Try our new research platform with insights from 80,000+ expert users

CyberArk Identity vs CyberArk Secrets Management comparison

 

Comparison Buyer's Guide

Executive SummaryUpdated on Jun 15, 2025

Review summaries and opinions

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
 

Categories and Ranking

CyberArk Identity
Ranking in Enterprise Password Managers
8th
Ranking in Access Management
5th
Average Rating
8.2
Reviews Sentiment
7.1
Number of Reviews
24
Ranking in other categories
Authentication Systems (9th), Identity Management (IM) (9th), Authorization Software (3rd), User Entity Behavior Analytics (UEBA) (9th), Active Directory Management (8th), Cloud Resource Access Management (3rd), Customer Identity and Access Management (CIAM) (7th)
CyberArk Secrets Management
Ranking in Enterprise Password Managers
16th
Ranking in Access Management
19th
Average Rating
7.2
Reviews Sentiment
6.0
Number of Reviews
5
Ranking in other categories
No ranking in other categories
 

Featured Reviews

Julio Montero - PeerSpot reviewer
Access management system provides strong security and effortless user authentication
The solution can be deployed on cloud or on-premises. CyberArk is more on the cloud than on local hardware. The deployment is initially quite difficult. That said, when you are doing the implementation of CyberArk, there are so many tutorials that make the learning process very easy. The only complaint could be the language barrier. It's difficult if you don't have a very good level of English. Otherwise, it is very easy. You can have it set up within three months without much difficulty. It's hard to get started, however, once you get going, it gets easier. A full deployment takes half a year or less. There is some maintenance necessary. A company is constantly hiring and letting go of employees. The access is always changing, so access must always be adjusted. Or, if we need another law of filter, we would need to add those, or even take them away. That's another aspect of maintenance.
RJ
Helps with compliance and improves operational flexibility
We have had both on-premises and SaaS models. The on-premise setup was a little difficult, but now that it has been moved to the SaaS model, everything is controlled by CyberArk. We just go and do our work. The initial on-premises setup took two weeks because it was an integrated effort. I had to spin up the servers and bring in the CyberArk Secrets Management resource to deploy the scripts. I then had to open networks and firewalls between CyberArk Secrets Management's on-premise servers and the application server. In the initial phase, it took two to three weeks, but it became easier when moving to the SaaS model. In terms of maintenance, it requires patching or upgrades, which happens one day in a month. If there is a failure, we have to roll back and try once again, which takes more time, but if everything goes smoothly, there is three to five hours of downtime.

Quotes from Members

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
 

Pros

"CyberArk Identity provides identity governance and gives me control over who and how access to environments occurs, offering significant confidentiality in what is accessed."
"If anyone makes an error, or if an incident occurs by accident, the business will not be harmed as a result of this activity."
"CyberArk Identity is at the top."
"The user self-service program and the Office 365 provisioning service feature are the most valuable. It is a very easy and feature-rich solution that gives priority to the users and security."
"The integration capabilities, ability to integrate CyberArk into the overall IBB strategy of our current clients."
"I found the solution to be stable."
"CyberArk Identity is a mature product."
"CyberArk Identity's ability to safeguard financial services infrastructure is good."
"The granular controls of CyberArk Secrets Management are very niche in their development and very secure from the overall secret management perspective, offering high-level functionalities where we have control over user access, which can be tracked and monitored."
"It's vital for effectively managing and securing my credentials."
"CyberArk's support team is knowledgeable and helpful, consistently responding on time."
"The audit trails have been extremely important for us in helping our organization meet regulatory requirements."
"One of the most important features for us is the system's performance, particularly its speed of retrieving secrets."
"CyberArk Secrets Management is a critical solution for strengthening our security posture."
"With CyberArk Secrets Management, we were able to resolve the automatic change of the passwords based on timelines. We were also able to retrieve the passwords in an encrypted format by utilizing the CyberArk platform, which was not provided to us by UiPath."
"The automatic rotation of the password is the top feature."
 

Cons

"In terms of general user feedback, the more security you put in front of a user, the more they complain. So usability and the user experience are always a challenge. So there's always room for improvement."
"When you translate the page from one language to another, it can be a difficult process. The translation isn't always good, and it may have a completely different name. I've noticed this in the English to Spanish translation."
"I'm not sure what needs improvement. It is a good platform."
"Something they could improve is the management of multifactor authentication. When you translate the page from one language to another, it can be a difficult process."
"One area for improvement is the complexity of the learning curve for new users."
"We would like to see an improvement in the ability to manage mobile devices."
"The OpenID features could improve in CyberArk Identity."
"They could improve their UI and make everything more user-friendly."
"Improvements for CyberArk Secrets Management include enhanced documentation with more use cases and step-by-step integration guides."
"We occasionally experience incidents that delay password injection back into the script."
"There is room for improvement with better documentation and less need for CyberArk Secrets Management personnel to assist us with their presence."
"Implementing it and ensuring seamless password rotations present challenges."
"The password search feature and integration between different vaults could be enhanced. For instance, when updating passwords in both lower and higher environment vaults, improvement is required in search and upgrade functions."
"Implementation was complex and required professional services."
"We did not have a good experience with technical support because their numerous processes caused delays in engaging, leading to project delays or issues with production."
 

Pricing and Cost Advice

"I think it is a fairly priced tool. I rate the tool between six and seven on a scale of one to ten where one is expensive, and ten is cheap."
"There is an initial license and then there is a subscription needed."
"We find that the pricing and licensing of this solution is adequate, as compared to the other competitors in the market."
"In terms of pricing, BeyondTrust and CyberArk tend to be more expensive, with CyberArk receiving an eight out of ten, in this regard."
"The solution is cheap and I rate its pricing an eight out of ten."
"I would rate the tool’s pricing a seven out of ten. The product’s pricing is expensive and is on a yearly basis. You will need to pay around 10,000 GBP for 500 users."
"There could be some additional costs apart from the licensing costs of the solution when you want to develop connectors in CyberArk Identity."
"Their pricing is obviously a lot higher than many vendors in the marketplace but their service is also unmatched."
"CyberArk Secrets Management has a moderate pricing structure based on a per-tenant licensing model rather than a per-user account model like their PAM solution."
"It is in the middle. It is neither very cheap nor very expensive, so I would place it in the middle."
report
Use our free recommendation engine to learn which Access Management solutions are best for your needs.
865,384 professionals have used our research since 2012.
 

Top Industries

By visitors reading reviews
Financial Services Firm
14%
Computer Software Company
11%
Manufacturing Company
11%
Healthcare Company
6%
No data available
 

Company Size

By reviewers
Large Enterprise
Midsize Enterprise
Small Business
No data available
 

Questions from the Community

What do you like most about CyberArk Identity?
The integration capabilities, ability to integrate CyberArk into the overall IBB strategy of our current clients.
What is your experience regarding pricing and costs for CyberArk Identity?
The pricing is acceptable. It is worth considering what we are protecting with the amount charged.
What needs improvement with CyberArk Identity?
Some areas experience slowness based on the workload. There's a need to enhance network performance despite the good user experience with access management.
What needs improvement with CyberArk Secrets Management?
The tool is very good, but the commercialized training, which is paid, could be improved. Regularizing those trainings as part of a global alliance between the customer, SI partner, and CyberArk wo...
What is your primary use case for CyberArk Secrets Management?
The main use case for CyberArk Secrets Management is application integrations and the CI and CD part. In CyberArk Secrets Management, there are a variety of tools that they cover, one being the Cre...
 

Also Known As

Idaptive
No data available
 

Overview

 

Sample Customers

MLB, Citi, Pfizer, SulAmerica, GE Capital, Shiseido
Information Not Available
Find out what your peers are saying about CyberArk Identity vs. CyberArk Secrets Management and other solutions. Updated: July 2025.
865,384 professionals have used our research since 2012.