Try our new research platform with insights from 80,000+ expert users

CyberArk Privileged Access Manager vs ManageEngine ADSelfService Plus comparison

 

Comparison Buyer's Guide

Executive SummaryUpdated on Dec 16, 2024

Review summaries and opinions

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
 

Categories and Ranking

CyberArk Privileged Access ...
Ranking in Enterprise Password Managers
3rd
Average Rating
8.6
Reviews Sentiment
6.8
Number of Reviews
229
Ranking in other categories
User Activity Monitoring (1st), Privileged Access Management (PAM) (1st), Mainframe Security (2nd), Operational Technology (OT) Security (3rd)
ManageEngine ADSelfService ...
Ranking in Enterprise Password Managers
16th
Average Rating
8.4
Reviews Sentiment
7.2
Number of Reviews
9
Ranking in other categories
No ranking in other categories
 

Mindshare comparison

As of January 2026, in the Enterprise Password Managers category, the mindshare of CyberArk Privileged Access Manager is 6.9%, down from 7.4% compared to the previous year. The mindshare of ManageEngine ADSelfService Plus is 0.8%, up from 0.2% compared to the previous year. It is calculated based on PeerSpot user engagement data.
Enterprise Password Managers Market Share Distribution
ProductMarket Share (%)
CyberArk Privileged Access Manager6.9%
ManageEngine ADSelfService Plus0.8%
Other92.3%
Enterprise Password Managers
 

Featured Reviews

SI
Senior PAM Consultant at iC Consult GmbH
Makes privileged access management easy with automation and granular control
Many people underestimate the value of these tools because they treat them as simple automated password management. Once you realize the volume of passwords in your organization and factor in nonhuman passwords, you realize its value. Last year, CyberArk Impact cited 45 nonhuman passwords for every human password. If you have 10,000 employees, you can imagine the number of passwords. There are also many other operations. For example, you have a Qualys scanner that needs to reach out and touch all your endpoints and scan them for vulnerabilities. They use an API call to CyberArk to pull out a Privileged credential that allows them to log in to that target. This is an automated machine call. It is tapping into CyberArk to get that credential. There can be hundreds of thousands of those operations a day. You do not want to manage those passwords by hand. Some people marginalize the significance of such a solution by saying that it is just a fancy password changer. It goes well beyond that, especially with API calls and automation. Its importance extends beyond merely changing passwords; it involves automation, API calls, and process integration, crucial in agile environments for standing up new Amazon servers or other processes needing privileged credentials. CyberArk can automate these tasks into their build processes. Another critical feature is the proxy service via Privileged Session Manager (PSM), providing not only a proxy between your user and the target servers, protecting against malware but also offering session recording. Many companies I have worked with implemented a PAM product as a knee-jerk reaction to SOX audit requirements. They discovered they needed session recording and retention for regulatory compliance. This has become a major factor for clients instituting CyberArk, so PSM is a big deal in addition to regular password rotation.
Kimberly Brock - PeerSpot reviewer
Technical Security Engineer & Data Governance at a computer software company with 51-200 employees
Efficiently keeps track and monitors
When I look at something like a server or a user who has an unsuccessful login, all they're giving me is what is from the domain controllers. When I click on the analytics portion that says give me information, it doesn't tell me what application is errored out. It doesn't tell me; it just tells me what is the same information from the domain controller. I'd like a little bit more robust information on actually giving me some useful information instead of some links that send me out to the Internet that says research here, and then I have to do additional research. It's kind of generic. And, basically, it's just a quick, I don't have to search through the domain controller logs, but once I pull those out, the logs are still very generic like you get from Microsoft. Area code four three one one. Okay. I had to go look that up. It doesn't take it any further than just a copy based on the domain controller.

Quotes from Members

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
 

Pros

"The most beneficial feature in CyberArk Privileged Access Manager is its simple user interface."
"Provides improved security around having your credentials locked down and rotated regularly."
"We know when passwords will be expiring so we can force users to change their passwords, as well as requiring specific password requirements for length, complexity, etc."
"It's user-friendly and very configurable. We can do many things with it, especially with password management."
"PSM (Privilege Session Manager."
"The logs and reporting features are impressive."
"Enterprise Password Vault, Privilege Session Manager, and Application Identity Management have been very useful for our client environment."
"Increased our insight into how privileged accounts are being used and distributed within our footprint."
"One of the most valuable features is the self-service capability. I"
"The most valuable feature is the ability for remote users to change their login credentials using their mobile devices."
"Having multifactor authentication in Windows machines."
"The solution enables agents to reset their passwords."
"Due to ransomware and novel threats, we can no longer allow people to gain domain admin access to our servers with only a username and password. With MFA, they must supply a one-time password sent to them via some authenticator, like Microsoft or Google Authenticator. It could be a text message."
"It's very simple to manage and implement. Its functions are straightforward. You get all the basic features, such as you get the option to unlock the user account if it is locked. You can enforce password policies, and you also have the option to allow them to reset their passwords if they forget it. These were the basic requirements of my company that we could achieve through this product."
"Monitoring is one of the most valuable features for us."
"The solution provides wide options for multifactor authentication."
 

Cons

"I would love them to improve their UI customizing features."
"The session monitoring and recording feature is also a good feature feature, but we're currently experiencing an issue with session monitoring not working correctly. We're working with CyberArk to resolve it. We aren't able to view active sessions or historical recordings of sessions."
"Enhanced PSM support for Java based applications."
"Initially, there was a lot of hiccups, because there were a lot of transitions due to manual installations."
"Areas of CyberArk Privileged Access Manager that can be improved include offering clearer configuration options."
"It's not a cheap application. It's very expensive."
"I'd like it to be a little more granular. I want a little bit more control over exactly what we do. I know if you do that, you add more knobs and dials to deal with, but that's just my personal approach: granular access."
"One thing that could be improved is to create of a better alternative for fixing group policy fees. We currently use Microsoft, but they have introduced new policies that may not be compatible."
"Could be simplified, not user-friendly."
"We need more reports for visualization."
"The worst part is that the solution can only be installed or updated on a device if it is physically connected to the local network."
"There is a lack of specific information provided by the analytics portion of the software."
"They could improve their security of the products to prevent vulnerabilities."
"The registration process could be improved. It should be easier for users to register for the service."
"The price must be reduced."
 

Pricing and Cost Advice

"It's expensive, certainly. But CyberArk is the leader in the market with regards to privileged access management. You pay a lot, but you are paying for the value that is being delivered."
"It is in line with its competitors, but all such solutions cost too much money."
"Before we bought it, they were licensing each function individually, which got complicated and very expensive. When we decided to buy it, it was much more straightforward and still quite expensive, but it brings a lot of value and risk reduction to the organization."
"I haven't seen the numbers. I know it is not cheap, but I don't know what it is. I would rate it a six out of ten in terms of pricing. It is definitely more expensive than the other product, but it also provides more functionality, and it is modular too. So, we pay for the functionality we're actually going to use, and that's nice."
"If you are looking at implementing this solution, buy the training and go to it."
"The solution is very expensive and requires a license. We pay for an enterprise license."
"In comparison to other products on the market, CyberArk is a more costly product."
"The solution is costly but we get what we pay for."
"Using this solution costs us about $1,200 USD per year."
"You purchase the license for one time, and you can use it for a lifetime. The only thing is that in order to get support, you need to upgrade your product to the latest solution. You need to keep a support contract with them for which you have to pay some amount. It's a very small amount for renewing their support contract. Overall, it's very cost-effective."
report
Use our free recommendation engine to learn which Enterprise Password Managers solutions are best for your needs.
881,082 professionals have used our research since 2012.
 

Top Industries

By visitors reading reviews
Financial Services Firm
15%
Manufacturing Company
10%
Computer Software Company
9%
Government
6%
No data available
 

Company Size

By reviewers
Large Enterprise
Midsize Enterprise
Small Business
By reviewers
Company SizeCount
Small Business59
Midsize Enterprise40
Large Enterprise173
By reviewers
Company SizeCount
Small Business5
Midsize Enterprise2
Large Enterprise2
 

Questions from the Community

How does Sailpoint IdentityIQ compare with CyberArk PAM?
We evaluated Sailpoint IdentityIQ before ultimately choosing CyberArk. Sailpoint Identity Platform is a solution to manage risks in cloud enterprise environments. It automates and streamlines the m...
What do you like most about CyberArk Privileged Access Manager?
The most valuable features of the solution are control and analytics.
What is your experience regarding pricing and costs for CyberArk Privileged Access Manager?
My thoughts on the pricing of CyberArk Privileged Access Manager depend entirely on the vendors' requirements. If they want their things to be secure, they have to spend accordingly. We have four t...
What needs improvement with ManageEngine ADSelfService Plus?
The price must be reduced. The cost must depend on the number of nodes.
What is your primary use case for ManageEngine ADSelfService Plus?
We use the solution to reset passwords automatically. It is useful for companies that have many employees.
What advice do you have for others considering ManageEngine ADSelfService Plus?
We can get a certification on the solution. We never had to contact support. It is a simple application. We also use a tool to decrease the number of incidents. I will recommend the tool to others....
 

Also Known As

CyberArk Privileged Access Security, CyberArk Enterprise Password Vault
No data available
 

Overview

 

Sample Customers

Rockwell Automation
TEL U.S. Holdings Inc, Henson Group, CAMH, HPE, HubSpot, Hitachi, IBM, Accenture, Capgemini, Apogee, Symantec
Find out what your peers are saying about CyberArk Privileged Access Manager vs. ManageEngine ADSelfService Plus and other solutions. Updated: December 2025.
881,082 professionals have used our research since 2012.