CyberArk Privileged Access Manager vs Perimeter 81 comparison

Cancel
You must select at least 2 products to compare!
CyberArk Logo
11,160 views|6,378 comparisons
92% willing to recommend
Perimeter 81 Logo
2,806 views|1,642 comparisons
97% willing to recommend
Comparison Buyer's Guide
Executive Summary

We performed a comparison between CyberArk Privileged Access Manager and Perimeter 81 based on real PeerSpot user reviews.

Find out what your peers are saying about CyberArk, Delinea, BeyondTrust and others in Privileged Access Management (PAM).
To learn more, read our detailed Privileged Access Management (PAM) Report (Updated: March 2024).
768,886 professionals have used our research since 2012.
Featured Review
Quotes From Members
We asked business professionals to review the solutions they use.
Here are some excerpts of what they said:
Pros
"What I found most valuable in CyberArk Privileged Access Manager is the Session Manager as it allows you to split the connection between the administrator site and the target site. I also found the Password Manager valuable as it lets you rotate the passwords of privileged users.""The Password Upload Utility tool makes it easier when setting up a Safe that contains multiple accounts and has cut down the amount of time that it takes to complete the task.""I love the ability to customize the passwords: the forbidden characters, the length of the password, the number of capital, lowercase, and special characters. You can customize the password so that it tailor fits, for example, mainframes that can't have more than eight characters. You can say, "I want a random password that doesn't have these special characters, but it is exactly eight characters," so that it doesn't throw errors.""It's secure and reliable. I especially appreciate that it's locked down and only allows access to authorized components.""The technical support is good.""The regulation of accounts is by far the most needed and valuable part of the application.""It improves security in our company. We have more than 10,000 accounts that we manage in CyberArk. We use these accounts for SQLs, Windows Server, and Unix. Therefore, keeping these passwords up-to-date in another solution or software would be impossible. Now, we have some sort of a platform to manage passwords, distribute the inflow, and manage IT teams as well as making regular changes to it according to the internal security policies in our bank.""The biggest feature is the security of the overall solution. It's very secure. The vaulting technology and the number of security layers involved in the vault, where privileged accounts are actually stored, is the heart of the solution."

More CyberArk Privileged Access Manager Pros →

"Even after restarting, it tries to quickly reestablish connection which is very helpful.""Distributing the agent was very simple, allowing us to enforce security posture on our devices (i.e. S1, Disk-encryption, etc.).""Perimeter 81 has increased my security and privacy while maintaining solid internet performance.""Perimeter 81 provides a very secure and non-disruptive experience.""It has provided a seamless gateway to much-needed platforms.""The feature that I have found to be most valuable is the reputation that the company has regarding privacy. Nowadays, this is critical, especially when you do all of your work online.""The setup is really easy...I rate the support team a ten out of ten.""Scaling Perimeter 81 was easy to do."

More Perimeter 81 Pros →

Cons
"I would love them to improve their UI customizing features.""The initial setup was somewhat complex.""Over the past seven years, I have seen a lot of ups and downs with the product.""The initial setup of CyberArk Privileged Access Manager difficulty depends on the environment that you are implementing it into. However, it typically is simple.""There is a bit of a learning curve, but it's a pretty complex solution.""There is some stuff that we still have not fully integrated, which is our AIM solution. We are having all types of issues with it. I have been working with Level 3 support on it, but otherwise, from a functionality perspective, everything has been working except for the AIM solution.""In the beginning, CyberArk Privileged Access Manager didn't have a multifactor authentication feature, so that was an area for improvement, but now it's part of the solution. Having just one console for two CyberArk products would be good, particularly for the CyberArk Privileged Access Manager and the CyberArk Endpoint Privilege Manager, with the latter being a product for endpoint management that supports the workstations and allows you to manage workstations. In the next update of CyberArk Privileged Access Manager, it would be good to have a local agent where you can manage all users and processes, and have an agent on the servers such as Linux and Windows.""They can do a better job in the PSM space."

More CyberArk Privileged Access Manager Cons →

"I would suggest adding more networking and security features that allow more customization within their platform.""One of the more negative experiences using Perimeter 81 is the fact that I am logged off after a pre-determined amount of time which cuts off access to some of my company's resources.""If I were to be nitpicky, I would ask that Perimeter 81 offer the option for us to change the color of the graphical user interface, like maybe pink or green or so on.""I'd love to learn more about all of the features. Maybe a monthly spotlight of features or having a banner that explains more ways certain features could be used would be helpful.""The overall UI could be improved and updated to bring a simpler feel to the application.""There is a very small amount of downtime.""In the future, maybe P81 can improve the network traffic balancing and redundancy.""The platform still lacks relevant dashboards and the ability to customize them based on our needs."

More Perimeter 81 Cons →

Pricing and Cost Advice
  • "Pricing and licensing depend on the environment."
  • "It is not a cheap solution. It is expensive as compared with other solutions. However, it is one of the best solutions in their domain."
  • "It can be an expensive product."
  • "Cost efficiency is the number one thing that can be improved in my mind. This would change lots of companies minds on purchasing the product."
  • "The cost is high compared to other products."
  • "CyberArk provides all the features bundled. This is compared to other vendors who provide them as a different license for each functionality."
  • "Our risk is definitely significantly lower. Also, our resources are low."
  • "If you are looking at implementing this solution, buy the training and go to it."
  • More CyberArk Privileged Access Manager Pricing and Cost Advice →

  • "Overall I am very happy with the solution’s flexibility and pricing."
  • "The cost of the solution's licenses depends on the particular use cases."
  • "The solution is priced appropriately considering its uses. For an essential license, a user pays only 30 USD per month. For an enterprise version, the prices can be negotiated with the company."
  • "Perimeter 81 charges separately for gateways and VPN connectivity, but compared to Azure, it seemed more reasonable."
  • More Perimeter 81 Pricing and Cost Advice →

    report
    Use our free recommendation engine to learn which Privileged Access Management (PAM) solutions are best for your needs.
    768,886 professionals have used our research since 2012.
    Questions from the Community
    Top Answer:We evaluated Sailpoint IdentityIQ before ultimately choosing CyberArk. Sailpoint Identity Platform is a solution to manage risks in cloud enterprise environments. It automates and streamlines the… more »
    Top Answer:The product is expensive. I rate the product’s pricing a seven out of ten, where one is cheap and ten is expensive.
    Top Answer:Even after restarting, it tries to quickly reestablish connection which is very helpful.
    Top Answer:It's essential to consider the organization's specific requirements and budget. Here are some general recommendations: * Evaluate your needs * Understand pricing models * Request a quote * Compare… more »
    Top Answer:In terms of improvement, Perimeter 81 could enhance its reporting and analytics capabilities to provide more detailed insights into network activity. Additionally, expanding integration options with a… more »
    Ranking
    Views
    11,160
    Comparisons
    6,378
    Reviews
    34
    Average Words per Review
    621
    Rating
    8.9
    5th
    out of 34 in ZTNA as a Service
    Views
    2,806
    Comparisons
    1,642
    Reviews
    15
    Average Words per Review
    539
    Rating
    9.1
    Comparisons
    Also Known As
    CyberArk Privileged Access Security
    Learn More
    Overview

    CyberArk Privileged Access Manager is a next-generation solution that allows users to secure both their applications and their confidential corporate information. It is extremely flexible and can be implemented across a variety of environments. This program runs with equal efficiency in a fully cloud-based, hybrid, or on-premises environment. Users can now protect their critical infrastructure and access it in any way that best meets their needs.

    CyberArk Privileged Access Manager possesses a simplified and unified user interface. Users are able to manage the solution from one place. The UI allows users to view and manage all of the information and controls that administrators need to be able to easily access. Very often, management UIs do not have all of the controls and information streamlined in a single location. This platform provides a level of visibility that ensures users will be able to view all of their system’s most critical information at any time that they wish.

    Benefits of CyberArk Privileged Access Manager

    Some of CyberArk Privileged Access Manager’s benefits include:

    • The ability to manage IDs and permissions across a cloud environment. In a world where being able to work remotely is becoming increasingly important, CyberArk Privileged Access Manager is a very valuable tool. Administrators do not need to worry about infrastructure security when they are away from the office. They can assign and manage security credentials from anywhere in the world.
    • The ability to manage the program from a single centralized UI. CyberArk Privileged Access Manager’s UI contains all of the system controls and information. Users now have the ability to view and use all of their system’s most critical information and controls from one place.
    • The ability to automate user management tasks. Administrators can save valuable time by assigning certain management tasks to be fulfilled by the system itself. Users can now reserve their time for tasks that are most pressing. It can also allow for the system to simplify the management process by having the platform perform the most complex functions.

    Reviews from Real Users

    CyberArk Privileged Access Manager’s software stands out among its competitors for one very fundamental reason. CyberArk Privileged Access Manager is an all-in-one solution. Users are given the ability to accomplish with a single platform what might usually only be accomplished with multiple solutions.

    PeerSpot users note the truly all-in-one nature of this solution. Mateusz K., IT Manager at a financial services firm, wrote, "It improves security in our company. We have more than 10,000 accounts that we manage in CyberArk. We use these accounts for SQLs, Windows Server, and Unix. Therefore, keeping these passwords up-to-date in another solution or software would be impossible. Now, we have some sort of a platform to manage passwords, distribute the inflow, and manage IT teams as well as making regular changes to it according to the internal security policies in our bank."

    Hichem T.-B., CDO & Co-Founder at ELYTIK, noted that “This is a complete solution that can detect cyber attacks well. I have found the proxy features most valuable for fast password web access.”

    Perimeter 81 is a cloud-based network security and software-defined perimeter (SDP) solution designed to provide secure access to resources in the cloud, data centers, and on-premises environments. It offers a unified platform for organizations to manage and secure their network infrastructure, regardless of the location or type of resources.  

    Perimeter 81 Benefits:

    • Easy to use
    • Flexible access policies
    • Strong encryption and authentication protocols
    • Scalable
    • Compatible with various devices and platforms

    Perimeter 81 Features:

    • Secure Network Access: Perimeter 81 provides secure access to internal resources and cloud-based applications through its client applications and gateways.
    • Software-Defined Perimeter (SDP): SDP is a security framework that focuses on dynamically creating secure connections between users and resources on a need-to-know basis. 
    • Zero Trust Network Access (ZTNA): Perimeter 81 follows the Zero Trust security model, which assumes that no user or device can be inherently trusted. 
    • Multi-Cloud and Hybrid Cloud Support: Perimeter 81 is designed to secure access to resources across multi-cloud and hybrid cloud environments.
    • User and Device Management: The solution offers centralized user and device management capabilities, allowing administrators to define access policies, manage user roles, and enforce multi-factor authentication (MFA) for enhanced security. 
    • Network Segmentation: Perimeter 81 enables organizations to segment their network resources, creating isolated environments based on logical groupings. 
    • Centralized Management and Analytics: Perimeter 81 provides a centralized management console where administrators can configure and monitor their network security settings.

    Reviews from Real Users

    PeerSpot user, Frontend Developer at Limelight Networks, states that "We use some VPN solutions, and Perimeter 81 has the best user experience for desktop or mobile".

    Daniel Goldfeld, Vice President of Customer Success at Mine - The All-in-One Privacy Suite, says that Perimeter 81 has "Great SAML and SCIM support with the ability to deploy site-2-site tunnels with specific IP restrictions".

    Another PeerSpot user, Accounts Payable Specialist at Simera, writes that "The feature that I have found to be most valuable is the reputation that the company has regarding privacy. Nowadays, this is critical, especially when you do all of your work online."

      Sample Customers
      Rockwell Automation
      Aqua Security, Cognito, Multipoint, Kustomer, Postman, Meredith
      Top Industries
      REVIEWERS
      Financial Services Firm24%
      Computer Software Company13%
      Insurance Company12%
      Healthcare Company9%
      VISITORS READING REVIEWS
      Educational Organization30%
      Computer Software Company12%
      Financial Services Firm10%
      Manufacturing Company5%
      REVIEWERS
      Computer Software Company58%
      University8%
      Media Company8%
      Construction Company8%
      VISITORS READING REVIEWS
      Computer Software Company22%
      Financial Services Firm7%
      Manufacturing Company7%
      Government6%
      Company Size
      REVIEWERS
      Small Business21%
      Midsize Enterprise13%
      Large Enterprise66%
      VISITORS READING REVIEWS
      Small Business15%
      Midsize Enterprise38%
      Large Enterprise48%
      REVIEWERS
      Small Business48%
      Midsize Enterprise30%
      Large Enterprise22%
      VISITORS READING REVIEWS
      Small Business34%
      Midsize Enterprise19%
      Large Enterprise47%
      Buyer's Guide
      Privileged Access Management (PAM)
      March 2024
      Find out what your peers are saying about CyberArk, Delinea, BeyondTrust and others in Privileged Access Management (PAM). Updated: March 2024.
      768,886 professionals have used our research since 2012.

      CyberArk Privileged Access Manager is ranked 1st in Privileged Access Management (PAM) with 142 reviews while Perimeter 81 is ranked 5th in ZTNA as a Service with 22 reviews. CyberArk Privileged Access Manager is rated 8.8, while Perimeter 81 is rated 9.2. The top reviewer of CyberArk Privileged Access Manager writes "Lets you ensure relevant, compliant access in good time and with an audit trail, yet lacks clarity on MITRE ATT&CK". On the other hand, the top reviewer of Perimeter 81 writes "Great SAML and SCIM support with the ability to deploy site-2-site tunnels with specific IP restrictions". CyberArk Privileged Access Manager is most compared with Cisco ISE (Identity Services Engine), Microsoft Entra ID, Delinea Secret Server, WALLIX Bastion and One Identity Safeguard, whereas Perimeter 81 is most compared with Zscaler Zero Trust Exchange, Cato SASE Cloud Platform, Prisma Access by Palo Alto Networks, Cloudflare Access and Tailscale.

      We monitor all Privileged Access Management (PAM) reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.