Try our new research platform with insights from 80,000+ expert users

CyberArk Privileged Access Manager vs Imanami GroupID vs Varonis Platform comparison

 

Comparison Buyer's Guide

Executive Summary

Review summaries and opinions

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
 

Mindshare comparison

Privileged Access Management (PAM) Market Share Distribution
ProductMarket Share (%)
CyberArk Privileged Access Manager16.3%
Delinea Secret Server7.5%
WALLIX Bastion7.4%
Other68.8%
Privileged Access Management (PAM)
User Provisioning Software Market Share Distribution
ProductMarket Share (%)
Imanami GroupID1.0%
SailPoint Identity Security Cloud30.2%
Saviynt14.4%
Other54.4%
User Provisioning Software
Data Loss Prevention (DLP) Market Share Distribution
ProductMarket Share (%)
Varonis Platform5.9%
Microsoft Purview Data Loss Prevention13.0%
Forcepoint Data Loss Prevention9.0%
Other72.1%
Data Loss Prevention (DLP)
 

Featured Reviews

Atul-Gujar - PeerSpot reviewer
Secures critical infrastructures with essential user session audit records
A potential area for improvement is enhancing support for cluster environments and distributed Vaults. Clients in multiple countries that need central access have different challenges that require better solutions from CyberArk. For financial services, CyberArk can improve incident response by ensuring fast support for critical priority tickets to meet compliance requirements. Providing more documentation on CyberArk is recommended for new team members to enhance their troubleshooting capabilities. I understand it's up to the client, but 99% fail to change the demo key, so it's crucial for CyberArk to emphasize changing the key and documenting it as part of the installation process.
Jonathan Cauthorn - PeerSpot reviewer
Simplifies the task of managing groups and is affordable and easy to implement
I'd like to see it be able to do more than just groups. I'd like it to be able to do some things with email distribution lists as well. It can do that, but there were a few things that were limiting. It was difficult to get it set up, particularly with Azure in the cloud. I'd like that to be a little bit smoother. I'd like to see a better user interface. It works, but it is clunky. There should be better import and export of LDAP queries and better management tools. We've got a ton of groups, and it does take quite a while to do nightly processing. This is something that definitely needs improvement.
Frederic  Delos - PeerSpot reviewer
Offers the ability to identify sensitive areas, allowing you to drill down into the sensitive data
The most effective feature for me is its ability to identify sensitive areas, allowing you to drill down into the sensitive data, provided you have access, to determine whether it's a false positive or a true positive. That's the best thing for me, out of all of it. It's got everything, like other ones, but I like to be able to look at something if I'm doing forensics on the alert and say, "Okay, do I really need to do something with this?" For example, we don't want sensitive data in our OneDrive. So it identifies the sensitive data that's possibly in the OneDrive. And what I can do is look at it and identify whether it's actually sensitive data in Datalert or whether it looks like sensitive data, but I know it's a false positive. If it is a false positive, I can basically say ignore this pattern based on X, Y, and Z, you know, whether it's Redjax or keyword proximity. So I like that. With other tools, I gotta go through a whole process because it's a little bit more complex. Here, I can tag it and bag it in one shot. And the next good time I scan, it slips over it. So it helps in that.

Quotes from Members

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
 

Pros

"The key aspects of privileged access management are being able rotate passwords, make sure someone is accountable, and tie it back to a user (when the system is being used)."
"CyberArk has resulted in a massive increase in our security footprint."
"CyberArk has the ability to change the credentials on every platform."
"Helped us meet our standards and requirements to help us comply with industry standards and banking regulations."
"The automatic password management is the most important feature. The second most important feature is the ability to enforce dual control on the release of those passwords. The combination of these two features is the most important thing for us because we can show that we're in control of who uses any non-personal account, and when they do so."
"We use the solution for password vaulting, password rotation, session management, and secret management."
"CyberArk Privileged Access Manager is cool."
"I appreciate the ease of use for support analysts."
"I have found the overall features to be useful."
"Imanami GroupID's UI is good."
"For each job code, we go through and determine the access they're supposed to have to the system. Based on that job code, we use the query tool and say that anybody who is in this job code gets these groups added to them, or conversely, if they change job codes, it removes the ones that they shouldn't have and adds the one they should. That runs every night, and the next day, everybody has the job codes they're supposed to have."
"The solution's classification engine is highly configurable and efficient."
"I also appreciate the reporting feature, which allows for the extraction of various reports based on specific needs. These reports can be used for audit purposes, such as tracking changes in file locations or deletions."
"The solution ensures that users have not accidentally shared sensitive information with the wrong people or too many people."
"It can easily identify unusual behavior or access patterns that may pose a potential threat, while operating as a unified reporting system."
"The analytics would have to be our most valuable feature."
"The 24/7 support is the most valuable feature. They have been able to answer support questions pretty quickly."
"There's also a 90-day policy where if a user is not using the warehouse, it will automatically delete that username."
"On the Varonis side, technical support is phenomenal. Their ability to explain is very good, and they seem to be very knowledgeable. When I get an alert that doesn't quite make sense, they dive in there and kind of take me through it. That's very useful and very good. There are some false alerts, but it is better to have a false alert than no alert at all."
 

Cons

"The greatest area of improvement is with the user interface of the Password Vault Web Access component."
"Some of the additional features that we are looking at are in the Conjur product. I am specifically discussing key management, API Keys, and things for connecting applications in the CI/CD pipelines."
"Areas of CyberArk Privileged Access Manager that can be improved include offering clearer configuration options."
"The web interface has come a long way, but the PrivateArk client seems clunky and not intuitive. It could use an update to be brought up to speed with the usability of PVWA."
"The main challenge was integrating with in-house IT and business applications, which are not standard. We needed to create special updates for that kind of integration."
"CyberArk Privileged Access Manager could improve the integration docking, it should have more layers. For example, integration with OpenShift."
"Transitioning from a traditional on-premises deployment to the privileged cloud has resulted in losing access to many logs and administrative tools typically available on the back end."
"The solution's architecture could be improved. It requires installation on four to five different servers."
"I'd like to see a better user interface. It works, but it is clunky. There should be better import and export of LDAP queries and better management tools."
"The product's implementation is complex. It should also work on GPO."
"The mobile application needs to be improved and there should be chatbox features to allow users to easily reach out for assistance."
"One area for improvement is the calculation engine. When applying rules in Varonis, especially for large datasets (terabytes of data), the calculations can be slow and require time to process. Speeding up this process would be beneficial."
"For unstructured data monitoring, it's one of the top ones, if not the top one, due to its usability."
"It is significantly complex."
"The remediation process can be improved. There will be no existing permission group for the McAfee channel domains. We can create a new permissions group for the required folder."
"The product is very complicated."
"I'd like to see automatic updates for this solution. Currently, it's a manual process to update all the keywords"
"The GUI should be more functional. There should be a process for connecting through Chrome, Internet Explorer, etc."
"Varonis requires more access permissions for its core functions compared to competitors, which can be a concern for companies about data safety."
 

Pricing and Cost Advice

"The price of CyberArk support could be a little bit less. Otherwise, pricing is fine."
"Although CyberArk Privileged Access Management is expensive, its protection capabilities outweigh the cost."
"The pricing is slightly higher compared to other solutions, but it is reasonable because there are better security features."
"CyberArk Privileged Access Manager is more expensive than its competitors, such as BeyondTrust, Delinea, and ManageEngine PAM360."
"CyberArk Privileged Access Manager is on the expensive side. It is very expensive."
"I focus more on the technical side, but I hear customers say that if CyberArk was more affordable, they might have acquired more licenses. Some clients consider alternative solutions due to pricing concerns."
"The pricing for CyberArk is on the higher side compared to other Privileged Access Management products. Something should be done regarding enterprise licensing for long-standing customers."
"In comparison to other products on the market, CyberArk is a more costly product."
"It is on a yearly basis, and it has the product license fee and the support for it. So, there is the licensing fee, and there is the annual maintenance that includes the support. I don't remember exactly, but we're probably paying somewhere in the neighborhood of $20,000 to $30,000 for it per year. We've got a pretty large implementation of it, and for the amount that we do, it is a pretty good deal. I would rate it a four out of five in terms of pricing."
"The price of the solution is reasonable."
"Licensing is on an annual basis. Maintenance and renewal fees are separate. Varonis Datalert is quite expensive."
"You could do a subscription, where you pay yearly, or you could purchase it outright. The licensing cost is based on the number of users on the system that you are monitoring."
"The platform is expensive. I rate the pricing a nine out of ten."
"The pricing is good. It neither expensive nor cheap. It is average."
"It's expensive, kind of, really expensive."
"I would rate the pricing an eight out of ten, with ten being the most expensive."
"Varonis Platform wasn't certainly the cheapest solution."
report
Use our free recommendation engine to learn which Privileged Access Management (PAM) solutions are best for your needs.
867,349 professionals have used our research since 2012.
 

Top Industries

By visitors reading reviews
Financial Services Firm
15%
Computer Software Company
15%
Manufacturing Company
9%
Government
6%
Computer Software Company
19%
Financial Services Firm
9%
Insurance Company
8%
Manufacturing Company
8%
Financial Services Firm
15%
Manufacturing Company
9%
Computer Software Company
9%
Insurance Company
8%
 

Company Size

By reviewers
Large Enterprise
Midsize Enterprise
Small Business
By reviewers
Company SizeCount
Small Business60
Midsize Enterprise41
Large Enterprise171
No data available
By reviewers
Company SizeCount
Small Business2
Midsize Enterprise1
Large Enterprise11
 

Questions from the Community

How does Sailpoint IdentityIQ compare with CyberArk PAM?
We evaluated Sailpoint IdentityIQ before ultimately choosing CyberArk. Sailpoint Identity Platform is a solution to m...
What do you like most about CyberArk Privileged Access Manager?
The most valuable features of the solution are control and analytics.
What is your experience regarding pricing and costs for CyberArk Privileged Access Manager?
There has been no reduced cost associated with CyberArk Privileged Access Manager, as when it is required, you must p...
What needs improvement with Imanami GroupID?
The product's implementation is complex. It should also work on GPO.
What advice do you have for others considering Imanami GroupID?
The notifications, approvals and emails are very smooth in Imanami GroupID. I rate it an eight out of ten.
What do you like most about Varonis Platform?
The solution has significantly improved data security and compliance posture by allowing us to track and monitor acti...
What needs improvement with Varonis Platform?
Varonis started as an on-premises solution and is transitioning to cloud. It hasn't fully moved yet, which is an area...
What is your primary use case for Varonis Platform?
The primary use case for Varonis Platform is data discovery, specifically for discovering sensitive data in our organ...
 

Also Known As

CyberArk Privileged Access Security, CyberArk Enterprise Password Vault
No data available
SlashNext Complete
 

Overview

 

Sample Customers

Rockwell Automation
Grant Thornton LLP
Nottingham Building Society
Find out what your peers are saying about CyberArk, Delinea, One Identity and others in Privileged Access Management (PAM). Updated: August 2025.
867,349 professionals have used our research since 2012.