Try our new research platform with insights from 80,000+ expert users

CyberArk Privileged Access Manager vs Safe-T Secure Application Access comparison

 

Comparison Buyer's Guide

Executive Summary

Review summaries and opinions

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
 

Categories and Ranking

CyberArk Privileged Access ...
Average Rating
8.6
Reviews Sentiment
6.9
Number of Reviews
221
Ranking in other categories
User Activity Monitoring (1st), Enterprise Password Managers (2nd), Privileged Access Management (PAM) (1st), Mainframe Security (2nd), Operational Technology (OT) Security (3rd)
Safe-T Secure Application A...
Average Rating
7.8
Reviews Sentiment
7.7
Number of Reviews
8
Ranking in other categories
Enterprise Infrastructure VPN (42nd), Access Management (28th), ZTNA (26th)
 

Featured Reviews

Lasantha Wijesinghe - PeerSpot reviewer
We have visibility and control through real-time user behavior analytics
It took us some time to realize its benefits because there was a learning curve for us. It took us about a year to get our heads around this product and start effectively using it. It is a journey. It takes at least five years for any company to make this product very useful and reach maturity. It is not only the product's fault. The company needs to have a vision, and the company culture needs to go with it. Senior leadership needs to support the vision. You need to have lots of ingredients for success. If everything is in place, you will see success after one year. In the first year, it is a struggle for everybody. My company was bought by a bigger company, and they were very new to privileged access management. Everybody was struggling. The advice I would give is to have a good vision for privileged access management. You need dedicated teams, senior management support, and proper company policies and standards before implementing the solution. Start building knowledge slowly and avoid jumping into the deep end without preparation. I would rate CyberArk Privileged Access Manager a nine out of ten.
it_user790473 - PeerSpot reviewer
The architecture is open to integration and development, making the product very flexible
We have a lot of in-house applications that we must integrate with a secure email system. We are a financial institute, so we must use it to send emails to our customers securely, because these emails contain sensitive customer data. The architecture of the product is very open to development, plug-ins and integration with in-house systems. We have been able integrate this system into our CRM and other operational systems. We didn't find that kind of flexibility in other secure email products. We have also been able to customize the user interface so it is branded and able to "talk" our marketing language. There is also a local Israeli vendor that helps us to improve the product, add the new features.

Quotes from Members

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
 

Pros

"CyberArk PAM can be easily automated."
"We have been able to manage application credentials in CyberArk, whether they come as a custom plugin or straight out-of-the-box."
"CyberArk has helped us to identify, store, protect, and monitor the usage of privileged accounts."
"CyberArk's support is excellent, providing personalized assistance through a dedicated local account manager and sales engineer."
"CyberArk probably has probably the best vault on the market because of the multiple layered security and each password getting its own encryption."
"I would recommend CyberArk Privileged Access Manager."
"We are able to know who is accessing what and when; having accountability."
"We have demoted a lot of domain admins and taken a lot of that away from people, giving it a shared account structure."
"the security level is very high. After we tested it and checked all the security aspects of the product, we found that it's highly secure."
"Safe-T is very good for users because it has plug-in for Outlook."
"It's easy to use over the web. A user who is not in the office can use it and securely insert files."
"If you want a very flexible system that you can easily integrate, and develop interfaces for it or plug-ins to other application environments, it's probably the most flexible"
 

Cons

"Customers also want CyberArk's pricing to be better so that they can implement it further and have more licenses."
"The current interface doesn't scale that well, and has some screens still in the old layout."
"One area for improvement is the user interface. It needs significant enhancements."
"Updates have been somewhat difficult, resulting in challenges when moving from one version to another. The current version includes automatic updates."
"The product documentation has to be more precise in certain aspects with explanations for functionality limitations along with reference material or screenshots."
"In the beginning, CyberArk Privileged Access Manager didn't have a multifactor authentication feature, so that was an area for improvement, but now it's part of the solution. Having just one console for two CyberArk products would be good, particularly for the CyberArk Privileged Access Manager and the CyberArk Endpoint Privilege Manager, with the latter being a product for endpoint management that supports the workstations and allows you to manage workstations. In the next update of CyberArk Privileged Access Manager, it would be good to have a local agent where you can manage all users and processes, and have an agent on the servers such as Linux and Windows."
"Having a centralized place to manage the solution has been something that I have always wanted, and they are starting to understand that and bring things back together."
"I sometimes require learning resources when there is a new solution for CyberArk."
"The Outlook agent is not working well for installing it in the entire office."
"One important thing that we haven't found in this product is the ability to provide a read-only view for documents. Also, the ability for the customer to add annotations to these documents."
 

Pricing and Cost Advice

"It costs us around $200 per user."
"Although CyberArk Privileged Access Management is expensive, its protection capabilities outweigh the cost."
"Licensing fees are paid on a yearly basis."
"It can be an expensive product."
"Generally, I don't get involved in the licensing or the purchasing side of it, but I do know that the licenses are expensive."
"CyberArk is one of the best PAM solutions and one of the most expensive, but it works better than the others, so the pricing is fair."
"It's an affordable platform."
"Pricing and licensing depend on the environment."
Information not available
report
Use our free recommendation engine to learn which Access Management solutions are best for your needs.
849,963 professionals have used our research since 2012.
 

Top Industries

By visitors reading reviews
Educational Organization
33%
Financial Services Firm
12%
Computer Software Company
11%
Manufacturing Company
6%
No data available
 

Company Size

By reviewers
Large Enterprise
Midsize Enterprise
Small Business
No data available
 

Questions from the Community

How does Sailpoint IdentityIQ compare with CyberArk PAM?
We evaluated Sailpoint IdentityIQ before ultimately choosing CyberArk. Sailpoint Identity Platform is a solution to manage risks in cloud enterprise environments. It automates and streamlines the m...
What do you like most about CyberArk Privileged Access Manager?
The most valuable features of the solution are control and analytics.
What is your experience regarding pricing and costs for CyberArk Privileged Access Manager?
With the current model of licensing, for my use cases, sometimes it's hard to convince the management and get budget approvals for it. It's expensive and you're not getting anything new. It's just ...
Ask a question
Earn 20 points
 

Also Known As

CyberArk Privileged Access Security, CyberArk Enterprise Password Vault
Safe-T SDA, Safe-T, Safe-T Software-Defined Access
 

Overview

 

Sample Customers

Rockwell Automation
Government of Israel, eviCore Healthcore, Glen Imaging, Sarin, LBG, Rollomatic, Boegli-Gravures SA, Banque Heritage, Groupe Minoteries, Temenos, ZEK, RLM Finsbury, Harel Insurance, Meitav Dash
Find out what your peers are saying about CyberArk Privileged Access Manager vs. Safe-T Secure Application Access and other solutions. Updated: April 2025.
849,963 professionals have used our research since 2012.