Try our new research platform with insights from 80,000+ expert users

CyberArk Endpoint Privilege Manager vs Saviynt Identity Cloud comparison

 

Comparison Buyer's Guide

Executive SummaryUpdated on Feb 11, 2026

Review summaries and opinions

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
 

Categories and Ranking

CyberArk Endpoint Privilege...
Ranking in Privileged Access Management (PAM)
4th
Average Rating
8.2
Reviews Sentiment
6.8
Number of Reviews
38
Ranking in other categories
Endpoint Compliance (5th), Anti-Malware Tools (5th), Application Control (3rd), Ransomware Protection (5th)
Saviynt Identity Cloud
Ranking in Privileged Access Management (PAM)
11th
Average Rating
7.4
Reviews Sentiment
6.2
Number of Reviews
27
Ranking in other categories
Identity and Access Management (2nd), Non-Human Identity Management (NHIM) (7th), Identity Security and Posture Management (ISPM) (1st), Identity Governance Administration (IGA) (4th)
 

Mindshare comparison

As of March 2026, in the Privileged Access Management (PAM) category, the mindshare of CyberArk Endpoint Privilege Manager is 2.4%, down from 3.5% compared to the previous year. The mindshare of Saviynt Identity Cloud is 3.2%, down from 4.0% compared to the previous year. It is calculated based on PeerSpot user engagement data.
Privileged Access Management (PAM) Mindshare Distribution
ProductMindshare (%)
CyberArk Endpoint Privilege Manager2.4%
Saviynt Identity Cloud3.2%
Other94.4%
Privileged Access Management (PAM)
 

Featured Reviews

PH
Manager at a computer software company with 1,001-5,000 employees
MFA boosts protection and has blocking capabilities but dependency on other solutions complicates deployment
The main issues I experience are related to deployment, which requires dependency on other solutions like AD or SCCM. These tools need to be defined and synced with the client or agent and master, sometimes needing manual checks. The agent may have problems syncing, which complicates deployment, especially when users leave the organization, however, agents remain licensed since the server still maintains licenses. Additionally, compared to other endpoint managers like Thycotic, CyberArk Endpoint Privilege Manager lacks recording capabilities, which limits its functionality for critical applications. A feature that records activity, even when bypassing CyberArk Endpoint Privilege Manager, would be beneficial.
reviewer2774067 - PeerSpot reviewer
Software Engineer at a tech consulting company with 11-50 employees
Has reduced manual work and shortened project timelines through faster deployment and intuitive workflows
One of the challenges regarding Saviynt is the lack of material available on the web, as searching on Google or YouTube often yields little information. Advertising Saviynt is necessary because I was not aware of it a couple of months ago, and it is a very helpful product for many organizations. In India, IGA solutions are not widely recognized, and Saviynt can utilize this point by promoting itself in the cybersecurity field. A significant challenge is the lack of people discussing Saviynt in the open market, as the forums provide slower responses compared to platforms like Reddit. Advancements related to AI would be very helpful. Saviynt should provide pricing for their university certifications, which is currently not publicly available. Information about enrolling requires an ID that is not easily obtained, as it can only be acquired through an organization. Some small wishlist features are related to APIs. As I work on projects, I find certain features to be much needed, but at a glance, they may not seem necessary. As I continue working with Saviynt, these small API-related features become apparent and would greatly enhance the experience.

Quotes from Members

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
 

Pros

"The tool is an endpoint management system. It monitors everything a standard user does and helps elevate privileges when necessary for advanced users. It keeps an auditable trail of all activities. Practically, it stops and blocks potentially hazardous user behavior, whether intentional or unintentional. Certain companies must use endpoint management software because of national or international rules or ISO norms."
"We were able to reduce the number of privileged accounts by 50%, which helped to simplify our privileged access management environment."
"The feature called PTA, which stands for Privileged Threat Analytics keeps track of what admins are doing and works with Centimeters. If something fishy is going on with a user's credentials, it alerts the security team so they can act fast. Plus, it automates stuff like resetting credentials or blocking users. So, if there's a potential hack, CyberArk can change passwords and lock out users in a snap. It also gives you a heads-up if anything unusual is going on with server activities, like someone creating new users with uncontrolled credentials."
"The product is stable."
"Regarding the granularity of the managed controls in CyberArk Endpoint Privilege Manager, we have different levels of features to define compensations and capabilities, which help us verify configurations and access, ultimately keeping the safety of rights intact."
"It allows whitelisting."
"It identifies the original source, and all instances of malicious applications in the environment."
"The password rotation and the session recording are the most valuable features."
"It is a flexible tool because it works on JSON."
"It is very easy to use. It addresses most of the trends in identity governance and risk management."
"Saviynt has positively impacted my organization by significantly reducing the time for a project where we previously used a spreadsheet for manual work to keep the data, and helped reduce that time from around two weeks to two to three days or even less."
"Considering the initial cost and the basic features, this is a good solution that provides integration with both on-premise and cloud applications."
"One of the tool's advantages is its user-friendly interface, making it easier to manipulate from a GUI perspective. The graphical user interface for users and administrators is straightforward. While it may require more configuration initially, once set up, it becomes more accessible and easier to use."
"Saviynt has positively impacted my organization by significantly reducing the time for a project where we previously used a spreadsheet for manual work to keep the data."
"Saviynt is superior because it is user-friendly, and their fundamental phenomena are no-code, low-code, which means no customization is needed for the implementation part."
"The product's initial setup phase is easy."
 

Cons

"The main issues I experience are related to deployment, which requires dependency on other solutions like AD or SCCM. These tools need to be defined and synced with the client or agent and master, sometimes needing manual checks."
"While CyberArk Endpoint Privilege Manager is a great tool, I believe the functionality could be wider. If it could work not only with permissions but also involve pure EDR tasks or User and Entity Behavior Analytics, it would be great."
"There are many features that are currently missing. A customization option is required for certain policies."
"One area that has room for improvement is in managing the credentials for network devices."
"The CyberArk team is working on a feature to identify devices without the Endpoint Privilege Manager running, which is currently missing."
"It was complex to introduction the product to the end-users and the technical team."
"The product's threat protection and defense capabilities need enhancement."
"The price of the solution should improve."
"It should support more customizations. In SailPoint, we can do many customizations, but we are not able to do that in Saviynt. For workflows and other things, we can only use what is already in place. Saviynt has a lot of scope for improvement on the customization part."
"The company needs to do more to establish standard practices within the product itself that are common in the industry."
"It is time-consuming to troubleshoot issues."
"One of the challenges regarding Saviynt is the lack of material available on the web, as searching on Google or YouTube often yields little information."
"While one product performed excellently, another was quite complex with code dating back 15 years."
"One of the challenges regarding Saviynt is the lack of material available on the web, as searching on Google or YouTube often yields little information."
"The product can improve the customer support offered to users since it is an area with shortcomings."
"The solution does not work very well as the number of users increases."
 

Pricing and Cost Advice

"We pay about $17 per user."
"The cost for CyberArk is very high."
"The solution's pricing is reasonable compared to other vendors' products."
"The product's license is easy to procure."
"Although I do not deal directly with the pricing, CyberArk Endpoint Privilege Manager is costly compared to other solutions. However, it offers beneficial features."
"Pricing depends on how many devices you use. Right now, on-premise, it costs us a little, but it's worth it. It seems like the cloud solution is much more expensive. We got this solution one year ago, and it's like we bought the solution, and now they are not going to support it on-premise anymore. We are in the implementation phase, and we missed this, and we already paid for the licenses. This is wasted time from my perspective, and CyberArk should be more customer-friendly."
"The tool's pricing is reasonable for customers."
"The tool is a bit pricey compared to its competitors. My company does work with competitors, but I don't have hands-on experience with other software. I've just done some comparisons."
"The pricing is comparable to Azure Entra ID. Kind of the same"
"We are not into the licensing part. The clients take care of the licensing part."
"Saviynt has a competitive price."
"Saviynt's pricing is reasonable."
"If you are investing in securing your data and avoiding any non-compliance issues, then yes, it is certainly recommended. To put it plainly, if you're willing to pay fines and aren't concerned about the misuse of data, then there might not be a problem. However, if you intend to safeguard the data of your employees, vendors, and customers, it becomes crucial. In this context, managing data security requires preventive and detective measures, such as enforcing segregation of duties and regularly reviewing permissions. Throughout an individual's life cycle within an organization or customer life cycle, various access permissions are granted. Without taking action on these permissions, there is a risk of exposure later on. If individuals retain access after leaving the organization, it poses a serious security threat. Implementing solutions like Saviynt can address these challenges, ensuring continuous access review, generating reports, alerts, and identifying potential risks."
"Saviynt's pricing is acceptable and licensing costs are yearly."
"The solution has a pay-as-you-go licensing model, and you can subscribe monthly or yearly."
"If you need to make any changes then there are additional fees."
report
Use our free recommendation engine to learn which Privileged Access Management (PAM) solutions are best for your needs.
884,933 professionals have used our research since 2012.
 

Top Industries

By visitors reading reviews
Financial Services Firm
13%
Manufacturing Company
11%
Computer Software Company
9%
Government
7%
Financial Services Firm
16%
Manufacturing Company
8%
Educational Organization
8%
Computer Software Company
7%
 

Company Size

By reviewers
Large Enterprise
Midsize Enterprise
Small Business
By reviewers
Company SizeCount
Small Business17
Midsize Enterprise9
Large Enterprise18
By reviewers
Company SizeCount
Small Business6
Midsize Enterprise5
Large Enterprise15
 

Questions from the Community

Looking for recommendations and a pros/cons template for software to detect insider threats
This is an inside-out --- outside-in --- inside-in question, as an insider can be an outsider as well. There is no short answer other than a blend of a PAM tool with Behavioral Analytics and Endpo...
What do you like most about CyberArk Endpoint Privilege Manager?
The most valuable feature of the solution is its performance.
What is your experience regarding pricing and costs for CyberArk Endpoint Privilege Manager?
I believe it's quite a reasonably priced solution. It's not very common to use CyberArk because it's a niche solution, but customers who are willing to control administrative accounts are willing t...
What do you like most about Saviynt?
It is very easy to use. It addresses most of the trends in identity governance and risk management.
What is your experience regarding pricing and costs for Saviynt?
Saviynt is very affordable compared to its competitors. It is cloud-based, making it significantly cheaper than on-premises solutions. This cost-effectiveness aligns well with the Saudi market, whe...
What needs improvement with Saviynt?
One of the challenges regarding Saviynt is the lack of material available on the web, as searching on Google or YouTube often yields little information. Advertising Saviynt is necessary because I w...
 

Also Known As

Viewfinity
No data available
 

Overview

 

Sample Customers

Information Not Available
Shell, McKesson, Kimberly-Clark, Ingram Micro, Intermountain Health Care, Forterra, CoreLogic
Find out what your peers are saying about CyberArk Endpoint Privilege Manager vs. Saviynt Identity Cloud and other solutions. Updated: March 2026.
884,933 professionals have used our research since 2012.