Try our new research platform with insights from 80,000+ expert users

CyberArk Privileged Access Manager vs Intercede MyID PSM (Password Security Management) comparison

 

Comparison Buyer's Guide

Executive SummaryUpdated on Oct 27, 2025

Review summaries and opinions

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
 

Categories and Ranking

CyberArk Privileged Access ...
Ranking in Enterprise Password Managers
3rd
Average Rating
8.6
Reviews Sentiment
6.8
Number of Reviews
229
Ranking in other categories
User Activity Monitoring (1st), Privileged Access Management (PAM) (1st), Mainframe Security (2nd), Operational Technology (OT) Security (3rd)
Intercede MyID PSM (Passwor...
Ranking in Enterprise Password Managers
38th
Average Rating
9.0
Reviews Sentiment
7.8
Number of Reviews
2
Ranking in other categories
No ranking in other categories
 

Mindshare comparison

As of January 2026, in the Enterprise Password Managers category, the mindshare of CyberArk Privileged Access Manager is 6.9%, down from 7.4% compared to the previous year. The mindshare of Intercede MyID PSM (Password Security Management) is 0.3%, up from 0.0% compared to the previous year. It is calculated based on PeerSpot user engagement data.
Enterprise Password Managers Market Share Distribution
ProductMarket Share (%)
CyberArk Privileged Access Manager6.9%
Intercede MyID PSM (Password Security Management)0.3%
Other92.8%
Enterprise Password Managers
 

Featured Reviews

SI
Senior PAM Consultant at iC Consult GmbH
Makes privileged access management easy with automation and granular control
Many people underestimate the value of these tools because they treat them as simple automated password management. Once you realize the volume of passwords in your organization and factor in nonhuman passwords, you realize its value. Last year, CyberArk Impact cited 45 nonhuman passwords for every human password. If you have 10,000 employees, you can imagine the number of passwords. There are also many other operations. For example, you have a Qualys scanner that needs to reach out and touch all your endpoints and scan them for vulnerabilities. They use an API call to CyberArk to pull out a Privileged credential that allows them to log in to that target. This is an automated machine call. It is tapping into CyberArk to get that credential. There can be hundreds of thousands of those operations a day. You do not want to manage those passwords by hand. Some people marginalize the significance of such a solution by saying that it is just a fancy password changer. It goes well beyond that, especially with API calls and automation. Its importance extends beyond merely changing passwords; it involves automation, API calls, and process integration, crucial in agile environments for standing up new Amazon servers or other processes needing privileged credentials. CyberArk can automate these tasks into their build processes. Another critical feature is the proxy service via Privileged Session Manager (PSM), providing not only a proxy between your user and the target servers, protecting against malware but also offering session recording. Many companies I have worked with implemented a PAM product as a knee-jerk reaction to SOX audit requirements. They discovered they needed session recording and retention for regulatory compliance. This has become a major factor for clients instituting CyberArk, so PSM is a big deal in addition to regular password rotation.
Robin Schechinger - PeerSpot reviewer
Product Owner at Telekom Deutschland GmbH
A tool to encrypt and decrypt emails that can also be useful for general access management
I rate the initial setup process of Intercede MyID an eight on a scale of one to ten, where one is difficult, and ten is easy. The solution was deployed throughout the whole organization, meaning the solution was rolled out in my company, and that's it. The solution was deployed in a couple of days. Two people were required for the solution's deployment and maintenance phases.

Quotes from Members

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
 

Pros

"The most valuable features of CyberArk Privileged Access Manager include its search capabilities."
"The best feature of CyberArk Privileged Access Manager is its core function: automatically managing and securing credentials."
"Our most valuable features would probably be key rotation, the SKM or SSH key manager, and account discovery."
"Considering all those factors and being the best tool in the market for Privileged Access Management, it is recommended."
"Our go-to solution for securing against the pass the hash attack vector and auditing privileged account usage."
"The credentials management capability is key to ensuring that the credentials are kept secure and that access to them is done on a temporary and event-driven basis."
"I appreciate CyberArk's real-time capabilities. I can secure critical sessions, such as SSH or database sessions."
"The key aspects of privileged access management are being able rotate passwords, make sure someone is accountable, and tie it back to a user (when the system is being used)."
"The feature for signing documents is important to me."
"The most valuable feature of the solution is the access management."
 

Cons

"Improvements in CyberArk Privileged Access Manager should focus on simplifying installation and upgrade times, and also consider making professional services training more accessible to implementers and partners."
"It is easily customized, and that customization makes it very easy to start trying to shoehorn the solution into roles it was never intended to fill."
"Customers also want CyberArk's pricing to be better so that they can implement it further and have more licenses."
"Many of the infrastructure folks who use the product dislike it because it complicates their workflow. They get a little less control, and they have to go through a specific solution. It proactively logs in for them, which obfuscates some of the issues that they may be troubleshooting."
"It can be integrated with other systems, but it is not easy to integrate. It takes too long to integrate it. Its integration should be easier and simpler."
"It is complicated to deploy for Windows servers compared to other vendors."
"I think they can improve account onboarding. For instance, you have to use the Password Vault utility, whereas in Thycotic I think there is a feature in the user interface that allows you to upload your account with an Excel file. So I'd like to have a similar thing in CyberArk."
"In CyberArk Privileged Access Manager, the UI has room for improvement, as does the dashboard reporting, which could be made better or easier to use."
"I'm not sure whether the solution has a mobile version or mobile dashboard, but that would be nice."
"Reporting features would be a good addition to Intercede MyID, as it is one of the areas where the solution lacks."
 

Pricing and Cost Advice

"Licensing fees are paid on a yearly basis."
"Since CyberArk is at the top of the Gartner list, the cost is indeed on the higher side, but customers must discern which entities are essential to purchase. They should weigh the cost against the quality received."
"The solution is available at a high price"
"Cost efficiency is the number one thing that can be improved in my mind. This would change lots of companies minds on purchasing the product."
"The solution is very expensive and requires a license. We pay for an enterprise license."
"It can be an expensive product."
"Pricing is quite high and it could be improved."
"CyberArk provides all the features bundled. This is compared to other vendors who provide them as a different license for each functionality."
"I rate the product's pricing a seven on a scale of one to ten, where one is cheap, and ten is expensive."
report
Use our free recommendation engine to learn which Enterprise Password Managers solutions are best for your needs.
881,082 professionals have used our research since 2012.
 

Top Industries

By visitors reading reviews
Financial Services Firm
15%
Manufacturing Company
10%
Computer Software Company
9%
Government
6%
No data available
 

Company Size

By reviewers
Large Enterprise
Midsize Enterprise
Small Business
By reviewers
Company SizeCount
Small Business59
Midsize Enterprise40
Large Enterprise173
No data available
 

Questions from the Community

How does Sailpoint IdentityIQ compare with CyberArk PAM?
We evaluated Sailpoint IdentityIQ before ultimately choosing CyberArk. Sailpoint Identity Platform is a solution to manage risks in cloud enterprise environments. It automates and streamlines the m...
What do you like most about CyberArk Privileged Access Manager?
The most valuable features of the solution are control and analytics.
What is your experience regarding pricing and costs for CyberArk Privileged Access Manager?
My thoughts on the pricing of CyberArk Privileged Access Manager depend entirely on the vendors' requirements. If they want their things to be secure, they have to spend accordingly. We have four t...
Ask a question
Earn 20 points
 

Also Known As

CyberArk Privileged Access Security, CyberArk Enterprise Password Vault
MyID
 

Overview

 

Sample Customers

Rockwell Automation
Wells Fargo, Boeing, Airbus, United Health Group, U.S. Social Security Administration, U.S. Department of Homeland Security, Kuwait Government
Find out what your peers are saying about CyberArk Privileged Access Manager vs. Intercede MyID PSM (Password Security Management) and other solutions. Updated: December 2025.
881,082 professionals have used our research since 2012.