Try our new research platform with insights from 80,000+ expert users

Atos DirX Directory vs CyberArk Privileged Access Manager comparison

 

Comparison Buyer's Guide

Executive Summary

Review summaries and opinions

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
 

Categories and Ranking

Atos DirX Directory
Average Rating
6.8
Reviews Sentiment
6.7
Number of Reviews
4
Ranking in other categories
Application Infrastructure (23rd)
CyberArk Privileged Access ...
Average Rating
8.6
Reviews Sentiment
6.8
Number of Reviews
229
Ranking in other categories
User Activity Monitoring (1st), Enterprise Password Managers (3rd), Privileged Access Management (PAM) (1st), Mainframe Security (2nd), Operational Technology (OT) Security (3rd)
 

Mindshare comparison

Atos DirX Directory and CyberArk Privileged Access Manager aren’t in the same category and serve different purposes. Atos DirX Directory is designed for Application Infrastructure and holds a mindshare of 1.2%, up 0.5% compared to last year.
CyberArk Privileged Access Manager, on the other hand, focuses on Privileged Access Management (PAM), holds 11.6% mindshare, down 20.0% since last year.
Application Infrastructure Market Share Distribution
ProductMarket Share (%)
Atos DirX Directory1.2%
Apache Web Server11.3%
IIS10.2%
Other77.3%
Application Infrastructure
Privileged Access Management (PAM) Market Share Distribution
ProductMarket Share (%)
CyberArk Privileged Access Manager11.6%
WALLIX Bastion5.1%
Delinea Secret Server5.0%
Other78.3%
Privileged Access Management (PAM)
 

Featured Reviews

Kleber Fernandes - PeerSpot reviewer
Diretor Comercial at a security firm with 1,001-5,000 employees
An identity management system with valuable knowledge
We use Atos DirX Directory for cybersecurity with Managed Detection and Response (MDR) solutions Atos DirX Directory helps take care of attacks and manage responses. It also has artificial intelligence to mitigate any attack. The most valuable feature is its knowledge. The price could be…
SI
Senior PAM Consultant at iC Consult GmbH
Makes privileged access management easy with automation and granular control
Many people underestimate the value of these tools because they treat them as simple automated password management. Once you realize the volume of passwords in your organization and factor in nonhuman passwords, you realize its value. Last year, CyberArk Impact cited 45 nonhuman passwords for every human password. If you have 10,000 employees, you can imagine the number of passwords. There are also many other operations. For example, you have a Qualys scanner that needs to reach out and touch all your endpoints and scan them for vulnerabilities. They use an API call to CyberArk to pull out a Privileged credential that allows them to log in to that target. This is an automated machine call. It is tapping into CyberArk to get that credential. There can be hundreds of thousands of those operations a day. You do not want to manage those passwords by hand. Some people marginalize the significance of such a solution by saying that it is just a fancy password changer. It goes well beyond that, especially with API calls and automation. Its importance extends beyond merely changing passwords; it involves automation, API calls, and process integration, crucial in agile environments for standing up new Amazon servers or other processes needing privileged credentials. CyberArk can automate these tasks into their build processes. Another critical feature is the proxy service via Privileged Session Manager (PSM), providing not only a proxy between your user and the target servers, protecting against malware but also offering session recording. Many companies I have worked with implemented a PAM product as a knee-jerk reaction to SOX audit requirements. They discovered they needed session recording and retention for regulatory compliance. This has become a major factor for clients instituting CyberArk, so PSM is a big deal in addition to regular password rotation.

Quotes from Members

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
 

Pros

"DirX Directory is the best feature of the product: a very fast, stable LDAP directory."
"The solution offers high performance."
"The most valuable feature is its knowledge."
"The role and attribute-based access control has been greatly improved."
"The ability to develop and deploy applications with no stored secrets is very valuable."
"Because we now have the ability to grant access to management utilities like DNS Manager, Sequel Studio, and MMC, in a secure fashion, without system admins being required to continually reenter various passwords that are stored who knows where, it has really made the system admin's job much easier. It has made the PSM's job much easier. It has made the auditor's job and the security team's job and the access manager's job significantly easier, because we're able to move much more quickly toward a role-based access management system, and that is really streamlining the whole onboarding/offboarding management process."
"We are able to rotate privileged user passwords to eliminate fraudulent use."
"I love the ability to customize the passwords: the forbidden characters, the length of the password, the number of capital, lowercase, and special characters. You can customize the password so that it tailor fits, for example, mainframes that can't have more than eight characters. You can say, "I want a random password that doesn't have these special characters, but it is exactly eight characters," so that it doesn't throw errors."
"We have been able to manage application credentials in CyberArk, whether they come as a custom plugin or straight out-of-the-box."
"We have accomplished our security goals. We have two-factor authenticated and vaulted our important accounts, so people can't just steal stuff from us."
"CyberArk Privileged Access Manager assists in meeting compliance and regulatory requirements such as HIPAA and SOX, ensuring I adhere to necessary standards in my operations."
"The best feature of CyberArk Privileged Access Manager is its core function: automatically managing and securing credentials."
 

Cons

"Needs more available consultants and implementation partners."
"An overall modernization of the product is required in order to keep up with newer products."
"The Self-Service Portal is old school and it lacks easy accessibility for users."
"The price could be better. It would be better if they developed a better endpoint solution in the next release."
"The user interface could be more convenient for people that don't know the tool too intensively."
"It would be good to have integrations with other tools and firewalls, such as Zscaler and CrowdStrike. Although I am not fully aware of recent updates, more cross-platform integration would be valuable. A SOC analyst would like to have centralized access in terms of information flowing in even for privileged access management. They would like to have control over everything instead of opening four to five tabs for different sorts of information."
"The product documentation has to be more precise in certain aspects with explanations for functionality limitations along with reference material or screenshots."
"Its pricing is a big challenge here. When it started, the product came in at a very low cost. Now, they are the leaders in the market, so the cost has grown and is quite huge."
"It needs better documentation with more examples for the configuration files and API/REST integration"
"The greatest area of improvement is with the user interface of the Password Vault Web Access component."
"In the beginning, CyberArk Privileged Access Manager didn't have a multifactor authentication feature, so that was an area for improvement, but now it's part of the solution. Having just one console for two CyberArk products would be good, particularly for the CyberArk Privileged Access Manager and the CyberArk Endpoint Privilege Manager, with the latter being a product for endpoint management that supports the workstations and allows you to manage workstations. In the next update of CyberArk Privileged Access Manager, it would be good to have a local agent where you can manage all users and processes, and have an agent on the servers such as Linux and Windows."
"My company always complains about the cost of CyberArk Privileged Access Manager because it's too high."
"Occasionally, there are lagging issues. Sometimes users have to re-login. When users copy passwords, there is sometimes a lag, so they have to log out and log in, but these are very rare cases."
 

Pricing and Cost Advice

"The price could be better."
"CyberArk Enterprise Password Vault's pricing is reasonable."
"I'm aware that the organization had purchased licensing for almost all of CyberArk's solutions including licensing for PTA, EPM, and the Application Identity Manager. But when it comes to PSM, this is one of the components where there's an additional charge for any extra PSMs that you want to deploy. I believe that there's some rider where the vendor has a bit of leeway to, at times, charge a premium on whatever additional services you may require above the board."
"With the current model of licensing, for my use cases, sometimes it's hard to convince the management and get budget approvals for it. It's expensive and you're not getting anything new. It's just a control, but in terms of risk, you are covering a big impact on the company. Improvement in the licensing prices is something I would want to have."
"The price of CyberArk Privileged Access Manager is expensive. There are no other fees other than the standard licensing fees."
"This solution is expensive."
"It's per-company, license-based."
"This solution is considered to be more expensive than others out there on the market today."
"The product's licensing is yearly. I would rate the solution's pricing a six out of ten."
report
Use our free recommendation engine to learn which Application Infrastructure solutions are best for your needs.
881,082 professionals have used our research since 2012.
 

Top Industries

By visitors reading reviews
No data available
Financial Services Firm
15%
Manufacturing Company
10%
Computer Software Company
9%
Government
6%
 

Company Size

By reviewers
Large Enterprise
Midsize Enterprise
Small Business
No data available
By reviewers
Company SizeCount
Small Business59
Midsize Enterprise40
Large Enterprise173
 

Questions from the Community

Ask a question
Earn 20 points
How does Sailpoint IdentityIQ compare with CyberArk PAM?
We evaluated Sailpoint IdentityIQ before ultimately choosing CyberArk. Sailpoint Identity Platform is a solution to manage risks in cloud enterprise environments. It automates and streamlines the m...
What do you like most about CyberArk Privileged Access Manager?
The most valuable features of the solution are control and analytics.
What is your experience regarding pricing and costs for CyberArk Privileged Access Manager?
My thoughts on the pricing of CyberArk Privileged Access Manager depend entirely on the vendors' requirements. If they want their things to be secure, they have to spend accordingly. We have four t...
 

Also Known As

DirX Directory
CyberArk Privileged Access Security, CyberArk Enterprise Password Vault
 

Overview

 

Sample Customers

National Savings and Investments, Vehicle and Operator Services Agency
Rockwell Automation
Find out what your peers are saying about Microsoft, IBM, F5 and others in Application Infrastructure. Updated: January 2026.
881,082 professionals have used our research since 2012.