Try our new research platform with insights from 80,000+ expert users

CyberArk Privileged Access Manager vs One Identity Privileged Access Suite for Unix comparison

 

Comparison Buyer's Guide

Executive SummaryUpdated on Oct 6, 2024

Review summaries and opinions

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
 

Categories and Ranking

CyberArk Privileged Access ...
Ranking in Privileged Access Management (PAM)
1st
Average Rating
8.6
Reviews Sentiment
6.8
Number of Reviews
227
Ranking in other categories
User Activity Monitoring (1st), Enterprise Password Managers (3rd), Mainframe Security (2nd), Operational Technology (OT) Security (3rd)
One Identity Privileged Acc...
Ranking in Privileged Access Management (PAM)
35th
Average Rating
7.6
Number of Reviews
3
Ranking in other categories
No ranking in other categories
 

Mindshare comparison

As of October 2025, in the Privileged Access Management (PAM) category, the mindshare of CyberArk Privileged Access Manager is 15.8%, down from 21.4% compared to the previous year. The mindshare of One Identity Privileged Access Suite for Unix is 0.5%, up from 0.3% compared to the previous year. It is calculated based on PeerSpot user engagement data.
Privileged Access Management (PAM) Market Share Distribution
ProductMarket Share (%)
CyberArk Privileged Access Manager15.8%
One Identity Privileged Access Suite for Unix0.5%
Other83.7%
Privileged Access Management (PAM)
 

Featured Reviews

Atul-Gujar - PeerSpot reviewer
Secures critical infrastructures with essential user session audit records
A potential area for improvement is enhancing support for cluster environments and distributed Vaults. Clients in multiple countries that need central access have different challenges that require better solutions from CyberArk. For financial services, CyberArk can improve incident response by ensuring fast support for critical priority tickets to meet compliance requirements. Providing more documentation on CyberArk is recommended for new team members to enhance their troubleshooting capabilities. I understand it's up to the client, but 99% fail to change the demo key, so it's crucial for CyberArk to emphasize changing the key and documenting it as part of the installation process.
Hicham Barnoussi - PeerSpot reviewer
A reliable solution with great password and session management
The setup process depends on the environment of the customer. It's not dependent on the solution. For customers with normal use cases and scenarios, it's a straightforward implementation, but for a customer with more than one environment, they may have BeyondTrust in one environment and Safeguard in another one. When they want to consolidate later, there may be complications. It depends on the devices and assets they would like to have under their PAM solution. The standard time for implementation is four weeks. I rate the setup an eight out of ten. There needs to be a dedicated resource for maintenance.

Quotes from Members

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
 

Pros

"The ability to develop and deploy applications with no stored secrets is very valuable."
"It allows users to self-provision access to the accounts that they need."
"CyberArk Privileged Access Manager is excellent for meeting compliance and regulatory requirements."
"The session recording and monitoring capabilities are valuable. We have real-time session management ability to record, audit, and monitor any privileged user activities. That is a big deal."
"CyberArk Privileged Access Manager's abilities to safeguard the infrastructure are important, as protecting credentials provides us with security and visibility."
"The accounts are maintained automatically. Hence, resource and administration costs are less."
"The most valuable feature of the solution is session recording."
"Increased our insight into how privileged accounts are being used and distributed within our footprint."
"The most valuable features are session and password management."
"Privileged Access Suite's best feature is it's straightforward to use."
"The most valuable feature of this solution is that it is easy to use."
 

Cons

"I think having a distributed architecture would certainly help this solution."
"I would like to see is the policy export and import. When we expend, we do not want to just hand do a policy."
"Report creation could be improved. The policies could be more customized."
"There was a situation when one of our presidents had an issue, but I can't recall the specifics."
"The solution's architecture could be improved. It requires installation on four to five different servers. Each server has a purpose, but when you need to troubleshoot, it can be difficult because you need to access each of them. Reducing the number of servers would be helpful."
"The lead product has a slow process. There are some reports and requirements from CyberArk which are not readily available as an applicable solution. We have made consistent management requests in the logs."
"They can do a better job in the PSM space."
"I'd like to see a more expansive SSH tunneling situation through PSMP. Right now you have an account that exists in the vault and you say, "I want to create a tunnel using this account." I'd like to see something that is not account-based where I could say, "I want to create a tunnel to this machine over here," and then authenticate through the PSMP and then your tunnel is set up. You wouldn't need to then authenticate to a machine."
"There is a new trend of not having any privileged users or accounts."
"Privileged Access Suite's interface could be better."
"Product management should be improved."
 

Pricing and Cost Advice

"No, I do not have any advice on the price of the product."
"It's not a cheap application. It's very expensive."
"This solution is expensive."
"I focus more on the technical side, but I hear customers say that if CyberArk was more affordable, they might have acquired more licenses. Some clients consider alternative solutions due to pricing concerns."
"CyberArk has been Gartner's number-one pick for the past ten years, so you can infer that their pricing is higher than everyone else. When you are the best, you will charge appropriately for it."
"Overall, its pricing is really good. The main difference from all the other vendors is that they have one package that covers all the functionality and modules of the basic PAM, except the add-on modules like adware and server protection. It also doesn't include the licenses for domain controller protection or maybe an API call-related feature. For the basic privileged access management, the bundle pricing is really good, but when it comes to an agent-based solution for advanced cyber protection or application identity managers, it is expensive. Services are also very expensive if you hire the services team from CyberArk, but these guys are really good. For a couple of large banking projects, we had an experience with them. The banks wanted to have things quickly and efficiently, so we had to hire them. If we take four weeks, these guys can do everything on a weekend. They charge quite a big sum of money, but they know the system well."
"Pricing is a problem. CyberArk is expensive compared to other products I know. It is similar to buying a German car. It comes with all the bells and whistles, but some companies may find it too expensive."
"This product is very expensive."
Information not available
report
Use our free recommendation engine to learn which Privileged Access Management (PAM) solutions are best for your needs.
869,202 professionals have used our research since 2012.
 

Top Industries

By visitors reading reviews
Financial Services Firm
15%
Computer Software Company
14%
Manufacturing Company
9%
Government
6%
No data available
 

Company Size

By reviewers
Large Enterprise
Midsize Enterprise
Small Business
By reviewers
Company SizeCount
Small Business59
Midsize Enterprise41
Large Enterprise171
No data available
 

Questions from the Community

How does Sailpoint IdentityIQ compare with CyberArk PAM?
We evaluated Sailpoint IdentityIQ before ultimately choosing CyberArk. Sailpoint Identity Platform is a solution to manage risks in cloud enterprise environments. It automates and streamlines the m...
What do you like most about CyberArk Privileged Access Manager?
The most valuable features of the solution are control and analytics.
What is your experience regarding pricing and costs for CyberArk Privileged Access Manager?
Regarding costs, CyberArk Privileged Access Manager is not a cheap product; hence, many companies struggle with its high licensing cost. While it's valuable, it comes with a high price tag, making ...
Ask a question
Earn 20 points
 

Also Known As

CyberArk Privileged Access Security, CyberArk Enterprise Password Vault
No data available
 

Overview

 

Sample Customers

Rockwell Automation
University of East Anglia, nForce Secure, dunnhumby
Find out what your peers are saying about CyberArk Privileged Access Manager vs. One Identity Privileged Access Suite for Unix and other solutions. Updated: September 2025.
869,202 professionals have used our research since 2012.