No more typing reviews! Try our Samantha, our new voice AI agent.

CyberArk Privileged Access Manager vs OpenText Privileged Access Manager comparison

 

Comparison Buyer's Guide

Executive SummaryUpdated on Mar 29, 2026

Review summaries and opinions

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
 

Categories and Ranking

CyberArk Privileged Access ...
Ranking in Privileged Access Management (PAM)
1st
Average Rating
8.6
Reviews Sentiment
6.8
Number of Reviews
230
Ranking in other categories
User Activity Monitoring (1st), Enterprise Password Managers (3rd), Mainframe Security (1st), Operational Technology (OT) Security (3rd)
OpenText Privileged Access ...
Ranking in Privileged Access Management (PAM)
34th
Average Rating
6.0
Number of Reviews
1
Ranking in other categories
No ranking in other categories
 

Mindshare comparison

As of May 2026, in the Privileged Access Management (PAM) category, the mindshare of CyberArk Privileged Access Manager is 10.4%, down from 18.5% compared to the previous year. The mindshare of OpenText Privileged Access Manager is 1.1%, up from 0.4% compared to the previous year. It is calculated based on PeerSpot user engagement data.
Privileged Access Management (PAM) Mindshare Distribution
ProductMindshare (%)
CyberArk Privileged Access Manager10.4%
OpenText Privileged Access Manager1.1%
Other88.5%
Privileged Access Management (PAM)
 

Featured Reviews

Atul-Gujar - PeerSpot reviewer
CyberArk manager at a comms service provider with 10,001+ employees
Secures critical infrastructures with essential user session audit records
A potential area for improvement is enhancing support for cluster environments and distributed Vaults. Clients in multiple countries that need central access have different challenges that require better solutions from CyberArk. For financial services, CyberArk can improve incident response by ensuring fast support for critical priority tickets to meet compliance requirements. Providing more documentation on CyberArk is recommended for new team members to enhance their troubleshooting capabilities. I understand it's up to the client, but 99% fail to change the demo key, so it's crucial for CyberArk to emphasize changing the key and documenting it as part of the installation process.
MB
Solutions Architect at IP Protocol INC
Has a useful credential vault feature but the user interface needs to be improved
I don't have a complete picture to be able to tell you that this is the best product. Because each customer in their own environment has a different set of circumstances and different situations that mandate different technologies. I cannot recommend this as the best product or recommend that you should use it. I would rate this product a six out of 10.

Quotes from Members

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
 

Pros

"If your business/organization has crown-jewel data, this is the tool to use."
"CyberArk PAM gives us a single pane of glass to manage and secure identities across multiple environments."
"The fact that I can put my vault here in a central location on one net for example, and I'll have a CPM in California, a CPM in Texas, a CPM in New York, a CPM in Florida, and actually be able to grow with my company and not necessarily have to continue to grow my vault until I get to a certain number accounts - yet I can still manage everything across the country, if not the world - I love that. I love the flexibility and the capability of being able to pull those components out."
"CyberArk has the most extensive hardening and encryption techniques I have seen in a product, with equal intentions."
"It makes compliance of the organization with password management easy, resulting in a handy auditing process and adherence to all risk compliance as well."
"All the high privileged accounts are managed by CyberArk at a regular frequency."
"The most valuable feature of this product is the Central Policy Manager, as from the operation and security point of view a robot that can connect to destination machines, change passwords at fixed times, and put them in the vault, like a person, is the best that you can ask for because it combines more functionality in a single product and solves a lot of problems, from security to compliance."
"You can see the benefits of CyberArk Privileged Access Manager immediately."
"Technical support is very good."
"Most valuable feature is the credential vault."
 

Cons

"The solution is stable, but some features in BeyondTrust are unavailable in CyberArk Privileged Access Manager."
"Improvements in CyberArk Privileged Access Manager should focus on simplifying installation and upgrade times, and also consider making professional services training more accessible to implementers and partners."
"Having a cloud version would be very helpful. You have to invest a lot of money for the infrastructure hardware so the cloud version would help."
"There is a little bit of confusion in the implementation part, especially when one tries to understand the actual working of the product."
"In terms of mean time to respond, I acknowledge variable response time. The L1 team is proactive, yet the vendor often pushes to close incidents swiftly, even when issues remain unresolved."
"Perhaps improve the user registry integration. It is already fine, but a bit atypical."
"The pricing is too expensive and should be reduced."
"Sometimes they didn't always offer, for the less critical issues perhaps, a quick, easy, how-to-implement-it solution."
"The user interface could be improved, it's not that good,"
"Micro Focus needs a lot of enhancements. Actually, it's a good product, but it's not the best product."
 

Pricing and Cost Advice

"Before we bought it, they were licensing each function individually, which got complicated and very expensive. When we decided to buy it, it was much more straightforward and still quite expensive, but it brings a lot of value and risk reduction to the organization."
"The license CyberArk Privileged Access Manager is on an annual basis."
"I would rate CyberArk's pricing a nine out of ten, with one being cheap and ten being expensive. It's one of the most expensive solutions in the market, but it's worth it."
"I rate the tool's pricing an eight out of ten."
"They have two types of licensing: purchase and subscription. You have to pay for each admin user, such as Microsoft admin, mail admin, database admin, etc."
"It can be an expensive product."
"If you are looking at implementing this solution, buy the training and go to it."
"It's not a cheap application. It's very expensive."
Information not available
report
Use our free recommendation engine to learn which Privileged Access Management (PAM) solutions are best for your needs.
893,244 professionals have used our research since 2012.
 

Top Industries

By visitors reading reviews
Financial Services Firm
13%
Manufacturing Company
11%
Computer Software Company
7%
Comms Service Provider
6%
No data available
 

Company Size

By reviewers
Large Enterprise
Midsize Enterprise
Small Business
By reviewers
Company SizeCount
Small Business59
Midsize Enterprise42
Large Enterprise174
No data available
 

Questions from the Community

How does Sailpoint IdentityIQ compare with CyberArk PAM?
We evaluated Sailpoint IdentityIQ before ultimately choosing CyberArk. Sailpoint Identity Platform is a solution to manage risks in cloud enterprise environments. It automates and streamlines the m...
What do you like most about CyberArk Privileged Access Manager?
The most valuable features of the solution are control and analytics.
What is your experience regarding pricing and costs for CyberArk Privileged Access Manager?
My thoughts on the pricing of CyberArk Privileged Access Manager depend entirely on the vendors' requirements. If they want their things to be secure, they have to spend accordingly. We have four t...
Looking for recommendations and a pros/cons template for software to detect insider threats
This is an inside-out --- outside-in --- inside-in question, as an insider can be an outsider as well. There is no short answer other than a blend of a PAM tool with Behavioral Analytics and Endpo...
 

Also Known As

CyberArk Privileged Access Security, CyberArk Enterprise Password Vault
Micro Focus Privileged Account Manager
 

Overview

 

Sample Customers

Rockwell Automation
Information Not Available
Find out what your peers are saying about CyberArk, One Identity, Okta and others in Privileged Access Management (PAM). Updated: April 2026.
893,244 professionals have used our research since 2012.