

Find out what your peers are saying about CyberArk, One Identity, Okta and others in Privileged Access Management (PAM).
| Product | Mindshare (%) |
|---|---|
| CyberArk Privileged Access Manager | 10.4% |
| Delinea Secret Server | 4.5% |
| One Identity Safeguard | 4.4% |
| Other | 80.7% |
| Product | Mindshare (%) |
|---|---|
| RSA Identity Governance and Lifecycle | 1.1% |
| SailPoint Identity Security Cloud | 10.0% |
| Microsoft Entra ID | 6.9% |
| Other | 82.0% |


| Company Size | Count |
|---|---|
| Small Business | 59 |
| Midsize Enterprise | 42 |
| Large Enterprise | 174 |
| Company Size | Count |
|---|---|
| Small Business | 2 |
| Midsize Enterprise | 2 |
| Large Enterprise | 6 |
CyberArk Privileged Access Manager safeguards privileged accounts through password management, credential rotation, and session recording. With seamless integration and real-time monitoring, it ensures robust security across platforms.
CyberArk Privileged Access Manager is recognized for its extensive capabilities in managing and securing privileged accounts. It offers vital functionalities such as automatic password rotation, real-time session monitoring, and cross-platform integration through APIs and custom connectors. Users find the flexibility in workflows and granular access controls beneficial, particularly in protecting access across cloud and on-prem infrastructures. However, improvements in its interface, installation process, plugin support, and integration with third-party tools are often suggested. Pricing is a concern for many, along with the need for better dashboard reporting, user provisioning, and enhanced documentation. Organizations leverage this tool for encrypting and monitoring critical account activities and automating password management to bolster security.
What are the key features of CyberArk Privileged Access Manager?CyberArk Privileged Access Manager finds substantial use in industries such as finance, healthcare, and technology, where the protection of privileged accounts is critical. These sectors rely on its capabilities to manage application credentials securely and provide safe access for developers, administrators, and vendors across various infrastructures.
RSA Identity Governance and Lifecycle aids efficient identity management, offering synchronization with Active Directory for seamless setups and enhancing security with two-factor authentication.
RSA Identity Governance and Lifecycle streamlines identity management from initiation to off-boarding, focusing on role-based access control and application integration. Despite requiring on-premise deployment, it provides advanced policy features for segregation of duties and access management. Performance issues arise with large file sizes, and there is limited integration with some third-party applications. Users benefit from custom forms, workflows, and an intuitive portal that eases the user's experience. While improvements are needed in database integration and multi-tenant capabilities, the solution remains popular for its auditing and certification support.
What are the key features of RSA Identity Governance and Lifecycle?RSA Identity Governance and Lifecycle is utilized in sectors managing digital identities, with deployment options on AWS, either on the cloud or on-premise. It assists organizations in handling joiner, mover, and leaver processes, adapting to business-specific needs while adding authentication layers to network access.
We monitor all Privileged Access Management (PAM) reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.