


Find out what your peers are saying about Microsoft, Amazon Web Services (AWS), CyberArk and others in Enterprise Password Managers.
Next year, we may add another BeyondTrust element because the overall experience has been good.
The return on investment lies in improved security infrastructure, addressing over-privileged access, and reducing the risk of credential compromise, which is a major source of data breaches.
The end users have the authority to reconcile the password or verify it before using session isolation, which is one of the unique features that can be enabled through Privileged Session Manager, preventing any attacks from happening within the organization when connected with sessions through CyberArk Privileged Access Manager.
CyberArk Privileged Access Manager has helped customers save on costs primarily by reducing the number of engineering and information security personnel.
The tickets for minor issues have been resolved efficiently.
One person gets aligned for troubleshooting and maintenance activities during their downtime, and within an hour, they complete these tasks.
The support and maintenance from BeyondTrust are commendable.
CyberArk has been exceptional in coming back to us with immediate responses.
It could be forever until you talk to someone who knows what they are doing.
Based on the issue resolution and support quality, I rate the support 10 out of 10.
When I faced issues integrating custom applications with Delinea Secret Server, the support from their deployment partner was inadequate.
Technical support from Delinea is good.
I have contacted Delinea support for an issue where Secret Server logs off when the IP address is not secure, and I received a great response from the service.
If using the built-in database, it requires good knowledge in Microsoft SQL, which could complicate scalability.
BeyondTrust Password Safe is scalable and stable from my perspective, as if you increase your CPU and RAM, you can use as many user licenses as you want on a single platform.
In my experience, the scalability of BeyondTrust Password Safe is also a nine.
The CPM can reportedly handle up to 50,000 accounts independently without issue.
I would rate it a ten out of ten for scalability.
They had 40,000 passwords in this one safe, and it was saving the last ten iterations of each password object. That means they had 400,000 password objects in this safe. They exceeded the limit.
In BeyondTrust Password Safe, the upgrade activity can take longer, and I have occasionally experienced being stuck during appliance version upgrades.
The solution is very stable.
Proper fine-tuning and expertise ensure the product performs well.
Overall, the stability of the solution is high.
It has a large customer base and positive feedback within my network.
Delinea Secret Server can be considered as a stable and reliable for most enterprise use cases, especially in vaulting and privileged access management.
The stability is less than ideal since it updates to our console can take around six to ten hours.
This feature would allow PAM to check the credentials of privileged accounts, indicating if they are correct or not, showing if the heartbeat has failed if they are wrong.
This would help in identifying suspicious activities immediately when users log in.
There are limitations when accessing or creating connectors for each application.
They want everything to be on the cloud, but even in the SaaS version of CyberArk Privileged Access Manager, they need to deploy some servers on-premises.
We cannot generate a plug-in for web-based applications.
If they want clients to move to the cloud, they need to support them in real-time.
Most of the time, the solution tends to fail, necessitating the need to pull data from backup servers.
When it comes to web-related access, we can access directly through Delinea Secret Server.
Certain features like the Remote Access Service (RAS) Engine and syncing with directory services may still have bugs or limitations.
The pricing model is more affordable with the option of going for either unlimited devices or users.
Pricing is managed by a different team, however, I know it's less expensive than CyberArk Privilege Access.
My experience with the pricing, setup cost, and licensing of BeyondTrust Password Safe is good because we have an asset-based license, not a user-based one, allowing us to add many clients with privilege access.
CyberArk is expensive compared to other products I know.
CyberArk is comparatively expensive compared to other PAM solutions, such as Delinea, especially during renewal.
CyberArk's SaaS solution is particularly expensive.
The price of Delinea Secret Server is okay, however, the solution is considered expensive when compared to others.
BeyondTrust JIT (Just-in-Time) Access helps minimize risks in the organization by allowing privileged accounts to be provisioned temporarily, granting users elevated access only for the required duration.
The flexibility of the licensing model is significantly better as it offers both unlimited users and unlimited devices, unlike Delinea, which is based on the number of users.
The features I find valuable in Password Safe include password retention and management, session privilege monitoring, live monitoring and recording, and the use of PS automation scripts for creating connections.
CyberArk Privileged Access Manager helps ensure data privacy because we now know who is using which credentials and at what time.
It keeps a record of activities, allowing me to easily fetch screen recordings to detect any misuse and see who did what and what happened.
It can integrate with Splunk, SNMP, and other solutions and technologies.
The biggest benefit of Delinea Secret Server would be the remote password change and discovery, which are a major help for the management of the accounts.
Delinea Secret Server doesn't offer any exceptional features; most solutions have similar capabilities such as automatic password rotation, activity log monitoring, and activity log auditing.
| Product | Mindshare (%) |
|---|---|
| CyberArk Privileged Access Manager | 6.7% |
| Delinea Secret Server | 5.0% |
| BeyondTrust Password Safe | 3.0% |
| Other | 85.3% |



| Company Size | Count |
|---|---|
| Small Business | 13 |
| Midsize Enterprise | 5 |
| Large Enterprise | 10 |
| Company Size | Count |
|---|---|
| Small Business | 59 |
| Midsize Enterprise | 42 |
| Large Enterprise | 174 |
| Company Size | Count |
|---|---|
| Small Business | 20 |
| Midsize Enterprise | 10 |
| Large Enterprise | 26 |
BeyondTrust Password Safe is a robust Privileged Access Management tool designed to secure access to servers, databases, and applications. It automates onboarding, rotation, and integration processes, enhancing efficiency and compliance with advanced security measures.
BeyondTrust Password Safe offers a comprehensive approach to managing privileged accounts, integrating smoothly into organizational frameworks to bolster security protocols. Its standout capabilities include session recording, Smart Rules for onboarding automation, and sophisticated auditing tools that support compliance and real-time monitoring. While it exhibits high availability and facilitates seamless usability, enhancements are needed in management console integration, documentation, and installation processes. Users benefit from its password rotation and policy enforcement, despite facing challenges with authentication sync times and session disconnects.
What are the core features of BeyondTrust Password Safe?In industries with stringent security demands, BeyondTrust Password Safe is employed to safeguard privileged accounts, ensuring compliance with regulatory requirements. It is crucial for sectors like finance and healthcare, where access to sensitive data must be tightly controlled and monitored.
CyberArk Privileged Access Manager safeguards privileged accounts through password management, credential rotation, and session recording. With seamless integration and real-time monitoring, it ensures robust security across platforms.
CyberArk Privileged Access Manager is recognized for its extensive capabilities in managing and securing privileged accounts. It offers vital functionalities such as automatic password rotation, real-time session monitoring, and cross-platform integration through APIs and custom connectors. Users find the flexibility in workflows and granular access controls beneficial, particularly in protecting access across cloud and on-prem infrastructures. However, improvements in its interface, installation process, plugin support, and integration with third-party tools are often suggested. Pricing is a concern for many, along with the need for better dashboard reporting, user provisioning, and enhanced documentation. Organizations leverage this tool for encrypting and monitoring critical account activities and automating password management to bolster security.
What are the key features of CyberArk Privileged Access Manager?CyberArk Privileged Access Manager finds substantial use in industries such as finance, healthcare, and technology, where the protection of privileged accounts is critical. These sectors rely on its capabilities to manage application credentials securely and provide safe access for developers, administrators, and vendors across various infrastructures.
Delinea Secret Server efficiently manages privileged access and passwords through robust features like a password vault, Active Directory integration, and remote desktop creation, ensuring enhanced security and compliance.
Delinea Secret Server provides IT teams with essential governance and security capabilities, including automatic password rotation and session monitoring. Its integration options, along with APIs and discovery functionalities, support managing privileged accounts. Effective for improving access security, Delinea Secret Server supports seamless Active Directory integration and offers a user-friendly interface, which aids in risk and compliance management, role-based access, and zero trust support.
What are the key features of Delinea Secret Server?Delinea Secret Server is beneficial for industries requiring stringent security and compliance measures, effectively managing administrative accounts, and monitoring access to critical systems. It is widely adopted for credential management, auditing sessions, and controlling privileged accounts in both on-premises and cloud environments.