No more typing reviews! Try our Samantha, our new voice AI agent.

CA Privileged Access Manager Server Control [EOL] vs CyberArk Privileged Access Manager comparison

 

Comparison Buyer's Guide

Executive Summary

Review summaries and opinions

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
 

Categories and Ranking

CA Privileged Access Manage...
Average Rating
7.8
Number of Reviews
9
Ranking in other categories
No ranking in other categories
CyberArk Privileged Access ...
Average Rating
8.6
Reviews Sentiment
6.8
Number of Reviews
230
Ranking in other categories
User Activity Monitoring (1st), Enterprise Password Managers (3rd), Privileged Access Management (PAM) (1st), Mainframe Security (1st), Operational Technology (OT) Security (3rd)
 

Featured Reviews

it_user558603 - PeerSpot reviewer
Engineer at a manufacturing company with 10,001+ employees
I like that the access control on the agent. Installation is difficult.
I would like to see some improvements, specifically in terms of some set-up items. We have spoken to CA quite a bit about the ability to have 'always-on', or 'active/active' status options, so if the infrastructure goes down, we don't lose transactions. This is very important for the environment and for the users so we cannot really afford any downtime with the solution. We have had problems with deployment, and we are concerned with the possibility for outages and how they can have a negative impact on the environment.
Atul-Gujar - PeerSpot reviewer
CyberArk manager at a comms service provider with 10,001+ employees
Secures critical infrastructures with essential user session audit records
A potential area for improvement is enhancing support for cluster environments and distributed Vaults. Clients in multiple countries that need central access have different challenges that require better solutions from CyberArk. For financial services, CyberArk can improve incident response by ensuring fast support for critical priority tickets to meet compliance requirements. Providing more documentation on CyberArk is recommended for new team members to enhance their troubleshooting capabilities. I understand it's up to the client, but 99% fail to change the demo key, so it's crucial for CyberArk to emphasize changing the key and documenting it as part of the installation process.

Quotes from Members

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
 

Pros

"We have been able to exceed our audit requirements for security."
"Access Control enhances the security of business systems through a secured authentication and validation of users credentials before accessing organizations resources."
"No, the product been stable and robust, and boasts with new additional features."
"It efficiently controls the access to the resources from the privileged user thus implementing the security aspects and this provides fine granular access."
"It gives us the ability to track who is using what ID and for what purpose."
"It depends on the client's requirements, but for me the most valuable one is the security access management with distributed architecture and centralized management."
"We're happy to see it working so well with our IBM solution, saving us time and costs."
"Access Control has greatly prevented the misuse of administrator rights which is very rampant."
"The most valuable features of CyberArk Enterprise Password Vault are password vaulting and automatic rotation of passwords after use."
"CyberArk has helped us to identify, store, protect, and monitor the usage of privileged accounts."
"The most valuable feature is Special Monitoring."
"Overall, I would rate it a ten out of ten."
"I help implement and train others on how to use it in a highly secure environment."
"Users were removed from local administrators group on all desktop endpoints providing a more secure computing environment, allowing only those programs approved to run securely."
"It makes compliance of the organization with password management easy, resulting in a handy auditing process and adherence to all risk compliance as well."
"The technical support is very good and helpful."
 

Cons

"Sometimes we encounter issues whilst generating the reports."
"The manuals for this product used to be good. We could find in one place answers to pretty much every question or situation we had. However, it's now in piece-meal fashion."
"We have had problems with deployment, and we are concerned with the possibility for outages and how they can have a negative impact on the environment."
"Automated deployment did not work as expected, had to go to a manual deployment."
"User Interface needs to be improved."
"I found the installation process of Access Control challenging due to the much networking work involved in order to grant access to authorized users."
"Yes, I encountered lots of issues."
"I have faced a few challenges due to the system complexity, as it involves two integrated authentication systems that have to be purchased."
"CyberArk lacks the following functions for a better IAM like solution: - Provision accounts for systems and directories. - Create access to the systems. - Monitor if any new account has been created into the system. - Better GUI for the end-user and also for administrators."
"Some of the additional features that we are looking at are in the Conjur product."
"There is room for improvement in the pricing model."
"New functionalities or discovered bugs take a little longer to patch."
"I think that this product can be improved in all the areas."
"They are sometimes not flexible with things. For instance, from one day to another, there might be something that had been done years ago by CyberArk, then they say, "We do not support that.""
"In the beginning, CyberArk Privileged Access Manager didn't have a multifactor authentication feature, so that was an area for improvement, but now it's part of the solution. Having just one console for two CyberArk products would be good, particularly for the CyberArk Privileged Access Manager and the CyberArk Endpoint Privilege Manager, with the latter being a product for endpoint management that supports the workstations and allows you to manage workstations. In the next update of CyberArk Privileged Access Manager, it would be good to have a local agent where you can manage all users and processes, and have an agent on the servers such as Linux and Windows."
"​It's hard to find competent resellers/support."
 

Pricing and Cost Advice

Information not available
"With reducing the privileged account access, there has been a huge improvement. They are now bringing more accounts on a little at a time."
"I would rate CyberArk's pricing a nine out of ten, with one being cheap and ten being expensive. It's one of the most expensive solutions in the market, but it's worth it."
"The pricing for CyberArk Privileged Access Manager is quite expensive, and the pricing varies from region to region. In APAC, CyberArk Privileged Access Manager can be obtained for less than in North America, according to my understanding."
"It's expensive, certainly. But CyberArk is the leader in the market with regards to privileged access management. You pay a lot, but you are paying for the value that is being delivered."
"The price of CyberArk Privileged Access Manager could be less expensive."
"The pricing is slightly higher compared to other solutions, but it is reasonable because there are better security features."
"The SaaS version of CyberArk Enterprise Password Vault is very expensive, but the on-premises version is relative, e.g. depending on the size of the environment, it can be a bit pricey, but it's relatively okay compared to the others."
"Network and security licenses are currently being managed by other outsource vendors, so they are facing some type of problems in the digital aspect."
report
Use our free recommendation engine to learn which Privileged Access Management (PAM) solutions are best for your needs.
893,164 professionals have used our research since 2012.
 

Top Industries

By visitors reading reviews
No data available
Financial Services Firm
13%
Manufacturing Company
11%
Computer Software Company
7%
Comms Service Provider
6%
 

Company Size

By reviewers
Large Enterprise
Midsize Enterprise
Small Business
By reviewers
Company SizeCount
Small Business3
Midsize Enterprise2
Large Enterprise4
By reviewers
Company SizeCount
Small Business59
Midsize Enterprise42
Large Enterprise174
 

Questions from the Community

Ask a question
Earn 20 points
How does Sailpoint IdentityIQ compare with CyberArk PAM?
We evaluated Sailpoint IdentityIQ before ultimately choosing CyberArk. Sailpoint Identity Platform is a solution to manage risks in cloud enterprise environments. It automates and streamlines the m...
What do you like most about CyberArk Privileged Access Manager?
The most valuable features of the solution are control and analytics.
What is your experience regarding pricing and costs for CyberArk Privileged Access Manager?
My thoughts on the pricing of CyberArk Privileged Access Manager depend entirely on the vendors' requirements. If they want their things to be secure, they have to spend accordingly. We have four t...
 

Also Known As

CA Access Control, CA Privileged Identity Manager
CyberArk Privileged Access Security, CyberArk Enterprise Password Vault
 

Overview

 

Sample Customers

Colruyt Group, Logicalis, TIS Inc.
Rockwell Automation
Find out what your peers are saying about CyberArk, One Identity, Okta and others in Privileged Access Management (PAM). Updated: April 2026.
893,164 professionals have used our research since 2012.