Try our new research platform with insights from 80,000+ expert users

CA Privileged Access Manager Server Control [EOL] vs CyberArk Privileged Access Manager comparison

 

Comparison Buyer's Guide

Executive Summary

Review summaries and opinions

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
 

Categories and Ranking

CA Privileged Access Manage...
Average Rating
7.8
Number of Reviews
9
Ranking in other categories
No ranking in other categories
CyberArk Privileged Access ...
Average Rating
8.6
Reviews Sentiment
6.8
Number of Reviews
230
Ranking in other categories
User Activity Monitoring (1st), Enterprise Password Managers (2nd), Privileged Access Management (PAM) (1st), Mainframe Security (1st), Operational Technology (OT) Security (3rd)
 

Featured Reviews

it_user558603 - PeerSpot reviewer
Engineer at a manufacturing company with 10,001+ employees
I like that the access control on the agent. Installation is difficult.
I would like to see some improvements, specifically in terms of some set-up items. We have spoken to CA quite a bit about the ability to have 'always-on', or 'active/active' status options, so if the infrastructure goes down, we don't lose transactions. This is very important for the environment and for the users so we cannot really afford any downtime with the solution. We have had problems with deployment, and we are concerned with the possibility for outages and how they can have a negative impact on the environment.
Atul-Gujar - PeerSpot reviewer
CyberArk manager at a comms service provider with 10,001+ employees
Secures critical infrastructures with essential user session audit records
A potential area for improvement is enhancing support for cluster environments and distributed Vaults. Clients in multiple countries that need central access have different challenges that require better solutions from CyberArk. For financial services, CyberArk can improve incident response by ensuring fast support for critical priority tickets to meet compliance requirements. Providing more documentation on CyberArk is recommended for new team members to enhance their troubleshooting capabilities. I understand it's up to the client, but 99% fail to change the demo key, so it's crucial for CyberArk to emphasize changing the key and documenting it as part of the installation process.

Quotes from Members

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
 

Pros

"Access Control has greatly prevented the misuse of administrator rights which is very rampant."
"It gives us the ability to track who is using what ID and for what purpose."
"Access Control enhances the security of business systems through a secured authentication and validation of users credentials before accessing organizations resources."
"No, the product been stable and robust, and boasts with new additional features."
"It depends on the client's requirements, but for me the most valuable one is the security access management with distributed architecture and centralized management."
"We're happy to see it working so well with our IBM solution, saving us time and costs."
"We have been able to exceed our audit requirements for security."
"It efficiently controls the access to the resources from the privileged user thus implementing the security aspects and this provides fine granular access."
"The product is an important security measure against credential theft. It ensures session isolation and password rotation including pushing passwords to the endpoints."
"We like it for the ability to automatically change passwords. At least for my group, that's the best thing."
"The most valuable feature is that it is flexible. It has many connectors. that have done well, the EPV and SSH sessions are all being recorded and everything works fine."
"Rather than multiple tools for maintaining regulatory compliance around passwords and privileged accounts, we have centralized as much as possible with CyberArk. This is now a one stop shop for end users to access their elevated credentials."
"The ability to start the project, install and add the passwords in just a few days brings a big advantage for CyberArk."
"Right off the bat, the most valuable feature is the DNA scan. It gives us the ability to scan our environment and find the accounts that we're going to need to take under control."
"The solution is scalable."
"The most valuable features of CyberArk Enterprise Password Vault are password vaulting and automatic rotation of passwords after use."
 

Cons

"Automated deployment did not work as expected, had to go to a manual deployment."
"The manuals for this product used to be good. We could find in one place answers to pretty much every question or situation we had. However, it's now in piece-meal fashion."
"We have had problems with deployment, and we are concerned with the possibility for outages and how they can have a negative impact on the environment."
"Sometimes we encounter issues whilst generating the reports."
"I have faced a few challenges due to the system complexity, as it involves two integrated authentication systems that have to be purchased."
"Yes, I encountered lots of issues."
"I found the installation process of Access Control challenging due to the much networking work involved in order to grant access to authorized users."
"User Interface needs to be improved."
"The pricing is too expensive and should be reduced."
"We had an issue with the Copy feature... Apparently, in version 10, that Copy feature does not work. You actually have to click Show and then copy the password from within Show and then paste it. We've had a million tickets and we had to figure out a workaround to it."
"Areas of CyberArk Privileged Access Manager that can be improved include offering clearer configuration options."
"It is easily customized, and that customization makes it very easy to start trying to shoehorn the solution into roles it was never intended to fill."
"However, there is still room for improvement."
"Cost efficiency is the number one thing that can be improved in my mind."
"Some aspects of the administration need improvement, though they have recently made improvements to the API. However, the management with the interface and configuration are not so user-friendly."
"I would like to see a simplification of the product."
 

Pricing and Cost Advice

Information not available
"Generally, I don't get involved in the licensing or the purchasing side of it, but I do know that the licenses are expensive."
"Its price is high. I have also worked with Delinea. CyberArk is comparatively expensive compared to other PAM solutions, such as Delinea, especially during renewal."
"Cost efficiency is the number one thing that can be improved in my mind. This would change lots of companies minds on purchasing the product."
"Pricing is quite high and it could be improved."
"The cost is high compared to other products."
"The pricing for CyberArk is on the higher side compared to other Privileged Access Management products. Something should be done regarding enterprise licensing for long-standing customers."
"Compared to other solutions, it is costly."
"Licensing fees are paid on a yearly basis."
report
Use our free recommendation engine to learn which Privileged Access Management (PAM) solutions are best for your needs.
884,976 professionals have used our research since 2012.
 

Top Industries

By visitors reading reviews
No data available
Financial Services Firm
14%
Manufacturing Company
10%
Computer Software Company
8%
Government
6%
 

Company Size

By reviewers
Large Enterprise
Midsize Enterprise
Small Business
By reviewers
Company SizeCount
Small Business3
Midsize Enterprise2
Large Enterprise4
By reviewers
Company SizeCount
Small Business59
Midsize Enterprise42
Large Enterprise174
 

Questions from the Community

Ask a question
Earn 20 points
How does Sailpoint IdentityIQ compare with CyberArk PAM?
We evaluated Sailpoint IdentityIQ before ultimately choosing CyberArk. Sailpoint Identity Platform is a solution to manage risks in cloud enterprise environments. It automates and streamlines the m...
What do you like most about CyberArk Privileged Access Manager?
The most valuable features of the solution are control and analytics.
What is your experience regarding pricing and costs for CyberArk Privileged Access Manager?
My thoughts on the pricing of CyberArk Privileged Access Manager depend entirely on the vendors' requirements. If they want their things to be secure, they have to spend accordingly. We have four t...
 

Also Known As

CA Access Control, CA Privileged Identity Manager
CyberArk Privileged Access Security, CyberArk Enterprise Password Vault
 

Overview

 

Sample Customers

Colruyt Group, Logicalis, TIS Inc.
Rockwell Automation
Find out what your peers are saying about CyberArk, One Identity, Okta and others in Privileged Access Management (PAM). Updated: March 2026.
884,976 professionals have used our research since 2012.