

Find out what your peers are saying about CyberArk, One Identity, Okta and others in Privileged Access Management (PAM).
The return on investment lies in improved security infrastructure, addressing over-privileged access, and reducing the risk of credential compromise, which is a major source of data breaches.
The end users have the authority to reconcile the password or verify it before using session isolation, which is one of the unique features that can be enabled through Privileged Session Manager, preventing any attacks from happening within the organization when connected with sessions through CyberArk Privileged Access Manager.
CyberArk Privileged Access Manager has helped customers save on costs primarily by reducing the number of engineering and information security personnel.
It enhances security by ensuring only the right person can access systems, even if their login credentials are compromised.
CyberArk has been exceptional in coming back to us with immediate responses.
It could be forever until you talk to someone who knows what they are doing.
Based on the issue resolution and support quality, I rate the support 10 out of 10.
At times, some technical staff lack knowledge, which delays issue resolution.
Customer service and support are excellent.
Technical support from Fortinet deserves a rating of 10.
The CPM can reportedly handle up to 50,000 accounts independently without issue.
I would rate it a ten out of ten for scalability.
They had 40,000 passwords in this one safe, and it was saving the last ten iterations of each password object. That means they had 400,000 password objects in this safe. They exceeded the limit.
The scalability of FortiAuthenticator is good, and I would rate it an eight on a scale of one to ten.
I find Fortinet FortiAuthenticator to be highly scalable, and I would rate it an eight out of ten for scalability.
Fortinet FortiAuthenticator should be sufficiently scalable.
Proper fine-tuning and expertise ensure the product performs well.
Overall, the stability of the solution is high.
It has a large customer base and positive feedback within my network.
It remains stable even when the number of concurrent users increases.
They want everything to be on the cloud, but even in the SaaS version of CyberArk Privileged Access Manager, they need to deploy some servers on-premises.
We cannot generate a plug-in for web-based applications.
If they want clients to move to the cloud, they need to support them in real-time.
For example, authentication for wireless users expires after 24 hours, requiring re-authentication daily.
For example, Cisco Duo is on the cloud, so we cannot compete with that part if a user requires a cloud-based two-factor authentication solution.
I recommend Fortinet make its images migratable between environments.
CyberArk is expensive compared to other products I know.
CyberArk is comparatively expensive compared to other PAM solutions, such as Delinea, especially during renewal.
CyberArk's SaaS solution is particularly expensive.
Fortinet FortiAuthenticator is not overly expensive compared to other Fortinet subscriptions.
CyberArk Privileged Access Manager helps ensure data privacy because we now know who is using which credentials and at what time.
It keeps a record of activities, allowing me to easily fetch screen recordings to detect any misuse and see who did what and what happened.
It can integrate with Splunk, SNMP, and other solutions and technologies.
The integration with FortiToken is outstanding, adding a layer of security for authentication.
We use multi-factor authentication for enhancing security.
Fortinet FortiAuthenticator can be used from anywhere in the world, and the authenticator services function globally.
| Product | Mindshare (%) |
|---|---|
| CyberArk Privileged Access Manager | 10.5% |
| Delinea Secret Server | 4.5% |
| One Identity Safeguard | 4.4% |
| Other | 80.6% |
| Product | Mindshare (%) |
|---|---|
| Fortinet FortiAuthenticator | 3.6% |
| Microsoft Entra ID | 10.3% |
| Okta Platform | 10.0% |
| Other | 76.1% |


| Company Size | Count |
|---|---|
| Small Business | 60 |
| Midsize Enterprise | 42 |
| Large Enterprise | 174 |
| Company Size | Count |
|---|---|
| Small Business | 38 |
| Midsize Enterprise | 18 |
| Large Enterprise | 11 |
CyberArk Privileged Access Manager safeguards privileged accounts through password management, credential rotation, and session recording. With seamless integration and real-time monitoring, it ensures robust security across platforms.
CyberArk Privileged Access Manager is recognized for its extensive capabilities in managing and securing privileged accounts. It offers vital functionalities such as automatic password rotation, real-time session monitoring, and cross-platform integration through APIs and custom connectors. Users find the flexibility in workflows and granular access controls beneficial, particularly in protecting access across cloud and on-prem infrastructures. However, improvements in its interface, installation process, plugin support, and integration with third-party tools are often suggested. Pricing is a concern for many, along with the need for better dashboard reporting, user provisioning, and enhanced documentation. Organizations leverage this tool for encrypting and monitoring critical account activities and automating password management to bolster security.
What are the key features of CyberArk Privileged Access Manager?CyberArk Privileged Access Manager finds substantial use in industries such as finance, healthcare, and technology, where the protection of privileged accounts is critical. These sectors rely on its capabilities to manage application credentials securely and provide safe access for developers, administrators, and vendors across various infrastructures.
Fortinet FortiAuthenticator enhances security through intuitive management and integration capabilities, offering two-factor authentication and seamless connectivity with FortiGate, LDAP, and AD. It provides robust OTP features and operates efficiently across diverse environments.
Fortinet FortiAuthenticator is designed to streamline two-factor and multi-factor authentication processes across diverse network environments. Its seamless integration with Active Directory optimizes secure user management and enhances VPN security. It facilitates multi-domain authentication and serves as a comprehensive identity and access management tool. Organizations leverage its capabilities for VPN and network access while utilizing tokens for increased security. Its single sign-on feature aids in simplifying identity management and authorization, supporting extensive network and application security demands. However, improvements could be made to its outdated interface, pricing strategy, and better integration with third-party applications. Streamlined command line configurations and bolstered technical support would enhance user experience further.
What are the key features of Fortinet FortiAuthenticator?In industries like finance, healthcare, and education, Fortinet FortiAuthenticator is implemented to secure sensitive data and streamline access management. Its integration capabilities support compliance requirements, while its authentication features ensure authorized access across platforms, enhancing both security and operational efficiency.
We monitor all Privileged Access Management (PAM) reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.