Try our new research platform with insights from 80,000+ expert users

CyberArk Privileged Access Manager vs Proofpoint Insider Threat Management comparison

 

Comparison Buyer's Guide

Executive SummaryUpdated on Mar 3, 2025

Review summaries and opinions

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
 

Categories and Ranking

CyberArk Privileged Access ...
Ranking in User Activity Monitoring
1st
Average Rating
8.6
Reviews Sentiment
6.8
Number of Reviews
229
Ranking in other categories
Enterprise Password Managers (3rd), Privileged Access Management (PAM) (1st), Mainframe Security (2nd), Operational Technology (OT) Security (3rd)
Proofpoint Insider Threat M...
Ranking in User Activity Monitoring
3rd
Average Rating
8.4
Reviews Sentiment
6.8
Number of Reviews
6
Ranking in other categories
User Entity Behavior Analytics (UEBA) (10th), Insider Risk Management (4th)
 

Mindshare comparison

As of September 2025, in the User Activity Monitoring category, the mindshare of CyberArk Privileged Access Manager is 13.0%, down from 24.6% compared to the previous year. The mindshare of Proofpoint Insider Threat Management is 23.7%, down from 26.5% compared to the previous year. It is calculated based on PeerSpot user engagement data.
User Activity Monitoring Market Share Distribution
ProductMarket Share (%)
CyberArk Privileged Access Manager13.0%
Proofpoint Insider Threat Management23.7%
Other63.3%
User Activity Monitoring
 

Featured Reviews

Atul-Gujar - PeerSpot reviewer
Secures critical infrastructures with essential user session audit records
A potential area for improvement is enhancing support for cluster environments and distributed Vaults. Clients in multiple countries that need central access have different challenges that require better solutions from CyberArk. For financial services, CyberArk can improve incident response by ensuring fast support for critical priority tickets to meet compliance requirements. Providing more documentation on CyberArk is recommended for new team members to enhance their troubleshooting capabilities. I understand it's up to the client, but 99% fail to change the demo key, so it's crucial for CyberArk to emphasize changing the key and documenting it as part of the installation process.
reviewer1271289 - PeerSpot reviewer
Good value, easy to use, and easy to deploy
In terms of what can be improved, that is a question I think the end users can tell you better. I'm not the end-user for this system. However, I can say that it needs to be more scalable. I think they already have a good value proposition in terms of being a hybrid model, and the reporting is okay, as well. It could have better integration with other SIEMs, but this integration has to come from the SIEM side, not ObserveIT.

Quotes from Members

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
 

Pros

"CyberArk Privileged Access Manager has made our operations more streamlined. There is an approval process, so it helps us keep tabs on who's working on what and for how long."
"It enables companies to automate password management on target systems gaining a more secure access management approach."
"The solution is highly stable."
"It gives us the capability to rotate passwords."
"Session recordings and timestamps are valuable features. They allow me to specifically select the time a particular command was executed, so I do not have to review the entire recording. I can click on events to determine where and when they happened."
"CyberArk Privileged Access Manager’s ability to safeguard credentials for our organization is very important because it helps in managing the keys to the kingdom, especially the privileged access for various platforms."
"The automatic change of the password and Privileged Session Manager (PSM) are the most valuable features. With Privileged Session Manager, you can control the password management in a centralized way. You can activate these features in a session; the session isolation and recording. You apply the full intermediation principle. So, you must pass through CyberArk PAM to get access to the target system. You don't need to know the password, and everything that you do is registered and auditable. In this case, no one gets to touch the password directly. Also, you can implement detection and response behavior in case of a breach."
"The most important feature is managing the credentials and implementing those policies which rotate the credentials. Session Manager is also key in not letting the users have access to those credentials. Instead, CyberArk actually manages everything by itself."
"ObserveIT is small, easy to use, easy to deploy, and is not complicated, so it's more generally suited for only SMBs. It's a good value with a cheaper price."
 

Cons

"Regarding pricing for CyberArk Privileged Access Manager, it is quite costly, with premium pricing, making it more suitable for mid-to-large enterprises rather than small businesses and startups."
"They are taking two to three days for resolution are too slow. Customers, including myself, do not want to wait this long for solutions."
"The current user interface is a little dated. However, I hear there are changes coming in the next version."
"We had an issue with the Copy feature... Apparently, in version 10, that Copy feature does not work. You actually have to click Show and then copy the password from within Show and then paste it. We've had a million tickets and we had to figure out a workaround to it."
"The solution should be able to mitigate internal threats"
"The solution needs better features for end users to manage their own whitelisting for API retrieval."
"The tool needs to improve its usage and interface. They need to have a modern and useful interface. I want the product to improve its integration capabilities as well since some of the integration features do not work always."
"We would like to expand the usage of the auto discovery accounts feed, then on our end, tie in the REST API for automation."
"ObserveIT is not scalable and it's not for the medium to large corporations. It's for the smaller environments. For the larger corporations, we have other scalable solutions."
 

Pricing and Cost Advice

"My company always complains about the cost of CyberArk Privileged Access Manager because it's too high."
"It costs us around $200 per user."
"There are additional features added to our CyberArk Privileged Access Manager license. For example, features that allow us to integrate into various kinds of platforms."
"Network and security licenses are currently being managed by other outsource vendors, so they are facing some type of problems in the digital aspect."
"CyberArk Privileged Access Manager is more expensive than its competitors, such as BeyondTrust, Delinea, and ManageEngine PAM360."
"CyberArk DNA is free if you purchase the CyberArk solution. There is no additional charge for CyberArk DNA, which is great."
"Before we bought it, they were licensing each function individually, which got complicated and very expensive. When we decided to buy it, it was much more straightforward and still quite expensive, but it brings a lot of value and risk reduction to the organization."
"I haven't seen the numbers. I know it is not cheap, but I don't know what it is. I would rate it a six out of ten in terms of pricing. It is definitely more expensive than the other product, but it also provides more functionality, and it is modular too. So, we pay for the functionality we're actually going to use, and that's nice."
Information not available
report
Use our free recommendation engine to learn which User Activity Monitoring solutions are best for your needs.
867,676 professionals have used our research since 2012.
 

Top Industries

By visitors reading reviews
Financial Services Firm
15%
Computer Software Company
14%
Manufacturing Company
9%
Government
6%
Financial Services Firm
13%
Manufacturing Company
9%
Media Company
8%
Healthcare Company
8%
 

Company Size

By reviewers
Large Enterprise
Midsize Enterprise
Small Business
By reviewers
Company SizeCount
Small Business60
Midsize Enterprise41
Large Enterprise171
No data available
 

Questions from the Community

How does Sailpoint IdentityIQ compare with CyberArk PAM?
We evaluated Sailpoint IdentityIQ before ultimately choosing CyberArk. Sailpoint Identity Platform is a solution to manage risks in cloud enterprise environments. It automates and streamlines the m...
What do you like most about CyberArk Privileged Access Manager?
The most valuable features of the solution are control and analytics.
What is your experience regarding pricing and costs for CyberArk Privileged Access Manager?
There has been no reduced cost associated with CyberArk Privileged Access Manager, as when it is required, you must pay for their licensing and prepare the full environment. While there are costs f...
Looking for recommendations and a pros/cons template for software to detect insider threats
In addition to responsesfrom Xavier Suriol and reviewer1324719, also consider ObserveIT from Proofpoint.
Looking for recommendations and a pros/cons template for software to detect insider threats
Hello All,I hope you had a merry Christmas.In this case it is as simple as it is.Just take Proofpoint ObserveIT - many companies in the public and financial sector have been using it for years.By ...
 

Also Known As

CyberArk Privileged Access Security, CyberArk Enterprise Password Vault
ObserveIT
 

Overview

 

Sample Customers

Rockwell Automation
Coca Cola, Allianz, Premiere League, Xerox, AIG, Cigna, Starbucks, Revlon, Toshiba, Nissan and more.
Find out what your peers are saying about CyberArk Privileged Access Manager vs. Proofpoint Insider Threat Management and other solutions. Updated: September 2025.
867,676 professionals have used our research since 2012.