Try our new research platform with insights from 80,000+ expert users

CyberArk Privileged Access Manager vs Symantec Privileged Access Manager comparison

 

Comparison Buyer's Guide

Executive SummaryUpdated on Oct 6, 2024

Review summaries and opinions

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
 

Categories and Ranking

CyberArk Privileged Access ...
Ranking in Privileged Access Management (PAM)
1st
Average Rating
8.6
Reviews Sentiment
6.9
Number of Reviews
223
Ranking in other categories
User Activity Monitoring (1st), Enterprise Password Managers (2nd), Mainframe Security (2nd), Operational Technology (OT) Security (3rd)
Symantec Privileged Access ...
Ranking in Privileged Access Management (PAM)
18th
Average Rating
7.8
Reviews Sentiment
7.0
Number of Reviews
53
Ranking in other categories
No ranking in other categories
 

Mindshare comparison

As of July 2025, in the Privileged Access Management (PAM) category, the mindshare of CyberArk Privileged Access Manager is 17.1%, down from 22.3% compared to the previous year. The mindshare of Symantec Privileged Access Manager is 1.6%, up from 1.6% compared to the previous year. It is calculated based on PeerSpot user engagement data.
Privileged Access Management (PAM)
 

Featured Reviews

Abdul Durrani - PeerSpot reviewer
Enables granular and secure access with just-in-time access and Zero Trust model
CyberArk provides a good amount of control over access types. However, as a future enhancement, having additional features for cross-platform integration would be beneficial. It would be good to have integrations with other tools and firewalls, such as Zscaler and CrowdStrike. Although I am not fully aware of recent updates, more cross-platform integration would be valuable. A SOC analyst would like to have centralized access in terms of information flowing in even for privileged access management. They would like to have control over everything instead of opening four to five tabs for different sorts of information. Cross-platform integration would help with that. Customers also want CyberArk's pricing to be better so that they can implement it further and have more licenses. Implementing a privileged access management solution can be challenging. It would be great if CyberArk could provide recommendations based on the compliance standards of an organization. It would help system admins ensure that all the required ports are closed and the systems are being managed properly. If any system is not being used anymore, any ports opened for that system need to be closed. Having such recommendations would be helpful.
Muzi Lubisi - PeerSpot reviewer
Secure management of sensitive servers and seamless applications with direct linking
The credential injection feature is highly valued, particularly for RDP sessions. A majority of customers use it for RDP, and a couple for Linux servers. The broader capabilities, including access to multiple systems, web-based applications, and clustering, have never posed an issue. The threat analytics aspect is also a robust feature that analyzes all pertinent information.

Quotes from Members

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
 

Pros

"The most valuable feature is that it is flexible. It has many connectors. that have done well, the EPV and SSH sessions are all being recorded and everything works fine."
"Session recordings and timestamps are valuable features. They allow me to specifically select the time a particular command was executed, so I do not have to review the entire recording. I can click on events to determine where and when they happened."
"I'm no longer the product owner for PAM, but I can say that the most useful feature is the vault functionality, which keeps all your passwords secure in a digital vault."
"We are able to rotate privileged user passwords to eliminate fraudulent use."
"The solution is stable and reliable."
"I would recommend CyberArk Privileged Access Manager because it is a leading solution for privileged access management."
"Our go-to solution for securing against the pass the hash attack vector and auditing privileged account usage."
"It is a central repository. Therefore, if someone needs to access a server, then they go through CyberArk PAM. It provides a secure way to do this and CyberArk PAM records everything. For example, if you are connecting to a Linux server, then once you get into the Linux server and if it is integrated with CyberArk, it will automatically start recording everything that is being done. In most banks, seeing the recordings is very useful. If there are any gaps or something has happened which shouldn't have happened, then we can check the logs and videos. So, it gives security, in a robust manner, to the organization."
"Stability is solid as a rock."
"The RDP-gateway: For limiting which server an operator can access."
"It is simple to implement and is suitable for medium to large-scale enterprises."
"The product is very scalable in terms of concurrent sessions that it can handle at a time, number of device it can support, accounts that it can manage, or number of nodes that you can deploy in a cluster."
"CA PAM is working well for us."
"The agent-based credential management solution allows clients to programmatically use the agent to collect passwords during runtime from Symantec Privileged Access Manager."
"The DB clustering is a really good benefit of using CA PAM."
"We have received good support from the tech support team."
 

Cons

"It is complicated to deploy for Windows servers compared to other vendors."
"I think having a distributed architecture would certainly help this solution."
"There were a lot of manual steps in the initial setup which could have been automated. I read the 10.4 release that was sent out about a month or two ago, and I saw the steps required for upgrade have been reduced by about 90%. That was a big thing for me, but I still haven't seen that yet because we have not upgrade past 9.9.5."
"We don't often contact technical support, but when we do it, the response could be faster and better."
"My company always complains about the cost of CyberArk Privileged Access Manager because it's too high."
"There was a functionality of the solution that was missing. I had noticed it in Beyond Trust, but not in this solution. But, recently they have incorporated something similar."
"I don't know if "failed authentication" is a glitch or if that was an update... However, since we are the CyberArk support within our organization, we need to know that the password is suspended and we won't know that unless we have the ITA log up. So when a user calls and says, "Hey, I'm locked out of CyberArk, I can't get into CyberArk," we have to go through all of these other troubleshooting steps because the first thing we don't think of right now is, "The account is suspended." It doesn't say that anymore."
"CyberArk has to continue to evolve with that threat landscape to make sure that they're still protecting those credentials that are owned by those that have privileged accounts in the firms."
"Bring more technology into the portfolio and being able to collapse those products into a much more integrated way."
"I wish it could create local accounts on desktops."
"Instead of just giving passwords to the user based on job function, from auditing perspective, turn that cycle around. That would really help from an auditing standpoint."
"The service account management functionality needs to be extended to application pools, SQL database, PowerShell scripts, service account discovery, etc."
"The setup is complex."
"Broadcom has neglected product development since acquiring Symantec, and nothing major has been added to PAM."
"They need to have zero tier and active-active setup ​with zero minimum downtime, which they are working on it. ​"
"I’m no fan of Java as an application front-end, as it tends to have issues depending on what browser one’s using."
 

Pricing and Cost Advice

"Generally, I don't get involved in the licensing or the purchasing side of it, but I do know that the licenses are expensive."
"Since CyberArk is at the top of the Gartner list, the cost is indeed on the higher side, but customers must discern which entities are essential to purchase. They should weigh the cost against the quality received."
"CyberArk Privileged Access Manager is on the expensive side. It is very expensive."
"If you are looking at implementing this solution, buy the training and go to it."
"With the current model of licensing, for my use cases, sometimes it's hard to convince the management and get budget approvals for it. It's expensive and you're not getting anything new. It's just a control, but in terms of risk, you are covering a big impact on the company. Improvement in the licensing prices is something I would want to have."
"The price of this solution is expensive."
"It costs us around $200 per user."
"No, I do not have any advice on the price of the product."
"The licensing is simple and scalable."
"They offer per-device, per-user, or monthly and yearly licensing models."
"The prices are not low, but one can ask for a discount. It’s not the cheapest PAM solution."
"The version we are using is affordable compared to BeyondTrust, which is maybe three to four times as expensive, but it depends on the features."
"Appliances are relatively cheap, don’t skimp. Make sure you have redundancy, high availability, and enough appliances to manage the concurrent workload."
"Pricing is fair compared to other top vendors."
"It is more expensive than other solutions on the market."
"It is reasonably priced."
report
Use our free recommendation engine to learn which Privileged Access Management (PAM) solutions are best for your needs.
859,957 professionals have used our research since 2012.
 

Top Industries

By visitors reading reviews
Educational Organization
19%
Financial Services Firm
14%
Computer Software Company
13%
Manufacturing Company
7%
Computer Software Company
17%
Comms Service Provider
13%
Financial Services Firm
13%
Manufacturing Company
11%
 

Company Size

By reviewers
Large Enterprise
Midsize Enterprise
Small Business
 

Questions from the Community

How does Sailpoint IdentityIQ compare with CyberArk PAM?
We evaluated Sailpoint IdentityIQ before ultimately choosing CyberArk. Sailpoint Identity Platform is a solution to manage risks in cloud enterprise environments. It automates and streamlines the m...
What do you like most about CyberArk Privileged Access Manager?
The most valuable features of the solution are control and analytics.
What do you like most about Symantec Privileged Access Manager?
We can check the activities in the server for fragile files and documents in case of any issues.
What is your experience regarding pricing and costs for Symantec Privileged Access Manager?
Due to the nature of the solution, it is hard to gauge, but compared to competitors, the pricing is very good. I would rate it as an eight and a half out of ten.
What needs improvement with Symantec Privileged Access Manager?
Recent releases need improvement in webpage management. For instance, navigating through a webpage that acts like a wizard, where I proceed to the next page and enter more information, is not handl...
 

Also Known As

CyberArk Privileged Access Security, CyberArk Enterprise Password Vault
CA PAM, Xceedium Xsuite, CA Privileged Access Manager
 

Overview

 

Sample Customers

Rockwell Automation
NEOVERA, Telesis, eSoft
Find out what your peers are saying about CyberArk Privileged Access Manager vs. Symantec Privileged Access Manager and other solutions. Updated: June 2025.
859,957 professionals have used our research since 2012.