Try our new research platform with insights from 80,000+ expert users

CyberArk Privileged Access Manager vs Ekran System comparison

 

Comparison Buyer's Guide

Executive Summary

Review summaries and opinions

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
 

Categories and Ranking

CyberArk Privileged Access ...
Ranking in User Activity Monitoring
1st
Ranking in Privileged Access Management (PAM)
1st
Average Rating
8.6
Reviews Sentiment
6.8
Number of Reviews
230
Ranking in other categories
Enterprise Password Managers (2nd), Mainframe Security (1st), Operational Technology (OT) Security (3rd)
Ekran System
Ranking in User Activity Monitoring
5th
Ranking in Privileged Access Management (PAM)
24th
Average Rating
8.0
Reviews Sentiment
7.5
Number of Reviews
1
Ranking in other categories
No ranking in other categories
 

Mindshare comparison

As of March 2026, in the User Activity Monitoring category, the mindshare of CyberArk Privileged Access Manager is 11.5%, down from 19.9% compared to the previous year. The mindshare of Ekran System is 13.7%, down from 20.9% compared to the previous year. It is calculated based on PeerSpot user engagement data.
User Activity Monitoring Mindshare Distribution
ProductMindshare (%)
CyberArk Privileged Access Manager11.5%
Ekran System13.7%
Other74.8%
User Activity Monitoring
 

Featured Reviews

Atul-Gujar - PeerSpot reviewer
CyberArk manager at a comms service provider with 10,001+ employees
Secures critical infrastructures with essential user session audit records
A potential area for improvement is enhancing support for cluster environments and distributed Vaults. Clients in multiple countries that need central access have different challenges that require better solutions from CyberArk. For financial services, CyberArk can improve incident response by ensuring fast support for critical priority tickets to meet compliance requirements. Providing more documentation on CyberArk is recommended for new team members to enhance their troubleshooting capabilities. I understand it's up to the client, but 99% fail to change the demo key, so it's crucial for CyberArk to emphasize changing the key and documenting it as part of the installation process.
Andreas Lalos - PeerSpot reviewer
Director of Professional Services at Besecure
Early threat detection and diverse OS support with enhanced security
Ekran System offers a lightweight solution that does not impact the systems where it is implemented. It provides rich metadata for monitored activities and includes threat analysis capabilities for early alerting and investigation of unauthorized actions. Additionally, it supports diverse operating systems and allows for monitoring and enforcement policies, like blocking actions for policy violations, and provides a retention of historical data in a lightweight format.

Quotes from Members

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
 

Pros

"I have an affinity towards CyberArk; I find that it works out-of-the-box as a product."
"The most important feature is managing the credentials and implementing those policies which rotate the credentials. Session Manager is also key in not letting the users have access to those credentials. Instead, CyberArk actually manages everything by itself."
"The ability to start the project, install and add the passwords in just a few days brings a big advantage for CyberArk."
"We are able to rotate privileged user passwords to eliminate fraudulent use."
"The product enables us manage passwords of highly privileged (service) accounts, which are not tied to a person, and they include a full audit trail and approval workflow functionality."
"CyberArk Privileged Access Manager provides granularity. You can break things down into individual safes. You have specific access to safes by individual or group. The interface is with AD, with LDAP, or with local CyberArk passwords. You also have the ability to establish policies for your individual credentials."
"I found it valuable that CyberArk Privileged Access Manager can be integrated with PTA (privileged threat analytics), and this means that it will tell you if there's a risk to the logins and signs of risk and if risky behavior is observed. It's a good feature. Another good feature is the CPM (central password manager) because it helps you rotate the passwords automatically without involving the admins. It can go and update the scheduled tasks and the services. At the same time, if there's an application where it cannot do all of these, CPM will trigger an automatic email to the application owners, telling them that they should go ahead and change the password. This allows you to manage the account password that CyberArk cannot manage, which helps mitigate the risk of old passwords, where the password gets compromised, and also allows you to manage the security of the domain."
"I'm no longer the product owner for PAM, but I can say that the most useful feature is the vault functionality, which keeps all your passwords secure in a digital vault."
"It supports diverse operating systems and allows for monitoring and enforcement policies, like blocking actions for policy violations, and provides a retention of historical data in a lightweight format."
 

Cons

"It's not a cheap application. It's very expensive."
"Improved user-friendliness, granularity, and functionality would enhance the product further."
"The greatest area of improvement is with the user interface of the Password Vault Web Access component."
"This product needs professional consulting services to onboard accounts effectively based user profiles."
"The solution is too complicated to use and should be simplified. It took me a long time to understand how to use it. There is a lot that the solution can improve for the future."
"Initially, there was a lot of hiccups, because there were a lot of transitions due to manual installations."
"The initial setup of CyberArk is a challenge if you do not have prior experience with it."
"Sometimes they didn't always offer, for the less critical issues perhaps, a quick, easy, how-to-implement-it solution."
"Ekran System could improve in terms of communication to the market, particularly after their rebranding as Shiteka."
 

Pricing and Cost Advice

"I would rate CyberArk's pricing a nine out of ten, with one being cheap and ten being expensive. It's one of the most expensive solutions in the market, but it's worth it."
"Quite expensive"
"It is not a cheap solution. It is expensive as compared with other solutions. However, it is one of the best solutions in their domain."
"It's an affordable platform."
"Payments have to be made on a yearly basis toward the licensing costs of the solution."
"The solution is available at a high price"
"CyberArk is one of the best PAM solutions and one of the most expensive, but it works better than the others, so the pricing is fair."
"Its price can be reduced."
Information not available
report
Use our free recommendation engine to learn which User Activity Monitoring solutions are best for your needs.
884,933 professionals have used our research since 2012.
 

Top Industries

By visitors reading reviews
Financial Services Firm
14%
Manufacturing Company
10%
Computer Software Company
8%
Government
6%
No data available
 

Company Size

By reviewers
Large Enterprise
Midsize Enterprise
Small Business
By reviewers
Company SizeCount
Small Business59
Midsize Enterprise42
Large Enterprise174
No data available
 

Questions from the Community

How does Sailpoint IdentityIQ compare with CyberArk PAM?
We evaluated Sailpoint IdentityIQ before ultimately choosing CyberArk. Sailpoint Identity Platform is a solution to manage risks in cloud enterprise environments. It automates and streamlines the m...
What do you like most about CyberArk Privileged Access Manager?
The most valuable features of the solution are control and analytics.
What is your experience regarding pricing and costs for CyberArk Privileged Access Manager?
My thoughts on the pricing of CyberArk Privileged Access Manager depend entirely on the vendors' requirements. If they want their things to be secure, they have to spend accordingly. We have four t...
What is your experience regarding pricing and costs for Ekran System?
The business model has become more complex with changes in feature licensing, yet they provide affordable options, particularly with the standard edition, which doesn't charge for the management co...
What needs improvement with Ekran System?
Ekran System could improve in terms of communication to the market, particularly after their rebranding as Shiteka. The solution does not support other protocols beyond traditional monitoring chann...
What is your primary use case for Ekran System?
The primary use case for Ekran System is third-party vendor monitoring and privileged access management monitoring. It is also used for privilege access management solutions.
 

Also Known As

CyberArk Privileged Access Security, CyberArk Enterprise Password Vault
No data available
 

Overview

 

Sample Customers

Rockwell Automation
Deloitte, UPS, Seoul National University, KDN, Finat, Constitutional Court of Korea, Ukrsibbank
Find out what your peers are saying about CyberArk, Amazon Web Services (AWS), Proofpoint and others in User Activity Monitoring. Updated: March 2026.
884,933 professionals have used our research since 2012.