We performed a comparison between CyberArk Privileged Access Manager and Delinea Secret Server based on our users’ reviews in five categories. After reading all of the collected data, you can find our conclusion below.
Comparison Results: Delinea Secret Server has an edge over CyberArk in this comparison. According to reviews, Secret Server is easier to set up, more reasonably priced, and more user friendly.
"We are able to know who is accessing what and when; having accountability."
"The technical support for this solution is very good. If I was to rate it on a scale of one to five, I would give it a five."
"AIM has been a great help in automating password retrieval which removes the need for hard-coded credentials."
"The users have the ability to rotate passwords on a daily basis with a Reconcile Account. Or, if they want to do one-time password checkouts, we can manage those, check in, check out. I like the flexibility of the changing of the password, specifically."
"We have been able to manage application credentials in CyberArk, whether they come as a custom plugin or straight out-of-the-box."
"The product is for hardening access and making the organization more secure, therefore reducing chances of a breach."
"It is one of the best solutions in the market. Ever since I started using this solution, there has not been any compromise when it comes to our lab."
"This solution is quite stable."
"The solution is scalable."
"The most valuable feature is session monitoring."
"The privileged access management, which is the Safe Access Model is the most valuable feature."
"I really like the zero trust piece."
"Provides us with the ability to control access [to secrets] by groups."
"The "App to App" feature has been most impactful. It allows secure communication between applications without requiring direct user access, which is crucial for several applications."
"Technical support is pretty good."
"The secret template, password rotation, and recording sessions are the most valuable."
"Report creation could be improved. The policies could be more customized."
"When I was a component owner for PAM's Privileged Threat Analytics (PTA) component, what I wanted was a clear mapping to the MITRE ATT&CK framework, a framework which has a comprehensive list of use cases. We reached out to the vendor and asked them how much coverage they have of the uses cases found on MITRE, which would have given us a better view of things while I was the product owner. Unfortunately they did not have the capability of mapping onto MITRE's framework at that time."
"CyberArk has to continue to evolve with that threat landscape to make sure that they're still protecting those credentials that are owned by those that have privileged accounts in the firms."
"If there is an area that has room for improvement, it's probably working with their support and getting people on the phone. That is hard to do with most products in general, but that seems to be the difficult area. The product is fantastic, but sometimes we want somebody on the phone."
"Sometimes the infrastructure team is hesitant to provide more resources."
"If we could have some kind of out-of-the box feature that you can simply say "no" so they don't have to go into a development mode, that would a really helpful feature."
"Areas the product could be improved are in some of the reporting capabilities and how the reports are configured."
"We had an issue with the Copy feature... Apparently, in version 10, that Copy feature does not work. You actually have to click Show and then copy the password from within Show and then paste it. We've had a million tickets and we had to figure out a workaround to it."
"We always ask for partner enablement, which is more like a soft requirement rather than a product requirement. It would be great if they can provide us deeper knowledge of their products for integration."
"What needs improvement? The product can be improved by reducing the number of updates provided."
"The technical support needs improvement. For example, if you have any problems on the server configuring the IIS, they would provide you very limited details and they would tell you the problem is on your end."
"I formerly used only one service: the remote server. For example, I connected to the Active Directory user and the computer's console. But now, I need to do a remote connection to the domain controller. Maybe it only connects to that tool, the Active Directory users, and the computer management console, but not to the domain controller. Another thing Delinea could add is multi-factor authentication."
"I think that the main interface should integrate better with non-standard applications and clients, to connect with other systems."
"Its remote support feature needs improvement."
"It is expensive compared to other solutions in this category and for what it does."
"One of the things that we want is to be able to do some of the management of it using APIs."
More CyberArk Privileged Access Manager Pricing and Cost Advice →
CyberArk Privileged Access Manager is ranked 1st in Privileged Access Management (PAM) with 142 reviews while Delinea Secret Server is ranked 2nd in Privileged Access Management (PAM) with 47 reviews. CyberArk Privileged Access Manager is rated 8.8, while Delinea Secret Server is rated 8.2. The top reviewer of CyberArk Privileged Access Manager writes "Lets you ensure relevant, compliant access in good time and with an audit trail, yet lacks clarity on MITRE ATT&CK". On the other hand, the top reviewer of Delinea Secret Server writes "Effective for password rotation policies triggered by audit requirements, it helps maintain compliance standards and seamless integration with third-party tools ". CyberArk Privileged Access Manager is most compared with Cisco ISE (Identity Services Engine), Microsoft Entra ID, WALLIX Bastion, One Identity Safeguard and Zscaler Internet Access, whereas Delinea Secret Server is most compared with Azure Key Vault, HashiCorp Vault, IBM Security Secret Server, ManageEngine PAM360 and BeyondTrust Endpoint Privilege Management. See our CyberArk Privileged Access Manager vs. Delinea Secret Server report.
See our list of best Privileged Access Management (PAM) vendors.
We monitor all Privileged Access Management (PAM) reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.
Hello Avinash, it all depends on the timeline and urgency of the project. If you need to deploy a PAM tool that focuses on standing privileges, stopping lateral movement, and incorporating Zero Standing Privileges as part of Zero Trust, then please consider looking at Remediant. I've worked for BeyondTrust and have gone up against the other big players such as Delinea, Centrify, CyberArk, and HashiCorp. They more or less all offer similar solutions, but looking at your current requirements, Remediant really excels in delivering a simple, yet very effective tool in a matter of days and weeks, not months and years.