Try our new research platform with insights from 80,000+ expert users

CyberArk Privileged Access Manager vs Safe-T Secure Application Access comparison

 

Comparison Buyer's Guide

Executive Summary

Review summaries and opinions

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
 

Categories and Ranking

CyberArk Privileged Access ...
Average Rating
8.6
Reviews Sentiment
6.9
Number of Reviews
223
Ranking in other categories
User Activity Monitoring (1st), Enterprise Password Managers (2nd), Privileged Access Management (PAM) (1st), Mainframe Security (2nd), Operational Technology (OT) Security (3rd)
Safe-T Secure Application A...
Average Rating
7.8
Reviews Sentiment
7.7
Number of Reviews
8
Ranking in other categories
Enterprise Infrastructure VPN (44th), Access Management (27th), ZTNA (22nd)
 

Featured Reviews

Abdul Durrani - PeerSpot reviewer
Enables granular and secure access with just-in-time access and Zero Trust model
CyberArk provides a good amount of control over access types. However, as a future enhancement, having additional features for cross-platform integration would be beneficial. It would be good to have integrations with other tools and firewalls, such as Zscaler and CrowdStrike. Although I am not fully aware of recent updates, more cross-platform integration would be valuable. A SOC analyst would like to have centralized access in terms of information flowing in even for privileged access management. They would like to have control over everything instead of opening four to five tabs for different sorts of information. Cross-platform integration would help with that. Customers also want CyberArk's pricing to be better so that they can implement it further and have more licenses. Implementing a privileged access management solution can be challenging. It would be great if CyberArk could provide recommendations based on the compliance standards of an organization. It would help system admins ensure that all the required ports are closed and the systems are being managed properly. If any system is not being used anymore, any ports opened for that system need to be closed. Having such recommendations would be helpful.
it_user787671 - PeerSpot reviewer
Needs to be easier to configure and to display logs more simply
We use only it for scanning files for viruses. That's the only feature we use in this product It needs to be easier to configure, it should be something that's working well with other sources. It should be something that allows me to see the logs simply. One to three years. Sometimes it doesn't…

Quotes from Members

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
 

Pros

"We can make a policy that affects everybody instantly."
"AIM has been a great help in automating password retrieval which removes the need for hard-coded credentials."
"I like the integrations for external applications."
"By implementing CyberArk Privileged Access Manager, we wanted to secure the password data and password accounts. We could see the benefits of CyberArk Privileged Access Manager immediately after we deployed it and started using it."
"CyberArk has the ability to change the credentials on every platform."
"The password protection itself is the most important feature. It's something we didn't have before."
"I love how easily we could operate within Password Vault and get things done. It was almost effortless."
"The threat analytics is an important feature."
"It's easy to use over the web. A user who is not in the office can use it and securely insert files."
"If you want a very flexible system that you can easily integrate, and develop interfaces for it or plug-ins to other application environments, it's probably the most flexible"
"the security level is very high. After we tested it and checked all the security aspects of the product, we found that it's highly secure."
"Safe-T is very good for users because it has plug-in for Outlook."
 

Cons

"The solution's architecture could be improved. It requires installation on four to five different servers."
"There is some stuff that we still have not fully integrated, which is our AIM solution. We are having all types of issues with it. I have been working with Level 3 support on it, but otherwise, from a functionality perspective, everything has been working except for the AIM solution."
"New functionalities and discovered bugs take longer to patch. We would greatly appreciate quicker development of security patches and bug corrections."
"It's not a cheap application. It's very expensive."
"The initial setup has room for improvement to be more straightforward."
"The initial setup of CyberArk is a challenge if you do not have prior experience with it."
"We had an issue with the Copy feature... Apparently, in version 10, that Copy feature does not work. You actually have to click Show and then copy the password from within Show and then paste it. We've had a million tickets and we had to figure out a workaround to it."
"When something comes out, it's generally airtight and works as advertised. However, sometimes they are a little bit slow to keep up with what's coming out. In 2017, for example, they released support for Windows Server 2016, which had been out for a year or so."
"One important thing that we haven't found in this product is the ability to provide a read-only view for documents. Also, the ability for the customer to add annotations to these documents."
"The Outlook agent is not working well for installing it in the entire office."
 

Pricing and Cost Advice

"Licensing fees are paid on a yearly basis."
"I hope to learn how the pricing works so that I can understand it better, but I am certain it is not inexpensive."
"CyberArk is good at what they do, and the price reflects that. You have to pay the price for the same."
"I rate the tool's pricing an eight out of ten."
"The license CyberArk Privileged Access Manager is on an annual basis."
"Pricing is quite high and it could be improved."
"I'm aware that the organization had purchased licensing for almost all of CyberArk's solutions including licensing for PTA, EPM, and the Application Identity Manager. But when it comes to PSM, this is one of the components where there's an additional charge for any extra PSMs that you want to deploy. I believe that there's some rider where the vendor has a bit of leeway to, at times, charge a premium on whatever additional services you may require above the board."
"I would rate the tool’s pricing a six out of ten."
Information not available
report
Use our free recommendation engine to learn which Access Management solutions are best for your needs.
857,585 professionals have used our research since 2012.
 

Top Industries

By visitors reading reviews
Educational Organization
25%
Financial Services Firm
13%
Computer Software Company
13%
Manufacturing Company
7%
No data available
 

Company Size

By reviewers
Large Enterprise
Midsize Enterprise
Small Business
No data available
 

Questions from the Community

How does Sailpoint IdentityIQ compare with CyberArk PAM?
We evaluated Sailpoint IdentityIQ before ultimately choosing CyberArk. Sailpoint Identity Platform is a solution to manage risks in cloud enterprise environments. It automates and streamlines the m...
What do you like most about CyberArk Privileged Access Manager?
The most valuable features of the solution are control and analytics.
What is your experience regarding pricing and costs for CyberArk Privileged Access Manager?
The pricing for CyberArk Privileged Access Manager is quite expensive, and the pricing varies from region to region. In APAC, CyberArk Privileged Access Manager can be obtained for less than in Nor...
Ask a question
Earn 20 points
 

Also Known As

CyberArk Privileged Access Security, CyberArk Enterprise Password Vault
Safe-T SDA, Safe-T, Safe-T Software-Defined Access
 

Overview

 

Sample Customers

Rockwell Automation
Government of Israel, eviCore Healthcore, Glen Imaging, Sarin, LBG, Rollomatic, Boegli-Gravures SA, Banque Heritage, Groupe Minoteries, Temenos, ZEK, RLM Finsbury, Harel Insurance, Meitav Dash
Find out what your peers are saying about CyberArk Privileged Access Manager vs. Safe-T Secure Application Access and other solutions. Updated: June 2025.
857,585 professionals have used our research since 2012.