Try our new research platform with insights from 80,000+ expert users

CyberArk Privileged Access Manager vs Varonis Platform comparison

 

Comparison Buyer's Guide

Executive Summary

Review summaries and opinions

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
 

Categories and Ranking

CyberArk Privileged Access ...
Average Rating
8.6
Reviews Sentiment
6.9
Number of Reviews
221
Ranking in other categories
User Activity Monitoring (1st), Enterprise Password Managers (2nd), Privileged Access Management (PAM) (1st), Mainframe Security (2nd), Operational Technology (OT) Security (3rd)
Varonis Platform
Average Rating
8.2
Reviews Sentiment
6.4
Number of Reviews
14
Ranking in other categories
Data Loss Prevention (DLP) (9th), Data Governance (6th), SaaS Security Posture Management (SSPM) (5th), Data Security Posture Management (DSPM) (8th), Compliance Management (8th), Ransomware Protection (8th), Identity Threat Detection and Response (ITDR) (5th)
 

Mindshare comparison

While both are Security Software solutions, they serve different purposes. CyberArk Privileged Access Manager is designed for Privileged Access Management (PAM) and holds a mindshare of 18.3%, down 22.8% compared to last year.
Varonis Platform, on the other hand, focuses on Data Loss Prevention (DLP), holds 5.8% mindshare, up 2.4% since last year.
Privileged Access Management (PAM)
Data Loss Prevention (DLP)
 

Featured Reviews

Lasantha Wijesinghe - PeerSpot reviewer
We have visibility and control through real-time user behavior analytics
It took us some time to realize its benefits because there was a learning curve for us. It took us about a year to get our heads around this product and start effectively using it. It is a journey. It takes at least five years for any company to make this product very useful and reach maturity. It is not only the product's fault. The company needs to have a vision, and the company culture needs to go with it. Senior leadership needs to support the vision. You need to have lots of ingredients for success. If everything is in place, you will see success after one year. In the first year, it is a struggle for everybody. My company was bought by a bigger company, and they were very new to privileged access management. Everybody was struggling. The advice I would give is to have a good vision for privileged access management. You need dedicated teams, senior management support, and proper company policies and standards before implementing the solution. Start building knowledge slowly and avoid jumping into the deep end without preparation. I would rate CyberArk Privileged Access Manager a nine out of ten.
Frederic  Delos - PeerSpot reviewer
Offers the ability to identify sensitive areas, allowing you to drill down into the sensitive data
The most effective feature for me is its ability to identify sensitive areas, allowing you to drill down into the sensitive data, provided you have access, to determine whether it's a false positive or a true positive. That's the best thing for me, out of all of it. It's got everything, like other ones, but I like to be able to look at something if I'm doing forensics on the alert and say, "Okay, do I really need to do something with this?" For example, we don't want sensitive data in our OneDrive. So it identifies the sensitive data that's possibly in the OneDrive. And what I can do is look at it and identify whether it's actually sensitive data in Datalert or whether it looks like sensitive data, but I know it's a false positive. If it is a false positive, I can basically say ignore this pattern based on X, Y, and Z, you know, whether it's Redjax or keyword proximity. So I like that. With other tools, I gotta go through a whole process because it's a little bit more complex. Here, I can tag it and bag it in one shot. And the next good time I scan, it slips over it. So it helps in that.

Quotes from Members

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
 

Pros

"It is useful for protecting passwords. If you need to do access security management, you can first use the CyberArk console, and after that, you can connect the firewall interface or firewall command line. Similarly, if you need to do an RDP session, you need to first log in to CyberArk before connecting to the Windows RDP session. This way, the admin doesn't know the password, and that password is changed immediately. To change the password, you first discover the old password in the network, and after that, you can change the password."
"I would rate this solution a nine out of ten."
"You can easily manage more than 4000 accounts with one PSM."
"The most valuable aspects of the solution include password management and Rest API retrieval of vaulted credentials."
"The access control feature and privilege and role-based assignment are outstanding."
"It is a central repository. Therefore, if someone needs to access a server, then they go through CyberArk PAM. It provides a secure way to do this and CyberArk PAM records everything. For example, if you are connecting to a Linux server, then once you get into the Linux server and if it is integrated with CyberArk, it will automatically start recording everything that is being done. In most banks, seeing the recordings is very useful. If there are any gaps or something has happened which shouldn't have happened, then we can check the logs and videos. So, it gives security, in a robust manner, to the organization."
"Considering all those factors and being the best tool in the market for Privileged Access Management, it is recommended."
"They just released Marketplace, and they are constantly releasing updates to the components and adding new components, like Conjur. This is something that we ran into with Secret Server and DevOps, so it is already scalable, but becoming more so in the future."
"The analytics would have to be our most valuable feature."
"The most important feature is remediation. In remediation support, there is no group permission. We'll go ahead and remediate the access from the Dell folder to the parent folder."
"The solution ensures that users have not accidentally shared sensitive information with the wrong people or too many people."
"There's also a 90-day policy where if a user is not using the warehouse, it will automatically delete that username."
"The solution's classification engine is highly configurable and efficient."
"Varonis offers robust data access governance, allowing us to understand which sensitive data exists and who has access to it."
"Technical support from Varonis is rated as nine out of ten."
"The solution has significantly improved data security and compliance posture by allowing us to track and monitor activities. We can see who accesses data and when files are created and understand what's happening in our environment."
 

Cons

"It is complicated to deploy for Windows servers compared to other vendors."
"This product needs professional consulting services to onboard accounts effectively based user profiles."
"The initial setup of CyberArk is a challenge if you do not have prior experience with it."
"One thing that could be improved is to create of a better alternative for fixing group policy fees. We currently use Microsoft, but they have introduced new policies that may not be compatible."
"We found a lot of errors during the initial setup. They should work to improve the implementation experience and to remove errors from the process."
"Areas the product could be improved are in some of the reporting capabilities and how the reports are configured."
"The current interface doesn't scale that well, and has some screens still in the old layout."
"It should be easy to use for non-technical people. Its interface can be a bit difficult. Some parts of its interface are not very intuitive. Some of the controls are hidden, and instead of having a screen with all the controls for that account on it, you have to use menus and other similar things."
"For unstructured data monitoring, it's one of the top ones, if not the top one, due to its usability."
"I'd like to see automatic updates for this solution. Currently, it's a manual process to update all the keywords"
"There is one thing that if I add something manually, I get so many alerts. That's the biggest bad thing."
"One area for improvement is the calculation engine. When applying rules in Varonis, especially for large datasets (terabytes of data), the calculations can be slow and require time to process. Speeding up this process would be beneficial."
"The solution's interface is a little complicated with regard to setting up filters and reports."
"The solution's areas of improvement are the interface and the dependency on on-premises deployment for some components."
"The product is very complicated."
"The GUI should be more functional. There should be a process for connecting through Chrome, Internet Explorer, etc."
 

Pricing and Cost Advice

"Pricing and licensing depend on the environment."
"The price of the solution is reasonable."
"CyberArk is good at what they do, and the price reflects that. You have to pay the price for the same."
"Quite expensive"
"CyberArk Privileged Access Manager is more expensive than its competitors, such as BeyondTrust, Delinea, and ManageEngine PAM360."
"Compared to other solutions, it is costly."
"I hope to learn how the pricing works so that I can understand it better, but I am certain it is not inexpensive."
"The license CyberArk Privileged Access Manager is on an annual basis."
"It's expensive, kind of, really expensive."
"Licensing is on an annual basis. Maintenance and renewal fees are separate. Varonis Datalert is quite expensive."
"I would rate the pricing an eight out of ten, with ten being the most expensive."
"Varonis Platform wasn't certainly the cheapest solution."
"You could do a subscription, where you pay yearly, or you could purchase it outright. The licensing cost is based on the number of users on the system that you are monitoring."
"The pricing is good. It neither expensive nor cheap. It is average."
"The platform is expensive. I rate the pricing a nine out of ten."
report
Use our free recommendation engine to learn which Privileged Access Management (PAM) solutions are best for your needs.
850,671 professionals have used our research since 2012.
 

Top Industries

By visitors reading reviews
Educational Organization
33%
Financial Services Firm
12%
Computer Software Company
11%
Manufacturing Company
6%
Financial Services Firm
16%
Computer Software Company
10%
Manufacturing Company
9%
Healthcare Company
7%
 

Company Size

By reviewers
Large Enterprise
Midsize Enterprise
Small Business
 

Questions from the Community

How does Sailpoint IdentityIQ compare with CyberArk PAM?
We evaluated Sailpoint IdentityIQ before ultimately choosing CyberArk. Sailpoint Identity Platform is a solution to manage risks in cloud enterprise environments. It automates and streamlines the m...
What do you like most about CyberArk Privileged Access Manager?
The most valuable features of the solution are control and analytics.
What is your experience regarding pricing and costs for CyberArk Privileged Access Manager?
With the current model of licensing, for my use cases, sometimes it's hard to convince the management and get budget approvals for it. It's expensive and you're not getting anything new. It's just ...
What do you like most about Varonis Platform?
The solution has significantly improved data security and compliance posture by allowing us to track and monitor activities. We can see who accesses data and when files are created and understand w...
What needs improvement with Varonis Platform?
Varonis started as an on-premises solution and is transitioning to cloud. It hasn't fully moved yet, which is an area for improvement. Varonis requires more access permissions for its core function...
What is your primary use case for Varonis Platform?
The primary use case for Varonis Platform is data discovery, specifically for discovering sensitive data in our organization to protect it. We are looking for a solution that can scan our repositor...
 

Also Known As

CyberArk Privileged Access Security, CyberArk Enterprise Password Vault
No data available
 

Overview

 

Sample Customers

Rockwell Automation
Nottingham Building Society
Find out what your peers are saying about CyberArk, Delinea, One Identity and others in Privileged Access Management (PAM). Updated: April 2025.
850,671 professionals have used our research since 2012.