the...
What is your experience regarding pricing and costs for One Identity Active Roles?
I am aware of the pricing; it is on the expensive side, though pricing is not my department.
What needs improvement with One Identity Active Roles?
One Identity Active Roles can be improved by simplifying the setup process since a small team in a small business req...
What is your primary use case for One Identity Active Roles?
One Identity Active Roles is used primarily to simplify and automate Active Directory user and permission management....
 

Also Known As

BeyondTrust PowerBroker, BeyondTrust Endpoint Privilege Management for Windows, BeyondTrust Endpoint Privilege Management for Mac, BeyondTrust Endpoint Privilege Management for Linux, BeyondTrust Endpoint Privilege Management for Unix, Avecto Defendpoint
CyberArk Privileged Access Security, CyberArk Enterprise Password Vault
Quest Active Roles
 

Overview

 

Sample Customers

Aera Energy LLC, Care New England, James Madison University
Rockwell Automation
City of Frankfurt, Moore Public Schools, George Washington University, Transavia Airlines, Howard County, MD. See all stories at OneIdentity.com/casestudies
Find out what your peers are saying about CyberArk, One Identity, Okta and others in Privileged Access Management (PAM). Updated: March 2026.
885,667 professionals have used our research since 2012.