Try our new research platform with insights from 80,000+ expert users

CyberArk Privileged Access Manager vs Proofpoint Insider Threat Management comparison

 

Comparison Buyer's Guide

Executive SummaryUpdated on Mar 3, 2025

Review summaries and opinions

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
 

Categories and Ranking

CyberArk Privileged Access ...
Ranking in User Activity Monitoring
1st
Average Rating
8.6
Reviews Sentiment
6.8
Number of Reviews
224
Ranking in other categories
Enterprise Password Managers (2nd), Privileged Access Management (PAM) (1st), Mainframe Security (2nd), Operational Technology (OT) Security (3rd)
Proofpoint Insider Threat M...
Ranking in User Activity Monitoring
3rd
Average Rating
8.4
Reviews Sentiment
6.8
Number of Reviews
6
Ranking in other categories
User Entity Behavior Analytics (UEBA) (8th), Insider Risk Management (4th)
 

Mindshare comparison

As of July 2025, in the User Activity Monitoring category, the mindshare of CyberArk Privileged Access Manager is 16.0%, down from 24.7% compared to the previous year. The mindshare of Proofpoint Insider Threat Management is 23.6%, down from 26.2% compared to the previous year. It is calculated based on PeerSpot user engagement data.
User Activity Monitoring
 

Featured Reviews

Abdul Durrani - PeerSpot reviewer
Enables granular and secure access with just-in-time access and Zero Trust model
CyberArk provides a good amount of control over access types. However, as a future enhancement, having additional features for cross-platform integration would be beneficial. It would be good to have integrations with other tools and firewalls, such as Zscaler and CrowdStrike. Although I am not fully aware of recent updates, more cross-platform integration would be valuable. A SOC analyst would like to have centralized access in terms of information flowing in even for privileged access management. They would like to have control over everything instead of opening four to five tabs for different sorts of information. Cross-platform integration would help with that. Customers also want CyberArk's pricing to be better so that they can implement it further and have more licenses. Implementing a privileged access management solution can be challenging. It would be great if CyberArk could provide recommendations based on the compliance standards of an organization. It would help system admins ensure that all the required ports are closed and the systems are being managed properly. If any system is not being used anymore, any ports opened for that system need to be closed. Having such recommendations would be helpful.
reviewer1271289 - PeerSpot reviewer
Good value, easy to use, and easy to deploy
In terms of what can be improved, that is a question I think the end users can tell you better. I'm not the end-user for this system. However, I can say that it needs to be more scalable. I think they already have a good value proposition in terms of being a hybrid model, and the reporting is okay, as well. It could have better integration with other SIEMs, but this integration has to come from the SIEM side, not ObserveIT.

Quotes from Members

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
 

Pros

"All the features of CyberArk are useful for me, but the biggest one is that CyberArk has logs for all the features. That is important when there is a problem. You know where to look and you have the information. In cyber security, the most important aspect is information."
"I love how easily we could operate within Password Vault and get things done. It was almost effortless."
"CyberArk makes our environment more secure and prevents possible attacks by compromised accounts."
"We use the solution for password vaulting, password rotation, session management, and secret management."
"The AI capabilities, including advanced threat detection features, are very helpful for us. They reduce human effort and errors, allowing us to quickly identify and respond to threats."
"On the EBB user side, we were able to secure all the server root passwords and admin for Windows. This was a big win for us."
"It has helped from an auditing perspective identify who has access to privileged accounts."
"Our privileged accounts are now stored in a more secure location and lateral movement within the network have been lessened."
"ObserveIT is small, easy to use, easy to deploy, and is not complicated, so it's more generally suited for only SMBs. It's a good value with a cheaper price."
 

Cons

"It needs better documentation with more examples for the configuration files and API/REST integration"
"Sometimes the infrastructure team is hesitant to provide more resources."
"Transitioning from a traditional on-premises deployment to the privileged cloud has resulted in losing access to many logs and administrative tools typically available on the back end."
"Areas of CyberArk Privileged Access Manager that can be improved include offering clearer configuration options."
"The solution should be able to mitigate internal threats"
"I think having a distributed architecture would certainly help this solution."
"I would like easier integrations for creating an online dashboard that executives would look at or are able to run reports from the tool."
"When I was a component owner for PAM's Privileged Threat Analytics (PTA) component, what I wanted was a clear mapping to the MITRE ATT&CK framework, a framework which has a comprehensive list of use cases. We reached out to the vendor and asked them how much coverage they have of the uses cases found on MITRE, which would have given us a better view of things while I was the product owner. Unfortunately they did not have the capability of mapping onto MITRE's framework at that time."
"ObserveIT is not scalable and it's not for the medium to large corporations. It's for the smaller environments. For the larger corporations, we have other scalable solutions."
 

Pricing and Cost Advice

"CyberArk is good at what they do, and the price reflects that. You have to pay the price for the same."
"The solution is cost-effective for the features."
"The cost is high compared to other products."
"Although CyberArk Privileged Access Management is expensive, its protection capabilities outweigh the cost."
"CyberArk Privileged Access Manager is more expensive than its competitors, such as BeyondTrust, Delinea, and ManageEngine PAM360."
"CyberArk provides all the features bundled. This is compared to other vendors who provide them as a different license for each functionality."
"Since CyberArk is at the top of the Gartner list, the cost is indeed on the higher side, but customers must discern which entities are essential to purchase. They should weigh the cost against the quality received."
"Compared to other solutions, it is costly."
Information not available
report
Use our free recommendation engine to learn which User Activity Monitoring solutions are best for your needs.
862,499 professionals have used our research since 2012.
 

Top Industries

By visitors reading reviews
Financial Services Firm
15%
Computer Software Company
15%
Manufacturing Company
8%
Educational Organization
7%
Financial Services Firm
19%
Computer Software Company
9%
Real Estate/Law Firm
9%
Manufacturing Company
8%
 

Company Size

By reviewers
Large Enterprise
Midsize Enterprise
Small Business
No data available
 

Questions from the Community

How does Sailpoint IdentityIQ compare with CyberArk PAM?
We evaluated Sailpoint IdentityIQ before ultimately choosing CyberArk. Sailpoint Identity Platform is a solution to manage risks in cloud enterprise environments. It automates and streamlines the m...
What do you like most about CyberArk Privileged Access Manager?
The most valuable features of the solution are control and analytics.
Looking for recommendations and a pros/cons template for software to detect insider threats
In addition to responsesfrom Xavier Suriol and reviewer1324719, also consider ObserveIT from Proofpoint.
Looking for recommendations and a pros/cons template for software to detect insider threats
Hello All,I hope you had a merry Christmas.In this case it is as simple as it is.Just take Proofpoint ObserveIT - many companies in the public and financial sector have been using it for years.By ...
 

Also Known As

CyberArk Privileged Access Security, CyberArk Enterprise Password Vault
ObserveIT
 

Overview

 

Sample Customers

Rockwell Automation
Coca Cola, Allianz, Premiere League, Xerox, AIG, Cigna, Starbucks, Revlon, Toshiba, Nissan and more.
Find out what your peers are saying about CyberArk Privileged Access Manager vs. Proofpoint Insider Threat Management and other solutions. Updated: July 2025.
862,499 professionals have used our research since 2012.