Try our new research platform with insights from 80,000+ expert users

CyberArk Privileged Access Manager vs IBM Resource Access Control Facility comparison

 

Comparison Buyer's Guide

Executive SummaryUpdated on Feb 4, 2025

Review summaries and opinions

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
 

Categories and Ranking

CyberArk Privileged Access ...
Ranking in Mainframe Security
1st
Average Rating
8.6
Reviews Sentiment
6.8
Number of Reviews
230
Ranking in other categories
User Activity Monitoring (1st), Enterprise Password Managers (2nd), Privileged Access Management (PAM) (1st), Operational Technology (OT) Security (3rd)
IBM Resource Access Control...
Ranking in Mainframe Security
4th
Average Rating
8.0
Reviews Sentiment
6.8
Number of Reviews
3
Ranking in other categories
No ranking in other categories
 

Mindshare comparison

As of March 2026, in the Mainframe Security category, the mindshare of CyberArk Privileged Access Manager is 3.7%, up from 1.3% compared to the previous year. The mindshare of IBM Resource Access Control Facility is 12.3%, down from 14.8% compared to the previous year. It is calculated based on PeerSpot user engagement data.
Mainframe Security Mindshare Distribution
ProductMindshare (%)
CyberArk Privileged Access Manager3.7%
IBM Resource Access Control Facility12.3%
Other84.0%
Mainframe Security
 

Featured Reviews

Atul-Gujar - PeerSpot reviewer
CyberArk manager at a comms service provider with 10,001+ employees
Secures critical infrastructures with essential user session audit records
A potential area for improvement is enhancing support for cluster environments and distributed Vaults. Clients in multiple countries that need central access have different challenges that require better solutions from CyberArk. For financial services, CyberArk can improve incident response by ensuring fast support for critical priority tickets to meet compliance requirements. Providing more documentation on CyberArk is recommended for new team members to enhance their troubleshooting capabilities. I understand it's up to the client, but 99% fail to change the demo key, so it's crucial for CyberArk to emphasize changing the key and documenting it as part of the installation process.
KC
Senior systems engineer at Unum
We're able to do role-based security so when new people join the company we're able to quickly add them to the proper security through role-based security groups.
It's completely secure. That's the best answer I can give you. We're able to do role-based security so when new people join the company we're able to quickly add them to the proper security through role-based security groups. Our resources are secured with this product I would welcome something…

Quotes from Members

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
 

Pros

"The most important feature is managing the credentials and implementing those policies which rotate the credentials. Session Manager is also key in not letting the users have access to those credentials. Instead, CyberArk actually manages everything by itself."
"It improves security in our company. We have more than 10,000 accounts that we manage in CyberArk. We use these accounts for SQLs, Windows Server, and Unix. Therefore, keeping these passwords up-to-date in another solution or software would be impossible. Now, we have some sort of a platform to manage passwords, distribute the inflow, and manage IT teams as well as making regular changes to it according to the internal security policies in our bank."
"The credentials management capability is key to ensuring that the credentials are kept secure and that access to them is done on a temporary and event-driven basis."
"Increased our insight into how privileged accounts are being used and distributed within our footprint."
"I would rate this solution a nine out of ten."
"The most valuable features of CyberArk Enterprise Password Vault are password rotations and password encryptions."
"We utilize PTA, and we are now integrating that into our risk management program so we can identify the uses of the vault which are outside of the norm, e.g., people accessing after hours. It has reduced the amount of time that we are looking through logs and audit logs."
"There are no issues with scalability, and our clients are very happy to use the product."
"Perfectly integrated with the z/OS operating system and all the other products in the IBM z/OS family."
"It's completely secure."
"Technical support is exceptional."
 

Cons

"However, there is still room for improvement."
"The license is expensive."
"They need to provide better training for the System Integrator."
"The DNA scan should be able to scan Unix machines for privileged accounts."
"The architecture needs to be improved."
"​It's hard to find competent resellers/support."
"Perhaps improve the user registry integration. User registry integration is atypical in the sense that the product creates a copy of the user inside the product itself."
"The issue of technical support is crucial, as there are not many specialized partners available in Brazil to provide this service. While English language support is of good quality, there is a significant shortage of partners capable of meeting the demand locally."
"I would welcome something that is more easily integrated with distributor platforms."
"The way to pull security logs could be better."
"I would like the generation of RACF on-screen listings and reports to be more flexible."
 

Pricing and Cost Advice

"This product is very expensive."
"I hope to learn how the pricing works so that I can understand it better, but I am certain it is not inexpensive."
"There are additional features added to our CyberArk Privileged Access Manager license. For example, features that allow us to integrate into various kinds of platforms."
"This solution is expensive."
"CyberArk is one of the best PAM solutions and one of the most expensive, but it works better than the others, so the pricing is fair."
"Compared to other solutions, it is costly."
"CyberArk Privileged Access Manager is more expensive than its competitors, such as BeyondTrust, Delinea, and ManageEngine PAM360."
"It's not a cheap application. It's very expensive."
Information not available
report
Use our free recommendation engine to learn which Mainframe Security solutions are best for your needs.
884,976 professionals have used our research since 2012.
 

Top Industries

By visitors reading reviews
Financial Services Firm
14%
Manufacturing Company
10%
Computer Software Company
8%
Government
6%
Financial Services Firm
26%
Manufacturing Company
10%
Government
10%
Healthcare Company
8%
 

Company Size

By reviewers
Large Enterprise
Midsize Enterprise
Small Business
By reviewers
Company SizeCount
Small Business59
Midsize Enterprise42
Large Enterprise174
No data available
 

Questions from the Community

How does Sailpoint IdentityIQ compare with CyberArk PAM?
We evaluated Sailpoint IdentityIQ before ultimately choosing CyberArk. Sailpoint Identity Platform is a solution to manage risks in cloud enterprise environments. It automates and streamlines the m...
What do you like most about CyberArk Privileged Access Manager?
The most valuable features of the solution are control and analytics.
What is your experience regarding pricing and costs for CyberArk Privileged Access Manager?
My thoughts on the pricing of CyberArk Privileged Access Manager depend entirely on the vendors' requirements. If they want their things to be secure, they have to spend accordingly. We have four t...
Ask a question
Earn 20 points
 

Also Known As

CyberArk Privileged Access Security, CyberArk Enterprise Password Vault
IBM RACF
 

Overview

 

Sample Customers

Rockwell Automation
Information Not Available
Find out what your peers are saying about CyberArk Privileged Access Manager vs. IBM Resource Access Control Facility and other solutions. Updated: March 2026.
884,976 professionals have used our research since 2012.