


Find out what your peers are saying about CyberArk, One Identity, Okta and others in Privileged Access Management (PAM).
Money saving is the main part because every organization tries to reduce their costs.
The return on investment lies in improved security infrastructure, addressing over-privileged access, and reducing the risk of credential compromise, which is a major source of data breaches.
The end users have the authority to reconcile the password or verify it before using session isolation, which is one of the unique features that can be enabled through Privileged Session Manager, preventing any attacks from happening within the organization when connected with sessions through CyberArk Privileged Access Manager.
CyberArk Privileged Access Manager has helped customers save on costs primarily by reducing the number of engineering and information security personnel.
It is able to save time and money as everything is automated: user access provisioning, password policy management, and reporting.
Support is critical, especially when challenges arise related to PAM.
They offer support around the clock, and responses are generally quick.
BeyondTrust support is reliable.
CyberArk has been exceptional in coming back to us with immediate responses.
It could be forever until you talk to someone who knows what they are doing.
Based on the issue resolution and support quality, I rate the support 10 out of 10.
I do have dedicated support called the PUMA support, and they are providing excellent service.
The team is not very knowledgeable and takes too long to respond.
While they are familiar with me, the team is not large enough, which impacts their availability.
The initial understanding of the environment is crucial, followed by a simple deployment process.
The CPM can reportedly handle up to 50,000 accounts independently without issue.
I would rate it a ten out of ten for scalability.
They had 40,000 passwords in this one safe, and it was saving the last ten iterations of each password object. That means they had 400,000 password objects in this safe. They exceeded the limit.
The appliances are stable, and there are no significant issues with backups or recovery.
BeyondTrust Endpoint Privilege Management is very easy to use; if you know the process of cybersecurity, you will not experience downtime.
Proper fine-tuning and expertise ensure the product performs well.
Overall, the stability of the solution is high.
It has a large customer base and positive feedback within my network.
The ability to view recorded live sessions of specific users is a crucial benefit.
There is a need for better MQ integration with DevOps and improvements in architecture.
This product is highly ranked on Gartner, Peers, and other review sites.
They want everything to be on the cloud, but even in the SaaS version of CyberArk Privileged Access Manager, they need to deploy some servers on-premises.
We cannot generate a plug-in for web-based applications.
If they want clients to move to the cloud, they need to support them in real-time.
Incorporating AI to reduce manual work would be beneficial.
Oracle Identity Governance is a thick, heavy application and has fewer application connectors compared to SailPoint, which offers a large number of out-of-box connectors, making integration easier.
Improvements could include making Oracle Identity Governance a simpler plug-and-play product.
If a solution fits a customer's budget, considerations must be made that it may not have all the features of more expensive solutions.
CyberArk is expensive compared to other products I know.
CyberArk is comparatively expensive compared to other PAM solutions, such as Delinea, especially during renewal.
CyberArk's SaaS solution is particularly expensive.
They sell the solution cheaply, but setting up and maintaining it becomes very expensive.
If you want to implement it at full scale, it's not an entry-level product; it's an enterprise-class product and it is expensive.
Oracle Identity Governance is very expensive.
Another important aspect is the ability to move the solution to the cloud or install it on-premises, offering my customers flexibility.
When any unauthorized user makes an attempt, it notifies the administrators.
For security purposes in BeyondTrust Endpoint Privilege Management, when employees are working in the system, we can make a recording of the video, showing the modifications and configurations they made, allowing us to see everything.
CyberArk Privileged Access Manager helps ensure data privacy because we now know who is using which credentials and at what time.
It keeps a record of activities, allowing me to easily fetch screen recordings to detect any misuse and see who did what and what happened.
It can integrate with Splunk, SNMP, and other solutions and technologies.
The reporting function and Identity Audit function help with compliance, as they provide access review certification, segregation of duties, and a reporting feature.
The features I find most effective in Oracle Identity Governance include size and scale management, which is good for large organizations.
The solution's capabilities in provisioning, de-provisioning, terminations, and transfers are excellent.
| Product | Mindshare (%) |
|---|---|
| BeyondTrust Endpoint Privilege Management | 3.0% |
| CyberArk Privileged Access Manager | 10.5% |
| Delinea Secret Server | 4.5% |
| Other | 82.0% |
| Product | Mindshare (%) |
|---|---|
| CyberArk Privileged Access Manager | 10.5% |
| Delinea Secret Server | 4.5% |
| One Identity Safeguard | 4.4% |
| Other | 80.6% |
| Product | Mindshare (%) |
|---|---|
| Oracle Identity Governance | 4.9% |
| SailPoint Identity Security Cloud | 30.9% |
| Saviynt Identity Cloud | 18.7% |
| Other | 45.5% |



| Company Size | Count |
|---|---|
| Small Business | 15 |
| Midsize Enterprise | 3 |
| Large Enterprise | 15 |
| Company Size | Count |
|---|---|
| Small Business | 60 |
| Midsize Enterprise | 42 |
| Large Enterprise | 174 |
| Company Size | Count |
|---|---|
| Small Business | 23 |
| Midsize Enterprise | 11 |
| Large Enterprise | 46 |
BeyondTrust Endpoint Privilege Management offers enhanced security through asset discovery and privilege elevation without administrative rights, supporting seamless operations in complex environments.
BeyondTrust Endpoint Privilege Management combines advanced threat detection with powerful tools like application control and session management. It is designed to secure IT infrastructures by removing local admin privileges and facilitating remote application publishing. With integration capabilities and robust compliance support, it is suitable for sectors needing stringent security measures. However, improvements in update frequency, Mac integration, and pricing, along with enhanced reporting and console access, are needed to broaden market reach. Organizations value its scalability and flexibility, despite needing better support and development maturity.
What Features Define BeyondTrust Endpoint Privilege Management?BeyondTrust Endpoint Privilege Management is widely adopted in the finance and healthcare industries for privileged access management and compliance. It is instrumental in secure server access and remote management, aligning with zero-trust approaches and integrating smoothly with enterprise platforms.
CyberArk Privileged Access Manager safeguards privileged accounts through password management, credential rotation, and session recording. With seamless integration and real-time monitoring, it ensures robust security across platforms.
CyberArk Privileged Access Manager is recognized for its extensive capabilities in managing and securing privileged accounts. It offers vital functionalities such as automatic password rotation, real-time session monitoring, and cross-platform integration through APIs and custom connectors. Users find the flexibility in workflows and granular access controls beneficial, particularly in protecting access across cloud and on-prem infrastructures. However, improvements in its interface, installation process, plugin support, and integration with third-party tools are often suggested. Pricing is a concern for many, along with the need for better dashboard reporting, user provisioning, and enhanced documentation. Organizations leverage this tool for encrypting and monitoring critical account activities and automating password management to bolster security.
What are the key features of CyberArk Privileged Access Manager?CyberArk Privileged Access Manager finds substantial use in industries such as finance, healthcare, and technology, where the protection of privileged accounts is critical. These sectors rely on its capabilities to manage application credentials securely and provide safe access for developers, administrators, and vendors across various infrastructures.
Oracle Identity Governance offers centralized identity management with features like lifecycle management and integration with other Oracle offerings. It ensures secure governance and efficient user access, catering to large organizations.
Oracle Identity Governance is known for its comprehensive lifecycle management, centralizing identity activities. It automates provisioning, de-provisioning, and self-service password reset, which enhances compliance capabilities and security. The platform supports integration with HR and custom applications, enabling efficient user access management. Although challenged by complexity and infrastructure requirements, which create a steep learning curve, it provides scalable solutions crucial for telecom, finance, and healthcare sectors. Users note its outdated interface and difficulty in setup. Cost remains a consideration accompanied by limited automation support.
What are the key features of Oracle Identity Governance?In industries like telecom, finance, and healthcare, Oracle Identity Governance is deployed to streamline user onboarding, access provisioning, and role management. It enhances operational efficiency with multi-factor authentication and integration capabilities that align with large-scale user management needs.