Try our new research platform with insights from 80,000+ expert users

CyberArk Privileged Access Manager vs Ekran System comparison

 

Comparison Buyer's Guide

Executive Summary

Review summaries and opinions

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
 

Categories and Ranking

CyberArk Privileged Access ...
Ranking in User Activity Monitoring
1st
Ranking in Privileged Access Management (PAM)
1st
Average Rating
8.6
Reviews Sentiment
6.8
Number of Reviews
229
Ranking in other categories
Enterprise Password Managers (3rd), Mainframe Security (2nd), Operational Technology (OT) Security (3rd)
Ekran System
Ranking in User Activity Monitoring
4th
Ranking in Privileged Access Management (PAM)
22nd
Average Rating
8.0
Reviews Sentiment
7.5
Number of Reviews
1
Ranking in other categories
No ranking in other categories
 

Mindshare comparison

As of September 2025, in the User Activity Monitoring category, the mindshare of CyberArk Privileged Access Manager is 13.0%, down from 24.6% compared to the previous year. The mindshare of Ekran System is 19.8%, up from 14.3% compared to the previous year. It is calculated based on PeerSpot user engagement data.
User Activity Monitoring Market Share Distribution
ProductMarket Share (%)
CyberArk Privileged Access Manager13.0%
Ekran System19.8%
Other67.2%
User Activity Monitoring
 

Featured Reviews

Atul-Gujar - PeerSpot reviewer
Secures critical infrastructures with essential user session audit records
A potential area for improvement is enhancing support for cluster environments and distributed Vaults. Clients in multiple countries that need central access have different challenges that require better solutions from CyberArk. For financial services, CyberArk can improve incident response by ensuring fast support for critical priority tickets to meet compliance requirements. Providing more documentation on CyberArk is recommended for new team members to enhance their troubleshooting capabilities. I understand it's up to the client, but 99% fail to change the demo key, so it's crucial for CyberArk to emphasize changing the key and documenting it as part of the installation process.
Andreas Lalos - PeerSpot reviewer
Early threat detection and diverse OS support with enhanced security
Ekran System offers a lightweight solution that does not impact the systems where it is implemented. It provides rich metadata for monitored activities and includes threat analysis capabilities for early alerting and investigation of unauthorized actions. Additionally, it supports diverse operating systems and allows for monitoring and enforcement policies, like blocking actions for policy violations, and provides a retention of historical data in a lightweight format.

Quotes from Members

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
 

Pros

"CyberArk Privileged Access Manager provides granularity. You can break things down into individual safes. You have specific access to safes by individual or group. The interface is with AD, with LDAP, or with local CyberArk passwords. You also have the ability to establish policies for your individual credentials."
"PSM enables after-hours monitoring."
"I would recommend CyberArk Privileged Access Manager because it is a leading solution for privileged access management."
"The most important feature is managing the credentials and implementing those policies which rotate the credentials. Session Manager is also key in not letting the users have access to those credentials. Instead, CyberArk actually manages everything by itself."
"Session monitoring includes recordings of all activities performed."
"It's secure and reliable. I especially appreciate that it's locked down and only allows access to authorized components."
"It is a robust product."
"The module called PTA, Privileged Threat Analytics, is very useful. When you give access to a user, it monitors and detects if the user's behavior is unusual. After giving access, it continually checks if the user is the same user."
"It supports diverse operating systems and allows for monitoring and enforcement policies, like blocking actions for policy violations, and provides a retention of historical data in a lightweight format."
 

Cons

"Transitioning from a traditional on-premises deployment to the privileged cloud has resulted in losing access to many logs and administrative tools typically available on the back end."
"CyberArk Privileged Access Manager could improve the integration docking, it should have more layers. For example, integration with OpenShift."
"Pricing is a concern for me because it is not very user-friendly for startups, new users, or very small organizations."
"They are taking two to three days for resolution are too slow. Customers, including myself, do not want to wait this long for solutions."
"What could be improved in CyberArk Privileged Access Manager is the licensing model. It should be more flexible in terms of the users. Currently, it's based on the number of users, but many users only log in once in four months or once in five months. It would be great if the licensing model could be modified based on user needs. We even have users who have not logged in even once."
"The initial setup could be simpler but it may not be as effective."
"New functionalities and discovered bugs take longer to patch. We would greatly appreciate quicker development of security patches and bug corrections."
"The initial setup of CyberArk Privileged Access Manager difficulty depends on the environment that you are implementing it into. However, it typically is simple."
"Ekran System could improve in terms of communication to the market, particularly after their rebranding as Shiteka."
 

Pricing and Cost Advice

"It is in line with its competitors, but all such solutions cost too much money."
"CyberArk provides all the features bundled. This is compared to other vendors who provide them as a different license for each functionality."
"Overall, its pricing is really good. The main difference from all the other vendors is that they have one package that covers all the functionality and modules of the basic PAM, except the add-on modules like adware and server protection. It also doesn't include the licenses for domain controller protection or maybe an API call-related feature. For the basic privileged access management, the bundle pricing is really good, but when it comes to an agent-based solution for advanced cyber protection or application identity managers, it is expensive. Services are also very expensive if you hire the services team from CyberArk, but these guys are really good. For a couple of large banking projects, we had an experience with them. The banks wanted to have things quickly and efficiently, so we had to hire them. If we take four weeks, these guys can do everything on a weekend. They charge quite a big sum of money, but they know the system well."
"CyberArk is one of the best PAM solutions and one of the most expensive, but it works better than the others, so the pricing is fair."
"CyberArk Enterprise Password Vault's pricing is reasonable."
"This product is very expensive."
"This solution is expensive."
"Cost efficiency is the number one thing that can be improved in my mind. This would change lots of companies minds on purchasing the product."
Information not available
report
Use our free recommendation engine to learn which User Activity Monitoring solutions are best for your needs.
867,370 professionals have used our research since 2012.
 

Top Industries

By visitors reading reviews
Financial Services Firm
15%
Computer Software Company
15%
Manufacturing Company
9%
Government
6%
No data available
 

Company Size

By reviewers
Large Enterprise
Midsize Enterprise
Small Business
By reviewers
Company SizeCount
Small Business60
Midsize Enterprise41
Large Enterprise171
No data available
 

Questions from the Community

How does Sailpoint IdentityIQ compare with CyberArk PAM?
We evaluated Sailpoint IdentityIQ before ultimately choosing CyberArk. Sailpoint Identity Platform is a solution to manage risks in cloud enterprise environments. It automates and streamlines the m...
What do you like most about CyberArk Privileged Access Manager?
The most valuable features of the solution are control and analytics.
What is your experience regarding pricing and costs for CyberArk Privileged Access Manager?
There has been no reduced cost associated with CyberArk Privileged Access Manager, as when it is required, you must pay for their licensing and prepare the full environment. While there are costs f...
What is your experience regarding pricing and costs for Ekran System?
The business model has become more complex with changes in feature licensing, yet they provide affordable options, particularly with the standard edition, which doesn't charge for the management co...
What needs improvement with Ekran System?
Ekran System could improve in terms of communication to the market, particularly after their rebranding as Shiteka. The solution does not support other protocols beyond traditional monitoring chann...
What is your primary use case for Ekran System?
The primary use case for Ekran System is third-party vendor monitoring and privileged access management monitoring. It is also used for privilege access management solutions.
 

Also Known As

CyberArk Privileged Access Security, CyberArk Enterprise Password Vault
No data available
 

Overview

 

Sample Customers

Rockwell Automation
Deloitte, UPS, Seoul National University, KDN, Finat, Constitutional Court of Korea, Ukrsibbank
Find out what your peers are saying about CyberArk, Amazon Web Services (AWS), Proofpoint and others in User Activity Monitoring. Updated: August 2025.
867,370 professionals have used our research since 2012.