Try our new research platform with insights from 80,000+ expert users

Saviynt vs Symantec Privileged Access Manager comparison

 

Comparison Buyer's Guide

Executive SummaryUpdated on Oct 6, 2024

Review summaries and opinions

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
 

Categories and Ranking

Saviynt
Ranking in Privileged Access Management (PAM)
10th
Average Rating
7.4
Reviews Sentiment
6.7
Number of Reviews
25
Ranking in other categories
User Provisioning Software (3rd), Identity Management (IM) (5th), Identity Threat Detection and Response (ITDR) (9th), Identity and Access Management (32nd)
Symantec Privileged Access ...
Ranking in Privileged Access Management (PAM)
18th
Average Rating
7.8
Reviews Sentiment
7.0
Number of Reviews
53
Ranking in other categories
No ranking in other categories
 

Mindshare comparison

As of July 2025, in the Privileged Access Management (PAM) category, the mindshare of Saviynt is 3.6%, up from 3.3% compared to the previous year. The mindshare of Symantec Privileged Access Manager is 1.6%, up from 1.6% compared to the previous year. It is calculated based on PeerSpot user engagement data.
Privileged Access Management (PAM)
 

Featured Reviews

VinayM - PeerSpot reviewer
Used for IAM, IGA, MFA, SSO, and access management
The technical support team's response time could be improved. After the implementation, Saviynt should provide good support to their customers. While migrating from legacy applications to the cloud, Saviynt has many bugs. The lift and shift are not very seamless. There are a lot of customizations to be done and some development is required. From the migration point of view, the solution is a little buggy.
Muzi Lubisi - PeerSpot reviewer
Secure management of sensitive servers and seamless applications with direct linking
The credential injection feature is highly valued, particularly for RDP sessions. A majority of customers use it for RDP, and a couple for Linux servers. The broader capabilities, including access to multiple systems, web-based applications, and clustering, have never posed an issue. The threat analytics aspect is also a robust feature that analyzes all pertinent information.

Quotes from Members

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
 

Pros

"The repository has many features where you can define primary and secondary owners."
"The product is flexible to use."
"It's easy to manage and easy to use; a simple tool for end-users."
"The product's initial setup phase is simple."
"It gives very good and in-depth knowledge about a particular identity. Everything is through a single click. We get to know the workflows related to a particular identity with a single click."
"We have found the implementation process to be very easy."
"Considering the initial cost and the basic features, this is a good solution that provides integration with both on-premise and cloud applications."
"One of the tool's advantages is its user-friendly interface, making it easier to manipulate from a GUI perspective. The graphical user interface for users and administrators is straightforward. While it may require more configuration initially, once set up, it becomes more accessible and easier to use."
"The DB clustering is a really good benefit of using CA PAM."
"We can enforce complicated password policies and very important frequent password changes."
"Symantec PAM is easier to deploy compared to its competitors, such as BeyondTrust."
"We know we can scale up with what we have, and we probably will not need to buy any further appliances down the road."
"For me, it is the robust API which is the most valuable feature. This allows for low maintenance costs and allows applications to automatically connect. This is great to automate security of the DevOps pipeline for shared secrets across environments. Also, being on Linux and a virtual appliance is great."
"The credential injection feature is highly valued, particularly for RDP sessions."
"The agent-based credential management solution allows clients to programmatically use the agent to collect passwords during runtime from Symantec Privileged Access Manager."
"The product is very scalable in terms of concurrent sessions that it can handle at a time, number of device it can support, accounts that it can manage, or number of nodes that you can deploy in a cluster."
 

Cons

"It is time-consuming to troubleshoot issues."
"The product's stability is not easy to maintain."
"The custom application integration is a little complex, and this tool doesn't provide so many plugins or additional applications."
"An area for improvement in Saviynt is that there's a limitation on the number of logs you can get from the past twenty-four hours. For example, if the data is huge, the tool can only give you a maximum of one hundred logs. You can't get any further than that. In the next version of Saviynt, however, you can get more logs and you'll see them inside the log rotation. For example, when you're trying to search inside the log, you can select a date range, and then you can search for a particular log. We haven't used that new log rotation feature yet, but it's included in the next release of Saviynt. Another area for improvement in the tool is that it doesn't have a server monitoring feature, so if your server has a high load, it should give you a warning. You're supposed to get an alert similar to what's being done in WebLogic. In WebLogic, we had a separate facility, but in Saviynt, that feature's missing."
"The product lacks a broad user base which makes it difficult sometimes to find answers to questions about the product."
"Saviynt cannot customize based on customer needs."
"The configuration process at the beginning can be difficult, depending on the complexity of the company."
"It should support more customizations. In SailPoint, we can do many customizations, but we are not able to do that in Saviynt. For workflows and other things, we can only use what is already in place. Saviynt has a lot of scope for improvement on the customization part."
"They need to have zero tier and active-active setup ​with zero minimum downtime, which they are working on it. ​"
"What I hope happens with the new product CA PAM is to keep all the useful features that exist in PA, but what I’ve noticed with many new products is the UI gets polished but systems lags stability and performance or it adds additional complexity instead of simplifying the user experience."
"Recent releases need improvement in webpage management. For instance, navigating through a webpage that acts like a wizard, where I proceed to the next page and enter more information, is not handled well by the system."
"The service account management functionality needs to be extended to application pools, SQL database, PowerShell scripts, service account discovery, etc."
"Bring more technology into the portfolio and being able to collapse those products into a much more integrated way."
"I’m no fan of Java as an application front-end, as it tends to have issues depending on what browser one’s using."
"We have to do a lot of manual work to automate features."
"We experience stability issues after every patch upgrade. This is a place where CA needs to improve drastically."
 

Pricing and Cost Advice

"If you are investing in securing your data and avoiding any non-compliance issues, then yes, it is certainly recommended. To put it plainly, if you're willing to pay fines and aren't concerned about the misuse of data, then there might not be a problem. However, if you intend to safeguard the data of your employees, vendors, and customers, it becomes crucial. In this context, managing data security requires preventive and detective measures, such as enforcing segregation of duties and regularly reviewing permissions. Throughout an individual's life cycle within an organization or customer life cycle, various access permissions are granted. Without taking action on these permissions, there is a risk of exposure later on. If individuals retain access after leaving the organization, it poses a serious security threat. Implementing solutions like Saviynt can address these challenges, ensuring continuous access review, generating reports, alerts, and identifying potential risks."
"Saviynt has a competitive price."
"We are not into the licensing part. The clients take care of the licensing part."
"The pricing is comparable to Azure Entra ID. Kind of the same"
"If you need to make any changes then there are additional fees."
"Saviynt's pricing is reasonable."
"The solution has a pay-as-you-go licensing model, and you can subscribe monthly or yearly."
"The product is less expensive than one of the competitors."
"Cost-wise, CA was better compared to others in the market. ​"
"Appliances are relatively cheap, don’t skimp. Make sure you have redundancy, high availability, and enough appliances to manage the concurrent workload."
"The version we are using is affordable compared to BeyondTrust, which is maybe three to four times as expensive, but it depends on the features."
"It is reasonably priced."
"They offer per-device, per-user, or monthly and yearly licensing models."
"The licensing is simple and scalable."
"I would prefer better licensing options for the 20-100 users we have at a given time."
"Pricing is fair compared to other top vendors."
report
Use our free recommendation engine to learn which Privileged Access Management (PAM) solutions are best for your needs.
860,168 professionals have used our research since 2012.
 

Top Industries

By visitors reading reviews
Financial Services Firm
15%
Computer Software Company
15%
Manufacturing Company
8%
Healthcare Company
7%
Computer Software Company
17%
Comms Service Provider
13%
Financial Services Firm
12%
Manufacturing Company
11%
 

Company Size

By reviewers
Large Enterprise
Midsize Enterprise
Small Business
 

Questions from the Community

What do you like most about Saviynt?
It is very easy to use. It addresses most of the trends in identity governance and risk management.
What is your experience regarding pricing and costs for Saviynt?
Saviynt is very affordable compared to its competitors. It is cloud-based, making it significantly cheaper than on-premises solutions. This cost-effectiveness aligns well with the Saudi market, whe...
What needs improvement with Saviynt?
One area for improvement is Saviynt's training platform. They could enhance their training arrangements for partners and build a stronger partnership environment. When discussing Azure or AWS-relat...
What do you like most about Symantec Privileged Access Manager?
We can check the activities in the server for fragile files and documents in case of any issues.
What is your experience regarding pricing and costs for Symantec Privileged Access Manager?
Due to the nature of the solution, it is hard to gauge, but compared to competitors, the pricing is very good. I would rate it as an eight and a half out of ten.
What needs improvement with Symantec Privileged Access Manager?
Recent releases need improvement in webpage management. For instance, navigating through a webpage that acts like a wizard, where I proceed to the next page and enter more information, is not handl...
 

Also Known As

No data available
CA PAM, Xceedium Xsuite, CA Privileged Access Manager
 

Overview

 

Sample Customers

Shell, McKesson, Kimberly-Clark, Ingram Micro, Intermountain Health Care, Forterra, CoreLogic
NEOVERA, Telesis, eSoft
Find out what your peers are saying about Saviynt vs. Symantec Privileged Access Manager and other solutions. Updated: June 2025.
860,168 professionals have used our research since 2012.