No more typing reviews! Try our Samantha, our new voice AI agent.

CyberArk Privileged Access Manager vs RiskIQ Illuminate comparison

 

Comparison Buyer's Guide

Executive Summary

Review summaries and opinions

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
 

Categories and Ranking

CyberArk Privileged Access ...
Average Rating
8.6
Reviews Sentiment
6.8
Number of Reviews
230
Ranking in other categories
User Activity Monitoring (1st), Enterprise Password Managers (3rd), Privileged Access Management (PAM) (1st), Mainframe Security (1st), Operational Technology (OT) Security (3rd)
RiskIQ Illuminate
Average Rating
0.0
Number of Reviews
1
Ranking in other categories
Attack Surface Management (ASM) (34th)
 

Mindshare comparison

While both are Security Software solutions, they serve different purposes. CyberArk Privileged Access Manager is designed for Privileged Access Management (PAM) and holds a mindshare of 10.4%, down 18.5% compared to last year.
RiskIQ Illuminate, on the other hand, focuses on Attack Surface Management (ASM), holds 0.9% mindshare, up 0.2% since last year.
Privileged Access Management (PAM) Mindshare Distribution
ProductMindshare (%)
CyberArk Privileged Access Manager10.4%
Delinea Secret Server4.5%
One Identity Safeguard4.4%
Other80.7%
Privileged Access Management (PAM)
Attack Surface Management (ASM) Mindshare Distribution
ProductMindshare (%)
RiskIQ Illuminate0.9%
CrowdStrike Falcon6.4%
Darktrace4.5%
Other88.2%
Attack Surface Management (ASM)
 

Featured Reviews

Atul-Gujar - PeerSpot reviewer
CyberArk manager at a comms service provider with 10,001+ employees
Secures critical infrastructures with essential user session audit records
A potential area for improvement is enhancing support for cluster environments and distributed Vaults. Clients in multiple countries that need central access have different challenges that require better solutions from CyberArk. For financial services, CyberArk can improve incident response by ensuring fast support for critical priority tickets to meet compliance requirements. Providing more documentation on CyberArk is recommended for new team members to enhance their troubleshooting capabilities. I understand it's up to the client, but 99% fail to change the demo key, so it's crucial for CyberArk to emphasize changing the key and documenting it as part of the installation process.
SimonClark - PeerSpot reviewer
Cyber Security Advisor - Director at Fort Net UK
Able to discover unpatched servers, offers good stability, and scales very well
A low-cost service to evaluate the risk score of a supply chain would be very helpful. This could be useful for insurance companies offering cyber insurance to enterprise customers, providing the insurer with a valuable way to unobtrusively, quickly, and frequently assess their customers and apply appropriate premiums for the level of risk. This would also be useful for enterprises. They could, for example, assess companies prior to a merger or acquisition. What would also be useful for any enterprise would be if their supply chain has some kind of direct digital access to parts of their network.

Quotes from Members

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
 

Pros

"The whole concept of Zero Trust and implementing it with CyberArk, which somewhat adheres to the 'never trust, always verify' principle, is very valuable. I really appreciate this aspect. Moreover, the just-in-time access is impressive, allowing access for a specific time."
"It is useful for protecting passwords. If you need to do access security management, you can first use the CyberArk console, and after that, you can connect the firewall interface or firewall command line. Similarly, if you need to do an RDP session, you need to first log in to CyberArk before connecting to the Windows RDP session. This way, the admin doesn't know the password, and that password is changed immediately. To change the password, you first discover the old password in the network, and after that, you can change the password."
"The regulation of accounts is by far the most needed and valuable part of the application."
"CyberArk Privileged Access Manager is cool."
"Technical support is very helpful whenever we have any questions."
"We utilize PTA, and we are now integrating that into our risk management program so we can identify the uses of the vault which are outside of the norm, e.g., people accessing after hours. It has reduced the amount of time that we are looking through logs and audit logs."
"CyberArk has helped us to identify, store, protect, and monitor the usage of privileged accounts."
"CyberArk Privileged Access Manager is stable."
"Attack Surface Management provided our customers with visibility on everything in their network and domains - anything publicly-facing on the internet - and shows where they have potential vulnerabilities."
"The solution is stable with 12 years of established historical data."
 

Cons

"Enhanced PSM support for Java based applications."
"I would like to see is the policy export and import. When we expend, we do not want to just hand do a policy."
"CyberArk Enterprise Password Vault's GUI has certain shortcomings that need improvement."
"What needs to be improved in CyberArk Enterprise Password Vault is their customer support, particularly in terms of responsiveness, willingness to help, and being more understanding. The initial setup and upgrade process for the solution is complex and can only be done by CyberArk, so this is another area for improvement."
"The usual workload is sometimes delayed by the solution."
"CyberArk Privileged Access Manager could improve the integration docking, it should have more layers. For example, integration with OpenShift."
"The one place where we found that this product really needs to improve is the cloud. Simple integrations don't exist, even today. We don't have anything specific on CyberArk for managing, SaaS products, SaaS vendors, SaaS credentials. I understand it's a vendor-based thing and that they have to coordinate with the other vendors to be able to do that, and there are integrations coming. But these are the major places where CyberArk definitely needs to invest some more time."
"Currently, in Secure Connect, an end user is required to enter account information manually, and cannot save any of this information for future use."
"A low-cost service to evaluate the risk score of a supply chain would be very helpful."
"The product scales from small to enormous, however, the pricing is not suitable for very small companies."
 

Pricing and Cost Advice

"I do not have any opinions to add about the pricing of the product."
"I would rate the cost of CyberArk Privileged Access Manager seven out of ten with ten being the most expensive."
"I believe that this solution is priced well. It's the market leader and I think that it's the best solution."
"They have two types of licensing: purchase and subscription. You have to pay for each admin user, such as Microsoft admin, mail admin, database admin, etc."
"Its price can be reduced."
"Previously, the pricing was very meager. They started publicizing and advertising the solution, growing CyberArk, as an organization. They also changed their pricing with that growth, e.g., the pricier the product, the more people who will purchase it."
"Before we bought it, they were licensing each function individually, which got complicated and very expensive. When we decided to buy it, it was much more straightforward and still quite expensive, but it brings a lot of value and risk reduction to the organization."
"CyberArk Privileged Access Manager is more expensive than its competitors, such as BeyondTrust, Delinea, and ManageEngine PAM360."
Information not available
report
Use our free recommendation engine to learn which Privileged Access Management (PAM) solutions are best for your needs.
892,646 professionals have used our research since 2012.
 

Top Industries

By visitors reading reviews
Financial Services Firm
13%
Manufacturing Company
10%
Computer Software Company
7%
Comms Service Provider
6%
No data available
 

Company Size

By reviewers
Large Enterprise
Midsize Enterprise
Small Business
By reviewers
Company SizeCount
Small Business59
Midsize Enterprise42
Large Enterprise174
No data available
 

Questions from the Community

How does Sailpoint IdentityIQ compare with CyberArk PAM?
We evaluated Sailpoint IdentityIQ before ultimately choosing CyberArk. Sailpoint Identity Platform is a solution to manage risks in cloud enterprise environments. It automates and streamlines the m...
What do you like most about CyberArk Privileged Access Manager?
The most valuable features of the solution are control and analytics.
What is your experience regarding pricing and costs for CyberArk Privileged Access Manager?
My thoughts on the pricing of CyberArk Privileged Access Manager depend entirely on the vendors' requirements. If they want their things to be secure, they have to spend accordingly. We have four t...
Ask a question
Earn 20 points
 

Also Known As

CyberArk Privileged Access Security, CyberArk Enterprise Password Vault
RiskIQ Digital Threat Management
 

Overview

 

Sample Customers

Rockwell Automation
DocuSign, Outbrain, The Economist Group, Rackspace, The Citizen Lab
Find out what your peers are saying about CyberArk, One Identity, Okta and others in Privileged Access Management (PAM). Updated: April 2026.
892,646 professionals have used our research since 2012.