Try our new research platform with insights from 80,000+ expert users

CyberArk Privileged Access Manager vs OpenText Privileged Access Manager comparison

 

Comparison Buyer's Guide

Executive SummaryUpdated on Sep 21, 2025

Review summaries and opinions

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
 

Categories and Ranking

CyberArk Privileged Access ...
Ranking in Privileged Access Management (PAM)
1st
Average Rating
8.6
Reviews Sentiment
6.8
Number of Reviews
227
Ranking in other categories
User Activity Monitoring (1st), Enterprise Password Managers (3rd), Mainframe Security (2nd), Operational Technology (OT) Security (3rd)
OpenText Privileged Access ...
Ranking in Privileged Access Management (PAM)
34th
Average Rating
6.0
Number of Reviews
1
Ranking in other categories
No ranking in other categories
 

Mindshare comparison

As of October 2025, in the Privileged Access Management (PAM) category, the mindshare of CyberArk Privileged Access Manager is 15.8%, down from 21.4% compared to the previous year. The mindshare of OpenText Privileged Access Manager is 0.5%, up from 0.3% compared to the previous year. It is calculated based on PeerSpot user engagement data.
Privileged Access Management (PAM) Market Share Distribution
ProductMarket Share (%)
CyberArk Privileged Access Manager15.8%
OpenText Privileged Access Manager0.5%
Other83.7%
Privileged Access Management (PAM)
 

Featured Reviews

Atul-Gujar - PeerSpot reviewer
Secures critical infrastructures with essential user session audit records
A potential area for improvement is enhancing support for cluster environments and distributed Vaults. Clients in multiple countries that need central access have different challenges that require better solutions from CyberArk. For financial services, CyberArk can improve incident response by ensuring fast support for critical priority tickets to meet compliance requirements. Providing more documentation on CyberArk is recommended for new team members to enhance their troubleshooting capabilities. I understand it's up to the client, but 99% fail to change the demo key, so it's crucial for CyberArk to emphasize changing the key and documenting it as part of the installation process.
MB
Has a useful credential vault feature but the user interface needs to be improved
I don't have a complete picture to be able to tell you that this is the best product. Because each customer in their own environment has a different set of circumstances and different situations that mandate different technologies. I cannot recommend this as the best product or recommend that you should use it. I would rate this product a six out of 10.

Quotes from Members

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
 

Pros

"The solution is very good for protecting full levels of data privacy."
"All the features of CyberArk are useful for me, but the biggest one is that CyberArk has logs for all the features. That is important when there is a problem. You know where to look and you have the information. In cyber security, the most important aspect is information."
"PSM (Privilege Session Manager."
"The fact that I can put my vault here in a central location on one net for example, and I'll have a CPM in California, a CPM in Texas, a CPM in New York, a CPM in Florida, and actually be able to grow with my company and not necessarily have to continue to grow my vault until I get to a certain number accounts - yet I can still manage everything across the country, if not the world - I love that. I love the flexibility and the capability of being able to pull those components out."
"The solution is stable."
"Within the solution, I love the fact that everything is recorded. The configuration capabilities are great, too."
"It's secure and reliable. I especially appreciate that it's locked down and only allows access to authorized components."
"It enables companies to automate password management on target systems gaining a more secure access management approach."
"Most valuable feature is the credential vault."
 

Cons

"Improved user-friendliness, granularity, and functionality would enhance the product further."
"More than the product itself, there is room for improvement in the documentation. The documentation should be very detailed and very structured. It has a lot of good information, on one level, but I feel that it could be more elaborate and more structured."
"One of our current issues is a publishing issue. If we whitelist Google Chrome, all the events of Google Chrome should be gone. It is not happening."
"Transitioning from a traditional on-premises deployment to the privileged cloud has resulted in losing access to many logs and administrative tools typically available on the back end."
"The documentation is rather basic and it is missing many use cases."
"Response time is not ideal, and reaching someone knowledgeable can take time."
"The lead product has a slow process. There are some reports and requirements from CyberArk which are not readily available as an applicable solution. We have made consistent management requests in the logs."
"I would like to see improvement in the custom connector for integration with different devices."
"The user interface could be improved, it's not that good,"
 

Pricing and Cost Advice

"The price of CyberArk Privileged Access Manager could be less expensive."
"Generally, I don't get involved in the licensing or the purchasing side of it, but I do know that the licenses are expensive."
"The product’s pricing is feasible for enterprise customers. The pricing is expensive for smaller businesses. You need to pay additional costs for service implementation and local support."
"Pricing is a problem. CyberArk is expensive compared to other products I know. It is similar to buying a German car. It comes with all the bells and whistles, but some companies may find it too expensive."
"Network and security licenses are currently being managed by other outsource vendors, so they are facing some type of problems in the digital aspect."
"CyberArk Privileged Access Manager is on the expensive side. It is very expensive."
"It can be an expensive product."
"The price of the solution is reasonable."
Information not available
report
Use our free recommendation engine to learn which Privileged Access Management (PAM) solutions are best for your needs.
871,469 professionals have used our research since 2012.
 

Top Industries

By visitors reading reviews
Financial Services Firm
15%
Computer Software Company
14%
Manufacturing Company
9%
Government
6%
No data available
 

Company Size

By reviewers
Large Enterprise
Midsize Enterprise
Small Business
By reviewers
Company SizeCount
Small Business59
Midsize Enterprise41
Large Enterprise171
No data available
 

Questions from the Community

How does Sailpoint IdentityIQ compare with CyberArk PAM?
We evaluated Sailpoint IdentityIQ before ultimately choosing CyberArk. Sailpoint Identity Platform is a solution to manage risks in cloud enterprise environments. It automates and streamlines the m...
What do you like most about CyberArk Privileged Access Manager?
The most valuable features of the solution are control and analytics.
What is your experience regarding pricing and costs for CyberArk Privileged Access Manager?
Regarding costs, CyberArk Privileged Access Manager is not a cheap product; hence, many companies struggle with its high licensing cost. While it's valuable, it comes with a high price tag, making ...
Looking for recommendations and a pros/cons template for software to detect insider threats
This is an inside-out --- outside-in --- inside-in question, as an insider can be an outsider as well. There is no short answer other than a blend of a PAM tool with Behavioral Analytics and Endpo...
 

Also Known As

CyberArk Privileged Access Security, CyberArk Enterprise Password Vault
Micro Focus Privileged Account Manager
 

Overview

 

Sample Customers

Rockwell Automation
Information Not Available
Find out what your peers are saying about CyberArk, Delinea, WALLIX and others in Privileged Access Management (PAM). Updated: September 2025.
871,469 professionals have used our research since 2012.