Try our new research platform with insights from 80,000+ expert users

CyberArk Privileged Access Manager vs Saviynt comparison

 

Comparison Buyer's Guide

Executive SummaryUpdated on Oct 6, 2024

Review summaries and opinions

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
 

Categories and Ranking

CyberArk Privileged Access ...
Ranking in Privileged Access Management (PAM)
1st
Average Rating
8.6
Reviews Sentiment
6.8
Number of Reviews
224
Ranking in other categories
User Activity Monitoring (1st), Enterprise Password Managers (2nd), Mainframe Security (2nd), Operational Technology (OT) Security (3rd)
Saviynt
Ranking in Privileged Access Management (PAM)
10th
Average Rating
7.4
Reviews Sentiment
6.7
Number of Reviews
25
Ranking in other categories
User Provisioning Software (3rd), Identity Management (IM) (5th), Identity Threat Detection and Response (ITDR) (9th), Identity and Access Management (32nd)
 

Mindshare comparison

As of July 2025, in the Privileged Access Management (PAM) category, the mindshare of CyberArk Privileged Access Manager is 17.1%, down from 22.3% compared to the previous year. The mindshare of Saviynt is 3.6%, up from 3.3% compared to the previous year. It is calculated based on PeerSpot user engagement data.
Privileged Access Management (PAM)
 

Featured Reviews

Abdul Durrani - PeerSpot reviewer
Enables granular and secure access with just-in-time access and Zero Trust model
CyberArk provides a good amount of control over access types. However, as a future enhancement, having additional features for cross-platform integration would be beneficial. It would be good to have integrations with other tools and firewalls, such as Zscaler and CrowdStrike. Although I am not fully aware of recent updates, more cross-platform integration would be valuable. A SOC analyst would like to have centralized access in terms of information flowing in even for privileged access management. They would like to have control over everything instead of opening four to five tabs for different sorts of information. Cross-platform integration would help with that. Customers also want CyberArk's pricing to be better so that they can implement it further and have more licenses. Implementing a privileged access management solution can be challenging. It would be great if CyberArk could provide recommendations based on the compliance standards of an organization. It would help system admins ensure that all the required ports are closed and the systems are being managed properly. If any system is not being used anymore, any ports opened for that system need to be closed. Having such recommendations would be helpful.
VinayM - PeerSpot reviewer
Used for IAM, IGA, MFA, SSO, and access management
The technical support team's response time could be improved. After the implementation, Saviynt should provide good support to their customers. While migrating from legacy applications to the cloud, Saviynt has many bugs. The lift and shift are not very seamless. There are a lot of customizations to be done and some development is required. From the migration point of view, the solution is a little buggy.

Quotes from Members

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
 

Pros

"The established sessions on the target systems are fully isolated and the privileged account credentials are never exposed to the end-users or their client applications and devices."
"CyberArk Privileged Access Manager is very powerful and customizable."
"On the EBB user side, we were able to secure all the server root passwords and admin for Windows. This was a big win for us."
"I appreciate CyberArk's real-time capabilities. I can secure critical sessions, such as SSH or database sessions. As a security professional, I have real-time visibility into ongoing sessions. If anything suspicious occurs, I can terminate or freeze the session, which is part of user behavior analytics."
"Performance-wise, it is excellent."
"Session recordings and timestamps are valuable features. They allow me to specifically select the time a particular command was executed, so I do not have to review the entire recording. I can click on events to determine where and when they happened."
"Password Vault's policy configuration is very good - when you receive an attack, you can segment the structure of the project in order to isolate parts or users."
"The AI capabilities, including advanced threat detection features, are very helpful for us. They reduce human effort and errors, allowing us to quickly identify and respond to threats."
"The product's initial setup phase is easy."
"We have found the implementation process to be very easy."
"One of the tool's advantages is its user-friendly interface, making it easier to manipulate from a GUI perspective. The graphical user interface for users and administrators is straightforward. While it may require more configuration initially, once set up, it becomes more accessible and easier to use."
"The product is flexible to use."
"The dedicated Freshdesk platform is a user community and a step in the right direction for offering learning resources."
"Saviynt is easy to configure and manage."
"The repository has many features where you can define primary and secondary owners."
"Saviynt has a lot of potential with many features available for users."
 

Cons

"Customer support is somewhat lacking. They are often unavailable on Fridays, and the support process, such as raising a call or case, can take too long."
"The solution should be able to mitigate internal threats"
"There is room for improvement, particularly with Vendor PAM."
"The authentication port is available in CyberArk Alero but not Fortinet products."
"CyberArk has a lot on the privileged access side but they have to concentrate more on the application side as well."
"The initial setup of CyberArk Privileged Access Manager difficulty depends on the environment that you are implementing it into. However, it typically is simple."
"It's a big program. To scale excessively, locally, on an on-prem application, takes a lot of servers."
"The current interface is not very intuitive."
"In terms of improvement, it's really just a matter of them getting more mature. It's a relatively new solution and they probably need to streamline a few of the processes as they mature. But there are not too many problems."
"The product's stability is not easy to maintain."
"The technical support team's response time could be improved."
"The custom application integration is a little complex, and this tool doesn't provide so many plugins or additional applications."
"The configuration process at the beginning can be difficult, depending on the complexity of the company."
"The UI doesn’t enhance the user experience."
"While one product performed excellently, another was quite complex with code dating back 15 years."
"It is time-consuming to troubleshoot issues."
 

Pricing and Cost Advice

"Generally, I don't get involved in the licensing or the purchasing side of it, but I do know that the licenses are expensive."
"CyberArk is good at what they do, and the price reflects that. You have to pay the price for the same."
"The pricing for CyberArk is on the higher side compared to other Privileged Access Management products. Something should be done regarding enterprise licensing for long-standing customers."
"The main problem for the tool is its licensing. I work for a really big company. When you try to develop this as a service, usually you work with leverage teams who are formed with dozens of members. You might dedicate one FTE, or less, for something, e.g., an antivirus administrator. You might have half an FTE's effort dedicated to administering the antivirus, but then you have a team of about 30 users who might access that ticket. The problem is that CyberArk eliminated the possibility of concurrent users years ago. This is a big problem for companies who work with leverage teams. You need to pay for everyone. 40 licenses are used by 20 or 30 people. This is a big problem because licenses are not precisely cheap."
"The product's licensing is yearly. I would rate the solution's pricing a six out of ten."
"Its price can be reduced."
"It is not a cheap solution. It is expensive as compared with other solutions. However, it is one of the best solutions in their domain."
"Cost efficiency is the number one thing that can be improved in my mind. This would change lots of companies minds on purchasing the product."
"The pricing is comparable to Azure Entra ID. Kind of the same"
"If you need to make any changes then there are additional fees."
"Saviynt's pricing is reasonable."
"The price of the license for this product is quite expensive."
"Saviynt's pricing is acceptable and licensing costs are yearly."
"The product is less expensive than one of the competitors."
"If you are investing in securing your data and avoiding any non-compliance issues, then yes, it is certainly recommended. To put it plainly, if you're willing to pay fines and aren't concerned about the misuse of data, then there might not be a problem. However, if you intend to safeguard the data of your employees, vendors, and customers, it becomes crucial. In this context, managing data security requires preventive and detective measures, such as enforcing segregation of duties and regularly reviewing permissions. Throughout an individual's life cycle within an organization or customer life cycle, various access permissions are granted. Without taking action on these permissions, there is a risk of exposure later on. If individuals retain access after leaving the organization, it poses a serious security threat. Implementing solutions like Saviynt can address these challenges, ensuring continuous access review, generating reports, alerts, and identifying potential risks."
"We are not into the licensing part. The clients take care of the licensing part."
report
Use our free recommendation engine to learn which Privileged Access Management (PAM) solutions are best for your needs.
860,168 professionals have used our research since 2012.
 

Top Industries

By visitors reading reviews
Educational Organization
18%
Financial Services Firm
14%
Computer Software Company
13%
Manufacturing Company
7%
Financial Services Firm
15%
Computer Software Company
15%
Manufacturing Company
8%
Healthcare Company
7%
 

Company Size

By reviewers
Large Enterprise
Midsize Enterprise
Small Business
 

Questions from the Community

How does Sailpoint IdentityIQ compare with CyberArk PAM?
We evaluated Sailpoint IdentityIQ before ultimately choosing CyberArk. Sailpoint Identity Platform is a solution to manage risks in cloud enterprise environments. It automates and streamlines the m...
What do you like most about CyberArk Privileged Access Manager?
The most valuable features of the solution are control and analytics.
What do you like most about Saviynt?
It is very easy to use. It addresses most of the trends in identity governance and risk management.
What is your experience regarding pricing and costs for Saviynt?
Saviynt is very affordable compared to its competitors. It is cloud-based, making it significantly cheaper than on-premises solutions. This cost-effectiveness aligns well with the Saudi market, whe...
What needs improvement with Saviynt?
One area for improvement is Saviynt's training platform. They could enhance their training arrangements for partners and build a stronger partnership environment. When discussing Azure or AWS-relat...
 

Also Known As

CyberArk Privileged Access Security, CyberArk Enterprise Password Vault
No data available
 

Overview

 

Sample Customers

Rockwell Automation
Shell, McKesson, Kimberly-Clark, Ingram Micro, Intermountain Health Care, Forterra, CoreLogic
Find out what your peers are saying about CyberArk Privileged Access Manager vs. Saviynt and other solutions. Updated: June 2025.
860,168 professionals have used our research since 2012.