Try our new research platform with insights from 80,000+ expert users

CyberArk Privileged Access Manager vs CyberArk Secrets Management comparison

 

Comparison Buyer's Guide

Executive Summary

Review summaries and opinions

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
 

Categories and Ranking

CyberArk Privileged Access ...
Ranking in Enterprise Password Managers
2nd
Average Rating
8.6
Reviews Sentiment
6.8
Number of Reviews
226
Ranking in other categories
User Activity Monitoring (1st), Privileged Access Management (PAM) (1st), Mainframe Security (2nd), Operational Technology (OT) Security (3rd)
CyberArk Secrets Management
Ranking in Enterprise Password Managers
16th
Average Rating
7.2
Reviews Sentiment
6.0
Number of Reviews
5
Ranking in other categories
Access Management (19th)
 

Featured Reviews

Abdul Durrani - PeerSpot reviewer
Enables granular and secure access with just-in-time access and Zero Trust model
CyberArk provides a good amount of control over access types. However, as a future enhancement, having additional features for cross-platform integration would be beneficial. It would be good to have integrations with other tools and firewalls, such as Zscaler and CrowdStrike. Although I am not fully aware of recent updates, more cross-platform integration would be valuable. A SOC analyst would like to have centralized access in terms of information flowing in even for privileged access management. They would like to have control over everything instead of opening four to five tabs for different sorts of information. Cross-platform integration would help with that. Customers also want CyberArk's pricing to be better so that they can implement it further and have more licenses. Implementing a privileged access management solution can be challenging. It would be great if CyberArk could provide recommendations based on the compliance standards of an organization. It would help system admins ensure that all the required ports are closed and the systems are being managed properly. If any system is not being used anymore, any ports opened for that system need to be closed. Having such recommendations would be helpful.
RJ
Helps with compliance and improves operational flexibility
We have had both on-premises and SaaS models. The on-premise setup was a little difficult, but now that it has been moved to the SaaS model, everything is controlled by CyberArk. We just go and do our work. The initial on-premises setup took two weeks because it was an integrated effort. I had to spin up the servers and bring in the CyberArk Secrets Management resource to deploy the scripts. I then had to open networks and firewalls between CyberArk Secrets Management's on-premise servers and the application server. In the initial phase, it took two to three weeks, but it became easier when moving to the SaaS model. In terms of maintenance, it requires patching or upgrades, which happens one day in a month. If there is a failure, we have to roll back and try once again, which takes more time, but if everything goes smoothly, there is three to five hours of downtime.

Quotes from Members

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
 

Pros

"The ability of CyberArk Privileged Access Manager to safeguard the financial services infrastructure by protecting credentials is extremely important, as every activity in a financial organization needs to be recorded for accountability in auditing."
"It supports lots of requirements in the privileged access management area."
"Customer support has been very helpful and responsive."
"You can gradually implement CyberArk, starting with more easily attainable goals."
"Right off the bat, the most valuable feature is the DNA scan. It gives us the ability to scan our environment and find the accounts that we're going to need to take under control."
"CyberArk Privileged Access Manager is very powerful and customizable."
"I would rate CyberArk Privileged Access Manager nine out of ten."
"It is very simple to use."
"The granular controls of CyberArk Secrets Management are very niche in their development and very secure from the overall secret management perspective, offering high-level functionalities where we have control over user access, which can be tracked and monitored."
"CyberArk's support team is knowledgeable and helpful, consistently responding on time."
"The audit trails have been extremely important for us in helping our organization meet regulatory requirements."
"CyberArk Secrets Management is a critical solution for strengthening our security posture."
"It's vital for effectively managing and securing my credentials."
"One of the most important features for us is the system's performance, particularly its speed of retrieving secrets."
"With CyberArk Secrets Management, we were able to resolve the automatic change of the passwords based on timelines. We were also able to retrieve the passwords in an encrypted format by utilizing the CyberArk platform, which was not provided to us by UiPath."
"The automatic rotation of the password is the top feature."
 

Cons

"In the next release, they could simplify the setup and I would like some tasks added like file sharing. When a client connects to CyberArk and wants to put a file on the server, they cannot."
"The price is high compared to Azure Key Vault. It's the most expensive solution."
"Integration with the ticketing system should allow any number of fields to be used for validation before allowing a user to be evaluated and able to access a server."
"They can do a better job in the PSM space."
"The solution is too big and complex for any businesses that are small or medium-sized. They should offer a more compact version or make a solution better suited to smaller businesses."
"More than the product itself, there is room for improvement in the documentation. The documentation should be very detailed and very structured. It has a lot of good information, on one level, but I feel that it could be more elaborate and more structured."
"If CyberArk wants people to pay for cloud services, they need to make the cloud services much more real-time."
"The session monitoring and recording feature is also a good feature feature, but we're currently experiencing an issue with session monitoring not working correctly. We're working with CyberArk to resolve it. We aren't able to view active sessions or historical recordings of sessions."
"We occasionally experience incidents that delay password injection back into the script."
"Improvements for CyberArk Secrets Management include enhanced documentation with more use cases and step-by-step integration guides."
"The password search feature and integration between different vaults could be enhanced. For instance, when updating passwords in both lower and higher environment vaults, improvement is required in search and upgrade functions."
"Implementing it and ensuring seamless password rotations present challenges."
"There is room for improvement with better documentation and less need for CyberArk Secrets Management personnel to assist us with their presence."
"Implementation was complex and required professional services."
"We did not have a good experience with technical support because their numerous processes caused delays in engaging, leading to project delays or issues with production."
 

Pricing and Cost Advice

"I rate the tool's pricing an eight out of ten."
"CyberArk is very expensive and there are additional fees for add-ons."
"CyberArk Privileged Access Manager is perceived to be somewhat overpriced compared to similar market products. It is a little bit overvalued. It could come down a little bit for my liking. However, the industry-leading reputation and the quality of service justify the high price point to some extent."
"It's an affordable platform."
"I have heard from my leaders that CyberArk is costlier in terms of licensing. The support and maintenance are also costly. We use their premium support, but for the price we pay, we do not get the value."
"It is in line with its competitors, but all such solutions cost too much money."
"Quite expensive"
"I'm a technician so I don't handle the licensing for CyberArk Privileged Access Manager, but I know that the price for the core license is about €140 per year. There's another type of license, the external vendor license, and that's about €600 and you can manage twenty devices. From what I know, the price for one device in a subscription is about €65 per year. You can buy the CyberArk Endpoint Privilege Manager too, or you can buy some other application or application license with CyberArk Privileged Access Manager, but all other features, such as the Analytics Server is included in the basic CyberArk license. With WALLIX, you need to buy separate licenses for the features."
"It is in the middle. It is neither very cheap nor very expensive, so I would place it in the middle."
"CyberArk Secrets Management has a moderate pricing structure based on a per-tenant licensing model rather than a per-user account model like their PAM solution."
report
Use our free recommendation engine to learn which Enterprise Password Managers solutions are best for your needs.
865,384 professionals have used our research since 2012.
 

Top Industries

By visitors reading reviews
Computer Software Company
15%
Financial Services Firm
15%
Manufacturing Company
9%
Government
7%
No data available
 

Company Size

By reviewers
Large Enterprise
Midsize Enterprise
Small Business
No data available
 

Questions from the Community

How does Sailpoint IdentityIQ compare with CyberArk PAM?
We evaluated Sailpoint IdentityIQ before ultimately choosing CyberArk. Sailpoint Identity Platform is a solution to manage risks in cloud enterprise environments. It automates and streamlines the m...
What do you like most about CyberArk Privileged Access Manager?
The most valuable features of the solution are control and analytics.
What needs improvement with CyberArk Secrets Management?
The tool is very good, but the commercialized training, which is paid, could be improved. Regularizing those trainings as part of a global alliance between the customer, SI partner, and CyberArk wo...
What is your primary use case for CyberArk Secrets Management?
The main use case for CyberArk Secrets Management is application integrations and the CI and CD part. In CyberArk Secrets Management, there are a variety of tools that they cover, one being the Cre...
 

Also Known As

CyberArk Privileged Access Security, CyberArk Enterprise Password Vault
No data available
 

Overview

 

Sample Customers

Rockwell Automation
Information Not Available
Find out what your peers are saying about CyberArk Privileged Access Manager vs. CyberArk Secrets Management and other solutions. Updated: July 2025.
865,384 professionals have used our research since 2012.