We performed a comparison between CyberArk Privileged Access Manager and RSA SecurID based on real PeerSpot user reviews.
Find out what your peers are saying about CyberArk, Delinea, BeyondTrust and others in Privileged Access Management (PAM)."The technical support for this solution is very good. If I was to rate it on a scale of one to five, I would give it a five."
"The password vault and session monitoring are useful."
"The established sessions on the target systems are fully isolated and the privileged account credentials are never exposed to the end-users or their client applications and devices."
"The most valuable feature is Special Monitoring."
"The automatic password management is the most important feature. The second most important feature is the ability to enforce dual control on the release of those passwords. The combination of these two features is the most important thing for us because we can show that we're in control of who uses any non-personal account, and when they do so."
"I like the integrations for external applications."
"It has a centralized page where you can manage everything. This makes work easier. You don't have to remember different module URLs or browser applications. It is very easy to get all the secure identities of other environments into a single page, which is very important for us as it helps a lot in terms of operations, e.g., reduces management time. This is a single page where you can manage all accounts and onboard them to the CyberArk. You can then secure and see passwords from everywhere. So, there is a single pane of glass where you can manage all the identities across environments as well as across different types of identities."
"Password rotation, session recording & isolation and on-demand privileges."
"I would say that the two-factor authentication and the ease of installation and configuration are the most valuable features of this solution."
"I think it is really good when it comes to the hard token side of things."
"One of the most valuable feature is the ID soft token and hard token."
"It is a scalable solution."
"The most valuable features of RSA SecurID Access are push notifications, multifactor authentication, and ease of integration and deployment."
"Initial setup is complex. Lots of architecture, lots of planning, and lots of education and training are needed."
"They are sometimes not flexible with things. For instance, from one day to another, there might be something that had been done years ago by CyberArk, then they say, "We do not support that." You then have to initiate a complaint and start working with them. Things might become complicated and months pass while you are working with them. Usually, they are good and fast, but sometimes they seem to be blocked with problems, e.g., you will suddenly be working with another team instead of the team that you were working with the day before."
"The turnaround time for technical support is lengthy."
"CyberArk has to continue to evolve with that threat landscape to make sure that they're still protecting those credentials that are owned by those that have privileged accounts in the firms."
"Some of the additional features that we are looking at are in the Conjur product. I am specifically discussing key management, API Keys, and things for connecting applications in the CI/CD pipelines."
"There is a learning curve when it comes to planning out the deployment strategy, but once it is defined, it runs itself."
"The tool’s pricing and scalability can be better."
"We found a lot of errors during the initial setup. They should work to improve the implementation experience and to remove errors from the process."
"The interface needs to improve a lot. It should be easier to manage and navigate."
"Sometimes, we encounter issues with other applications that are not compatible with RSA SecurID Access and require expert troubleshooting. At those times, we need additional support from an implementation perspective. This is an area where Oracle can improve as there is no substitute for reliable and efficient support."
"It doesn't offer an agent-based or reverse-proxy-based approach to integration, which could enhance its flexibility."
"There are different compliances across the globe; RSA SecurID Access could be more complaint-based."
More CyberArk Privileged Access Manager Pricing and Cost Advice →
CyberArk Privileged Access Manager is ranked 1st in Privileged Access Management (PAM) with 142 reviews while RSA SecurID is ranked 8th in Authentication Systems with 9 reviews. CyberArk Privileged Access Manager is rated 8.8, while RSA SecurID is rated 7.8. The top reviewer of CyberArk Privileged Access Manager writes "Lets you ensure relevant, compliant access in good time and with an audit trail, yet lacks clarity on MITRE ATT&CK". On the other hand, the top reviewer of RSA SecurID writes "Enhanced security, reliable, helpful technical support, and easy to install". CyberArk Privileged Access Manager is most compared with Cisco ISE (Identity Services Engine), Microsoft Entra ID, Delinea Secret Server, WALLIX Bastion and One Identity Safeguard, whereas RSA SecurID is most compared with Yubico YubiKey, Microsoft Entra ID, PingID, Fortinet FortiToken and Symantec VIP Access Manager.
We monitor all Privileged Access Management (PAM) reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.