No more typing reviews! Try our Samantha, our new voice AI agent.

ACF2 vs CyberArk Privileged Access Manager comparison

 

Comparison Buyer's Guide

Executive SummaryUpdated on Feb 4, 2025

Review summaries and opinions

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
 

Categories and Ranking

ACF2
Ranking in Mainframe Security
4th
Average Rating
9.0
Reviews Sentiment
7.8
Number of Reviews
6
Ranking in other categories
Database Security (13th)
CyberArk Privileged Access ...
Ranking in Mainframe Security
1st
Average Rating
8.6
Reviews Sentiment
6.8
Number of Reviews
230
Ranking in other categories
User Activity Monitoring (1st), Enterprise Password Managers (3rd), Privileged Access Management (PAM) (1st), Operational Technology (OT) Security (3rd)
 

Mindshare comparison

As of May 2026, in the Mainframe Security category, the mindshare of ACF2 is 12.1%, up from 10.3% compared to the previous year. The mindshare of CyberArk Privileged Access Manager is 4.8%, up from 1.5% compared to the previous year. It is calculated based on PeerSpot user engagement data.
Mainframe Security Mindshare Distribution
ProductMindshare (%)
CyberArk Privileged Access Manager4.8%
ACF212.1%
Other83.1%
Mainframe Security
 

Featured Reviews

reviewer1077621 - PeerSpot reviewer
IT Examiner at a financial services firm with 10,001+ employees
A reliable, scalable product for security and auditing of our mainframe environment
It is a good product. It has been used for years. As long as it is configured correctly, it is a very stable product. It depends on how an institution or a company configures it. It depends on an institution's risk appetite. You need to make sure it is configured as per the concept of least privilege, and the logging features, detection and control mechanism, and other things like that are enabled. If you configure it to give access to the public, then there could be compromises. You should also have someone who independently checks it to make sure that it is configured keeping security in mind. If it has been configured for a while, when there are enhancements to the product or when you enhance it, you need to make sure that security is also looked at, and it is configured according to an institution's security policies. I would rate it a nine out of 10.
Atul-Gujar - PeerSpot reviewer
CyberArk manager at a comms service provider with 10,001+ employees
Secures critical infrastructures with essential user session audit records
A potential area for improvement is enhancing support for cluster environments and distributed Vaults. Clients in multiple countries that need central access have different challenges that require better solutions from CyberArk. For financial services, CyberArk can improve incident response by ensuring fast support for critical priority tickets to meet compliance requirements. Providing more documentation on CyberArk is recommended for new team members to enhance their troubleshooting capabilities. I understand it's up to the client, but 99% fail to change the demo key, so it's crucial for CyberArk to emphasize changing the key and documenting it as part of the installation process.

Quotes from Members

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
 

Pros

"The most valuable feature is strict and reliable access control to CICS Resources."
"I love their support. The support is great. They are number one."
"The NOACCESS by default is another very good feature. Also, access rules are straightforward, and easy to understand."
"Without the product, extracting this information may take us as much as several days; instead, we can get it in real time."
"We use this tool to quickly assign privileges to different users as soon as they come in."
"I am deeply impressed with the quality and depth and breadth of security and functionality in CA’s ACF2 and Top Secret products."
"By providing a high level of access control to the z/OS systems, ACF2 allows us to maintain tight controls on dataset and system access and helps us keep unauthorized users from accessing PHI or PII data."
"Logging and monitoring are most valuable. It is for the mainframe environment, and it is at the forefront for security and resilience."
"It has become one of the primary components that we have."
"It is a great product when it comes to security, and from the security point of view, I would advise a new user to use this tool and deploy it in your environment since the security is unbeatable."
"It does what it promised, it secures our platforms, has the scalability, and it is just a solid product."
"CyberArk is a very important tool for my organization."
"I love how easily we could operate within Password Vault and get things done."
"All of the features of CyberArk Privileged Access Manager are valuable."
"Overall, as a partner in our digital transformation, CyberArk has been great."
"CyberArk is a solution to problems being faced by multiple companies and organizations, as it removes security threats and vulnerabilities from an organization in a secure way, and your credentials are handled in a secure way, so it solves this pain area in a company, and that is why I think they are one of the top tools."
 

Cons

"They can work on its ability to work in a distributed environment. It's a mainframe product. As many companies move to the cloud, depending on what cloud models they choose, such as a public, hybrid, or private cloud, it should be deployable. I am not sure if it can be deployed on those platforms. It has been there since the '50s or '60s, and it's still scalable. It has survived all these years, and it's scalable to many platforms, but I don't know about the cloud."
"I would like my team and me to be able to use simple browsers, like Chrome, to be able to access mainframe data and provision users using the browser.​"
"Initial setup could be complex if you rely on contractors to help with implementation."
"They can work on its ability to work in a distributed environment."
"The user access review could also be improved. It produces a lot of false positives."
"It needs longer rules. The max rule is 32K."
"I would like my team and me to be able to use simple browsers, like Chrome, to be able to access mainframe data and provision users using the browser."
"It needs longer rules. The max rule is 32K."
"It could be more user-friendly. Sometimes I encounter issues, and I do not know what the issue is. It takes a lot of time to find the error and fix it. Sometimes it gives an error, but I do not know what the error is. I have to find the documents, but it does not provide all the details needed to fix the error. This is one of the day-to-day issues with CyberArk."
"The interface on version 9 looks old."
"The initial setup was very complex."
"The turnaround time for technical support is lengthy."
"The product is very vaulting-focused. I'd love to see it expanding its capabilities a bit further into areas like just-in-time elevation, and access with non-vaulted credentials."
"We need a bit more education for our user community because they are not using it to its capabilities."
"They need to provide better training for the System Integrator."
"There is some stuff that we still have not fully integrated, which is our AIM solution. We are having all types of issues with it. I have been working with Level 3 support on it, but otherwise, from a functionality perspective, everything has been working except for the AIM solution."
 

Pricing and Cost Advice

Information not available
"The solution is costly but we get what we pay for."
"From a client perspective, CyberArk's pricing is fair but there is a significant increase each year. They should limit the price increase because this could potentially drive customers to other partners. Price changes should be at defined intervals. There should not be sudden jumps."
"CyberArk provides all the features bundled. This is compared to other vendors who provide them as a different license for each functionality."
"Pricing is a problem. CyberArk is expensive compared to other products I know. It is similar to buying a German car. It comes with all the bells and whistles, but some companies may find it too expensive."
"It's expensive, certainly. But CyberArk is the leader in the market with regards to privileged access management. You pay a lot, but you are paying for the value that is being delivered."
"The price of CyberArk support could be a little bit less. Otherwise, pricing is fine."
"The pricing for CyberArk is on the higher side compared to other Privileged Access Management products. Something should be done regarding enterprise licensing for long-standing customers."
"They have two types of licensing: purchase and subscription. You have to pay for each admin user, such as Microsoft admin, mail admin, database admin, etc."
report
Use our free recommendation engine to learn which Mainframe Security solutions are best for your needs.
893,164 professionals have used our research since 2012.
 

Top Industries

By visitors reading reviews
Financial Services Firm
18%
Manufacturing Company
13%
Comms Service Provider
8%
Retailer
7%
Financial Services Firm
13%
Manufacturing Company
11%
Computer Software Company
7%
Comms Service Provider
6%
 

Company Size

By reviewers
Large Enterprise
Midsize Enterprise
Small Business
By reviewers
Company SizeCount
Small Business2
Midsize Enterprise1
Large Enterprise4
By reviewers
Company SizeCount
Small Business59
Midsize Enterprise42
Large Enterprise174
 

Questions from the Community

Ask a question
Earn 20 points
How does Sailpoint IdentityIQ compare with CyberArk PAM?
We evaluated Sailpoint IdentityIQ before ultimately choosing CyberArk. Sailpoint Identity Platform is a solution to manage risks in cloud enterprise environments. It automates and streamlines the m...
What do you like most about CyberArk Privileged Access Manager?
The most valuable features of the solution are control and analytics.
What is your experience regarding pricing and costs for CyberArk Privileged Access Manager?
My thoughts on the pricing of CyberArk Privileged Access Manager depend entirely on the vendors' requirements. If they want their things to be secure, they have to spend accordingly. We have four t...
 

Also Known As

CA ACF2
CyberArk Privileged Access Security, CyberArk Enterprise Password Vault
 

Overview

 

Sample Customers

Sky, Rogers Communications
Rockwell Automation
Find out what your peers are saying about ACF2 vs. CyberArk Privileged Access Manager and other solutions. Updated: April 2026.
893,164 professionals have used our research since 2012.