Try our new research platform with insights from 80,000+ expert users

BeyondTrust Password Safe vs CyberArk Identity comparison

 

Comparison Buyer's Guide

Executive SummaryUpdated on Dec 16, 2024

Review summaries and opinions

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
 

ROI

Sentiment score
7.0
BeyondTrust Password Safe offers mixed ROI; praised for security and compliance benefits, but cost and delayed returns concern some users.
Sentiment score
7.7
Users report rapid financial returns and effective security with CyberArk Identity, though some lack familiarity to comment on outcomes.
By the second month, we started seeing the benefits and achieved a return on investment.
 

Customer Service

Sentiment score
6.8
BeyondTrust Password Safe's service receives mixed reviews, with praise for support responsiveness and criticism for documentation and resolution delays.
Sentiment score
6.3
CyberArk Identity's support is praised for responsiveness, though some users report delays and desire more expert assistance.
The tickets for minor issues have been resolved efficiently.
I found the technical support from BeyondTrust to be very good.
The technical support from BeyondTrust responds very shortly whenever a ticket is created.
They resolved the problem immediately after I reported it, on the same day, within one hour.
I have had conversations with them twice, and their technical support team was not that good.
There are times when there is a delay in handling my inquiries via email.
 

Scalability Issues

Sentiment score
7.6
BeyondTrust Password Safe is praised for its scalable, adaptable infrastructure, efficiently supporting enterprises with active-active architecture.
Sentiment score
7.6
CyberArk Identity is praised for scalability and adaptability, but faces challenges in performance, stability, and support at large scales.
If using the built-in database, it requires good knowledge in Microsoft SQL, which could complicate scalability.
In my experience, the scalability of BeyondTrust Password Safe is also a nine.
We can use it on different phones and computers, demonstrating its scalability.
By addressing the issues I have highlighted, such as stability and making it bug and lag-free, along with improving customer support, they can enhance its scalability.
 

Stability Issues

Sentiment score
7.6
BeyondTrust Password Safe is praised for reliability and flexibility, though initial issues improved; users recommend updates for competitive parity.
Sentiment score
7.9
CyberArk Identity is highly stable and reliable, though minor glitches and enhanced regional coverage could further improve performance.
The solution is very stable.
When you have it in the cloud, you have CyberArk every time you need it.
There is a timeout period that I do not like, requiring repeated verification.
With respect to stability, I find that stability is very good.
 

Room For Improvement

BeyondTrust Password Safe needs better integration, documentation, user experience, and support while addressing pricing and deployment challenges.
CyberArk Identity issues include complex setup, weak authentication, poor integration, difficult scalability, and inadequate technical support and customer service.
This would help in identifying suspicious activities immediately when users log in.
There are limitations when accessing or creating connectors for each application.
I believe one improvement could be having the last used passwords appear more automatically whenever I check for passwords associated with a frequently used system.
Integration or deployment is extremely difficult for CyberArk Identity.
Something they could improve is the management of multifactor authentication.
To enhance the product, they can consider improving the user interface of the software.
 

Setup Cost

BeyondTrust Password Safe offers competitive, asset-based pricing and flexible renewals, providing justified cost advantages over CyberArk.
CyberArk Identity pricing varies among users but is valued for strong security features by medium and large enterprises.
The pricing model is more affordable with the option of going for either unlimited devices or users.
Pricing is managed by a different team, however, I know it's less expensive than CyberArk Privilege Access.
I compared it with other products, and it does not require a heavy investment.
Regarding pricing, it can be quite a lot for small companies.
The pricing is acceptable.
 

Valuable Features

BeyondTrust Password Safe offers session recording, password management, integration, high availability, and customization for enhanced security and efficiency.
CyberArk Identity offers robust security features and integrations at a low cost, enhancing identity management and operational efficiency.
The flexibility of the licensing model is significantly better as it offers both unlimited users and unlimited devices, unlike Delinea, which is based on the number of users.
The features I find valuable in Password Safe include password retention and management, session privilege monitoring, live monitoring and recording, and the use of PS automation scripts for creating connections.
The most valuable features of BeyondTrust Password Safe, in my opinion, are its ease of use and robust security management.
It impacts zero trust security strategies. It prevents lateral movements in the organization.
It protects our platform, application, network, and infrastructure resources on any device.
It is the most powerful access management system.
 

Categories and Ranking

BeyondTrust Password Safe
Ranking in Enterprise Password Managers
6th
Average Rating
8.0
Reviews Sentiment
7.0
Number of Reviews
24
Ranking in other categories
Privileged Access Management (PAM) (7th)
CyberArk Identity
Ranking in Enterprise Password Managers
8th
Average Rating
8.2
Reviews Sentiment
7.0
Number of Reviews
23
Ranking in other categories
Authentication Systems (8th), Identity Management (IM) (11th), Authorization Software (3rd), User Entity Behavior Analytics (UEBA) (9th), Access Management (6th), Active Directory Management (9th), Cloud Resource Access Management (2nd), Customer Identity and Access Management (CIAM) (6th)
 

Mindshare comparison

As of May 2025, in the Enterprise Password Managers category, the mindshare of BeyondTrust Password Safe is 3.3%, up from 3.0% compared to the previous year. The mindshare of CyberArk Identity is 1.1%, up from 0.7% compared to the previous year. It is calculated based on PeerSpot user engagement data.
Enterprise Password Managers
 

Featured Reviews

Gary Jolley - PeerSpot reviewer
Their discovery engine is off the charts, and the ease of administration and implementation they talk about is for real
It starts with discovery. Its number one feature is discovery. The discovery engine in BeyondTrust is off the charts. When they perform a discovery, you know everything there is about a server, including what software is installed. For example, if you want to group all of your database servers together, you can do that by using discovery and Smart Rules. If a server has Microsoft SQL installed, it gets put into a group based on a Smart Rule. It makes it very easy to determine what is what in your environment. As organizations grow or acquire other companies and merge, they lose track of what they have. BeyondTrust can help you throw a rope around it very rapidly. Its user interface is really nice. It is very visual. When you first log in, based on your job role, you see what you have access to when you look at the screen. As an administrator, I see the configuration screen where I can go in and modify Active Directory and authentication connections. I can set up SAML, or I also have access to create Smart Rules. The access is based on the role that you have when you log in. I have six boxes or six categories of administration items, whereas when an admin user connects, he would only have one or two. So, based on your role, you see what you have access to. It is not like you click something and then it fails because you're not an administrator at that level. You actually see what you have access to, and BeyondTrust is very good at that. BeyondTrust provides the ability to connect by using not just the web interface but also the admin tools such as MobaXterm, PuTTY, or a lengthy list of other types of tools. You can use the connection string and connect through BeyondTrust, and it will be session recorded, keystroke logged, and highly available. When you bring up MobaXterm, you probably bring up one of the most complex ones because MobaXterm has the ability to have two, three, or four concurrent connections, which makes BeyondTrust Password Safe ideal. It is very easy to integrate session management into existing business processes. To make it easy for the engineers, we created templates of the connection strings and then used, believe it or not, Microsoft Excel to create custom strings for each of the engineers. We exported them to a text file that they could then import. In the case of PuTTY, because PuTTY stores the connections and the credentials in the registry, we had to do something different there, but the connection string is customizable enough to make the job fast and easily repeatable for all the other engineers. You don't have 20 or 30 engineers spending two or three days creating all these connection strings. I can create them in a matter of minutes with a Microsoft Excel spreadsheet and then save them to a text file or a CSV file. It is awesome. We are able to integrate session management without disrupting business processes. One of the niceties about BeyondTrust is the ability to integrate it with ticketing systems. For example, as per Sarbanes-Oxley, we have to have a reason for why an administrator is performing something. The integration with a ticketing system is ideal rather than manually typing the reason in the reason field through the GUI where most engineers, after a while, end up just typing in Work. They don't put in enough data to make it clearly visible why they connected. The integration with the ticketing system is ideal for that. Ticket-driven access makes the work very quantifiable.
Julio Montero - PeerSpot reviewer
Access management system provides strong security and effortless user authentication
The solution can be deployed on cloud or on-premises. CyberArk is more on the cloud than on local hardware. The deployment is initially quite difficult. That said, when you are doing the implementation of CyberArk, there are so many tutorials that make the learning process very easy. The only complaint could be the language barrier. It's difficult if you don't have a very good level of English. Otherwise, it is very easy. You can have it set up within three months without much difficulty. It's hard to get started, however, once you get going, it gets easier. A full deployment takes half a year or less. There is some maintenance necessary. A company is constantly hiring and letting go of employees. The access is always changing, so access must always be adjusted. Or, if we need another law of filter, we would need to add those, or even take them away. That's another aspect of maintenance.
report
Use our free recommendation engine to learn which Enterprise Password Managers solutions are best for your needs.
850,028 professionals have used our research since 2012.
 

Top Industries

By visitors reading reviews
Computer Software Company
16%
Financial Services Firm
16%
Government
9%
Manufacturing Company
9%
Financial Services Firm
17%
Computer Software Company
14%
Manufacturing Company
11%
Healthcare Company
6%
 

Company Size

By reviewers
Large Enterprise
Midsize Enterprise
Small Business
 

Questions from the Community

What is your experience regarding pricing and costs for BeyondTrust Password Safe?
Pricing is managed by a different team, however, I know it's less expensive than CyberArk Privilege Access. BeyondTrust's pricing for the cloud platform is affordable.
What needs improvement with BeyondTrust Password Safe?
I believe one improvement could be having the last used passwords appear more automatically whenever I check for passwords associated with a frequently used system.
What is your primary use case for BeyondTrust Password Safe?
I find that BeyondTrust Password Safe is a very effective application for password management. I find it very easy to use and update.
What do you like most about CyberArk Identity?
The integration capabilities, ability to integrate CyberArk into the overall IBB strategy of our current clients.
What is your experience regarding pricing and costs for CyberArk Identity?
The pricing point is very good. I compared it with other products, and it does not require a heavy investment.
What needs improvement with CyberArk Identity?
It does not have global market penetration, and sometimes, there are support issues. CyberArk Identity can definitely improve on the IAM rules when I create them. The stability can also be better.
 

Also Known As

BeyondTrust PowerBroker Password Safe
Idaptive
 

Overview

 

Sample Customers

Aera Energy LLC, Care New England, James Madison University
MLB, Citi, Pfizer, SulAmerica, GE Capital, Shiseido
Find out what your peers are saying about BeyondTrust Password Safe vs. CyberArk Identity and other solutions. Updated: April 2025.
850,028 professionals have used our research since 2012.