Try our new research platform with insights from 80,000+ expert users

CyberArk Privileged Access Manager vs i-Sprint AccessMatrix Universal Access Management comparison

 

Comparison Buyer's Guide

Executive Summary

Review summaries and opinions

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
 

Categories and Ranking

CyberArk Privileged Access ...
Average Rating
8.6
Reviews Sentiment
6.8
Number of Reviews
226
Ranking in other categories
User Activity Monitoring (1st), Enterprise Password Managers (2nd), Privileged Access Management (PAM) (1st), Mainframe Security (2nd), Operational Technology (OT) Security (3rd)
i-Sprint AccessMatrix Unive...
Average Rating
8.0
Reviews Sentiment
7.7
Number of Reviews
2
Ranking in other categories
Single Sign-On (SSO) (27th), Authentication Systems (36th), Access Management (28th)
 

Featured Reviews

Abdul Durrani - PeerSpot reviewer
Enables granular and secure access with just-in-time access and Zero Trust model
CyberArk provides a good amount of control over access types. However, as a future enhancement, having additional features for cross-platform integration would be beneficial. It would be good to have integrations with other tools and firewalls, such as Zscaler and CrowdStrike. Although I am not fully aware of recent updates, more cross-platform integration would be valuable. A SOC analyst would like to have centralized access in terms of information flowing in even for privileged access management. They would like to have control over everything instead of opening four to five tabs for different sorts of information. Cross-platform integration would help with that. Customers also want CyberArk's pricing to be better so that they can implement it further and have more licenses. Implementing a privileged access management solution can be challenging. It would be great if CyberArk could provide recommendations based on the compliance standards of an organization. It would help system admins ensure that all the required ports are closed and the systems are being managed properly. If any system is not being used anymore, any ports opened for that system need to be closed. Having such recommendations would be helpful.
NO
A stable and scalable solution with reasonable pricing
The solution has high support capability.  The tool needs to improve its cloud service capability.  I have been working with the solution for 15 years.  I would rate the solution's stability a ten out of ten.  I would rate the tool's scalability a ten out of ten since it is highly scalable. We…

Quotes from Members

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
 

Pros

"The most valuable features of CyberArk Privileged Access Manager include its search capabilities."
"The impact of CyberArk Privileged Access Manager on customer operational efficiency is quite positive."
"The credentials management capability is key to ensuring that the credentials are kept secure and that access to them is done on a temporary and event-driven basis."
"It is very simple to use."
"Identity and access management are fundamental in cybersecurity."
"We know when passwords will be expiring so we can force users to change their passwords, as well as requiring specific password requirements for length, complexity, etc."
"The solution is very good for protecting full levels of data privacy."
"The solution is stable and reliable."
"The feature that I have found the most valuable is that they are open to connecting with any token. For example, a year ago, we were looking for a soft token, and we started to look for alternatives. They are open to connecting with any token that we looking for."
"The solution has high support capability."
 

Cons

"CyberArk Enterprise Password Vault's deployment is complex for resources with little experience. Tech support needs to be improved as well based on quality and knowledge."
"The reporting should be improved. There should be more customization."
"It can be integrated with other systems, but it is not easy to integrate. It takes too long to integrate it. Its integration should be easier and simpler."
"The initial setup can get complex."
"Improved user-friendliness, granularity, and functionality would enhance the product further."
"It is complicated to deploy for Windows servers compared to other vendors."
"It could be more user-friendly. Sometimes I encounter issues, and I do not know what the issue is. It takes a lot of time to find the error and fix it. Sometimes it gives an error, but I do not know what the error is. I have to find the documents, but it does not provide all the details needed to fix the error. This is one of the day-to-day issues with CyberArk."
"We'd like to see the creation of some kind of memo field for each device account, which could be used, in our network at least, to leave a note about the device for either the security or network engineering team members."
"The user interface is not quite good and easy to use. There are a lot of menus, and the look and feel is not modern like a modern app."
"The tool needs to improve its cloud capability."
 

Pricing and Cost Advice

"It's per-company, license-based."
"Overall, its pricing is really good. The main difference from all the other vendors is that they have one package that covers all the functionality and modules of the basic PAM, except the add-on modules like adware and server protection. It also doesn't include the licenses for domain controller protection or maybe an API call-related feature. For the basic privileged access management, the bundle pricing is really good, but when it comes to an agent-based solution for advanced cyber protection or application identity managers, it is expensive. Services are also very expensive if you hire the services team from CyberArk, but these guys are really good. For a couple of large banking projects, we had an experience with them. The banks wanted to have things quickly and efficiently, so we had to hire them. If we take four weeks, these guys can do everything on a weekend. They charge quite a big sum of money, but they know the system well."
"Although CyberArk Privileged Access Management is expensive, its protection capabilities outweigh the cost."
"Licensing fees are paid on a yearly basis."
"There are no additional costs other than the standard licensing fees."
"The cost is high compared to other products."
"CyberArk is very expensive and there are additional fees for add-ons."
"The product’s pricing is feasible for enterprise customers. The pricing is expensive for smaller businesses. You need to pay additional costs for service implementation and local support."
"I would rate the solution's pricing a three out of ten. The tool's licensing is monthly."
report
Use our free recommendation engine to learn which Access Management solutions are best for your needs.
865,384 professionals have used our research since 2012.
 

Top Industries

By visitors reading reviews
Computer Software Company
15%
Financial Services Firm
15%
Manufacturing Company
9%
Government
7%
No data available
 

Company Size

By reviewers
Large Enterprise
Midsize Enterprise
Small Business
No data available
 

Questions from the Community

How does Sailpoint IdentityIQ compare with CyberArk PAM?
We evaluated Sailpoint IdentityIQ before ultimately choosing CyberArk. Sailpoint Identity Platform is a solution to manage risks in cloud enterprise environments. It automates and streamlines the m...
What do you like most about CyberArk Privileged Access Manager?
The most valuable features of the solution are control and analytics.
Ask a question
Earn 20 points
 

Also Known As

CyberArk Privileged Access Security, CyberArk Enterprise Password Vault
AccessMatrix Universal Access Management
 

Overview

 

Sample Customers

Rockwell Automation
IRAS, Singapore Bank
Find out what your peers are saying about CyberArk Privileged Access Manager vs. i-Sprint AccessMatrix Universal Access Management and other solutions. Updated: July 2025.
865,384 professionals have used our research since 2012.