Try our new research platform with insights from 80,000+ expert users

CyberArk Privileged Access Manager vs senhasegura SaaS comparison

 

Comparison Buyer's Guide

Executive Summary

Review summaries and opinions

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
 

Categories and Ranking

CyberArk Privileged Access ...
Ranking in Privileged Access Management (PAM)
1st
Average Rating
8.6
Reviews Sentiment
6.8
Number of Reviews
224
Ranking in other categories
User Activity Monitoring (1st), Enterprise Password Managers (2nd), Mainframe Security (2nd), Operational Technology (OT) Security (3rd)
senhasegura SaaS
Ranking in Privileged Access Management (PAM)
30th
Average Rating
0.0
Reviews Sentiment
7.6
Number of Reviews
1
Ranking in other categories
No ranking in other categories
 

Mindshare comparison

As of July 2025, in the Privileged Access Management (PAM) category, the mindshare of CyberArk Privileged Access Manager is 17.1%, down from 22.3% compared to the previous year. The mindshare of senhasegura SaaS is 0.8%, up from 0.5% compared to the previous year. It is calculated based on PeerSpot user engagement data.
Privileged Access Management (PAM)
 

Featured Reviews

Abdul Durrani - PeerSpot reviewer
Enables granular and secure access with just-in-time access and Zero Trust model
CyberArk provides a good amount of control over access types. However, as a future enhancement, having additional features for cross-platform integration would be beneficial. It would be good to have integrations with other tools and firewalls, such as Zscaler and CrowdStrike. Although I am not fully aware of recent updates, more cross-platform integration would be valuable. A SOC analyst would like to have centralized access in terms of information flowing in even for privileged access management. They would like to have control over everything instead of opening four to five tabs for different sorts of information. Cross-platform integration would help with that. Customers also want CyberArk's pricing to be better so that they can implement it further and have more licenses. Implementing a privileged access management solution can be challenging. It would be great if CyberArk could provide recommendations based on the compliance standards of an organization. It would help system admins ensure that all the required ports are closed and the systems are being managed properly. If any system is not being used anymore, any ports opened for that system need to be closed. Having such recommendations would be helpful.
MB
Easy to deploy and offers a good return on investment
CyberArk is the oldest tool and the most experienced one that can be integrated with a lot of interfaces and platforms, which is a huge advantage. A product like senhasegura is very new on the market and is doing very well while also growing very fast. Again, they are very good at integrating with several platforms. The tool is growing and I see a really good future for the tool. The tool has to improve its interface and make the product more user-friendly. In CyberArk, we need more dashboards to monitor things. In senhasegura, again, we need the personalizable dashboards.

Quotes from Members

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
 

Pros

"You can easily manage more than 4000 accounts with one PSM."
"The feature that I like the most is the Privileged Session Manager. It offers session recordings, logging, and tracking of user workstreams."
"The tool has safe vaults. We keep our passwords in the Vault. The tool’s recording feature is also valuable for us."
"The most valuable feature of CyberArk Privileged Access Manager is the vault. I am satisfied with the interface and the documentation."
"The automatic change of the password and Privileged Session Manager (PSM) are the most valuable features. With Privileged Session Manager, you can control the password management in a centralized way. You can activate these features in a session; the session isolation and recording. You apply the full intermediation principle. So, you must pass through CyberArk PAM to get access to the target system. You don't need to know the password, and everything that you do is registered and auditable. In this case, no one gets to touch the password directly. Also, you can implement detection and response behavior in case of a breach."
"It has helped us with our adoption with other teams, and it has also helped us to integrate it at the ground level."
"The threat analytics is an important feature."
"I would rate this solution a nine out of ten."
"The product's initial setup phase is easy."
 

Cons

"They are sometimes not flexible with things. For instance, from one day to another, there might be something that had been done years ago by CyberArk, then they say, "We do not support that." You then have to initiate a complaint and start working with them. Things might become complicated and months pass while you are working with them. Usually, they are good and fast, but sometimes they seem to be blocked with problems, e.g., you will suddenly be working with another team instead of the team that you were working with the day before."
"The turnaround time for technical support is lengthy."
"The PTA could be improved. Currently, companies often have multiple domains and sometimes it's difficult to implement CyberArk in this kind of infrastructure. For example, you can add CPM (Central Policy Manager) and PSM (Privileged Session Manager and PVWA (Password Vault Web Access) for access, but if you want to add PTA (Privileged Threat Analysis) to scan Vault logs, it is difficult because this component may be adding multiple domain environments."
"Its pricing is a big challenge here. When it started, the product came in at a very low cost. Now, they are the leaders in the market, so the cost has grown and is quite huge."
"The solution needs better features for end users to manage their own whitelisting for API retrieval."
"One thing that could be improved is to create of a better alternative for fixing group policy fees. We currently use Microsoft, but they have introduced new policies that may not be compatible."
"The interface on version 9 looks old."
"Enhanced PSM support for Java based applications."
"The tool has to improve its interface and make the product more user-friendly."
 

Pricing and Cost Advice

"It is not a cheap solution. It is expensive as compared with other solutions. However, it is one of the best solutions in their domain."
"The price of this solution is expensive."
"Pricing and licensing depend on the environment."
"The pricing for CyberArk Privileged Access Manager is quite expensive, and the pricing varies from region to region. In APAC, CyberArk Privileged Access Manager can be obtained for less than in North America, according to my understanding."
"In comparison to other products on the market, CyberArk is a more costly product."
"The main problem for the tool is its licensing. I work for a really big company. When you try to develop this as a service, usually you work with leverage teams who are formed with dozens of members. You might dedicate one FTE, or less, for something, e.g., an antivirus administrator. You might have half an FTE's effort dedicated to administering the antivirus, but then you have a team of about 30 users who might access that ticket. The problem is that CyberArk eliminated the possibility of concurrent users years ago. This is a big problem for companies who work with leverage teams. You need to pay for everyone. 40 licenses are used by 20 or 30 people. This is a big problem because licenses are not precisely cheap."
"CyberArk Privileged Access Manager is on the expensive side. It is very expensive."
"There are no additional costs other than the standard licensing fees."
"Compared to CyberArk, the tool is very cheap."
report
Use our free recommendation engine to learn which Privileged Access Management (PAM) solutions are best for your needs.
862,499 professionals have used our research since 2012.
 

Top Industries

By visitors reading reviews
Financial Services Firm
15%
Computer Software Company
15%
Manufacturing Company
8%
Educational Organization
7%
No data available
 

Company Size

By reviewers
Large Enterprise
Midsize Enterprise
Small Business
No data available
 

Questions from the Community

How does Sailpoint IdentityIQ compare with CyberArk PAM?
We evaluated Sailpoint IdentityIQ before ultimately choosing CyberArk. Sailpoint Identity Platform is a solution to manage risks in cloud enterprise environments. It automates and streamlines the m...
What do you like most about CyberArk Privileged Access Manager?
The most valuable features of the solution are control and analytics.
What is your experience regarding pricing and costs for senhasegura SaaS?
Compared to CyberArk, the tool is very cheap. CyberArk is super advanced and the king.
What needs improvement with senhasegura SaaS?
CyberArk is the oldest tool and the most experienced one that can be integrated with a lot of interfaces and platforms, which is a huge advantage. A product like senhasegura is very new on the mark...
What is your primary use case for senhasegura SaaS?
I use the solution in my company as a PAM tool. For privileged access management, there are tools like senhasegura SaaS, BeyondTrust, One Identity, and CyberArk. CyberArk is the greatest tool from ...
 

Also Known As

CyberArk Privileged Access Security, CyberArk Enterprise Password Vault
No data available
 

Overview

 

Sample Customers

Rockwell Automation
Information Not Available
Find out what your peers are saying about CyberArk, Delinea, One Identity and others in Privileged Access Management (PAM). Updated: July 2025.
862,499 professionals have used our research since 2012.