Try our new research platform with insights from 80,000+ expert users

BeyondTrust DevOps Secrets Safe vs CyberArk Privileged Access Manager comparison

 

Comparison Buyer's Guide

Executive SummaryUpdated on Oct 6, 2024

Review summaries and opinions

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
 

Categories and Ranking

BeyondTrust DevOps Secrets ...
Ranking in Enterprise Password Managers
26th
Ranking in Privileged Access Management (PAM)
41st
Average Rating
7.6
Reviews Sentiment
6.6
Number of Reviews
4
Ranking in other categories
Secrets Management Tools (7th)
CyberArk Privileged Access ...
Ranking in Enterprise Password Managers
3rd
Ranking in Privileged Access Management (PAM)
1st
Average Rating
8.6
Reviews Sentiment
6.8
Number of Reviews
229
Ranking in other categories
User Activity Monitoring (1st), Mainframe Security (2nd), Operational Technology (OT) Security (3rd)
 

Mindshare comparison

As of January 2026, in the Privileged Access Management (PAM) category, the mindshare of BeyondTrust DevOps Secrets Safe is 1.1%, up from 0.2% compared to the previous year. The mindshare of CyberArk Privileged Access Manager is 11.6%, down from 20.0% compared to the previous year. It is calculated based on PeerSpot user engagement data.
Privileged Access Management (PAM) Market Share Distribution
ProductMarket Share (%)
CyberArk Privileged Access Manager11.6%
BeyondTrust DevOps Secrets Safe1.1%
Other87.3%
Privileged Access Management (PAM)
 

Featured Reviews

YB
Contractor at a financial services firm with 5,001-10,000 employees
Integrates well between AD and Unix, scalable, and easy to use
BeyondTrust DevOps Secrets Safe stability in the AD Bridge has been not good, we have had many issues. I recently received a new version a few weeks ago and it looks like they solved most of the problems. Some of the issues we had, lasted a very long time until they found a solution.
SI
Senior PAM Consultant at iC Consult GmbH
Makes privileged access management easy with automation and granular control
Many people underestimate the value of these tools because they treat them as simple automated password management. Once you realize the volume of passwords in your organization and factor in nonhuman passwords, you realize its value. Last year, CyberArk Impact cited 45 nonhuman passwords for every human password. If you have 10,000 employees, you can imagine the number of passwords. There are also many other operations. For example, you have a Qualys scanner that needs to reach out and touch all your endpoints and scan them for vulnerabilities. They use an API call to CyberArk to pull out a Privileged credential that allows them to log in to that target. This is an automated machine call. It is tapping into CyberArk to get that credential. There can be hundreds of thousands of those operations a day. You do not want to manage those passwords by hand. Some people marginalize the significance of such a solution by saying that it is just a fancy password changer. It goes well beyond that, especially with API calls and automation. Its importance extends beyond merely changing passwords; it involves automation, API calls, and process integration, crucial in agile environments for standing up new Amazon servers or other processes needing privileged credentials. CyberArk can automate these tasks into their build processes. Another critical feature is the proxy service via Privileged Session Manager (PSM), providing not only a proxy between your user and the target servers, protecting against malware but also offering session recording. Many companies I have worked with implemented a PAM product as a knee-jerk reaction to SOX audit requirements. They discovered they needed session recording and retention for regulatory compliance. This has become a major factor for clients instituting CyberArk, so PSM is a big deal in addition to regular password rotation.

Quotes from Members

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
 

Pros

"The local administrator can manage all the user's logins in one, simple, straight-away account access. Additionally, the solution is user-friendly."
"DevOps Secrets Safe allows you to customize a lot of rules."
"The most valuable features of BeyondTrust DevOps Secrets Safe are the ease of use and the API is very nice. Additionally, the interface is very good between AD and Unix."
"A sophisticated and mature solution."
"What I found most valuable in CyberArk Privileged Access Manager is the Session Manager as it allows you to split the connection between the administrator site and the target site. I also found the Password Manager valuable as it lets you rotate the passwords of privileged users."
"Because we now have the ability to grant access to management utilities like DNS Manager, Sequel Studio, and MMC, in a secure fashion, without system admins being required to continually reenter various passwords that are stored who knows where, it has really made the system admin's job much easier. It has made the PSM's job much easier. It has made the auditor's job and the security team's job and the access manager's job significantly easier, because we're able to move much more quickly toward a role-based access management system, and that is really streamlining the whole onboarding/offboarding management process."
"CyberArk's support is excellent, providing personalized assistance through a dedicated local account manager and sales engineer."
"Every aspect of the solution is very well integrated, and even that gives comfort. It is a fail-safe kind of environment."
"The biggest feature is the security of the overall solution. It's very secure. The vaulting technology and the number of security layers involved in the vault, where privileged accounts are actually stored, is the heart of the solution."
"The logs and reporting features are impressive."
"CyberArk Privileged Access Manager’s ability to safeguard credentials for our organization is very important because it helps in managing the keys to the kingdom, especially the privileged access for various platforms."
"Service count rotation is probably one of my favorite features... The ability to automatically rotate any password I need to really helps with the entire enterprise strategy that we're pushing right now."
 

Cons

"The support for the solution is not very good, they could improve by being quicker."
"You need to improvise many of the customized rules, which can lead to some errors. BeyondTrust should reduce the error rate."
"The product contains some bugs."
"We had some issues with the solution and once we contacted support they eventually solved the problem. They could improve their response time."
"The authentication port is available in CyberArk Alero but not Fortinet products."
"I think they can improve account onboarding. For instance, you have to use the Password Vault utility, whereas in Thycotic I think there is a feature in the user interface that allows you to upload your account with an Excel file. So I'd like to have a similar thing in CyberArk."
"CyberArk definitely needs to improve user experience and reduce complexity."
"If you are an administrator or architect, then the solution is kind of complicated, as it is mostly focused on the end user. So, they need to also focus on the people who are implementing it."
"If there is an area that has room for improvement, it's probably working with their support and getting people on the phone. That is hard to do with most products in general, but that seems to be the difficult area. The product is fantastic, but sometimes we want somebody on the phone."
"It is only good as a PAM solution. If they could work more on Privileged Threat Analytics, it would be beneficial. It has limitations, so improvements on PTA would be fine."
"If we could have some kind of out-of-the box feature that you can simply say "no" so they don't have to go into a development mode, that would a really helpful feature."
"It is complicated to deploy for Windows servers compared to other vendors."
 

Pricing and Cost Advice

"There is an annual license required to use BeyondTrust DevOps Secrets Safe."
"The price of this solution is quite reasonable."
"The solution is available at a high price"
"I'm a technician so I don't handle the licensing for CyberArk Privileged Access Manager, but I know that the price for the core license is about €140 per year. There's another type of license, the external vendor license, and that's about €600 and you can manage twenty devices. From what I know, the price for one device in a subscription is about €65 per year. You can buy the CyberArk Endpoint Privilege Manager too, or you can buy some other application or application license with CyberArk Privileged Access Manager, but all other features, such as the Analytics Server is included in the basic CyberArk license. With WALLIX, you need to buy separate licenses for the features."
"Pricing is quite high and it could be improved."
"CyberArk has been Gartner's number-one pick for the past ten years, so you can infer that their pricing is higher than everyone else. When you are the best, you will charge appropriately for it."
"In comparison to other products on the market, CyberArk is a more costly product."
"The cost is high compared to other products."
"It's expensive, certainly. But CyberArk is the leader in the market with regards to privileged access management. You pay a lot, but you are paying for the value that is being delivered."
report
Use our free recommendation engine to learn which Privileged Access Management (PAM) solutions are best for your needs.
881,082 professionals have used our research since 2012.
 

Top Industries

By visitors reading reviews
No data available
Financial Services Firm
15%
Manufacturing Company
10%
Computer Software Company
9%
Government
6%
 

Company Size

By reviewers
Large Enterprise
Midsize Enterprise
Small Business
No data available
By reviewers
Company SizeCount
Small Business59
Midsize Enterprise40
Large Enterprise173
 

Questions from the Community

Ask a question
Earn 20 points
How does Sailpoint IdentityIQ compare with CyberArk PAM?
We evaluated Sailpoint IdentityIQ before ultimately choosing CyberArk. Sailpoint Identity Platform is a solution to manage risks in cloud enterprise environments. It automates and streamlines the m...
What do you like most about CyberArk Privileged Access Manager?
The most valuable features of the solution are control and analytics.
What is your experience regarding pricing and costs for CyberArk Privileged Access Manager?
My thoughts on the pricing of CyberArk Privileged Access Manager depend entirely on the vendors' requirements. If they want their things to be secure, they have to spend accordingly. We have four t...
 

Also Known As

No data available
CyberArk Privileged Access Security, CyberArk Enterprise Password Vault
 

Overview

 

Sample Customers

Starbucks, Ebay, CSC, RBC, Williams-Sonoma, Carbonite
Rockwell Automation
Find out what your peers are saying about BeyondTrust DevOps Secrets Safe vs. CyberArk Privileged Access Manager and other solutions. Updated: December 2025.
881,082 professionals have used our research since 2012.