Try our new research platform with insights from 80,000+ expert users

Akamai Enterprise Application Access vs CyberArk Privileged Access Manager comparison

 

Comparison Buyer's Guide

Executive Summary

Review summaries and opinions

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
 

Categories and Ranking

Akamai Enterprise Applicati...
Average Rating
9.0
Reviews Sentiment
7.5
Number of Reviews
4
Ranking in other categories
Cloud Access Security Brokers (CASB) (14th), Access Management (16th), ZTNA as a Service (16th), Secure Access Service Edge (SASE) (18th)
CyberArk Privileged Access ...
Average Rating
8.6
Reviews Sentiment
6.8
Number of Reviews
229
Ranking in other categories
User Activity Monitoring (1st), Enterprise Password Managers (2nd), Privileged Access Management (PAM) (1st), Mainframe Security (2nd), Operational Technology (OT) Security (3rd)
 

Featured Reviews

DE
Platform Manager at Globe Telecom
Centralized authentication streamlines global access with single sign-on and auto-scaling for seamless user experience
We use Akamai Enterprise Application Access for centralized authentication for our global customers. It provides a solution for consolidated authentication on our platform. We use the service to manage access for our global consumers, not for remote access for our employees My favorite part of…
Atul-Gujar - PeerSpot reviewer
CyberArk manager at a comms service provider with 10,001+ employees
Secures critical infrastructures with essential user session audit records
A potential area for improvement is enhancing support for cluster environments and distributed Vaults. Clients in multiple countries that need central access have different challenges that require better solutions from CyberArk. For financial services, CyberArk can improve incident response by ensuring fast support for critical priority tickets to meet compliance requirements. Providing more documentation on CyberArk is recommended for new team members to enhance their troubleshooting capabilities. I understand it's up to the client, but 99% fail to change the demo key, so it's crucial for CyberArk to emphasize changing the key and documenting it as part of the installation process.

Quotes from Members

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
 

Pros

"The solution is very convenient and stable because you don't have to worry about attacks to public IPs or public networks."
"Application Access's most valuable feature is the accessibility of enterprise tech protection."
"The capability of Akamai Enterprise Application Access is what you're looking for, it's giving you the service that you're looking for. It's simple and doesn't use an agent. It uses LCSD responders, and they have a lot of services around the globe. That's the reason that we were very interested in using it because it has a lot of coverage. This is because it's under the GDS umbrella."
"My favorite part of the Akamai Enterprise Application Access service is its SSO and auto-scaling capabilities."
"The most valuable aspects of the solution include password management and Rest API retrieval of vaulted credentials."
"Allows secure, logged access to highly sensitive servers and services."
"The privileged support manager is the most valuable feature of CyberArk Enterprise Password Vault."
"It improves security in our company. We have more than 10,000 accounts that we manage in CyberArk. We use these accounts for SQLs, Windows Server, and Unix. Therefore, keeping these passwords up-to-date in another solution or software would be impossible. Now, we have some sort of a platform to manage passwords, distribute the inflow, and manage IT teams as well as making regular changes to it according to the internal security policies in our bank."
"CyberArk probably has probably the best vault on the market because of the multiple layered security and each password getting its own encryption."
"We found the initial setup to be easy."
"Our most valuable features would probably be key rotation, the SKM or SSH key manager, and account discovery."
"The automatic change of the password and Privileged Session Manager (PSM) are the most valuable features. With Privileged Session Manager, you can control the password management in a centralized way. You can activate these features in a session; the session isolation and recording. You apply the full intermediation principle. So, you must pass through CyberArk PAM to get access to the target system. You don't need to know the password, and everything that you do is registered and auditable. In this case, no one gets to touch the password directly. Also, you can implement detection and response behavior in case of a breach."
 

Cons

"The technical enablement sessions are quite limited, and Akamai could help by providing more of them."
"The pricing could be lower for Akamai Enterprise Application Access."
"We need another approach to bring the solution to the cloud. In addition to Access Management, we would like to see if we can jump into Directories. I think ADs are going to go away and everything is going to be cloud-based and minimize the use of ADs because of the cost and some other dependencies to the cloud. Every time you buy AD it is more hardware, and everything's changing to software. The network's changing, the applications are changing, and for IT it is hard to keep up with it."
"The solution has two agents so should combine its enterprise application and security access into one agent."
"This is probably a common thing, but they do ask for a lot of log files, a lot of information. They ask you to provide a lot of information to them before they're willing to give you anything at all upfront. It would be better if they were a little more give-and-take upfront: "Why don't you try these couple of things while we take your log files and stuff and go research them?" A little bit of that might be more helpful."
"I would love them to improve their UI customizing features."
"In the next release, they could simplify the setup and I would like some tasks added like file sharing. When a client connects to CyberArk and wants to put a file on the server, they cannot."
"As of now, it does not manage all of the IDM practices. It is only good as a PAM solution."
"The initial setup could be simplified. Right now, in comparison to its nearest competitors, it's quite complex."
"It would be good to have integrations with other tools and firewalls, such as Zscaler and CrowdStrike. Although I am not fully aware of recent updates, more cross-platform integration would be valuable. A SOC analyst would like to have centralized access in terms of information flowing in even for privileged access management. They would like to have control over everything instead of opening four to five tabs for different sorts of information."
"When they took it to the cloud, they started cutting things out."
"As a customer, I might need a plugin for a specific product, or an application, and CyberArk might have already worked with some other client on it. There has to be some platform where it is available for everybody else to go and grab it, instead of my having to reinvent the wheel."
 

Pricing and Cost Advice

"The price is great it is all-inclusive, they use an enterprise cost model. That's what we like compared to other users. This is one of the main attractions of Akamai Enterprise Application Access. It's already an enterprise cost model established with us for services."
"Licensing is based on user count."
"The license can be shared based on the number of active users."
"The price of CyberArk support could be a little bit less. Otherwise, pricing is fine."
"Payments have to be made on a yearly basis toward the licensing costs of the solution."
"CyberArk is very expensive and there are additional fees for add-ons."
"The cost is high compared to other products."
"My company always complains about the cost of CyberArk Privileged Access Manager because it's too high."
"Although CyberArk Privileged Access Management is expensive, its protection capabilities outweigh the cost."
"I have heard from my leaders that CyberArk is costlier in terms of licensing. The support and maintenance are also costly. We use their premium support, but for the price we pay, we do not get the value."
"This solution is considered to be more expensive than others out there on the market today."
report
Use our free recommendation engine to learn which Access Management solutions are best for your needs.
881,757 professionals have used our research since 2012.
 

Top Industries

By visitors reading reviews
Manufacturing Company
13%
Computer Software Company
8%
Healthcare Company
8%
Energy/Utilities Company
6%
Financial Services Firm
15%
Manufacturing Company
10%
Computer Software Company
9%
Government
6%
 

Company Size

By reviewers
Large Enterprise
Midsize Enterprise
Small Business
No data available
By reviewers
Company SizeCount
Small Business59
Midsize Enterprise40
Large Enterprise173
 

Questions from the Community

What needs improvement with Akamai Enterprise Application Access?
The pricing is a bit expensive for our market. Although it is cheaper compared to alternatives, Akamai Enterprise Application Access offers a more robust solution overall, particularly for authenti...
What is your primary use case for Akamai Enterprise Application Access?
We use Akamai Enterprise Application Access ( /products/akamai-enterprise-application-access-reviews ) for centralized authentication for our global customers. It provides a solution for consolidat...
How does Sailpoint IdentityIQ compare with CyberArk PAM?
We evaluated Sailpoint IdentityIQ before ultimately choosing CyberArk. Sailpoint Identity Platform is a solution to manage risks in cloud enterprise environments. It automates and streamlines the m...
What do you like most about CyberArk Privileged Access Manager?
The most valuable features of the solution are control and analytics.
What is your experience regarding pricing and costs for CyberArk Privileged Access Manager?
My thoughts on the pricing of CyberArk Privileged Access Manager depend entirely on the vendors' requirements. If they want their things to be secure, they have to spend accordingly. We have four t...
 

Also Known As

Soha
CyberArk Privileged Access Security, CyberArk Enterprise Password Vault
 

Overview

 

Sample Customers

Bugcrowd, InPowered, Spirent Communications
Rockwell Automation
Find out what your peers are saying about Akamai Enterprise Application Access vs. CyberArk Privileged Access Manager and other solutions. Updated: December 2025.
881,757 professionals have used our research since 2012.