Try our new research platform with insights from 80,000+ expert users

CyberArk Privileged Access Manager vs Tenable OT Security comparison

 

Comparison Buyer's Guide

Executive Summary

Review summaries and opinions

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
 

Categories and Ranking

CyberArk Privileged Access ...
Ranking in Operational Technology (OT) Security
3rd
Average Rating
8.6
Reviews Sentiment
6.8
Number of Reviews
226
Ranking in other categories
User Activity Monitoring (1st), Enterprise Password Managers (2nd), Privileged Access Management (PAM) (1st), Mainframe Security (2nd)
Tenable OT Security
Ranking in Operational Technology (OT) Security
4th
Average Rating
8.6
Reviews Sentiment
6.6
Number of Reviews
7
Ranking in other categories
No ranking in other categories
 

Mindshare comparison

As of August 2025, in the Operational Technology (OT) Security category, the mindshare of CyberArk Privileged Access Manager is 0.3%. The mindshare of Tenable OT Security is 10.7%, down from 14.0% compared to the previous year. It is calculated based on PeerSpot user engagement data.
Operational Technology (OT) Security
 

Featured Reviews

Abdul Durrani - PeerSpot reviewer
Enables granular and secure access with just-in-time access and Zero Trust model
CyberArk provides a good amount of control over access types. However, as a future enhancement, having additional features for cross-platform integration would be beneficial. It would be good to have integrations with other tools and firewalls, such as Zscaler and CrowdStrike. Although I am not fully aware of recent updates, more cross-platform integration would be valuable. A SOC analyst would like to have centralized access in terms of information flowing in even for privileged access management. They would like to have control over everything instead of opening four to five tabs for different sorts of information. Cross-platform integration would help with that. Customers also want CyberArk's pricing to be better so that they can implement it further and have more licenses. Implementing a privileged access management solution can be challenging. It would be great if CyberArk could provide recommendations based on the compliance standards of an organization. It would help system admins ensure that all the required ports are closed and the systems are being managed properly. If any system is not being used anymore, any ports opened for that system need to be closed. Having such recommendations would be helpful.
PapadAnandKumar - PeerSpot reviewer
Helps identify vulnerabilities and risks for IT and OT assets
Tenable OT Security is fine, but I find it more language-based rather than structured. It feels like something is on a web page, and the dashboards and data representations are not cool. First of all, I said that the tool view should be improved. It looks pretty old. Second, the details Tenable OT Security provides regarding the metadata they work with should be more in-depth. Its main focus is vulnerability management, which is fine, but what about threat actors? What about attack vectors and OT vulnerabilities? There are major areas, baselines, etc. that need attention.

Quotes from Members

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
 

Pros

"The most valuable features of CyberArk Privileged Access Manager include its search capabilities."
"We use the solution for password vaulting, password rotation, session management, and secret management."
"I would recommend implementing CyberArk Privileged Access Manager as it is the best so far."
"The ability to monitor privileged accounts throughout the enterprises."
"It is useful for protecting passwords. If you need to do access security management, you can first use the CyberArk console, and after that, you can connect the firewall interface or firewall command line. Similarly, if you need to do an RDP session, you need to first log in to CyberArk before connecting to the Windows RDP session. This way, the admin doesn't know the password, and that password is changed immediately. To change the password, you first discover the old password in the network, and after that, you can change the password."
"The automatic password management is the most important feature. The second most important feature is the ability to enforce dual control on the release of those passwords. The combination of these two features is the most important thing for us because we can show that we're in control of who uses any non-personal account, and when they do so."
"I like the integrations for external applications."
"The most valuable feature of the solution is session recording."
"The active query inventory is the most valuable feature."
"The clear distinction between IT and OT that Tenable OT provides is its most valuable feature."
"It's for securing the vulnerability of the OT solutions they are using. We mitigate those through patch management activities and find vulnerabilities easily with this security solution."
"The product has easy-to-manage features and components."
"The biggest advantage is that with good infrastructure, you can utilize asset planning when using Nessus along with Tenable OT Security."
"The initial setup was very easy, and I would rate it a ten out of ten."
"The product’s price is its most valuable feature."
"I like Tenable OT Security for two main reasons. Firstly, it helps identify vulnerabilities and risks for IT and OT assets, which is crucial for our operations. Secondly, it performs external port scanning, including vulnerability scans for open ports. Compared to the Claroty Platform, the tool offers detailed asset discovery capabilities."
 

Cons

"The initial setup of CyberArk is a challenge if you do not have prior experience with it."
"My impression of their technical support team is that it is very bad. The support team's response time is quick, however, the resolution process takes too long."
"There is some stuff that we still have not fully integrated, which is our AIM solution. We are having all types of issues with it. I have been working with Level 3 support on it, but otherwise, from a functionality perspective, everything has been working except for the AIM solution."
"It needs better documentation with more examples for the configuration files and API/REST integration"
"The solution that they proposed was not straightforward because of the backend processes of CyberArk."
"The initial setup was somewhat complex."
"The scalability, sometimes, is lacking. It works really well for more static environments... But for an environment where you're constantly spinning up new infrastructure or new endpoints, sometimes it has a hard time keeping up."
"I would like easier integrations for creating an online dashboard that executives would look at or are able to run reports from the tool."
"Tenable OT Security is fine, but I find it more language-based rather than structured. It feels like something is on a web page, and the dashboards and data representations are not cool. First of all, I said that the tool view should be improved. It looks pretty old. Second, the details Tenable OT Security provides regarding the metadata they work with should be more in-depth. Its main focus is vulnerability management, which is fine, but what about threat actors? What about attack vectors and OT vulnerabilities? There are major areas, baselines, etc. that need attention."
"As an IT security professional, I would like to see automation improvements in the response part of Tenable OT Security. However, I understand that implementing automation in OT environments can be quite challenging."
"Tenable.ot's integration with one of the products needs improvement."
"During upgrades, the previous configuration may be lost, creating support issues."
"Tenable OT product is good, but OT security itself is still maturing."
"The solution could detect changes in reading variables. The support of IoT devices can be improved."
"The solution should provide more features to prevent attacks."
"As an IT security professional, I would like to see automation improvements in the response part of Tenable OT Security."
 

Pricing and Cost Advice

"The pricing for CyberArk is on the higher side compared to other Privileged Access Management products. Something should be done regarding enterprise licensing for long-standing customers."
"Our risk is definitely significantly lower. Also, our resources are low."
"CyberArk has been Gartner's number-one pick for the past ten years, so you can infer that their pricing is higher than everyone else. When you are the best, you will charge appropriately for it."
"From a client perspective, CyberArk's pricing is fair but there is a significant increase each year. They should limit the price increase because this could potentially drive customers to other partners. Price changes should be at defined intervals. There should not be sudden jumps."
"This product is very expensive."
"I hope to learn how the pricing works so that I can understand it better, but I am certain it is not inexpensive."
"CyberArk is one of the best PAM solutions and one of the most expensive, but it works better than the others, so the pricing is fair."
"It's expensive, certainly. But CyberArk is the leader in the market with regards to privileged access management. You pay a lot, but you are paying for the value that is being delivered."
"The product is inexpensive."
"The tool's pricing is fair enough."
report
Use our free recommendation engine to learn which Operational Technology (OT) Security solutions are best for your needs.
865,384 professionals have used our research since 2012.
 

Top Industries

By visitors reading reviews
Computer Software Company
15%
Financial Services Firm
15%
Manufacturing Company
9%
Government
7%
Manufacturing Company
16%
Energy/Utilities Company
15%
Computer Software Company
10%
Retailer
6%
 

Company Size

By reviewers
Large Enterprise
Midsize Enterprise
Small Business
 

Questions from the Community

How does Sailpoint IdentityIQ compare with CyberArk PAM?
We evaluated Sailpoint IdentityIQ before ultimately choosing CyberArk. Sailpoint Identity Platform is a solution to manage risks in cloud enterprise environments. It automates and streamlines the m...
What do you like most about CyberArk Privileged Access Manager?
The most valuable features of the solution are control and analytics.
What do you like most about Tenable OT Security?
The product’s price is its most valuable feature.
What is your experience regarding pricing and costs for Tenable OT Security?
Considering the cost and that it is affordable, I would rate it at seven.
What needs improvement with Tenable OT Security?
The time it takes to train itself is a concern. Initially, it will not identify many assets, as it needs time to read the information before finding the assets. Some detections can go wrong, and it...
 

Also Known As

CyberArk Privileged Access Security, CyberArk Enterprise Password Vault
Tenable.ot
 

Overview

 

Sample Customers

Rockwell Automation
Nesher Cement Enterprises, City of Raleigh
Find out what your peers are saying about CyberArk Privileged Access Manager vs. Tenable OT Security and other solutions. Updated: July 2025.
865,384 professionals have used our research since 2012.