No more typing reviews! Try our Samantha, our new voice AI agent.

BeyondTrust Endpoint Privilege Management vs CyberArk Privileged Access Manager vs One Identity Safeguard comparison

 

Comparison Buyer's Guide

Executive Summary

Review summaries and opinions

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
 

ROI

Sentiment score
6.9
BeyondTrust Endpoint Privilege Management offers ROI through compliance, security, cost savings, and efficient PAM benefits on Microsoft Azure.
Sentiment score
6.6
CyberArk enhances security, reduces risks and costs, improves efficiency, and streamlines workflows, but ROI remains difficult to quantify.
Sentiment score
6.6
One Identity Safeguard delivers cost savings, enhanced security, and efficiency improvements, most effective for large organizations with local infrastructure.
Money saving is the main part because every organization tries to reduce their costs.
System Engineer at Corporate Projukti Limited
The return on investment lies in improved security infrastructure, addressing over-privileged access, and reducing the risk of credential compromise, which is a major source of data breaches.
Cyber Security Engineer at Isolutions Associates Ltd (ISOLS)
The end users have the authority to reconcile the password or verify it before using session isolation, which is one of the unique features that can be enabled through Privileged Session Manager, preventing any attacks from happening within the organization when connected with sessions through CyberArk Privileged Access Manager.
Senior Engineer at a tech vendor with 1,001-5,000 employees
CyberArk Privileged Access Manager has helped customers save on costs primarily by reducing the number of engineering and information security personnel.
Head of Sales Services Department at a comms service provider with 51-200 employees
I have seen a return on investment through reduced audit effort and fewer security incidents related to privileged access, along with significant time savings for IT and security teams by automating access control and password management.
office administrator at Gitarattan International Business School
Any PAM solution, when I deploy it well and customers use it, leads to a return on investment.
Consultant at a tech vendor with 11-50 employees
The pricing, costing, and licensing type is quite low compared to other products, so One Identity Safeguard is cheaper than other products.
Technical Consultant at ProTechmanize Solutions (P) Ltd.
 

Customer Service

Sentiment score
7.1
BeyondTrust Endpoint Privilege Management support is positively rated for expertise but could improve response times, especially in Pacific time.
Sentiment score
6.5
CyberArk Privileged Access Manager's customer service is knowledgeable but experiences delays and inconsistency in response times.
Sentiment score
6.5
One Identity Safeguard support is generally responsive, but some users face delays and find premium support lacking.
Support is critical, especially when challenges arise related to PAM.
Solution Architect at FVC
They offer support around the clock, and responses are generally quick.
CEO at a non-tech company with 11-50 employees
BeyondTrust support is reliable.
System Engineer at Corporate Projukti Limited
CyberArk has been exceptional in coming back to us with immediate responses.
IT Cyber Security Lead at a mining and metals company with 1,001-5,000 employees
It could be forever until you talk to someone who knows what they are doing.
Senior PAM Consultant at iC Consult GmbH
Based on the issue resolution and support quality, I rate the support 10 out of 10.
Operation Specialists at a tech vendor with 10,001+ employees
I sometimes need escalations to reach expertise.
Consultant at a tech vendor with 11-50 employees
Sometimes, I get a very helpful response and they address issues on a call.
Systems Administrator at a university with 10,001+ employees
When I have day-to-day incidents and problems, the response is good enough in terms of time and quality.
Consultant at a outsourcing company with 5,001-10,000 employees
 

Scalability Issues

Sentiment score
7.3
BeyondTrust Endpoint Privilege Management scales effectively, supports large networks, and integrates easily, meeting enterprise-level needs efficiently.
Sentiment score
7.6
CyberArk Privileged Access Manager is scalable, supports diverse environments, but scaling decisions depend on licensing and proper planning.
Sentiment score
7.1
One Identity Safeguard is adaptable for enterprises, efficiently managing privileged access amid scalability challenges and complex cluster management.
The initial understanding of the environment is crucial, followed by a simple deployment process.
Solution Architect at FVC
The CPM can reportedly handle up to 50,000 accounts independently without issue.
Privileged Access Management Engineer at a hospitality company with 10,001+ employees
I would rate it a ten out of ten for scalability.
IT Cyber Security Lead at a mining and metals company with 1,001-5,000 employees
They had 40,000 passwords in this one safe, and it was saving the last ten iterations of each password object. That means they had 400,000 password objects in this safe. They exceeded the limit.
Senior PAM Consultant at iC Consult GmbH
The scalability of One Identity Safeguard is perfect, scoring ten out of ten.
Business Line Manager - IGA & PAM at a tech services company with 201-500 employees
We have a cluster of SPPs and a cluster of SPSs, and we can add a node to that cluster without much fuss.
Systems Administrator at a university with 10,001+ employees
I would rate it a nine out of ten for scalability.
Consultant at a outsourcing company with 5,001-10,000 employees
 

Stability Issues

Sentiment score
7.6
BeyondTrust Endpoint Privilege Management is stable and excels in cloud deployments, with minor configuration-related issues noted.
Sentiment score
7.7
CyberArk Privileged Access Manager is highly reliable and stable, with minor issues mainly from older versions or configurations.
Sentiment score
7.9
One Identity Safeguard is praised for stability, with occasional upgrade issues and minor bugs, receiving high dependability ratings.
The appliances are stable, and there are no significant issues with backups or recovery.
CEO at a non-tech company with 11-50 employees
BeyondTrust Endpoint Privilege Management is very easy to use; if you know the process of cybersecurity, you will not experience downtime.
Presales Engineer at SAUDI PARAMOUNT COMPUTER SYSTEMS
Proper fine-tuning and expertise ensure the product performs well.
Cybersecurity Specialist at a comms service provider with 5,001-10,000 employees
Overall, the stability of the solution is high.
Senior Cybersecurity Manager at a financial services firm with 10,001+ employees
It has a large customer base and positive feedback within my network.
Senior Manager at a energy/utilities company with 1,001-5,000 employees
I would rate it a nine out of ten for stability.
Consultant at a outsourcing company with 5,001-10,000 employees
In terms of stability, I rate One Identity Safeguard nine to ten out of ten.
Business Line Manager - IGA & PAM at a tech services company with 201-500 employees
One Identity Safeguard is very stable and can handle the workload easily; I have not seen any downtime.
office administrator at Gitarattan International Business School
 

Room For Improvement

BeyondTrust Endpoint Privilege Management needs UI enhancement, better OS integration, smoother deployment, improved support, and streamlined policy management.
CyberArk Privileged Access Manager needs improved navigation, reporting, automation, integration, platform compatibility, and pricing for enhanced user satisfaction.
One Identity Safeguard needs improved UI simplicity, setup ease, third-party integration, documentation, support, onboarding, and cost-effective scalability.
The ability to view recorded live sessions of specific users is a crucial benefit.
Solution Architect at FVC
There is a need for better MQ integration with DevOps and improvements in architecture.
CEO at a non-tech company with 11-50 employees
This product is highly ranked on Gartner, Peers, and other review sites.
System Engineer at Corporate Projukti Limited
They want everything to be on the cloud, but even in the SaaS version of CyberArk Privileged Access Manager, they need to deploy some servers on-premises.
Presales Engineer at a computer software company with 201-500 employees
We cannot generate a plug-in for web-based applications.
Contractor at a pharma/biotech company with 5,001-10,000 employees
If they want clients to move to the cloud, they need to support them in real-time.
Senior Manager at a consultancy with 11-50 employees
For some configurations on the SPS side, if I need to make changes, such as for DNS servers, I must redeploy the machine.
Consultant at a tech vendor with 11-50 employees
There are many steps. We are still in the onboarding phase, and it seems very manual.
Systems Administrator at a university with 10,001+ employees
Another area for improvement could be the threat detection capabilities, like those seen in other PAM vendors.
Consultant at a outsourcing company with 5,001-10,000 employees
 

Setup Cost

BeyondTrust Endpoint Privilege Management offers complex, competitive pricing with varying licensing models, recommended for negotiation and fixed-price deals.
CyberArk Privileged Access Manager is costly but valued for features and security, deemed worthwhile for large implementations.
One Identity Safeguard is priced higher, appreciated for its licensing model, and potentially cost-effective for large organizations.
If a solution fits a customer's budget, considerations must be made that it may not have all the features of more expensive solutions.
Solution Architect at FVC
CyberArk is expensive compared to other products I know.
Cybersecurity Specialist at a comms service provider with 5,001-10,000 employees
CyberArk is comparatively expensive compared to other PAM solutions, such as Delinea, especially during renewal.
Presales Engineer at a computer software company with 201-500 employees
CyberArk's SaaS solution is particularly expensive.
Senior Manager at a energy/utilities company with 1,001-5,000 employees
It is one of those where the more you buy, the cheaper it is.
Systems Administrator at a university with 10,001+ employees
It is cheaper than CyberArk.
Consultant at a outsourcing company with 5,001-10,000 employees
It is more expensive than Secret Server but way less expensive than CyberArk.
IAM Specialist
 

Valuable Features

BeyondTrust Endpoint Privilege Management enhances security with granular control, integration, and features like asset discovery and threat detection.
CyberArk Privileged Access Manager enhances security and efficiency with robust features, seamless integrations, and user-friendly, scalable architecture.
One Identity Safeguard enhances security with password management, session recording, user-friendly interface, and seamless multi-platform integration.
Another important aspect is the ability to move the solution to the cloud or install it on-premises, offering my customers flexibility.
CEO at a non-tech company with 11-50 employees
When any unauthorized user makes an attempt, it notifies the administrators.
System Engineer at Corporate Projukti Limited
For security purposes in BeyondTrust Endpoint Privilege Management, when employees are working in the system, we can make a recording of the video, showing the modifications and configurations they made, allowing us to see everything.
Presales Engineer at SAUDI PARAMOUNT COMPUTER SYSTEMS
CyberArk Privileged Access Manager helps ensure data privacy because we now know who is using which credentials and at what time.
Senior Cybersecurity Manager at a financial services firm with 10,001+ employees
It keeps a record of activities, allowing me to easily fetch screen recordings to detect any misuse and see who did what and what happened.
Senior Manager at a consultancy with 11-50 employees
It can integrate with Splunk, SNMP, and other solutions and technologies.
Technical Support Analyst at Capgemini
The auditing and approval mechanisms are features we did not have before and are greatly appreciated.
Systems Administrator at a university with 10,001+ employees
Automatic credential rotation helps our team by removing the need for manual changes to privileged passwords, reducing the risk of stale or shared credentials and ensuring that every access is controlled and compliant.
Technical Consultant at ProTechmanize Solutions (P) Ltd.
The password vault has been a game changer because it provides a secure and controlled way to store, manage, and rotate sensitive credentials without exposing them to users.
Developer Intern at Stealth
 

Mindshare comparison

As of April 2026, in the Privileged Access Management (PAM) category, the mindshare of BeyondTrust Endpoint Privilege Management is 2.9%, down from 4.0% compared to the previous year. The mindshare of CyberArk Privileged Access Manager is 11.4%, down from 19.6% compared to the previous year. The mindshare of One Identity Safeguard is 4.4%, up from 4.2% compared to the previous year. It is calculated based on PeerSpot user engagement data.
Privileged Access Management (PAM) Mindshare Distribution
ProductMindshare (%)
CyberArk Privileged Access Manager11.4%
One Identity Safeguard4.4%
BeyondTrust Endpoint Privilege Management2.9%
Other81.3%
Privileged Access Management (PAM)
 

Featured Reviews

Md Abdul Hakim - PeerSpot reviewer
System Engineer at Corporate Projukti Limited
Offers solid performance and user adaptability but needs better pricing options and local support
BeyondTrust is a strong, compliance-driven solution with excellent market recognition (Gartner, Peers, etc.), making it appealing for Bangladeshi enterprises. However, some key improvements could accelerate adoption: Areas for Improvement: Pricing & Local Affordability While the product’s capabilities justify its value, cost remains a barrier for many Bangladeshi organizations. Competitive pricing or regional discounts would make it more accessible. Local Support & Partnerships Currently, lack of local partners or trainers creates delays in support, implementation, and pricing negotiations. Establishing a Bangladesh-based support team or authorized resellers would improve responsiveness and trust. Enhanced Onboarding & Training Offering localized training programs (in Bengali/English) and documentation would help IT teams deploy and manage the solution more efficiently. Recommendations for Next Release: Introduce tiered pricing for emerging markets like Bangladesh. Develop a partner network in Bangladesh for faster service and sales. Add simplified dashboards for easier monitoring by non-technical staff. Final Note: BeyondTrust is already a top-tier PAM solution, but addressing these gaps would solidify its leadership in Bangladesh’s growing cybersecurity market.
Atul-Gujar - PeerSpot reviewer
CyberArk manager at a comms service provider with 10,001+ employees
Secures critical infrastructures with essential user session audit records
A potential area for improvement is enhancing support for cluster environments and distributed Vaults. Clients in multiple countries that need central access have different challenges that require better solutions from CyberArk. For financial services, CyberArk can improve incident response by ensuring fast support for critical priority tickets to meet compliance requirements. Providing more documentation on CyberArk is recommended for new team members to enhance their troubleshooting capabilities. I understand it's up to the client, but 99% fail to change the demo key, so it's crucial for CyberArk to emphasize changing the key and documenting it as part of the installation process.
ST
Senior Information Technology Consultant at Helse Nord IKT
Centralized privileged access has improved control and now supports secure vendor billing oversight
The transparent mode is a seamless approach when using it. We have some issues with it, but we are working on it to make it work for us. Managing remote access for privileged users with the secure remote access feature is both easy and hard depending on the scenario we face. We have some systems that are easy and take not even a minute to set up, while others take a bit longer. We are in the middle of integrating One Identity Safeguard with the IGA solution, Identity Manager. We have some A2A setups, but it is not optimal. We are using RPA for developers, not actually RPA accounts, but that is something we are working on. We are also using the service account password rotation on the asset to some degree, and we are exploring options there. For integrating One Identity Safeguard, figuring out how password rotation works is a bit difficult because we have to make custom integrations. After that, it was no problem really. For the A2A use, it is not as easy as using something like HashiCorp's password management tools. It is mostly for certain features in One Identity Safeguard that I would like some improvements. Some of the things you can do in entitlements, there is a lot you can do there, but not everything is optimal. You have to have duplicates of a lot of things to make it work the way you want.
report
Use our free recommendation engine to learn which Privileged Access Management (PAM) solutions are best for your needs.
885,667 professionals have used our research since 2012.
 

Top Industries

By visitors reading reviews
Financial Services Firm
17%
Manufacturing Company
9%
Government
8%
Comms Service Provider
7%
Financial Services Firm
13%
Manufacturing Company
10%
Computer Software Company
8%
Government
5%
University
11%
Computer Software Company
7%
Financial Services Firm
7%
Comms Service Provider
7%
 

Company Size

By reviewers
Large Enterprise
Midsize Enterprise
Small Business
By reviewers
Company SizeCount
Small Business15
Midsize Enterprise3
Large Enterprise15
By reviewers
Company SizeCount
Small Business59
Midsize Enterprise42
Large Enterprise174
By reviewers
Company SizeCount
Small Business42
Midsize Enterprise22
Large Enterprise22
 

Questions from the Community

Looking for recommendations and a pros/cons template for software to detect insider threats
This is an inside-out --- outside-in --- inside-in question, as an insider can be an outsider as well. There is no sh...
What is your experience regarding pricing and costs for BeyondTrust Endpoint Privilege Management?
BeyondTrust's pricing is premium but negotiable for Bangladesh. Expect 20-30% extra costs from currency/import factor...
What needs improvement with BeyondTrust Endpoint Privilege Management?
In future updates of BeyondTrust Endpoint Privilege Management, I would prefer to see features for Password Safe and ...
How does Sailpoint IdentityIQ compare with CyberArk PAM?
We evaluated Sailpoint IdentityIQ before ultimately choosing CyberArk. Sailpoint Identity Platform is a solution to m...
What do you like most about CyberArk Privileged Access Manager?
The most valuable features of the solution are control and analytics.
What is your experience regarding pricing and costs for CyberArk Privileged Access Manager?
My thoughts on the pricing of CyberArk Privileged Access Manager depend entirely on the vendors' requirements. If the...
What is your experience regarding pricing and costs for One Identity Safeguard?
We have a separate department that studies setup costs for each product, but as far as my information goes, the prici...
What needs improvement with One Identity Safeguard?
The most common improvement needed is for upgrades. One Identity Safeguard's desktop client should have a faster and ...
What is your primary use case for One Identity Safeguard?
One Identity Safeguard serves as our Privileged Access Management solution to enforce session management for administ...
 

Also Known As

BeyondTrust PowerBroker, BeyondTrust Endpoint Privilege Management for Windows, BeyondTrust Endpoint Privilege Management for Mac, BeyondTrust Endpoint Privilege Management for Linux, BeyondTrust Endpoint Privilege Management for Unix, Avecto Defendpoint
CyberArk Privileged Access Security, CyberArk Enterprise Password Vault
No data available
 

Overview

 

Sample Customers

Aera Energy LLC, Care New England, James Madison University
Rockwell Automation
Cavium
Find out what your peers are saying about CyberArk, One Identity, Okta and others in Privileged Access Management (PAM). Updated: March 2026.
885,667 professionals have used our research since 2012.