No more typing reviews! Try our Samantha, our new voice AI agent.

CyberArk Privileged Access Manager vs One Identity Privileged Access Suite for Unix comparison

 

Comparison Buyer's Guide

Executive SummaryUpdated on Oct 6, 2024

Review summaries and opinions

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
 

Categories and Ranking

CyberArk Privileged Access ...
Ranking in Privileged Access Management (PAM)
1st
Average Rating
8.6
Reviews Sentiment
6.8
Number of Reviews
230
Ranking in other categories
User Activity Monitoring (1st), Enterprise Password Managers (3rd), Mainframe Security (1st), Operational Technology (OT) Security (3rd)
One Identity Privileged Acc...
Ranking in Privileged Access Management (PAM)
33rd
Average Rating
7.6
Number of Reviews
3
Ranking in other categories
No ranking in other categories
 

Mindshare comparison

As of May 2026, in the Privileged Access Management (PAM) category, the mindshare of CyberArk Privileged Access Manager is 10.4%, down from 18.5% compared to the previous year. The mindshare of One Identity Privileged Access Suite for Unix is 1.0%, up from 0.4% compared to the previous year. It is calculated based on PeerSpot user engagement data.
Privileged Access Management (PAM) Mindshare Distribution
ProductMindshare (%)
CyberArk Privileged Access Manager10.4%
One Identity Privileged Access Suite for Unix1.0%
Other88.6%
Privileged Access Management (PAM)
 

Featured Reviews

Atul-Gujar - PeerSpot reviewer
CyberArk manager at a comms service provider with 10,001+ employees
Secures critical infrastructures with essential user session audit records
A potential area for improvement is enhancing support for cluster environments and distributed Vaults. Clients in multiple countries that need central access have different challenges that require better solutions from CyberArk. For financial services, CyberArk can improve incident response by ensuring fast support for critical priority tickets to meet compliance requirements. Providing more documentation on CyberArk is recommended for new team members to enhance their troubleshooting capabilities. I understand it's up to the client, but 99% fail to change the demo key, so it's crucial for CyberArk to emphasize changing the key and documenting it as part of the installation process.
Hicham Barnoussi - PeerSpot reviewer
Managing Partner at Smpl ID
A reliable solution with great password and session management
The setup process depends on the environment of the customer. It's not dependent on the solution. For customers with normal use cases and scenarios, it's a straightforward implementation, but for a customer with more than one environment, they may have BeyondTrust in one environment and Safeguard in another one. When they want to consolidate later, there may be complications. It depends on the devices and assets they would like to have under their PAM solution. The standard time for implementation is four weeks. I rate the setup an eight out of ten. There needs to be a dedicated resource for maintenance.

Quotes from Members

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
 

Pros

"All the high privileged accounts are managed by CyberArk at a regular frequency."
"The session recording and monitoring capabilities are valuable. We have real-time session management ability to record, audit, and monitor any privileged user activities. That is a big deal."
"It improves security in our company. We have more than 10,000 accounts that we manage in CyberArk. We use these accounts for SQLs, Windows Server, and Unix. Therefore, keeping these passwords up-to-date in another solution or software would be impossible. Now, we have some sort of a platform to manage passwords, distribute the inflow, and manage IT teams as well as making regular changes to it according to the internal security policies in our bank."
"CyberArk PAS is our go-to solution for securing against the pass the hash attack vector and auditing privileged account usage."
"The support is always very responsive, accurate, and complete in their solutions."
"The tech support is amazing."
"CyberArk Privileged Access Manager has several valuable features; the basic feature is privileged access management with all the processes and procedures that are needed, and it does everything that is needed to provide a PAM project or program."
"The solution is stable and reliable."
"The most valuable feature of this solution is that it is easy to use."
"The most valuable features are session and password management."
"Privileged Access Suite's best feature is it's straightforward to use."
"The technical support for this solution is very good."
"Privileged Access Suite's best feature is it's straightforward to use."
"Safeguard is a mature solution and is implemented by a large number of customers."
 

Cons

"The product is complex and requires extensive configuration."
"The initial setup can get complex."
"I would like easier integrations for creating an online dashboard that executives would look at or are able to run reports from the tool."
"Performance of PIM could be better and intended for usability as well as security."
"The solution could improve by adding more connectors."
"The solution that they proposed was not straightforward because of the backend processes of CyberArk."
"I believe account discovery and rolling support need to be improved."
"We would like to have more flexibility in the RBAC model and have more options to define who should have access to what, not only based on safe membership."
"There is a new trend of not having any privileged users or accounts."
"Product management should be improved."
"Privileged Access Suite's interface could be better."
"Privileged Access Suite's interface could be better."
"Product management should be improved."
"I rate the technical support a six out of ten. The technical support of One Identity depends on the case; if it is product-related, it takes quite a while, and they have to go back to the product management team."
 

Pricing and Cost Advice

"Payments have to be made on a yearly basis toward the licensing costs of the solution."
"Network and security licenses are currently being managed by other outsource vendors, so they are facing some type of problems in the digital aspect."
"The price of the solution is reasonable."
"I believe that this solution is priced well. It's the market leader and I think that it's the best solution."
"My company always complains about the cost of CyberArk Privileged Access Manager because it's too high."
"If you want a Ferrari, it will cost you. The solution is really nice, so it costs the client, but in the long run, it is very good. If you buy a solution that costs a lot to maintain because it is not stable, and you are frequently asking for consultant support, it costs more."
"The pricing for CyberArk Privileged Access Manager is quite expensive, and the pricing varies from region to region. In APAC, CyberArk Privileged Access Manager can be obtained for less than in North America, according to my understanding."
"The solution is cost-effective for the features."
Information not available
report
Use our free recommendation engine to learn which Privileged Access Management (PAM) solutions are best for your needs.
893,164 professionals have used our research since 2012.
 

Top Industries

By visitors reading reviews
Financial Services Firm
13%
Manufacturing Company
11%
Computer Software Company
7%
Comms Service Provider
6%
No data available
 

Company Size

By reviewers
Large Enterprise
Midsize Enterprise
Small Business
By reviewers
Company SizeCount
Small Business59
Midsize Enterprise42
Large Enterprise174
No data available
 

Questions from the Community

How does Sailpoint IdentityIQ compare with CyberArk PAM?
We evaluated Sailpoint IdentityIQ before ultimately choosing CyberArk. Sailpoint Identity Platform is a solution to manage risks in cloud enterprise environments. It automates and streamlines the m...
What do you like most about CyberArk Privileged Access Manager?
The most valuable features of the solution are control and analytics.
What is your experience regarding pricing and costs for CyberArk Privileged Access Manager?
My thoughts on the pricing of CyberArk Privileged Access Manager depend entirely on the vendors' requirements. If they want their things to be secure, they have to spend accordingly. We have four t...
Ask a question
Earn 20 points
 

Also Known As

CyberArk Privileged Access Security, CyberArk Enterprise Password Vault
No data available
 

Overview

 

Sample Customers

Rockwell Automation
University of East Anglia, nForce Secure, dunnhumby
Find out what your peers are saying about CyberArk Privileged Access Manager vs. One Identity Privileged Access Suite for Unix and other solutions. Updated: April 2026.
893,164 professionals have used our research since 2012.