Try our new research platform with insights from 80,000+ expert users

Akamai Enterprise Application Access vs CyberArk Privileged Access Manager comparison

 

Comparison Buyer's Guide

Executive Summary

Review summaries and opinions

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
 

Categories and Ranking

Akamai Enterprise Applicati...
Average Rating
9.0
Reviews Sentiment
7.5
Number of Reviews
4
Ranking in other categories
Cloud Access Security Brokers (CASB) (14th), Access Management (16th), ZTNA as a Service (15th), Secure Access Service Edge (SASE) (18th)
CyberArk Privileged Access ...
Average Rating
8.6
Reviews Sentiment
6.8
Number of Reviews
229
Ranking in other categories
User Activity Monitoring (1st), Enterprise Password Managers (3rd), Privileged Access Management (PAM) (1st), Mainframe Security (2nd), Operational Technology (OT) Security (3rd)
 

Featured Reviews

DE
Platform Manager at Globe Telecom
Centralized authentication streamlines global access with single sign-on and auto-scaling for seamless user experience
We use Akamai Enterprise Application Access for centralized authentication for our global customers. It provides a solution for consolidated authentication on our platform. We use the service to manage access for our global consumers, not for remote access for our employees My favorite part of…
SI
Senior PAM Consultant at iC Consult GmbH
Makes privileged access management easy with automation and granular control
Many people underestimate the value of these tools because they treat them as simple automated password management. Once you realize the volume of passwords in your organization and factor in nonhuman passwords, you realize its value. Last year, CyberArk Impact cited 45 nonhuman passwords for every human password. If you have 10,000 employees, you can imagine the number of passwords. There are also many other operations. For example, you have a Qualys scanner that needs to reach out and touch all your endpoints and scan them for vulnerabilities. They use an API call to CyberArk to pull out a Privileged credential that allows them to log in to that target. This is an automated machine call. It is tapping into CyberArk to get that credential. There can be hundreds of thousands of those operations a day. You do not want to manage those passwords by hand. Some people marginalize the significance of such a solution by saying that it is just a fancy password changer. It goes well beyond that, especially with API calls and automation. Its importance extends beyond merely changing passwords; it involves automation, API calls, and process integration, crucial in agile environments for standing up new Amazon servers or other processes needing privileged credentials. CyberArk can automate these tasks into their build processes. Another critical feature is the proxy service via Privileged Session Manager (PSM), providing not only a proxy between your user and the target servers, protecting against malware but also offering session recording. Many companies I have worked with implemented a PAM product as a knee-jerk reaction to SOX audit requirements. They discovered they needed session recording and retention for regulatory compliance. This has become a major factor for clients instituting CyberArk, so PSM is a big deal in addition to regular password rotation.

Quotes from Members

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
 

Pros

"My favorite part of the Akamai Enterprise Application Access service is its SSO and auto-scaling capabilities."
"Application Access's most valuable feature is the accessibility of enterprise tech protection."
"The solution is very convenient and stable because you don't have to worry about attacks to public IPs or public networks."
"The capability of Akamai Enterprise Application Access is what you're looking for, it's giving you the service that you're looking for. It's simple and doesn't use an agent. It uses LCSD responders, and they have a lot of services around the globe. That's the reason that we were very interested in using it because it has a lot of coverage. This is because it's under the GDS umbrella."
"PSM enables after-hours monitoring."
"It's user-friendly and very configurable. We can do many things with it, especially with password management."
"We are utilizing CyberArk to secure applications, credentials, and endpoints."
"The solution is stable and reliable."
"You can see the benefits of CyberArk Privileged Access Manager immediately."
"CyberArk has been easy for us to implement and the adoption has been good. We've been able to standardize a bunch of things. We've been able to standardize relatively easily with the use of the platforms and managing the policies."
"The automatic change of the password and Privileged Session Manager (PSM) are the most valuable features. With Privileged Session Manager, you can control the password management in a centralized way. You can activate these features in a session; the session isolation and recording. You apply the full intermediation principle. So, you must pass through CyberArk PAM to get access to the target system. You don't need to know the password, and everything that you do is registered and auditable. In this case, no one gets to touch the password directly. Also, you can implement detection and response behavior in case of a breach."
"The product is for hardening access and making the organization more secure, therefore reducing chances of a breach."
 

Cons

"The pricing could be lower for Akamai Enterprise Application Access."
"The technical enablement sessions are quite limited, and Akamai could help by providing more of them."
"We need another approach to bring the solution to the cloud. In addition to Access Management, we would like to see if we can jump into Directories. I think ADs are going to go away and everything is going to be cloud-based and minimize the use of ADs because of the cost and some other dependencies to the cloud. Every time you buy AD it is more hardware, and everything's changing to software. The network's changing, the applications are changing, and for IT it is hard to keep up with it."
"The solution has two agents so should combine its enterprise application and security access into one agent."
"If there is an area that has room for improvement, it's probably working with their support and getting people on the phone. That is hard to do with most products in general, but that seems to be the difficult area. The product is fantastic, but sometimes we want somebody on the phone."
"The only problem involves granting access to people who are authorized to view it."
"Occasionally, there are lagging issues. Sometimes users have to re-login. When users copy passwords, there is sometimes a lag, so they have to log out and log in, but these are very rare cases."
"Areas of CyberArk Privileged Access Manager that can be improved include offering clearer configuration options."
"As they grow, the technical support is having growing pains. One of the things is just being able to get somebody on the phone sometimes."
"We would, of course, always prefer it if the pricing was cheaper."
"The initial setup could be simplified. Right now, in comparison to its nearest competitors, it's quite complex."
"Upgrading the product is very difficult, so this could be an area for improvement."
 

Pricing and Cost Advice

"Licensing is based on user count."
"The license can be shared based on the number of active users."
"The price is great it is all-inclusive, they use an enterprise cost model. That's what we like compared to other users. This is one of the main attractions of Akamai Enterprise Application Access. It's already an enterprise cost model established with us for services."
"Compared to other solutions, it is costly."
"My company always complains about the cost of CyberArk Privileged Access Manager because it's too high."
"The solution is cost-effective for the features."
"The solution is available at a high price"
"The price of the solution is reasonable."
"I'm a technician so I don't handle the licensing for CyberArk Privileged Access Manager, but I know that the price for the core license is about €140 per year. There's another type of license, the external vendor license, and that's about €600 and you can manage twenty devices. From what I know, the price for one device in a subscription is about €65 per year. You can buy the CyberArk Endpoint Privilege Manager too, or you can buy some other application or application license with CyberArk Privileged Access Manager, but all other features, such as the Analytics Server is included in the basic CyberArk license. With WALLIX, you need to buy separate licenses for the features."
"CyberArk DNA is free if you purchase the CyberArk solution. There is no additional charge for CyberArk DNA, which is great."
"The pricing for CyberArk is on the higher side compared to other Privileged Access Management products. Something should be done regarding enterprise licensing for long-standing customers."
report
Use our free recommendation engine to learn which Access Management solutions are best for your needs.
881,082 professionals have used our research since 2012.
 

Top Industries

By visitors reading reviews
Manufacturing Company
13%
Computer Software Company
8%
Healthcare Company
7%
Energy/Utilities Company
7%
Financial Services Firm
15%
Manufacturing Company
10%
Computer Software Company
9%
Government
6%
 

Company Size

By reviewers
Large Enterprise
Midsize Enterprise
Small Business
No data available
By reviewers
Company SizeCount
Small Business59
Midsize Enterprise40
Large Enterprise173
 

Questions from the Community

What needs improvement with Akamai Enterprise Application Access?
The pricing is a bit expensive for our market. Although it is cheaper compared to alternatives, Akamai Enterprise Application Access offers a more robust solution overall, particularly for authenti...
What is your primary use case for Akamai Enterprise Application Access?
We use Akamai Enterprise Application Access ( /products/akamai-enterprise-application-access-reviews ) for centralized authentication for our global customers. It provides a solution for consolidat...
How does Sailpoint IdentityIQ compare with CyberArk PAM?
We evaluated Sailpoint IdentityIQ before ultimately choosing CyberArk. Sailpoint Identity Platform is a solution to manage risks in cloud enterprise environments. It automates and streamlines the m...
What do you like most about CyberArk Privileged Access Manager?
The most valuable features of the solution are control and analytics.
What is your experience regarding pricing and costs for CyberArk Privileged Access Manager?
My thoughts on the pricing of CyberArk Privileged Access Manager depend entirely on the vendors' requirements. If they want their things to be secure, they have to spend accordingly. We have four t...
 

Also Known As

Soha
CyberArk Privileged Access Security, CyberArk Enterprise Password Vault
 

Overview

 

Sample Customers

Bugcrowd, InPowered, Spirent Communications
Rockwell Automation
Find out what your peers are saying about Akamai Enterprise Application Access vs. CyberArk Privileged Access Manager and other solutions. Updated: December 2025.
881,082 professionals have used our research since 2012.