No more typing reviews! Try our Samantha, our new voice AI agent.

CyberArk Endpoint Privilege Manager vs Saviynt Identity Cloud comparison

 

Comparison Buyer's Guide

Executive SummaryUpdated on Feb 11, 2026

Review summaries and opinions

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
 

Categories and Ranking

CyberArk Endpoint Privilege...
Ranking in Privileged Access Management (PAM)
4th
Average Rating
8.2
Reviews Sentiment
6.8
Number of Reviews
38
Ranking in other categories
Endpoint Compliance (5th), Anti-Malware Tools (5th), Application Control (3rd), Ransomware Protection (3rd)
Saviynt Identity Cloud
Ranking in Privileged Access Management (PAM)
10th
Average Rating
7.4
Reviews Sentiment
6.2
Number of Reviews
27
Ranking in other categories
Identity and Access Management (3rd), Non-Human Identity Management (NHIM) (7th), Identity Security and Posture Management (ISPM) (1st), Identity Governance Administration (IGA) (4th)
 

Mindshare comparison

As of May 2026, in the Privileged Access Management (PAM) category, the mindshare of CyberArk Endpoint Privilege Manager is 2.4%, down from 3.6% compared to the previous year. The mindshare of Saviynt Identity Cloud is 3.2%, down from 3.9% compared to the previous year. It is calculated based on PeerSpot user engagement data.
Privileged Access Management (PAM) Mindshare Distribution
ProductMindshare (%)
CyberArk Endpoint Privilege Manager2.4%
Saviynt Identity Cloud3.2%
Other94.4%
Privileged Access Management (PAM)
 

Featured Reviews

DR
Commercial and Technical Professional Manager at Evolution Technologies Group
Strengthening financial services infrastructure by safeguarding and integrating with ecosystems
We use CyberArk Endpoint Privilege Manager to complement a privilege access management solution in order to avoid golden ticket attacks and strengthen services against attacks. It serves as a complement to our asset management solution. The architecture of CyberArk Endpoint Privilege Manager is beneficial for integrating with all customer ecosystems; it's easy to deploy, and achieving that level of integration and control is more challenging with other solutions. The ability of CyberArk Endpoint Privilege Manager to safeguard our financial services infrastructure is very important, as we need to record actions on privileges in our information systems. Regarding the granularity of the managed controls in CyberArk Endpoint Privilege Manager, we have different levels of features to define compensations and capabilities, which help us verify configurations and access, ultimately keeping the safety of rights intact. Our initial challenge with CyberArk Endpoint Privilege Manager is to comply with Colombian regulations in the financial sector, particularly identifying users and managing password changes and rotations. We needed to certify the identities and provide necessary information for government investigations, if required. CyberArk Endpoint Privilege Manager is very important for helping our organization meet compliance and regulatory requirements. We have to comply with international regulations such as SOC, but also with local regulations unique to the financial sector, which is crucial for us due to the high risks involved. CyberArk Endpoint Privilege Manager helped us reduce the time for regulatory processes to approximately two to four months, completing the solution and training. CyberArk Endpoint Privilege Manager has helped us reduce the mean time to detect within our organization. That's our main goal. Regarding MTTD, the solution provides enough information to enhance our overall detection process. We have an 85% improvement in MTTD. CyberArk Endpoint Privilege Manager helps ensure data privacy through strategies that manage information in real-time. CyberArk Endpoint Privilege Manager helps save costs by avoiding risks and future expenses associated with security incidents. It's essential to communicate the value of CyberArk Endpoint Privilege Manager to users, as its controls help improve system security. My role at the company involves service and sales activities.
reviewer2774067 - PeerSpot reviewer
Software Engineer at a tech consulting company with 11-50 employees
Has reduced manual work and shortened project timelines through faster deployment and intuitive workflows
One of the challenges regarding Saviynt is the lack of material available on the web, as searching on Google or YouTube often yields little information. Advertising Saviynt is necessary because I was not aware of it a couple of months ago, and it is a very helpful product for many organizations. In India, IGA solutions are not widely recognized, and Saviynt can utilize this point by promoting itself in the cybersecurity field. A significant challenge is the lack of people discussing Saviynt in the open market, as the forums provide slower responses compared to platforms like Reddit. Advancements related to AI would be very helpful. Saviynt should provide pricing for their university certifications, which is currently not publicly available. Information about enrolling requires an ID that is not easily obtained, as it can only be acquired through an organization. Some small wishlist features are related to APIs. As I work on projects, I find certain features to be much needed, but at a glance, they may not seem necessary. As I continue working with Saviynt, these small API-related features become apparent and would greatly enhance the experience.

Quotes from Members

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
 

Pros

"The most valuable feature is that their database is completely encrypted and protected with multiple layers."
"In terms of removing local admin credentials on the endpoint and the effect on the size of the attack surface in our organization, it has drastically reduced the attack surface for local administrative rights and the chance of escalation of privilege."
"The most valuable feature is that it does lifecycle management and that it will change to whatever the end target is."
"This is the number one product for privilege account security."
"The stability of CyberArk Endpoint Privilege Manager is excellent, with an uptime of 99.99 percent."
"CyberArk Endpoint Privilege Manager has significantly improved our security posture by preventing virus incidents and restricting users from downloading unwanted applications."
"We like that you can distribute the applications and decide how you want to run those applications based on their criticality, and that division was really, really helpful as it has actually reduced almost 30% of calls to the IT help desk."
"The most valuable feature of CyberArk Endpoint Privilege Manager is its ability to reset passwords every time that it is needed or periodically."
"The most valuable features of Saviynt are database utility and report generation. These two features have a major impact, particularly when you are trying to create a report because, in other systems, you need to use a third-party utility such as a BI tool or any other reporting tool to fetch the data and send out the report to a third party team. In Saviynt, it's a system within a system, so you don't have to use any third-party tool because you can directly do your query and write that code on Saviynt and then send that report to the team."
"Saviynt has improved our organization, as it is a straightforward solution that allows you to configure things very fast, partly because of the JSON and Autobox functionality."
"Saviynt risk-based access requests and intelligent access controls have made a significant impact on our company."
"The product is flexible to use."
"Considering the initial cost and the basic features, this is a good solution that provides integration with both on-premise and cloud applications."
"Saviynt is superior because it is user-friendly, and their fundamental phenomena are no-code, low-code, which means no customization is needed for the implementation part."
"We have found the implementation process to be very easy."
"Saviynt has a lot of potential with many features available for users."
 

Cons

"Technical support is slow to respond when we run into issues."
"The product is expensive."
"The product's threat protection and defense capabilities need enhancement."
"The main issues I experience are related to deployment, which requires dependency on other solutions like AD or SCCM. These tools need to be defined and synced with the client or agent and master, sometimes needing manual checks."
"CyberArk Endpoint Privilege Manager can improve its Identity Governance, which is already working effectively yet could continue to enhance its capabilities."
"The price of the solution should improve."
"The main issues I experience are related to deployment, which requires dependency on other solutions like AD or SCCM."
"It's an old product and has many areas that can be improved."
"The tool is difficult to migrate."
"It should support more customizations. In SailPoint, we can do many customizations, but we are not able to do that in Saviynt. For workflows and other things, we can only use what is already in place. Saviynt has a lot of scope for improvement on the customization part."
"Both SailPoint IdentityNow and Saviynt have some bugs, but SailPoint is considered more mature with fewer bugs due to its longer establishment in the market since around 2005. SailPoint had its share of bugs in the early days, but they have resolved them over time, resulting in a stable product. Saviynt, on the other hand, was launched around 2013 or 2014 and is actively working to improve its product. Despite having some bugs, Saviynt is making progress and aims to build a stable product, but it is not there yet."
"The main difficulty was the integration process itself. But we were able to kind of work through it and fix it. We tried integrating with our HR system and other IBM solutions, like Microsoft Identity Management."
"The customer support and implementation services need to be improved."
"One of the challenges regarding Saviynt is the lack of material available on the web, as searching on Google or YouTube often yields little information."
"An area for improvement in Saviynt is that there's a limitation on the number of logs you can get from the past twenty-four hours. For example, if the data is huge, the tool can only give you a maximum of one hundred logs. You can't get any further than that. In the next version of Saviynt, however, you can get more logs and you'll see them inside the log rotation. For example, when you're trying to search inside the log, you can select a date range, and then you can search for a particular log. We haven't used that new log rotation feature yet, but it's included in the next release of Saviynt. Another area for improvement in the tool is that it doesn't have a server monitoring feature, so if your server has a high load, it should give you a warning. You're supposed to get an alert similar to what's being done in WebLogic. In WebLogic, we had a separate facility, but in Saviynt, that feature's missing."
"The product's stability is not easy to maintain."
 

Pricing and Cost Advice

"I feel that the price of the product is nominal. It must be around 10 to 15 USD per installation. I rate the product price an eight to nine out of ten, where one is high price, and ten is low price."
"The cost for CyberArk is very high."
"The tool is priced high. I would rate its pricing an eight out of ten."
"It is an expensive solution."
"The professional services for one eight-hour day would be $1,800."
"The product's license is easy to procure."
"The tool's pricing is reasonable for customers."
"The solution's pricing is reasonable compared to other vendors' products."
"If you are investing in securing your data and avoiding any non-compliance issues, then yes, it is certainly recommended. To put it plainly, if you're willing to pay fines and aren't concerned about the misuse of data, then there might not be a problem. However, if you intend to safeguard the data of your employees, vendors, and customers, it becomes crucial. In this context, managing data security requires preventive and detective measures, such as enforcing segregation of duties and regularly reviewing permissions. Throughout an individual's life cycle within an organization or customer life cycle, various access permissions are granted. Without taking action on these permissions, there is a risk of exposure later on. If individuals retain access after leaving the organization, it poses a serious security threat. Implementing solutions like Saviynt can address these challenges, ensuring continuous access review, generating reports, alerts, and identifying potential risks."
"The solution has a pay-as-you-go licensing model, and you can subscribe monthly or yearly."
"If you need to make any changes then there are additional fees."
"Saviynt's pricing is acceptable and licensing costs are yearly."
"Saviynt has a competitive price."
"The pricing is comparable to Azure Entra ID. Kind of the same"
"We are not into the licensing part. The clients take care of the licensing part."
"Saviynt's pricing is reasonable."
report
Use our free recommendation engine to learn which Privileged Access Management (PAM) solutions are best for your needs.
893,244 professionals have used our research since 2012.
 

Top Industries

By visitors reading reviews
Financial Services Firm
14%
Manufacturing Company
11%
Computer Software Company
7%
Government
7%
Financial Services Firm
16%
Manufacturing Company
8%
Educational Organization
8%
Computer Software Company
8%
 

Company Size

By reviewers
Large Enterprise
Midsize Enterprise
Small Business
By reviewers
Company SizeCount
Small Business17
Midsize Enterprise9
Large Enterprise18
By reviewers
Company SizeCount
Small Business6
Midsize Enterprise5
Large Enterprise15
 

Questions from the Community

Looking for recommendations and a pros/cons template for software to detect insider threats
This is an inside-out --- outside-in --- inside-in question, as an insider can be an outsider as well. There is no short answer other than a blend of a PAM tool with Behavioral Analytics and Endpo...
What do you like most about CyberArk Endpoint Privilege Manager?
The most valuable feature of the solution is its performance.
What is your experience regarding pricing and costs for CyberArk Endpoint Privilege Manager?
I believe it's quite a reasonably priced solution. It's not very common to use CyberArk because it's a niche solution, but customers who are willing to control administrative accounts are willing t...
What is your experience regarding pricing and costs for Saviynt?
Saviynt is very affordable compared to its competitors. It is cloud-based, making it significantly cheaper than on-premises solutions. This cost-effectiveness aligns well with the Saudi market, whe...
What needs improvement with Saviynt?
One of the challenges regarding Saviynt is the lack of material available on the web, as searching on Google or YouTube often yields little information. Advertising Saviynt is necessary because I w...
What is your primary use case for Saviynt?
My main use case for Saviynt is deploying IGA solutions to our customers. For deploying IT solutions to our customers using Saviynt, one of our recent projects was to develop an IGA solution for a ...
 

Also Known As

Viewfinity
No data available
 

Overview

 

Sample Customers

Information Not Available
Shell, McKesson, Kimberly-Clark, Ingram Micro, Intermountain Health Care, Forterra, CoreLogic
Find out what your peers are saying about CyberArk Endpoint Privilege Manager vs. Saviynt Identity Cloud and other solutions. Updated: April 2026.
893,244 professionals have used our research since 2012.