Try our new research platform with insights from 80,000+ expert users

CyberArk Privileged Access Manager vs Silverfort comparison

 

Comparison Buyer's Guide

Executive Summary

Review summaries and opinions

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
 

Categories and Ranking

CyberArk Privileged Access ...
Ranking in Privileged Access Management (PAM)
1st
Average Rating
8.6
Reviews Sentiment
6.8
Number of Reviews
229
Ranking in other categories
User Activity Monitoring (1st), Enterprise Password Managers (3rd), Mainframe Security (2nd), Operational Technology (OT) Security (3rd)
Silverfort
Ranking in Privileged Access Management (PAM)
26th
Average Rating
0.0
Reviews Sentiment
8.9
Number of Reviews
1
Ranking in other categories
Authentication Systems (23rd), Identity and Access Management as a Service (IDaaS) (IAMaaS) (30th), Identity Threat Detection and Response (ITDR) (13th), Multi-Factor Authentication (MFA) (7th), Non-Human Identity Management (NHIM) (12th), Identity Security and Posture Management (ISPM) (4th)
 

Mindshare comparison

As of January 2026, in the Privileged Access Management (PAM) category, the mindshare of CyberArk Privileged Access Manager is 11.6%, down from 20.0% compared to the previous year. The mindshare of Silverfort is 1.6%, up from 1.1% compared to the previous year. It is calculated based on PeerSpot user engagement data.
Privileged Access Management (PAM) Market Share Distribution
ProductMarket Share (%)
CyberArk Privileged Access Manager11.6%
Silverfort1.6%
Other86.8%
Privileged Access Management (PAM)
 

Featured Reviews

SI
Senior PAM Consultant at iC Consult GmbH
Makes privileged access management easy with automation and granular control
Many people underestimate the value of these tools because they treat them as simple automated password management. Once you realize the volume of passwords in your organization and factor in nonhuman passwords, you realize its value. Last year, CyberArk Impact cited 45 nonhuman passwords for every human password. If you have 10,000 employees, you can imagine the number of passwords. There are also many other operations. For example, you have a Qualys scanner that needs to reach out and touch all your endpoints and scan them for vulnerabilities. They use an API call to CyberArk to pull out a Privileged credential that allows them to log in to that target. This is an automated machine call. It is tapping into CyberArk to get that credential. There can be hundreds of thousands of those operations a day. You do not want to manage those passwords by hand. Some people marginalize the significance of such a solution by saying that it is just a fancy password changer. It goes well beyond that, especially with API calls and automation. Its importance extends beyond merely changing passwords; it involves automation, API calls, and process integration, crucial in agile environments for standing up new Amazon servers or other processes needing privileged credentials. CyberArk can automate these tasks into their build processes. Another critical feature is the proxy service via Privileged Session Manager (PSM), providing not only a proxy between your user and the target servers, protecting against malware but also offering session recording. Many companies I have worked with implemented a PAM product as a knee-jerk reaction to SOX audit requirements. They discovered they needed session recording and retention for regulatory compliance. This has become a major factor for clients instituting CyberArk, so PSM is a big deal in addition to regular password rotation.
reviewer2342856 - PeerSpot reviewer
Senior Solutions Specialist at a computer software company with 5,001-10,000 employees
Positive feedback highlights lightweight design and compatibility while suggesting more AI integration
Silverfort helps identify blind spots in your identity and access management, covering areas that traditional systems don't, such as command line tools. It checks your Active Directory authentication and continues only if the check is okay, plus it works with older protocols such as NTLM, which is a significant advantage. It's complementary to other tools you may have, whether they are TAM solutions such as Delinea or Xerox. Silverfort also has a lightweight adapter for domain controllers, and it finds gaps in security. Its capabilities are expanding regularly, with new features voted on every few months. For companies with large Active Directory implementations and zero staff, Silverfort provides instant results in identifying risks and blind spots. It also includes built-in virtual features, and while I don't know the exact pricing, it's not expensively priced, making it an attractive option.

Quotes from Members

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
 

Pros

"Our privileged accounts are now stored in a more secure location and lateral movement within the network have been lessened."
"What I appreciate about CyberArk Privileged Access Manager is that it is not only for password security; we can also manage their applications and platforms, and whenever a user logs in, end-to-end protection is handled, including monitoring user activity through PSM servers and reacting to threats with Privileged Threat Analysis."
"It has a lot of good tools, including everything we need."
"I would rate this solution a nine out of ten."
"For a while, there were individual IDs having privileged access. We wanted to restrict that. We implemented the solution so that it can be more of internal control. We can have session recordings happening and reduce our attacks."
"Lessens the risk with privileged access."
"It is a single tool that isolates possible kinds of malware. You get lateral movement blocking and auditing information, e.g., you know who is doing what. You are getting protections from the service as well as a useful environment. All your admins can easily go in and out of your company while accessing your servers in a secure way, even if they are working abroad."
"We are able to rotate credentials and have privileged account access."
"Silverfort helps identify blind spots in your identity and access management, covering areas that traditional systems don't, such as command line tools."
 

Cons

"They are sometimes not flexible with things. For instance, from one day to another, there might be something that had been done years ago by CyberArk, then they say, "We do not support that." You then have to initiate a complaint and start working with them. Things might become complicated and months pass while you are working with them. Usually, they are good and fast, but sometimes they seem to be blocked with problems, e.g., you will suddenly be working with another team instead of the team that you were working with the day before."
"Report creation could be improved. The policies could be more customized."
"The documentation is rather basic and it is missing many use cases."
"I'd like to see a more expansive SSH tunneling situation through PSMP. Right now you have an account that exists in the vault and you say, "I want to create a tunnel using this account." I'd like to see something that is not account-based where I could say, "I want to create a tunnel to this machine over here," and then authenticate through the PSMP and then your tunnel is set up. You wouldn't need to then authenticate to a machine."
"I would like to see more integration with more tools, for more APIs."
"I would prefer that this is a fully-managed service, rather than have to manage the software ourselves and keep it up to date."
"The reporting should be improved. There should be more customization."
"There is some stuff that we still have not fully integrated, which is our AIM solution. We are having all types of issues with it. I have been working with Level 3 support on it, but otherwise, from a functionality perspective, everything has been working except for the AIM solution."
"If Silverfort could integrate a gentle type of AI similar to Microsoft Copilot or enable workflow creation similar to Salesforce, it would further improve user navigation, even though the platform is already simple."
 

Pricing and Cost Advice

"CyberArk is very expensive and there are additional fees for add-ons."
"The product’s pricing is feasible for enterprise customers. The pricing is expensive for smaller businesses. You need to pay additional costs for service implementation and local support."
"The solution is available at a high price"
"The main problem for the tool is its licensing. I work for a really big company. When you try to develop this as a service, usually you work with leverage teams who are formed with dozens of members. You might dedicate one FTE, or less, for something, e.g., an antivirus administrator. You might have half an FTE's effort dedicated to administering the antivirus, but then you have a team of about 30 users who might access that ticket. The problem is that CyberArk eliminated the possibility of concurrent users years ago. This is a big problem for companies who work with leverage teams. You need to pay for everyone. 40 licenses are used by 20 or 30 people. This is a big problem because licenses are not precisely cheap."
"The license CyberArk Privileged Access Manager is on an annual basis."
"I would rate the tool’s pricing a six out of ten."
"CyberArk has been Gartner's number-one pick for the past ten years, so you can infer that their pricing is higher than everyone else. When you are the best, you will charge appropriately for it."
"The price of this solution is quite reasonable."
Information not available
report
Use our free recommendation engine to learn which Privileged Access Management (PAM) solutions are best for your needs.
881,082 professionals have used our research since 2012.
 

Top Industries

By visitors reading reviews
Financial Services Firm
15%
Manufacturing Company
10%
Computer Software Company
9%
Government
6%
Financial Services Firm
16%
Computer Software Company
11%
Manufacturing Company
9%
Retailer
9%
 

Company Size

By reviewers
Large Enterprise
Midsize Enterprise
Small Business
By reviewers
Company SizeCount
Small Business59
Midsize Enterprise40
Large Enterprise173
No data available
 

Questions from the Community

How does Sailpoint IdentityIQ compare with CyberArk PAM?
We evaluated Sailpoint IdentityIQ before ultimately choosing CyberArk. Sailpoint Identity Platform is a solution to manage risks in cloud enterprise environments. It automates and streamlines the m...
What do you like most about CyberArk Privileged Access Manager?
The most valuable features of the solution are control and analytics.
What is your experience regarding pricing and costs for CyberArk Privileged Access Manager?
My thoughts on the pricing of CyberArk Privileged Access Manager depend entirely on the vendors' requirements. If they want their things to be secure, they have to spend accordingly. We have four t...
What needs improvement with Silverfort?
I think Silverfort is actually a really good product. I might suggest adding more AI to it, which I believe could enhance its functionality. If Silverfort could integrate a gentle type of AI simila...
What is your primary use case for Silverfort?
I'm calling from PeerSpot, and we're resellers in the identity space, offering products such as Savient, SailPoint, CyberArk, and Silverfort. We are resellers, and I work in presale, focusing on fi...
What advice do you have for others considering Silverfort?
I prefer to remain anonymous. Please don't use my name; just label it as anonymous. I would prefer both my name and the company name to be kept anonymous. If you could just put identity presales sp...
 

Also Known As

CyberArk Privileged Access Security, CyberArk Enterprise Password Vault
No data available
 

Overview

 

Sample Customers

Rockwell Automation
Singtel, Egan, Agilisys, Reliance Worldwide Corporation, Indosat, ZOL Hospital
Find out what your peers are saying about CyberArk, One Identity, Delinea and others in Privileged Access Management (PAM). Updated: January 2026.
881,082 professionals have used our research since 2012.