

CyberArk Privileged Access Manager and One Identity Privileged Access Suite for Unix are leaders in privileged access management. Based on user reviews, CyberArk excels in support and pricing satisfaction, while One Identity is favored for its advanced features and integration.
Features: CyberArk offers comprehensive security and policy management, focusing heavily on support and pricing satisfaction. One Identity provides advanced features, significant scalability, and notable integration capabilities, which makes it adaptable across diverse environments.
Room for Improvement: CyberArk can enhance its reporting tools, customization options, and analytics. One Identity requires better documentation, improved performance speed, and advancements in support quality.
Ease of Deployment and Customer Service: CyberArk's deployment process can be time-consuming but is balanced by strong customer service. One Identity allows for smoother deployment yet experiences mixed reviews in customer support.
Pricing and ROI: CyberArk is known for its favorable pricing model, offering strong ROI. One Identity's premium pricing provides substantial ROI, particularly for its advanced features, justifying the higher initial costs.
| Product | Mindshare (%) |
|---|---|
| CyberArk Privileged Access Manager | 10.4% |
| One Identity Privileged Access Suite for Unix | 1.0% |
| Other | 88.6% |


| Company Size | Count |
|---|---|
| Small Business | 59 |
| Midsize Enterprise | 42 |
| Large Enterprise | 174 |
CyberArk Privileged Access Manager safeguards privileged accounts through password management, credential rotation, and session recording. With seamless integration and real-time monitoring, it ensures robust security across platforms.
CyberArk Privileged Access Manager is recognized for its extensive capabilities in managing and securing privileged accounts. It offers vital functionalities such as automatic password rotation, real-time session monitoring, and cross-platform integration through APIs and custom connectors. Users find the flexibility in workflows and granular access controls beneficial, particularly in protecting access across cloud and on-prem infrastructures. However, improvements in its interface, installation process, plugin support, and integration with third-party tools are often suggested. Pricing is a concern for many, along with the need for better dashboard reporting, user provisioning, and enhanced documentation. Organizations leverage this tool for encrypting and monitoring critical account activities and automating password management to bolster security.
What are the key features of CyberArk Privileged Access Manager?CyberArk Privileged Access Manager finds substantial use in industries such as finance, healthcare, and technology, where the protection of privileged accounts is critical. These sectors rely on its capabilities to manage application credentials securely and provide safe access for developers, administrators, and vendors across various infrastructures.
One Identity Privileged Access Suite for Unix enhances security and compliance by centralizing privileged access management across Unix and Linux environments. It streamlines identity governance while securing critical systems from potential misuse or breaches.
One Identity Privileged Access Suite for Unix addresses the complexities of managing Unix and Linux systems. It offers centralized access and management of multiple identities, ensuring that only authorized users can access mission-critical systems. The suite integrates seamlessly with existing infrastructure, providing efficient administration and robust security measures. By enforcing role-based access controls and offering deep audit capabilities, it helps maintain both compliance and operational efficiency. The suite also allows automated provisioning and management of user rights.
What are the key features?This suite is implemented in sectors like finance, healthcare, and government where controlling privileged access and maintaining compliance is critical. It helps these industries mitigate risks related to unauthorized access and data breaches, ensuring secure operations and compliance adherence.
We monitor all Privileged Access Management (PAM) reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.