Try our new research platform with insights from 80,000+ expert users

CyberArk Privileged Access Manager vs Top Secret comparison

 

Comparison Buyer's Guide

Executive SummaryUpdated on Feb 4, 2025

Review summaries and opinions

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
 

Categories and Ranking

CyberArk Privileged Access ...
Ranking in Mainframe Security
2nd
Average Rating
8.6
Reviews Sentiment
6.8
Number of Reviews
229
Ranking in other categories
User Activity Monitoring (1st), Enterprise Password Managers (3rd), Privileged Access Management (PAM) (1st), Operational Technology (OT) Security (3rd)
Top Secret
Ranking in Mainframe Security
3rd
Average Rating
8.6
Reviews Sentiment
8.4
Number of Reviews
8
Ranking in other categories
No ranking in other categories
 

Mindshare comparison

As of January 2026, in the Mainframe Security category, the mindshare of CyberArk Privileged Access Manager is 3.9%, up from 1.1% compared to the previous year. The mindshare of Top Secret is 14.2%, up from 11.7% compared to the previous year. It is calculated based on PeerSpot user engagement data.
Mainframe Security Market Share Distribution
ProductMarket Share (%)
CyberArk Privileged Access Manager3.9%
Top Secret14.2%
Other81.9%
Mainframe Security
 

Featured Reviews

SI
Senior PAM Consultant at iC Consult GmbH
Makes privileged access management easy with automation and granular control
Many people underestimate the value of these tools because they treat them as simple automated password management. Once you realize the volume of passwords in your organization and factor in nonhuman passwords, you realize its value. Last year, CyberArk Impact cited 45 nonhuman passwords for every human password. If you have 10,000 employees, you can imagine the number of passwords. There are also many other operations. For example, you have a Qualys scanner that needs to reach out and touch all your endpoints and scan them for vulnerabilities. They use an API call to CyberArk to pull out a Privileged credential that allows them to log in to that target. This is an automated machine call. It is tapping into CyberArk to get that credential. There can be hundreds of thousands of those operations a day. You do not want to manage those passwords by hand. Some people marginalize the significance of such a solution by saying that it is just a fancy password changer. It goes well beyond that, especially with API calls and automation. Its importance extends beyond merely changing passwords; it involves automation, API calls, and process integration, crucial in agile environments for standing up new Amazon servers or other processes needing privileged credentials. CyberArk can automate these tasks into their build processes. Another critical feature is the proxy service via Privileged Session Manager (PSM), providing not only a proxy between your user and the target servers, protecting against malware but also offering session recording. Many companies I have worked with implemented a PAM product as a knee-jerk reaction to SOX audit requirements. They discovered they needed session recording and retention for regulatory compliance. This has become a major factor for clients instituting CyberArk, so PSM is a big deal in addition to regular password rotation.
it_user814482 - PeerSpot reviewer
Information Security Engineer at a financial services firm with 1,001-5,000 employees
All the features help ensure we are compliant with banking regulations
Top Secret is our external security manager for our mainframe systems It's an integral part of all of our mainframe security functions. It's the core of our mainframe security functions. It helps ensure that we are compliant with all of the various banking regulations, security regulations and…

Quotes from Members

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
 

Pros

"I would rate this solution a nine out of ten."
"Securely protects our TAP/NUID and privileged access accounts within the company."
"CyberArk is a good and adaptive solution. It is easy to adopt and install. It is easy for every use case."
"All access to our servers by both staff and vendors is monitored and recorded."
"In terms of stability, there are no complaints."
"We are maintaining compliance in PCI, SOX and HIPPA, which is a big thing. Auditors really like it, and it has made us stay compliant."
"CyberArk Privileged Access Manager is the best solution for safeguarding sensitive patient data in healthcare, providing visibility and traceability that enhance compliance."
"I love how easily we could operate within Password Vault and get things done. It was almost effortless."
"We have implemented two-factor authentication, which is a new piece of CA Top Secret."
 

Cons

"It's a big program. To scale excessively, locally, on an on-prem application, takes a lot of servers."
"The solution needs better features for end users to manage their own whitelisting for API retrieval."
"The turnaround time for technical support is lengthy."
"Stability is a huge concern right now. We are on a version which is very unstable. We have to upgrade to stabilize it. It is fine, but the problem is we have to hire CyberArk to do the upgrade. This costs money, and it is their bug."
"One area for improvement is the plug-in development challenge. Although CyberArk provides a plug-in generator utility, it does not fully meet our needs, particularly for web-based applications. The plug-in generator currently works only for Telnet and SSH connections. We cannot generate a plug-in for web-based applications."
"I think they can improve account onboarding. For instance, you have to use the Password Vault utility, whereas in Thycotic I think there is a feature in the user interface that allows you to upload your account with an Excel file. So I'd like to have a similar thing in CyberArk."
"We don't often contact technical support, but when we do it, the response could be faster and better."
"We would, of course, always prefer it if the pricing was cheaper."
"It would be helpful if they removed limitations on user record sizes."
"Make sure that there is a post-sale department in your country. We have experienced some post-sale problems to do with integration of CA products into our systems."
"The user interface could be improved. Sometimes, it is not simple to understand where a certain definition should be defined, and I go through a number of screens until I find where to do some of them."
 

Pricing and Cost Advice

"Network and security licenses are currently being managed by other outsource vendors, so they are facing some type of problems in the digital aspect."
"CyberArk DNA is free if you purchase the CyberArk solution. There is no additional charge for CyberArk DNA, which is great."
"CyberArk provides all the features bundled. This is compared to other vendors who provide them as a different license for each functionality."
"The price of this solution is expensive."
"The main problem for the tool is its licensing. I work for a really big company. When you try to develop this as a service, usually you work with leverage teams who are formed with dozens of members. You might dedicate one FTE, or less, for something, e.g., an antivirus administrator. You might have half an FTE's effort dedicated to administering the antivirus, but then you have a team of about 30 users who might access that ticket. The problem is that CyberArk eliminated the possibility of concurrent users years ago. This is a big problem for companies who work with leverage teams. You need to pay for everyone. 40 licenses are used by 20 or 30 people. This is a big problem because licenses are not precisely cheap."
"I have heard from my leaders that CyberArk is costlier in terms of licensing. The support and maintenance are also costly. We use their premium support, but for the price we pay, we do not get the value."
"Before we bought it, they were licensing each function individually, which got complicated and very expensive. When we decided to buy it, it was much more straightforward and still quite expensive, but it brings a lot of value and risk reduction to the organization."
"I hope to learn how the pricing works so that I can understand it better, but I am certain it is not inexpensive."
Information not available
report
Use our free recommendation engine to learn which Mainframe Security solutions are best for your needs.
880,511 professionals have used our research since 2012.
 

Top Industries

By visitors reading reviews
Financial Services Firm
15%
Manufacturing Company
10%
Computer Software Company
9%
Government
6%
Financial Services Firm
23%
Real Estate/Law Firm
10%
Comms Service Provider
8%
Manufacturing Company
7%
 

Company Size

By reviewers
Large Enterprise
Midsize Enterprise
Small Business
By reviewers
Company SizeCount
Small Business59
Midsize Enterprise40
Large Enterprise173
By reviewers
Company SizeCount
Small Business1
Large Enterprise8
 

Questions from the Community

How does Sailpoint IdentityIQ compare with CyberArk PAM?
We evaluated Sailpoint IdentityIQ before ultimately choosing CyberArk. Sailpoint Identity Platform is a solution to manage risks in cloud enterprise environments. It automates and streamlines the m...
What do you like most about CyberArk Privileged Access Manager?
The most valuable features of the solution are control and analytics.
What is your experience regarding pricing and costs for CyberArk Privileged Access Manager?
My thoughts on the pricing of CyberArk Privileged Access Manager depend entirely on the vendors' requirements. If they want their things to be secure, they have to spend accordingly. We have four t...
Ask a question
Earn 20 points
 

Also Known As

CyberArk Privileged Access Security, CyberArk Enterprise Password Vault
CA Top Secret
 

Overview

 

Sample Customers

Rockwell Automation
First Tennessee Bank
Find out what your peers are saying about CyberArk Privileged Access Manager vs. Top Secret and other solutions. Updated: December 2025.
880,511 professionals have used our research since 2012.