Try our new research platform with insights from 80,000+ expert users

CyberArk Secrets Management vs Safe-T Secure Application Access comparison

 

Comparison Buyer's Guide

Executive SummaryUpdated on Mar 9, 2025

Review summaries and opinions

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
 

Categories and Ranking

CyberArk Secrets Management
Ranking in Access Management
17th
Average Rating
7.4
Reviews Sentiment
8.0
Number of Reviews
3
Ranking in other categories
Enterprise Password Managers (15th)
Safe-T Secure Application A...
Ranking in Access Management
28th
Average Rating
7.8
Reviews Sentiment
7.7
Number of Reviews
8
Ranking in other categories
Enterprise Infrastructure VPN (42nd), ZTNA (26th)
 

Featured Reviews

RJ
Helps with compliance and improves operational flexibility
We have had both on-premises and SaaS models. The on-premise setup was a little difficult, but now that it has been moved to the SaaS model, everything is controlled by CyberArk. We just go and do our work. The initial on-premises setup took two weeks because it was an integrated effort. I had to spin up the servers and bring in the CyberArk Secrets Management resource to deploy the scripts. I then had to open networks and firewalls between CyberArk Secrets Management's on-premise servers and the application server. In the initial phase, it took two to three weeks, but it became easier when moving to the SaaS model. In terms of maintenance, it requires patching or upgrades, which happens one day in a month. If there is a failure, we have to roll back and try once again, which takes more time, but if everything goes smoothly, there is three to five hours of downtime.
it_user790473 - PeerSpot reviewer
The architecture is open to integration and development, making the product very flexible
We have a lot of in-house applications that we must integrate with a secure email system. We are a financial institute, so we must use it to send emails to our customers securely, because these emails contain sensitive customer data. The architecture of the product is very open to development, plug-ins and integration with in-house systems. We have been able integrate this system into our CRM and other operational systems. We didn't find that kind of flexibility in other secure email products. We have also been able to customize the user interface so it is branded and able to "talk" our marketing language. There is also a local Israeli vendor that helps us to improve the product, add the new features.

Quotes from Members

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
 

Pros

"With CyberArk Secrets Management, we were able to resolve the automatic change of the passwords based on timelines. We were also able to retrieve the passwords in an encrypted format by utilizing the CyberArk platform, which was not provided to us by UiPath."
"CyberArk's support team is knowledgeable and helpful, consistently responding on time."
"It's vital for effectively managing and securing my credentials."
"The automatic rotation of the password is the top feature."
"CyberArk Secrets Management is a critical solution for strengthening our security posture."
"One of the most important features for us is the system's performance, particularly its speed of retrieving secrets."
"the security level is very high. After we tested it and checked all the security aspects of the product, we found that it's highly secure."
"Safe-T is very good for users because it has plug-in for Outlook."
"It's easy to use over the web. A user who is not in the office can use it and securely insert files."
"If you want a very flexible system that you can easily integrate, and develop interfaces for it or plug-ins to other application environments, it's probably the most flexible"
 

Cons

"Implementation was complex and required professional services."
"Improvements for CyberArk Secrets Management include enhanced documentation with more use cases and step-by-step integration guides."
"We did not have a good experience with technical support because their numerous processes caused delays in engaging, leading to project delays or issues with production."
"The password search feature and integration between different vaults could be enhanced. For instance, when updating passwords in both lower and higher environment vaults, improvement is required in search and upgrade functions."
"We occasionally experience incidents that delay password injection back into the script."
"Implementing it and ensuring seamless password rotations present challenges."
"The Outlook agent is not working well for installing it in the entire office."
"One important thing that we haven't found in this product is the ability to provide a read-only view for documents. Also, the ability for the customer to add annotations to these documents."
 

Pricing and Cost Advice

"It is in the middle. It is neither very cheap nor very expensive, so I would place it in the middle."
"CyberArk Secrets Management has a moderate pricing structure based on a per-tenant licensing model rather than a per-user account model like their PAM solution."
Information not available
report
Use our free recommendation engine to learn which Access Management solutions are best for your needs.
850,028 professionals have used our research since 2012.
 

Questions from the Community

What is your experience regarding pricing and costs for CyberArk Secrets Management?
It is in the middle. It is neither very cheap nor very expensive, so I would place it in the middle.
What needs improvement with CyberArk Secrets Management?
The user interface can be improved, and with new platforms emerging, CyberArk Secrets Management could integrate with them. The password search feature and integration between different vaults coul...
What is your primary use case for CyberArk Secrets Management?
We own a robotic process automation platform called UiPath. We use CyberArk Secrets Management to bring the credentials into robotic process automation for the bots during runtime.
Ask a question
Earn 20 points
 

Also Known As

No data available
Safe-T SDA, Safe-T, Safe-T Software-Defined Access
 

Overview

 

Sample Customers

Information Not Available
Government of Israel, eviCore Healthcore, Glen Imaging, Sarin, LBG, Rollomatic, Boegli-Gravures SA, Banque Heritage, Groupe Minoteries, Temenos, ZEK, RLM Finsbury, Harel Insurance, Meitav Dash
Find out what your peers are saying about CyberArk Secrets Management vs. Safe-T Secure Application Access and other solutions. Updated: April 2025.
850,028 professionals have used our research since 2012.