We performed a comparison between CyberArk Privileged Access Manager and Teramind based on real PeerSpot user reviews.
Find out what your peers are saying about CyberArk, Proofpoint, Amazon Web Services (AWS) and others in User Activity Monitoring."CyberArk is not just an IT security or cybersecurity tool. It's also an administrator tool. I had a fair number of systems where the passwords were not fully managed by CyberArk yet, and they were expiring every 30 or 45 days. I was able to get management turned on for those accounts. From an administrator perspective, I didn't have to go back into those systems and manually change those passwords anymore. CyberArk... lightened the load on our administrative work."
"On the customer accounts side, our account managers are responsive. If you ask them, they will get you whomever you need."
"We are able to know who is accessing what and when; having accountability."
"The Vault offers great capabilities for structuring and accessing data."
"CyberArk PAM can be easily automated."
"The credentials management capability is key to ensuring that the credentials are kept secure and that access to them is done on a temporary and event-driven basis."
"The voice technology is very good."
"The most valuable feature is that it always provides flexibility, password quality and one-time user check-in and check-out."
"The product provides data protection and employee monitoring features in a single console."
"I would like easier integrations for creating an online dashboard that executives would look at or are able to run reports from the tool."
"We'd like to see the creation of some kind of memo field for each device account, which could be used, in our network at least, to leave a note about the device for either the security or network engineering team members."
"We don't often contact technical support, but when we do it, the response could be faster and better."
"One of the main things that could be improved would be filtering accounts on the main page and increasing the functionality of the filters. There are some filters on the side which are very specific, but I feel there could be more."
"In the beginning, CyberArk Privileged Access Manager didn't have a multifactor authentication feature, so that was an area for improvement, but now it's part of the solution. Having just one console for two CyberArk products would be good, particularly for the CyberArk Privileged Access Manager and the CyberArk Endpoint Privilege Manager, with the latter being a product for endpoint management that supports the workstations and allows you to manage workstations. In the next update of CyberArk Privileged Access Manager, it would be good to have a local agent where you can manage all users and processes, and have an agent on the servers such as Linux and Windows."
"The initial setup was a bit complex."
"One of our current issues is a publishing issue. If we whitelist Google Chrome, all the events of Google Chrome should be gone. It is not happening."
"If we could have some kind of out-of-the box feature that you can simply say "no" so they don't have to go into a development mode, that would a really helpful feature."
"The user experience should be improved."
More CyberArk Privileged Access Manager Pricing and Cost Advice →
CyberArk Privileged Access Manager is ranked 1st in User Activity Monitoring with 142 reviews while Teramind is ranked 5th in User Activity Monitoring with 1 review. CyberArk Privileged Access Manager is rated 8.8, while Teramind is rated 0.0. The top reviewer of CyberArk Privileged Access Manager writes "Lets you ensure relevant, compliant access in good time and with an audit trail, yet lacks clarity on MITRE ATT&CK". On the other hand, the top reviewer of Teramind writes "A stable solution that provides data protection and employee monitoring features in a single console". CyberArk Privileged Access Manager is most compared with Cisco ISE (Identity Services Engine), Microsoft Entra ID, Delinea Secret Server, WALLIX Bastion and One Identity Safeguard, whereas Teramind is most compared with ObserveIT, Veriato and Ekran System.
See our list of best User Activity Monitoring vendors.
We monitor all User Activity Monitoring reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.