Try our new research platform with insights from 80,000+ expert users

CyberArk Privileged Access Manager vs Tenable OT Security comparison

 

Comparison Buyer's Guide

Executive Summary

Review summaries and opinions

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
 

Categories and Ranking

CyberArk Privileged Access ...
Ranking in Operational Technology (OT) Security
3rd
Average Rating
8.6
Reviews Sentiment
6.8
Number of Reviews
229
Ranking in other categories
User Activity Monitoring (1st), Enterprise Password Managers (3rd), Privileged Access Management (PAM) (1st), Mainframe Security (2nd)
Tenable OT Security
Ranking in Operational Technology (OT) Security
4th
Average Rating
8.6
Reviews Sentiment
6.6
Number of Reviews
7
Ranking in other categories
No ranking in other categories
 

Mindshare comparison

As of January 2026, in the Operational Technology (OT) Security category, the mindshare of CyberArk Privileged Access Manager is 0.6%, up from 0.1% compared to the previous year. The mindshare of Tenable OT Security is 9.2%, down from 12.6% compared to the previous year. It is calculated based on PeerSpot user engagement data.
Operational Technology (OT) Security Market Share Distribution
ProductMarket Share (%)
CyberArk Privileged Access Manager0.6%
Tenable OT Security9.2%
Other90.2%
Operational Technology (OT) Security
 

Featured Reviews

SI
Senior PAM Consultant at iC Consult GmbH
Makes privileged access management easy with automation and granular control
Many people underestimate the value of these tools because they treat them as simple automated password management. Once you realize the volume of passwords in your organization and factor in nonhuman passwords, you realize its value. Last year, CyberArk Impact cited 45 nonhuman passwords for every human password. If you have 10,000 employees, you can imagine the number of passwords. There are also many other operations. For example, you have a Qualys scanner that needs to reach out and touch all your endpoints and scan them for vulnerabilities. They use an API call to CyberArk to pull out a Privileged credential that allows them to log in to that target. This is an automated machine call. It is tapping into CyberArk to get that credential. There can be hundreds of thousands of those operations a day. You do not want to manage those passwords by hand. Some people marginalize the significance of such a solution by saying that it is just a fancy password changer. It goes well beyond that, especially with API calls and automation. Its importance extends beyond merely changing passwords; it involves automation, API calls, and process integration, crucial in agile environments for standing up new Amazon servers or other processes needing privileged credentials. CyberArk can automate these tasks into their build processes. Another critical feature is the proxy service via Privileged Session Manager (PSM), providing not only a proxy between your user and the target servers, protecting against malware but also offering session recording. Many companies I have worked with implemented a PAM product as a knee-jerk reaction to SOX audit requirements. They discovered they needed session recording and retention for regulatory compliance. This has become a major factor for clients instituting CyberArk, so PSM is a big deal in addition to regular password rotation.
AP
Senior Consultant at Payatu
Enables cost-effective asset and threat management while requiring improvements in support and training
The time it takes to train itself is a concern. Initially, it will not identify many assets, as it needs time to read the information before finding the assets. Some detections can go wrong, and it may not understand certain industrial protocols. While installation and deployment are easy, upgrading from one version to another can be challenging. When you assure clients they will receive minus two upgrades, sometimes upgrading through the cloud becomes difficult, requiring on-site upgrades. During upgrades, the previous configuration may be lost, creating support issues.

Quotes from Members

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
 

Pros

"Technical support is very helpful whenever we have any questions."
"What I appreciate about CyberArk Privileged Access Manager is that it is not only for password security; we can also manage their applications and platforms, and whenever a user logs in, end-to-end protection is handled, including monitoring user activity through PSM servers and reacting to threats with Privileged Threat Analysis."
"It enables companies to automate password management on target systems gaining a more secure access management approach."
"We could see the benefits of CyberArk Privileged Access Manager immediately after we deployed it and started using it."
"CyberArk Privileged Access Manager is cool."
"CyberArk Privileged Access Manager is excellent for meeting compliance and regulatory requirements."
"The AI capabilities, including advanced threat detection features, are very helpful for us. They reduce human effort and errors, allowing us to quickly identify and respond to threats."
"With CyberArk, you can be fully confident that your existing accounts are secure. You will be 100 percent"
"The product has easy-to-manage features and components."
"I like Tenable OT Security for two main reasons. Firstly, it helps identify vulnerabilities and risks for IT and OT assets, which is crucial for our operations. Secondly, it performs external port scanning, including vulnerability scans for open ports. Compared to the Claroty Platform, the tool offers detailed asset discovery capabilities."
"The initial setup was very easy, and I would rate it a ten out of ten."
"The product’s price is its most valuable feature."
"The active query inventory is the most valuable feature."
"It's for securing the vulnerability of the OT solutions they are using. We mitigate those through patch management activities and find vulnerabilities easily with this security solution."
"The clear distinction between IT and OT that Tenable OT provides is its most valuable feature."
"The biggest advantage is that with good infrastructure, you can utilize asset planning when using Nessus along with Tenable OT Security."
 

Cons

"More than the product itself, there is room for improvement in the documentation. The documentation should be very detailed and very structured. It has a lot of good information, on one level, but I feel that it could be more elaborate and more structured."
"There were a lot of manual steps in the initial setup which could have been automated. I read the 10.4 release that was sent out about a month or two ago, and I saw the steps required for upgrade have been reduced by about 90%. That was a big thing for me, but I still haven't seen that yet because we have not upgrade past 9.9.5."
"As a customer, I might need a plugin for a specific product, or an application, and CyberArk might have already worked with some other client on it. There has to be some platform where it is available for everybody else to go and grab it, instead of my having to reinvent the wheel."
"Customer support is somewhat lacking. They are often unavailable on Fridays, and the support process, such as raising a call or case, can take too long."
"We found a lot of errors during the initial setup. They should work to improve the implementation experience and to remove errors from the process."
"The support services could act faster when people reach out to resolve issues."
"When something comes out, it's generally airtight and works as advertised. However, sometimes they are a little bit slow to keep up with what's coming out. In 2017, for example, they released support for Windows Server 2016, which had been out for a year or so."
"Pricing is a concern for me because it is not very user-friendly for startups, new users, or very small organizations."
"The solution could detect changes in reading variables. The support of IoT devices can be improved."
"Tenable.ot's integration with one of the products needs improvement."
"As an IT security professional, I would like to see automation improvements in the response part of Tenable OT Security. However, I understand that implementing automation in OT environments can be quite challenging."
"As an IT security professional, I would like to see automation improvements in the response part of Tenable OT Security."
"The solution should provide more features to prevent attacks."
"Tenable OT product is good, but OT security itself is still maturing."
"During upgrades, the previous configuration may be lost, creating support issues."
"Tenable OT Security is fine, but I find it more language-based rather than structured. It feels like something is on a web page, and the dashboards and data representations are not cool. First of all, I said that the tool view should be improved. It looks pretty old. Second, the details Tenable OT Security provides regarding the metadata they work with should be more in-depth. Its main focus is vulnerability management, which is fine, but what about threat actors? What about attack vectors and OT vulnerabilities? There are major areas, baselines, etc. that need attention."
 

Pricing and Cost Advice

"CyberArk is very expensive and there are additional fees for add-ons."
"They have two types of licensing: purchase and subscription. You have to pay for each admin user, such as Microsoft admin, mail admin, database admin, etc."
"I would rate the cost of CyberArk Privileged Access Manager seven out of ten with ten being the most expensive."
"Its price is high. I have also worked with Delinea. CyberArk is comparatively expensive compared to other PAM solutions, such as Delinea, especially during renewal."
"There are no additional costs other than the standard licensing fees."
"Payments have to be made on a yearly basis toward the licensing costs of the solution."
"From a client perspective, CyberArk's pricing is fair but there is a significant increase each year. They should limit the price increase because this could potentially drive customers to other partners. Price changes should be at defined intervals. There should not be sudden jumps."
"I rate the tool's pricing an eight out of ten."
"The tool's pricing is fair enough."
"The product is inexpensive."
report
Use our free recommendation engine to learn which Operational Technology (OT) Security solutions are best for your needs.
879,371 professionals have used our research since 2012.
 

Top Industries

By visitors reading reviews
Financial Services Firm
15%
Computer Software Company
11%
Manufacturing Company
10%
Government
6%
Manufacturing Company
16%
Energy/Utilities Company
16%
Computer Software Company
9%
Financial Services Firm
6%
 

Company Size

By reviewers
Large Enterprise
Midsize Enterprise
Small Business
By reviewers
Company SizeCount
Small Business59
Midsize Enterprise40
Large Enterprise173
By reviewers
Company SizeCount
Small Business4
Large Enterprise4
 

Questions from the Community

How does Sailpoint IdentityIQ compare with CyberArk PAM?
We evaluated Sailpoint IdentityIQ before ultimately choosing CyberArk. Sailpoint Identity Platform is a solution to manage risks in cloud enterprise environments. It automates and streamlines the m...
What do you like most about CyberArk Privileged Access Manager?
The most valuable features of the solution are control and analytics.
What is your experience regarding pricing and costs for CyberArk Privileged Access Manager?
My thoughts on the pricing of CyberArk Privileged Access Manager depend entirely on the vendors' requirements. If they want their things to be secure, they have to spend accordingly. We have four t...
What do you like most about Tenable OT Security?
The product’s price is its most valuable feature.
What is your experience regarding pricing and costs for Tenable OT Security?
Considering the cost and that it is affordable, I would rate it at seven.
What needs improvement with Tenable OT Security?
The time it takes to train itself is a concern. Initially, it will not identify many assets, as it needs time to read the information before finding the assets. Some detections can go wrong, and it...
 

Also Known As

CyberArk Privileged Access Security, CyberArk Enterprise Password Vault
Tenable.ot
 

Overview

 

Sample Customers

Rockwell Automation
Nesher Cement Enterprises, City of Raleigh
Find out what your peers are saying about CyberArk Privileged Access Manager vs. Tenable OT Security and other solutions. Updated: December 2025.
879,371 professionals have used our research since 2012.