Try our new research platform with insights from 80,000+ expert users

ARCON Privileged Access Management vs CyberArk Privileged Access Manager comparison

 

Comparison Buyer's Guide

Executive SummaryUpdated on Oct 6, 2024

Review summaries and opinions

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
 

Categories and Ranking

ARCON Privileged Access Man...
Ranking in Privileged Access Management (PAM)
8th
Average Rating
7.8
Reviews Sentiment
7.6
Number of Reviews
36
Ranking in other categories
No ranking in other categories
CyberArk Privileged Access ...
Ranking in Privileged Access Management (PAM)
1st
Average Rating
8.6
Reviews Sentiment
6.8
Number of Reviews
229
Ranking in other categories
User Activity Monitoring (1st), Enterprise Password Managers (3rd), Mainframe Security (2nd), Operational Technology (OT) Security (3rd)
 

Mindshare comparison

As of January 2026, in the Privileged Access Management (PAM) category, the mindshare of ARCON Privileged Access Management is 3.0%, down from 3.7% compared to the previous year. The mindshare of CyberArk Privileged Access Manager is 11.6%, down from 20.0% compared to the previous year. It is calculated based on PeerSpot user engagement data.
Privileged Access Management (PAM) Market Share Distribution
ProductMarket Share (%)
CyberArk Privileged Access Manager11.6%
ARCON Privileged Access Management3.0%
Other85.4%
Privileged Access Management (PAM)
 

Featured Reviews

DS
System and DBA at a energy/utilities company with 1,001-5,000 employees
Enhanced security through session monitoring and activity recording
From an end-user point of view, it would be beneficial if the system could provide information about the last login. This would help identify if the server was accessed by me or if someone has potentially stolen my credentials. It would provide a clearer picture of whether ARCON Privileged Access Management is accessed by an authentic user.
SI
Senior PAM Consultant at iC Consult GmbH
Makes privileged access management easy with automation and granular control
Many people underestimate the value of these tools because they treat them as simple automated password management. Once you realize the volume of passwords in your organization and factor in nonhuman passwords, you realize its value. Last year, CyberArk Impact cited 45 nonhuman passwords for every human password. If you have 10,000 employees, you can imagine the number of passwords. There are also many other operations. For example, you have a Qualys scanner that needs to reach out and touch all your endpoints and scan them for vulnerabilities. They use an API call to CyberArk to pull out a Privileged credential that allows them to log in to that target. This is an automated machine call. It is tapping into CyberArk to get that credential. There can be hundreds of thousands of those operations a day. You do not want to manage those passwords by hand. Some people marginalize the significance of such a solution by saying that it is just a fancy password changer. It goes well beyond that, especially with API calls and automation. Its importance extends beyond merely changing passwords; it involves automation, API calls, and process integration, crucial in agile environments for standing up new Amazon servers or other processes needing privileged credentials. CyberArk can automate these tasks into their build processes. Another critical feature is the proxy service via Privileged Session Manager (PSM), providing not only a proxy between your user and the target servers, protecting against malware but also offering session recording. Many companies I have worked with implemented a PAM product as a knee-jerk reaction to SOX audit requirements. They discovered they needed session recording and retention for regulatory compliance. This has become a major factor for clients instituting CyberArk, so PSM is a big deal in addition to regular password rotation.

Quotes from Members

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
 

Pros

"The initial setup was very simple. There was only one server we had to setup. We needed to store all the passwords, and a secure database is used."
"With this log available, we can drill down to the activities performed by the people within our kiosk. There is a great feature where in the case of Unix servers, we have our own text-based logs. In the case of Window's server, we cannot create a text-based log, so our kiosk takes the screenshot or picture of the screen when I am working. It does this every three seconds."
"Logging, particularly screen recording for Windows RDP sessions. Also, command-logging for SSH sessions. This really helps us to see what commands/changes have been executed in a particular service at a given point of time, and by whom."
"The deployment process for the solution was easy...The solution's technical support team was good."
"The most valuable feature is it is easy to use and the interface is intuitive."
"One standout feature of ARCON is its ability to resolve lagging issues, especially noticeable in Linux environments."
"The product's deployment phase was easy."
"The best part of this product is the administrator convenience. The portal is very user-friendly. An administrator can use it very easily."
"Service count rotation is probably one of my favorite features... The ability to automatically rotate any password I need to really helps with the entire enterprise strategy that we're pushing right now."
"I would recommend implementing CyberArk Privileged Access Manager as it is the best so far."
"The key aspects of privileged access management are being able rotate passwords, make sure someone is accountable, and tie it back to a user (when the system is being used)."
"Lessens the risk with privileged access."
"Ensures accounts are managed according to corporate policies."
"The Vault offers great capabilities for structuring and accessing data."
"The interface is very simple to use."
"I appreciate the ease of use for support analysts."
 

Cons

"Managing users is difficult, so that is something that can be improved."
"Scalability could be improved."
"There is often a slow response when logging into routers, switches, or servers compared to direct access."
"There are no APIs readily available... I'm working on automation for ARCON so that whatever the ARCON administrator is doing will be automated, rather than having to do it manually. For that, I had to spend months to get the API developed myself. Having that handy out of the box, that would really help..."
"The auto-password change feature which was recently added. It is supposed to change the password. However, in some cases, while changing the password, it has caused me to lose to connection due to network-related issues or something similar. What we need to have is a type of log for failure of password change."
"If an ID gets locked, the tool cannot unlock it, making it an area where improvements are required."
"The deployment process is a bit complex because no document is available."
"I suggest implementing password rotation for service-based accounts, as that should be included."
"Make it easier to deploy."
"Stability is a huge concern right now. We are on a version which is very unstable. We have to upgrade to stabilize it. It is fine, but the problem is we have to hire CyberArk to do the upgrade. This costs money, and it is their bug."
"The current interface doesn't scale that well, and has some screens still in the old layout."
"CyberArk has a lot on the privileged access side but they have to concentrate more on the application side as well."
"The PTA could be improved. Currently, companies often have multiple domains and sometimes it's difficult to implement CyberArk in this kind of infrastructure. For example, you can add CPM (Central Policy Manager) and PSM (Privileged Session Manager and PVWA (Password Vault Web Access) for access, but if you want to add PTA (Privileged Threat Analysis) to scan Vault logs, it is difficult because this component may be adding multiple domain environments."
"Integration with the ticketing system should allow any number of fields to be used for validation before allowing a user to be evaluated and able to access a server."
"The initial setup could be simplified. Right now, in comparison to its nearest competitors, it's quite complex."
"It is web-based, but other competitors have apps. We need to get there. It is just smoother to have an app. You don't have all the bugs from having a browser, and people like them better, since you can get to them via mobile."
 

Pricing and Cost Advice

"It is good value for our business. According to me, their competitors are more costly. Therefore, it is quite affordable. I find the ARCON to be much cheaper than the other products in the market."
"Product pricing is based on users and connections. We did not have to pay more for additional features."
"The product's pricing is good value. Go for user-based licensing, without any limit on the target servers."
"There are no major concerns with licensing because we can handle multiple servers in our kiosk system."
"Pricing and licensing are good, very aggressive."
"Pricing is reasonable."
"The product's pricing is a good value. It's appropriately priced. The product has all the required features. It doesn't work in some of the areas but, right now overall, it's pretty good."
"Their licensing model is very simple, as it is based on the number of endpoints which you want to manage along with the number of users and administrators which you want to use."
"Its price can be reduced."
"It costs us around $200 per user."
"CyberArk is very expensive and there are additional fees for add-ons."
"The solution is cost-effective for the features."
"CyberArk is good at what they do, and the price reflects that. You have to pay the price for the same."
"This solution is considered to be more expensive than others out there on the market today."
"From a client perspective, CyberArk's pricing is fair but there is a significant increase each year. They should limit the price increase because this could potentially drive customers to other partners. Price changes should be at defined intervals. There should not be sudden jumps."
"I have heard from my leaders that CyberArk is costlier in terms of licensing. The support and maintenance are also costly. We use their premium support, but for the price we pay, we do not get the value."
report
Use our free recommendation engine to learn which Privileged Access Management (PAM) solutions are best for your needs.
881,082 professionals have used our research since 2012.
 

Top Industries

By visitors reading reviews
Computer Software Company
10%
Financial Services Firm
9%
Manufacturing Company
8%
Government
7%
Financial Services Firm
15%
Manufacturing Company
10%
Computer Software Company
9%
Government
6%
 

Company Size

By reviewers
Large Enterprise
Midsize Enterprise
Small Business
By reviewers
Company SizeCount
Small Business9
Midsize Enterprise11
Large Enterprise17
By reviewers
Company SizeCount
Small Business59
Midsize Enterprise40
Large Enterprise173
 

Questions from the Community

What needs improvement with ARCON Privileged Access Management?
From an end-user point of view, it would be beneficial if the system could provide information about the last login. This would help identify if the server was accessed by me or if someone has pote...
How does Sailpoint IdentityIQ compare with CyberArk PAM?
We evaluated Sailpoint IdentityIQ before ultimately choosing CyberArk. Sailpoint Identity Platform is a solution to manage risks in cloud enterprise environments. It automates and streamlines the m...
What do you like most about CyberArk Privileged Access Manager?
The most valuable features of the solution are control and analytics.
What is your experience regarding pricing and costs for CyberArk Privileged Access Manager?
My thoughts on the pricing of CyberArk Privileged Access Manager depend entirely on the vendors' requirements. If they want their things to be secure, they have to spend accordingly. We have four t...
 

Also Known As

ARCON ARCOS, ARCON PAM
CyberArk Privileged Access Security, CyberArk Enterprise Password Vault
 

Overview

 

Sample Customers

RAK Bank, AXIS Bank, Reliance Capital, Kotak Life Insurance, MTS
Rockwell Automation
Find out what your peers are saying about ARCON Privileged Access Management vs. CyberArk Privileged Access Manager and other solutions. Updated: December 2025.
881,082 professionals have used our research since 2012.