No more typing reviews! Try our Samantha, our new voice AI agent.

CyberArk Privileged Access Manager vs IBM Resource Access Control Facility comparison

 

Comparison Buyer's Guide

Executive SummaryUpdated on Feb 4, 2025

Review summaries and opinions

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
 

Categories and Ranking

CyberArk Privileged Access ...
Ranking in Mainframe Security
1st
Average Rating
8.6
Reviews Sentiment
6.8
Number of Reviews
230
Ranking in other categories
User Activity Monitoring (1st), Enterprise Password Managers (3rd), Privileged Access Management (PAM) (1st), Operational Technology (OT) Security (3rd)
IBM Resource Access Control...
Ranking in Mainframe Security
5th
Average Rating
8.0
Reviews Sentiment
6.8
Number of Reviews
3
Ranking in other categories
No ranking in other categories
 

Mindshare comparison

As of May 2026, in the Mainframe Security category, the mindshare of CyberArk Privileged Access Manager is 4.8%, up from 1.5% compared to the previous year. The mindshare of IBM Resource Access Control Facility is 11.5%, down from 14.7% compared to the previous year. It is calculated based on PeerSpot user engagement data.
Mainframe Security Mindshare Distribution
ProductMindshare (%)
CyberArk Privileged Access Manager4.8%
IBM Resource Access Control Facility11.5%
Other83.7%
Mainframe Security
 

Featured Reviews

Atul-Gujar - PeerSpot reviewer
CyberArk manager at a comms service provider with 10,001+ employees
Secures critical infrastructures with essential user session audit records
A potential area for improvement is enhancing support for cluster environments and distributed Vaults. Clients in multiple countries that need central access have different challenges that require better solutions from CyberArk. For financial services, CyberArk can improve incident response by ensuring fast support for critical priority tickets to meet compliance requirements. Providing more documentation on CyberArk is recommended for new team members to enhance their troubleshooting capabilities. I understand it's up to the client, but 99% fail to change the demo key, so it's crucial for CyberArk to emphasize changing the key and documenting it as part of the installation process.
KC
Senior systems engineer at Unum
We're able to do role-based security so when new people join the company we're able to quickly add them to the proper security through role-based security groups.
It's completely secure. That's the best answer I can give you. We're able to do role-based security so when new people join the company we're able to quickly add them to the proper security through role-based security groups. Our resources are secured with this product I would welcome something…

Quotes from Members

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
 

Pros

"I help implement and train others on how to use it in a highly secure environment."
"On implementing the CyberArk PIM solution, we are able to achieve this goal."
"The password vault and session monitoring are useful."
"Compared to other products, CyberArk is extremely easy to install and configure."
"It is a scalable product."
"The ability to start the project, install and add the passwords in just a few days brings a big advantage for CyberArk."
"The most valuable feature is the special management. It records the activity and the actions that we use for auditing."
"I appreciate the ease of use for support analysts."
"Perfectly integrated with the z/OS operating system and all the other products in the IBM z/OS family."
"Technical support is exceptional."
"It's completely secure."
 

Cons

"Additionally, I think the user experience needs to improve."
"Some aspects of the administration need improvement, though they have recently made improvements to the API. However, the management with the interface and configuration are not so user-friendly. It has not changed much during all the years that CyberArk has been on the market. The management part, like platform management as well as PSM connectors definition and management, could be improved, even if it has already been done with the API."
"The stability depends on the infrastructure it is installed on, which is important because CyberArk does not have the hardware appliance."
"The session monitoring and recording feature is also a good feature feature, but we're currently experiencing an issue with session monitoring not working correctly. We're working with CyberArk to resolve it. We aren't able to view active sessions or historical recordings of sessions."
"The tool needs to improve its usage and interface. They need to have a modern and useful interface. I want the product to improve its integration capabilities as well since some of the integration features do not work always."
"I would like to see better automation in granting access, better tools, more efficient tools, to be able to customize the solution that CyberArk provides."
"Authentication to the PVWA utilises integration to IIS. Therefore, it is not as strong as desired."
"The current interface is not very intuitive."
"The way to pull security logs could be better."
"I would like the generation of RACF on-screen listings and reports to be more flexible."
"I would welcome something that is more easily integrated with distributor platforms."
 

Pricing and Cost Advice

"In comparison to other products on the market, CyberArk is a more costly product."
"If you are looking at implementing this solution, buy the training and go to it."
"Pricing and licensing depend on the environment."
"Generally, I don't get involved in the licensing or the purchasing side of it, but I do know that the licenses are expensive."
"The price of CyberArk Privileged Access Manager could be less expensive."
"With the current model of licensing, for my use cases, sometimes it's hard to convince the management and get budget approvals for it. It's expensive and you're not getting anything new. It's just a control, but in terms of risk, you are covering a big impact on the company. Improvement in the licensing prices is something I would want to have."
"There are no additional costs other than the standard licensing fees."
"There are additional features added to our CyberArk Privileged Access Manager license. For example, features that allow us to integrate into various kinds of platforms."
Information not available
report
Use our free recommendation engine to learn which Mainframe Security solutions are best for your needs.
893,164 professionals have used our research since 2012.
 

Top Industries

By visitors reading reviews
Financial Services Firm
13%
Manufacturing Company
11%
Computer Software Company
7%
Comms Service Provider
6%
Financial Services Firm
26%
Manufacturing Company
10%
Government
9%
Healthcare Company
8%
 

Company Size

By reviewers
Large Enterprise
Midsize Enterprise
Small Business
By reviewers
Company SizeCount
Small Business59
Midsize Enterprise42
Large Enterprise174
No data available
 

Questions from the Community

How does Sailpoint IdentityIQ compare with CyberArk PAM?
We evaluated Sailpoint IdentityIQ before ultimately choosing CyberArk. Sailpoint Identity Platform is a solution to manage risks in cloud enterprise environments. It automates and streamlines the m...
What do you like most about CyberArk Privileged Access Manager?
The most valuable features of the solution are control and analytics.
What is your experience regarding pricing and costs for CyberArk Privileged Access Manager?
My thoughts on the pricing of CyberArk Privileged Access Manager depend entirely on the vendors' requirements. If they want their things to be secure, they have to spend accordingly. We have four t...
Ask a question
Earn 20 points
 

Also Known As

CyberArk Privileged Access Security, CyberArk Enterprise Password Vault
IBM RACF
 

Overview

 

Sample Customers

Rockwell Automation
Information Not Available
Find out what your peers are saying about CyberArk Privileged Access Manager vs. IBM Resource Access Control Facility and other solutions. Updated: April 2026.
893,164 professionals have used our research since 2012.