Try our new research platform with insights from 80,000+ expert users

1Password Business vs CyberArk Privileged Access Manager comparison

 

Comparison Buyer's Guide

Executive SummaryUpdated on Nov 2, 2025

Review summaries and opinions

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
 

Categories and Ranking

1Password Business
Ranking in Enterprise Password Managers
5th
Average Rating
9.0
Reviews Sentiment
6.4
Number of Reviews
12
Ranking in other categories
No ranking in other categories
CyberArk Privileged Access ...
Ranking in Enterprise Password Managers
3rd
Average Rating
8.6
Reviews Sentiment
6.8
Number of Reviews
229
Ranking in other categories
User Activity Monitoring (1st), Privileged Access Management (PAM) (1st), Mainframe Security (2nd), Operational Technology (OT) Security (3rd)
 

Mindshare comparison

As of January 2026, in the Enterprise Password Managers category, the mindshare of 1Password Business is 4.6%, up from 4.3% compared to the previous year. The mindshare of CyberArk Privileged Access Manager is 6.9%, down from 7.4% compared to the previous year. It is calculated based on PeerSpot user engagement data.
Enterprise Password Managers Market Share Distribution
ProductMarket Share (%)
CyberArk Privileged Access Manager6.9%
1Password Business4.6%
Other88.5%
Enterprise Password Managers
 

Featured Reviews

reviewer2783805 - PeerSpot reviewer
Cloud infrastructure at a tech vendor with 201-500 employees
Centralized credential management has transformed password rotation and streamlined compliance
1Password Business provides seamless integration with multiple services, AWS accounts, and enables easy management of the password vault and passwords. The automatic password rotation feature is particularly valuable, as rotated passwords are automatically updated to the 1Password Business vault. The time savings achieved through 1Password Business is significant, eliminating 10 to 15 hours of workforce time weekly and approximately 50 hours monthly. Previously, dedicated users were required to rotate passwords, share them with others, and notify stakeholders when passwords expired. This information no longer needs to be shared via email, and the time previously spent on these tasks has been substantially reduced.
SI
Senior PAM Consultant at iC Consult GmbH
Makes privileged access management easy with automation and granular control
Many people underestimate the value of these tools because they treat them as simple automated password management. Once you realize the volume of passwords in your organization and factor in nonhuman passwords, you realize its value. Last year, CyberArk Impact cited 45 nonhuman passwords for every human password. If you have 10,000 employees, you can imagine the number of passwords. There are also many other operations. For example, you have a Qualys scanner that needs to reach out and touch all your endpoints and scan them for vulnerabilities. They use an API call to CyberArk to pull out a Privileged credential that allows them to log in to that target. This is an automated machine call. It is tapping into CyberArk to get that credential. There can be hundreds of thousands of those operations a day. You do not want to manage those passwords by hand. Some people marginalize the significance of such a solution by saying that it is just a fancy password changer. It goes well beyond that, especially with API calls and automation. Its importance extends beyond merely changing passwords; it involves automation, API calls, and process integration, crucial in agile environments for standing up new Amazon servers or other processes needing privileged credentials. CyberArk can automate these tasks into their build processes. Another critical feature is the proxy service via Privileged Session Manager (PSM), providing not only a proxy between your user and the target servers, protecting against malware but also offering session recording. Many companies I have worked with implemented a PAM product as a knee-jerk reaction to SOX audit requirements. They discovered they needed session recording and retention for regulatory compliance. This has become a major factor for clients instituting CyberArk, so PSM is a big deal in addition to regular password rotation.

Quotes from Members

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
 

Pros

"The tool's most valuable feature is security."
"The solution's most valuable features are its password management security and cloud firewall."
"1Password Business has positively impacted my organization by making it more secure, easier to share credentials with other people, and more reliable."
"1Password is very secure for storing all my passwords, keys, and secrets for work."
"The best feature 1Password Business offers is the ability to use vaults to easily share access across different teams."
"The most valuable feature of 1Password is the one that automatically generates a password and MFA for me when I try to enter them, instead of going and hardcoding it."
"1Password Business has positively impacted my organization, as it has improved security and helped by providing better passwords with the generated passwords."
"1Password Business has positively impacted my organization by making it easier to access and exit accounts, create new accounts, and share information across teams, all in a secure manner."
"CyberArk Privileged Access Manager’s ability to safeguard credentials for our organization is very important because it helps in managing the keys to the kingdom, especially the privileged access for various platforms."
"The regulation of accounts is by far the most needed and valuable part of the application."
"All access to our servers by both staff and vendors is monitored and recorded."
"The product has allowed us to improve both the management and access to privileged credentials, while also creating a full audit trail of all activities happening within isolated sessions of all tasks and activities taking place within the solution."
"The implementation of the PSM proxy has reduced the specific risk of "insider attacks" on our domain controllers and SLDAP servers by eliminating direct user login by an open secure connection on the user's behalf without ever revealing the privileged credentials."
"We also use CyberArk’s Secrets Manager. Because AWS is the biggest area for us, we have accounts in AWS that are being rotated by CyberArk. We also have a manual process for the most sensitive of our AWS accounts, like root accounts. We've used Secrets Manager on those and that has resulted in a significant risk reduction, as well."
"I find the discovery feature, which includes credential management, session management, monitoring, and remediation within a session, to be very valuable."
"CyberArk Privileged Access Manager's abilities to safeguard the infrastructure are important, as protecting credentials provides us with security and visibility."
 

Cons

"1Password should check and alert me if my information, such as my password or email address, has been sold on the internet."
"I would improve the search engine of 1Password to make it clearer or less confusing."
"The service could be improved incrementally to enhance programmatic access to the vault."
"1Password Business can be improved by reducing the cost. I would recommend making it half the current cost, and I would be very happy with that change."
"I choose a nine out of ten because I think some of the UI is a bit confusing, and the tutorials and documentation for 1Password Business are not the best."
"We faced issues while integrating 1Password into JumpCloud."
"Sometimes it fails to appear automatically, and you have to call it manually."
"The initial setup of CyberArk Privileged Access Manager difficulty depends on the environment that you are implementing it into. However, it typically is simple."
"We'd like to see the creation of some kind of memo field for each device account, which could be used, in our network at least, to leave a note about the device for either the security or network engineering team members."
"Some aspects of the administration need improvement, though they have recently made improvements to the API. However, the management with the interface and configuration are not so user-friendly. It has not changed much during all the years that CyberArk has been on the market. The management part, like platform management as well as PSM connectors definition and management, could be improved, even if it has already been done with the API."
"Some of the additional features that we are looking at are in the Conjur product. I am specifically discussing key management, API Keys, and things for connecting applications in the CI/CD pipelines."
"CyberArk PAM is a very broad product as everyone's requirements for implementation are different. In our particular case, the initial implementation was planned and developed by people who didn't know our specific network requirements, so the initial implementation needed to be tweaked over time. While this is normal, at the time all these "major" changes required CyberArk professional services to come in-plant and "assist" with the changes."
"Sometimes critical issues require follow-ups, as the support team doesn't always recognize the urgency of a critical ticket immediately."
"The current interface is not very intuitive."
"The scalability, sometimes, is lacking. It works really well for more static environments... But for an environment where you're constantly spinning up new infrastructure or new endpoints, sometimes it has a hard time keeping up."
 

Pricing and Cost Advice

"Users have to pay around five euros per year for the solution."
"The tool's pricing is not too cheap or expensive."
"Pricing and licensing depend on the environment."
"CyberArk is very expensive and there are additional fees for add-ons."
"It is not a cheap solution. It is expensive as compared with other solutions. However, it is one of the best solutions in their domain."
"The solution is very expensive and requires a license. We pay for an enterprise license."
"I rate the tool's pricing an eight out of ten."
"Licensing fees are paid on a yearly basis."
"I would rate the tool’s pricing a six out of ten."
"The price of this solution is expensive."
report
Use our free recommendation engine to learn which Enterprise Password Managers solutions are best for your needs.
881,082 professionals have used our research since 2012.
 

Top Industries

By visitors reading reviews
Computer Software Company
10%
Financial Services Firm
8%
Manufacturing Company
8%
Government
6%
Financial Services Firm
15%
Manufacturing Company
10%
Computer Software Company
9%
Government
6%
 

Company Size

By reviewers
Large Enterprise
Midsize Enterprise
Small Business
By reviewers
Company SizeCount
Small Business6
Midsize Enterprise5
Large Enterprise2
By reviewers
Company SizeCount
Small Business59
Midsize Enterprise40
Large Enterprise173
 

Questions from the Community

What is your experience regarding pricing and costs for 1Password?
My experience with 1Password Business regarding pricing, setup cost, and licensing was good.
What needs improvement with 1Password?
I can't think of anything in particular that would improve 1Password Business at the moment. I think you're doing a fantastic job.
What is your primary use case for 1Password?
I use 1Password Business for both work and personal family purposes. At work, I use 1Password Business to organize all my passwords for various applications I log into, as well as certain secrets t...
How does Sailpoint IdentityIQ compare with CyberArk PAM?
We evaluated Sailpoint IdentityIQ before ultimately choosing CyberArk. Sailpoint Identity Platform is a solution to manage risks in cloud enterprise environments. It automates and streamlines the m...
What do you like most about CyberArk Privileged Access Manager?
The most valuable features of the solution are control and analytics.
What is your experience regarding pricing and costs for CyberArk Privileged Access Manager?
My thoughts on the pricing of CyberArk Privileged Access Manager depend entirely on the vendors' requirements. If they want their things to be secure, they have to spend accordingly. We have four t...
 

Also Known As

No data available
CyberArk Privileged Access Security, CyberArk Enterprise Password Vault
 

Overview

 

Sample Customers

Dribble, Geckoboard, Wonderbly
Rockwell Automation
Find out what your peers are saying about 1Password Business vs. CyberArk Privileged Access Manager and other solutions. Updated: December 2025.
881,082 professionals have used our research since 2012.