Try our new research platform with insights from 80,000+ expert users

CyberArk Privileged Access Manager vs Dashlane Business Password Management comparison

 

Comparison Buyer's Guide

Executive SummaryUpdated on Nov 9, 2025

Review summaries and opinions

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
 

Categories and Ranking

CyberArk Privileged Access ...
Ranking in Enterprise Password Managers
3rd
Average Rating
8.6
Reviews Sentiment
6.8
Number of Reviews
229
Ranking in other categories
User Activity Monitoring (1st), Privileged Access Management (PAM) (1st), Mainframe Security (2nd), Operational Technology (OT) Security (3rd)
Dashlane Business Password ...
Ranking in Enterprise Password Managers
19th
Average Rating
9.0
Reviews Sentiment
7.3
Number of Reviews
4
Ranking in other categories
No ranking in other categories
 

Mindshare comparison

As of January 2026, in the Enterprise Password Managers category, the mindshare of CyberArk Privileged Access Manager is 6.9%, down from 7.4% compared to the previous year. The mindshare of Dashlane Business Password Management is 1.8%, up from 0.9% compared to the previous year. It is calculated based on PeerSpot user engagement data.
Enterprise Password Managers Market Share Distribution
ProductMarket Share (%)
CyberArk Privileged Access Manager6.9%
Dashlane Business Password Management1.8%
Other91.3%
Enterprise Password Managers
 

Featured Reviews

SI
Senior PAM Consultant at iC Consult GmbH
Makes privileged access management easy with automation and granular control
Many people underestimate the value of these tools because they treat them as simple automated password management. Once you realize the volume of passwords in your organization and factor in nonhuman passwords, you realize its value. Last year, CyberArk Impact cited 45 nonhuman passwords for every human password. If you have 10,000 employees, you can imagine the number of passwords. There are also many other operations. For example, you have a Qualys scanner that needs to reach out and touch all your endpoints and scan them for vulnerabilities. They use an API call to CyberArk to pull out a Privileged credential that allows them to log in to that target. This is an automated machine call. It is tapping into CyberArk to get that credential. There can be hundreds of thousands of those operations a day. You do not want to manage those passwords by hand. Some people marginalize the significance of such a solution by saying that it is just a fancy password changer. It goes well beyond that, especially with API calls and automation. Its importance extends beyond merely changing passwords; it involves automation, API calls, and process integration, crucial in agile environments for standing up new Amazon servers or other processes needing privileged credentials. CyberArk can automate these tasks into their build processes. Another critical feature is the proxy service via Privileged Session Manager (PSM), providing not only a proxy between your user and the target servers, protecting against malware but also offering session recording. Many companies I have worked with implemented a PAM product as a knee-jerk reaction to SOX audit requirements. They discovered they needed session recording and retention for regulatory compliance. This has become a major factor for clients instituting CyberArk, so PSM is a big deal in addition to regular password rotation.
JB
Vice President - Management Information Systems at Quadbridge
Straightforward to scale, has good auto-fill capabilities, and allows us to share passwords without them being visible to other team members
It would be good to have some kind of best use cases, tips, and tricks on the platform. In terms of implementation, it took us a little bit longer to implement it, but on the whole, we're happy with the product. There should also be an easier way to be able to transfer user data to other users who have kind of left the company. It could be a little bit cheaper.

Quotes from Members

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
 

Pros

"CyberArk Privileged Access Manager's main benefit is it provides secure access to our servers. There are features to capture the user activity, it provides video recording processing. If the users are logged in to the server, we can see what activities they are performing. It's a very nice tool for Privileged Access Management. They have plenty of useful services and the solution has fulfilled our needs."
"CyberArk PAM can be easily automated."
"When we started with RPA, there was a requirement that every credential and the bots themselves be protected through the PAM system. From the get-go, we've had CyberArk in the middle... We've got a pretty robust RPA implementation with our PAM platform. Users, bots, the credentials — everything is managed via our PAM solution."
"The ability of CyberArk Privileged Access Manager to safeguard the financial services infrastructure by protecting credentials is extremely important, as every activity in a financial organization needs to be recorded for accountability in auditing."
"We like it for the ability to automatically change passwords. At least for my group, that's the best thing."
"It allows users to self-provision access to the accounts that they need."
"It's secure and reliable. I especially appreciate that it's locked down and only allows access to authorized components."
"It is useful for protecting passwords. If you need to do access security management, you can first use the CyberArk console, and after that, you can connect the firewall interface or firewall command line. Similarly, if you need to do an RDP session, you need to first log in to CyberArk before connecting to the Windows RDP session. This way, the admin doesn't know the password, and that password is changed immediately. To change the password, you first discover the old password in the network, and after that, you can change the password."
"The integration capabilities have been good."
"I like the ability to share passwords without them being visible to other team members. The auto-fill capabilities are great too."
"Dashlane's most valuable feature is Hotspot Shield, the VPN feature that allows you to connect securely to public wifi."
"The synchronization is the solution's most valuable feature. It works really well. The ability to have secure notes is also very helpful."
 

Cons

"Their post-sale support area requires a big improvement. Customers cannot automate tickets directly with CyberArk. They have to come through the distributor or bring in partners who have access to the support portal. Basically, the support for post-sales implementation is there, but the role of CyberArk is very minimal. Customers have to rely on partners, which sometimes creates issues. Some of the vendors help you during the implementation process, but the CyberArk support team does not do that. They have 24/7 support for our region, but they help only if there is an emergency or there is a problem with their system. If the password vault is down or the system is down, they provide immediate attention. For almost everything else, they take more time to respond. They give low priority to service-related or migration-related questions."
"Report creation could be improved. The policies could be more customized."
"They are sometimes not flexible with things. For instance, from one day to another, there might be something that had been done years ago by CyberArk, then they say, "We do not support that." You then have to initiate a complaint and start working with them. Things might become complicated and months pass while you are working with them. Usually, they are good and fast, but sometimes they seem to be blocked with problems, e.g., you will suddenly be working with another team instead of the team that you were working with the day before."
"There is a bit of a learning curve, but it's a pretty complex solution."
"In the next release, they could simplify the setup and I would like some tasks added like file sharing. When a client connects to CyberArk and wants to put a file on the server, they cannot."
"One of our current issues is a publishing issue. If we whitelist Google Chrome, all the events of Google Chrome should be gone. It is not happening."
"The product is very vaulting-focused. I'd love to see it expanding its capabilities a bit further into areas like just-in-time elevation, and access with non-vaulted credentials."
"The initial setup was a bit complex."
"There should also be an easier way to be able to transfer user data to other users who have kind of left the company."
"The integration with the VPN feature could be smoother."
"It would be nice to have the solution localized in Europe. Dashlane is an American company. It's controlled by American laws and regulations that allows the American government to have full access to my data with Dashlane. That's why I am leaving Dashlane, because we can't accept such an important function in American control."
"The cost, while decent, of course, could always be less."
 

Pricing and Cost Advice

"I would rate the cost of CyberArk Privileged Access Manager seven out of ten with ten being the most expensive."
"I rate the tool's pricing an eight out of ten."
"Cost efficiency is the number one thing that can be improved in my mind. This would change lots of companies minds on purchasing the product."
"The price of CyberArk Privileged Access Manager could be less expensive."
"If you want a Ferrari, it will cost you. The solution is really nice, so it costs the client, but in the long run, it is very good. If you buy a solution that costs a lot to maintain because it is not stable, and you are frequently asking for consultant support, it costs more."
"Quite expensive"
"Compared to other solutions, it is costly."
"The price of the solution is reasonable."
"It is a little bit on the expensive side."
report
Use our free recommendation engine to learn which Enterprise Password Managers solutions are best for your needs.
881,082 professionals have used our research since 2012.
 

Top Industries

By visitors reading reviews
Financial Services Firm
15%
Manufacturing Company
10%
Computer Software Company
9%
Government
6%
Manufacturing Company
22%
Financial Services Firm
11%
University
8%
Construction Company
8%
 

Company Size

By reviewers
Large Enterprise
Midsize Enterprise
Small Business
By reviewers
Company SizeCount
Small Business59
Midsize Enterprise40
Large Enterprise173
No data available
 

Questions from the Community

How does Sailpoint IdentityIQ compare with CyberArk PAM?
We evaluated Sailpoint IdentityIQ before ultimately choosing CyberArk. Sailpoint Identity Platform is a solution to manage risks in cloud enterprise environments. It automates and streamlines the m...
What do you like most about CyberArk Privileged Access Manager?
The most valuable features of the solution are control and analytics.
What is your experience regarding pricing and costs for CyberArk Privileged Access Manager?
My thoughts on the pricing of CyberArk Privileged Access Manager depend entirely on the vendors' requirements. If they want their things to be secure, they have to spend accordingly. We have four t...
Ask a question
Earn 20 points
 

Also Known As

CyberArk Privileged Access Security, CyberArk Enterprise Password Vault
No data available
 

Overview

 

Sample Customers

Rockwell Automation
Autologin Pro, Super Shopper, Kantox
Find out what your peers are saying about CyberArk Privileged Access Manager vs. Dashlane Business Password Management and other solutions. Updated: December 2025.
881,082 professionals have used our research since 2012.