Try our new research platform with insights from 80,000+ expert users

CyberArk Privileged Access Manager vs CyberArk Secrets Management comparison

 

Comparison Buyer's Guide

Executive Summary

Review summaries and opinions

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
 

Categories and Ranking

CyberArk Privileged Access ...
Ranking in Enterprise Password Managers
2nd
Average Rating
8.6
Reviews Sentiment
6.9
Number of Reviews
223
Ranking in other categories
User Activity Monitoring (1st), Privileged Access Management (PAM) (1st), Mainframe Security (2nd), Operational Technology (OT) Security (3rd)
CyberArk Secrets Management
Ranking in Enterprise Password Managers
16th
Average Rating
7.2
Reviews Sentiment
7.6
Number of Reviews
4
Ranking in other categories
Access Management (19th)
 

Featured Reviews

Abdul Durrani - PeerSpot reviewer
Enables granular and secure access with just-in-time access and Zero Trust model
CyberArk provides a good amount of control over access types. However, as a future enhancement, having additional features for cross-platform integration would be beneficial. It would be good to have integrations with other tools and firewalls, such as Zscaler and CrowdStrike. Although I am not fully aware of recent updates, more cross-platform integration would be valuable. A SOC analyst would like to have centralized access in terms of information flowing in even for privileged access management. They would like to have control over everything instead of opening four to five tabs for different sorts of information. Cross-platform integration would help with that. Customers also want CyberArk's pricing to be better so that they can implement it further and have more licenses. Implementing a privileged access management solution can be challenging. It would be great if CyberArk could provide recommendations based on the compliance standards of an organization. It would help system admins ensure that all the required ports are closed and the systems are being managed properly. If any system is not being used anymore, any ports opened for that system need to be closed. Having such recommendations would be helpful.
RJ
Helps with compliance and improves operational flexibility
We have had both on-premises and SaaS models. The on-premise setup was a little difficult, but now that it has been moved to the SaaS model, everything is controlled by CyberArk. We just go and do our work. The initial on-premises setup took two weeks because it was an integrated effort. I had to spin up the servers and bring in the CyberArk Secrets Management resource to deploy the scripts. I then had to open networks and firewalls between CyberArk Secrets Management's on-premise servers and the application server. In the initial phase, it took two to three weeks, but it became easier when moving to the SaaS model. In terms of maintenance, it requires patching or upgrades, which happens one day in a month. If there is a failure, we have to roll back and try once again, which takes more time, but if everything goes smoothly, there is three to five hours of downtime.

Quotes from Members

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
 

Pros

"CyberArk is not just an IT security or cybersecurity tool. It's also an administrator tool. I had a fair number of systems where the passwords were not fully managed by CyberArk yet, and they were expiring every 30 or 45 days. I was able to get management turned on for those accounts. From an administrator perspective, I didn't have to go back into those systems and manually change those passwords anymore. CyberArk... lightened the load on our administrative work."
"The ability to develop and deploy applications with no stored secrets is very valuable."
"CyberArk has been easy for us to implement and the adoption has been good. We've been able to standardize a bunch of things. We've been able to standardize relatively easily with the use of the platforms and managing the policies."
"This solution is quite stable."
"It enables companies to automate password management on target systems gaining a more secure access management approach."
"With PAM in place, we've experienced a significant reduction in potential security breaches."
"Password rotation, session recording & isolation and on-demand privileges."
"By implementing CyberArk Privileged Access Manager, we wanted to secure the password data and password accounts. We could see the benefits of CyberArk Privileged Access Manager immediately after we deployed it and started using it."
"The audit trails have been extremely important for us in helping our organization meet regulatory requirements."
"The automatic rotation of the password is the top feature."
"With CyberArk Secrets Management, we were able to resolve the automatic change of the passwords based on timelines. We were also able to retrieve the passwords in an encrypted format by utilizing the CyberArk platform, which was not provided to us by UiPath."
"One of the most important features for us is the system's performance, particularly its speed of retrieving secrets."
"CyberArk Secrets Management is a critical solution for strengthening our security posture."
"It's vital for effectively managing and securing my credentials."
"CyberArk's support team is knowledgeable and helpful, consistently responding on time."
 

Cons

"The solution should be able to mitigate internal threats"
"The initial setup was a bit complex."
"If we could have some kind of out-of-the box feature that you can simply say "no" so they don't have to go into a development mode, that would a really helpful feature."
"Its GUI is very confusing."
"There is a bit of a learning curve, but it's a pretty complex solution."
"It is complicated to deploy for Windows servers compared to other vendors."
"The initial setup could be simpler but it may not be as effective."
"Customer support is somewhat lacking. They are often unavailable on Fridays, and the support process, such as raising a call or case, can take too long."
"Improvements for CyberArk Secrets Management include enhanced documentation with more use cases and step-by-step integration guides."
"We occasionally experience incidents that delay password injection back into the script."
"We did not have a good experience with technical support because their numerous processes caused delays in engaging, leading to project delays or issues with production."
"Implementing it and ensuring seamless password rotations present challenges."
"Implementation was complex and required professional services."
"The password search feature and integration between different vaults could be enhanced. For instance, when updating passwords in both lower and higher environment vaults, improvement is required in search and upgrade functions."
"There is room for improvement with better documentation and less need for CyberArk Secrets Management personnel to assist us with their presence."
 

Pricing and Cost Advice

"It is in line with its competitors, but all such solutions cost too much money."
"This solution is considered to be more expensive than others out there on the market today."
"I focus more on the technical side, but I hear customers say that if CyberArk was more affordable, they might have acquired more licenses. Some clients consider alternative solutions due to pricing concerns."
"I hope to learn how the pricing works so that I can understand it better, but I am certain it is not inexpensive."
"CyberArk is good at what they do, and the price reflects that. You have to pay the price for the same."
"There are additional features added to our CyberArk Privileged Access Manager license. For example, features that allow us to integrate into various kinds of platforms."
"They have two types of licensing: purchase and subscription. You have to pay for each admin user, such as Microsoft admin, mail admin, database admin, etc."
"The price of this solution is expensive."
"It is in the middle. It is neither very cheap nor very expensive, so I would place it in the middle."
"CyberArk Secrets Management has a moderate pricing structure based on a per-tenant licensing model rather than a per-user account model like their PAM solution."
report
Use our free recommendation engine to learn which Enterprise Password Managers solutions are best for your needs.
859,129 professionals have used our research since 2012.
 

Top Industries

By visitors reading reviews
Educational Organization
23%
Financial Services Firm
13%
Computer Software Company
13%
Manufacturing Company
7%
No data available
 

Company Size

By reviewers
Large Enterprise
Midsize Enterprise
Small Business
No data available
 

Questions from the Community

How does Sailpoint IdentityIQ compare with CyberArk PAM?
We evaluated Sailpoint IdentityIQ before ultimately choosing CyberArk. Sailpoint Identity Platform is a solution to manage risks in cloud enterprise environments. It automates and streamlines the m...
What do you like most about CyberArk Privileged Access Manager?
The most valuable features of the solution are control and analytics.
What is your experience regarding pricing and costs for CyberArk Secrets Management?
It is in the middle. It is neither very cheap nor very expensive, so I would place it in the middle.
What needs improvement with CyberArk Secrets Management?
There is room for improvement with better documentation and less need for CyberArk Secrets Management personnel to assist us with their presence.
What is your primary use case for CyberArk Secrets Management?
My main use cases at the moment promote security all across the organization.
 

Also Known As

CyberArk Privileged Access Security, CyberArk Enterprise Password Vault
No data available
 

Overview

 

Sample Customers

Rockwell Automation
Information Not Available
Find out what your peers are saying about CyberArk Privileged Access Manager vs. CyberArk Secrets Management and other solutions. Updated: June 2025.
859,129 professionals have used our research since 2012.