We performed a comparison between CyberArk Privileged Access Manager and Safe-T Secure Application Access based on real PeerSpot user reviews.
Find out what your peers are saying about Microsoft, Auth0, Okta and others in Access Management."The ability to develop and deploy applications with no stored secrets is very valuable."
"The users have the ability to rotate passwords on a daily basis with a Reconcile Account. Or, if they want to do one-time password checkouts, we can manage those, check in, check out. I like the flexibility of the changing of the password, specifically."
"Enterprise Password Vault, Privilege Session Manager, and Application Identity Management have been very useful for our client environment."
"Allows secure, logged access to highly sensitive servers and services."
"The solution is scalable."
"AIM has been a great help in automating password retrieval which removes the need for hard-coded credentials."
"We have accomplished our security goals. We have two-factor authenticated and vaulted our important accounts, so people can't just steal stuff from us."
"Automatic password management, which will automatically change passwords based on compliance requirements."
"Safe-T is very good for users because it has plug-in for Outlook."
"If you want a very flexible system that you can easily integrate, and develop interfaces for it or plug-ins to other application environments, it's probably the most flexible"
"the security level is very high. After we tested it and checked all the security aspects of the product, we found that it's highly secure."
"It's easy to use over the web. A user who is not in the office can use it and securely insert files."
"We would like to expand the usage of the auto discovery accounts feed, then on our end, tie in the REST API for automation."
"The product is very vaulting-focused. I'd love to see it expanding its capabilities a bit further into areas like just-in-time elevation, and access with non-vaulted credentials."
"I would like to see is the policy export and import. When we expend, we do not want to just hand do a policy."
"There is a learning curve when it comes to planning out the deployment strategy, but once it is defined, it runs itself."
"I would like to see better usability for non-technical people."
"We would, of course, always prefer it if the pricing was cheaper."
"There is some stuff that we still have not fully integrated, which is our AIM solution. We are having all types of issues with it. I have been working with Level 3 support on it, but otherwise, from a functionality perspective, everything has been working except for the AIM solution."
"There is room for improvement in the pricing model."
"The Outlook agent is not working well for installing it in the entire office."
"One important thing that we haven't found in this product is the ability to provide a read-only view for documents. Also, the ability for the customer to add annotations to these documents."
More CyberArk Privileged Access Manager Pricing and Cost Advice →
Earn 20 points
CyberArk Privileged Access Manager is ranked 1st in Privileged Access Management (PAM) with 142 reviews while Safe-T Secure Application Access is ranked 27th in Access Management. CyberArk Privileged Access Manager is rated 8.8, while Safe-T Secure Application Access is rated 7.8. The top reviewer of CyberArk Privileged Access Manager writes "Lets you ensure relevant, compliant access in good time and with an audit trail, yet lacks clarity on MITRE ATT&CK". On the other hand, the top reviewer of Safe-T Secure Application Access writes "The architecture is open to integration and development, making the product very flexible". CyberArk Privileged Access Manager is most compared with Cisco ISE (Identity Services Engine), Microsoft Entra ID, Delinea Secret Server, WALLIX Bastion and One Identity Safeguard, whereas Safe-T Secure Application Access is most compared with .
See our list of best Access Management vendors.
We monitor all Access Management reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.