

CyberArk Privileged Access Manager and One Identity Safeguard are leading solutions in the privileged access management category. CyberArk holds an upper hand with its security features, while One Identity is favored for ease of management capabilities.
Features: CyberArk provides extensive security controls, comprehensive policy management, and customizable integration options. One Identity Safeguard offers easy management of privileged accounts, session monitoring, and user-friendly features.
Room for Improvement: CyberArk can improve its complex configuration process, increase usability, and reduce the expertise required. One Identity needs to enhance its reporting features, frequency of updates, and enrich integration options.
Ease of Deployment and Customer Service: CyberArk's deployment is complex, requiring technical expertise, but offers dependable support. One Identity allows for faster deployment but needs improved customer support for smoother transitions.
Pricing and ROI: CyberArk has a high initial cost but shows considerable long-term ROI. One Identity is more cost-effective upfront, though opinions differ on the long-term value.
The return on investment lies in improved security infrastructure, addressing over-privileged access, and reducing the risk of credential compromise, which is a major source of data breaches.
The end users have the authority to reconcile the password or verify it before using session isolation, which is one of the unique features that can be enabled through Privileged Session Manager, preventing any attacks from happening within the organization when connected with sessions through CyberArk Privileged Access Manager.
CyberArk Privileged Access Manager has helped customers save on costs primarily by reducing the number of engineering and information security personnel.
It has also reduced the time spent on password management, saving our team time in managing privileged accounts, and is helping with automation that reduces manual efforts.
Instead of manually reconstructing activity, everything is already logged and searchable, which has improved response time during internal reviews.
It has reduced inside and external threats, which is essential for preventing privileged user damage, and decreased privileged account incidents by 40%.
CyberArk has been exceptional in coming back to us with immediate responses.
It could be forever until you talk to someone who knows what they are doing.
Based on the issue resolution and support quality, I rate the support 10 out of 10.
Documentation and knowledge base resources are also useful for resolving common issues and understanding product features, making customer support reliable and meeting enterprise expectations.
The customer team is knowledgeable and technically strong, especially when dealing with configuration issues, session monitoring, or password-related queries.
I sometimes need escalations to reach expertise.
The CPM can reportedly handle up to 50,000 accounts independently without issue.
I would rate it a ten out of ten for scalability.
They had 40,000 passwords in this one safe, and it was saving the last ten iterations of each password object. That means they had 400,000 password objects in this safe. They exceeded the limit.
The scalability of One Identity Safeguard is perfect, scoring ten out of ten.
The system can distribute tasks across nodes, improving performance as demand grows.
The platform is designed to support horizontal scaling, so adding capacity is relatively straightforward without redesigning the entire architecture.
Proper fine-tuning and expertise ensure the product performs well.
Overall, the stability of the solution is high.
It has a large customer base and positive feedback within my network.
With proper sizing and high availability configuration, the system handles multiple concurrent sessions efficiently, making it a dependable and stable platform suitable for enterprise environments.
It appears designed as a dependable enterprise-grade solution, reflecting well in its production performance.
I would rate it a nine out of ten for stability.
They want everything to be on the cloud, but even in the SaaS version of CyberArk Privileged Access Manager, they need to deploy some servers on-premises.
We cannot generate a plug-in for web-based applications.
If they want clients to move to the cloud, they need to support them in real-time.
For some configurations on the SPS side, if I need to make changes, such as for DNS servers, I must redeploy the machine.
There are many steps. We are still in the onboarding phase, and it seems very manual.
Another area for improvement could be the threat detection capabilities, like those seen in other PAM vendors.
CyberArk is expensive compared to other products I know.
CyberArk is comparatively expensive compared to other PAM solutions, such as Delinea, especially during renewal.
CyberArk's SaaS solution is particularly expensive.
It is one of those where the more you buy, the cheaper it is.
It is cheaper than CyberArk.
Regarding pricing, it may appear slightly on the higher side initially compared to some alternatives, but when we evaluate it against the security benefits, compliance support, and risk reduction, it proves to be cost-effective in the long run.
CyberArk Privileged Access Manager helps ensure data privacy because we now know who is using which credentials and at what time.
It keeps a record of activities, allowing me to easily fetch screen recordings to detect any misuse and see who did what and what happened.
It can integrate with Splunk, SNMP, and other solutions and technologies.
The auditing and approval mechanisms are features we did not have before and are greatly appreciated.
Automatic credential rotation helps our team by removing the need for manual changes to privileged passwords, reducing the risk of stale or shared credentials and ensuring that every access is controlled and compliant.
The password vault has been a game changer because it provides a secure and controlled way to store, manage, and rotate sensitive credentials without exposing them to users.
| Product | Mindshare (%) |
|---|---|
| CyberArk Privileged Access Manager | 10.4% |
| One Identity Safeguard | 4.4% |
| Other | 85.2% |


| Company Size | Count |
|---|---|
| Small Business | 59 |
| Midsize Enterprise | 42 |
| Large Enterprise | 174 |
| Company Size | Count |
|---|---|
| Small Business | 63 |
| Midsize Enterprise | 25 |
| Large Enterprise | 31 |
CyberArk Privileged Access Manager safeguards privileged accounts through password management, credential rotation, and session recording. With seamless integration and real-time monitoring, it ensures robust security across platforms.
CyberArk Privileged Access Manager is recognized for its extensive capabilities in managing and securing privileged accounts. It offers vital functionalities such as automatic password rotation, real-time session monitoring, and cross-platform integration through APIs and custom connectors. Users find the flexibility in workflows and granular access controls beneficial, particularly in protecting access across cloud and on-prem infrastructures. However, improvements in its interface, installation process, plugin support, and integration with third-party tools are often suggested. Pricing is a concern for many, along with the need for better dashboard reporting, user provisioning, and enhanced documentation. Organizations leverage this tool for encrypting and monitoring critical account activities and automating password management to bolster security.
What are the key features of CyberArk Privileged Access Manager?CyberArk Privileged Access Manager finds substantial use in industries such as finance, healthcare, and technology, where the protection of privileged accounts is critical. These sectors rely on its capabilities to manage application credentials securely and provide safe access for developers, administrators, and vendors across various infrastructures.
One Identity Safeguard manages and monitors privileged access, enhancing security with features like automatic session recording, real-time monitoring, and credential rotation. It integrates seamlessly, supports compliance with audit trails, and improves operational efficiency across organizations. This robust platform significantly bolsters security protocols while controlling sensitive operations.
We monitor all Privileged Access Management (PAM) reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.