Try our new research platform with insights from 80,000+ expert users

CyberArk vs Teleport comparison

 

Comparison Buyer's Guide

Executive SummaryUpdated on Mar 9, 2025

Review summaries and opinions

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
 

Categories and Ranking

CyberArk Privileged Access ...
Ranking in Privileged Access Management (PAM)
1st
Average Rating
8.6
Reviews Sentiment
6.9
Number of Reviews
223
Ranking in other categories
User Activity Monitoring (1st), Enterprise Password Managers (2nd), Mainframe Security (2nd), Operational Technology (OT) Security (3rd)
Teleport
Ranking in Privileged Access Management (PAM)
13th
Average Rating
9.0
Reviews Sentiment
6.4
Number of Reviews
1
Ranking in other categories
Identity and Access Management as a Service (IDaaS) (IAMaaS) (22nd)
 

Mindshare comparison

As of May 2025, in the Privileged Access Management (PAM) category, the mindshare of CyberArk Privileged Access Manager is 18.3%, down from 22.8% compared to the previous year. The mindshare of Teleport is 3.6%, up from 1.4% compared to the previous year. It is calculated based on PeerSpot user engagement data.
Privileged Access Management (PAM)
 

Featured Reviews

Abdul Durrani - PeerSpot reviewer
Enables granular and secure access with just-in-time access and Zero Trust model
CyberArk provides a good amount of control over access types. However, as a future enhancement, having additional features for cross-platform integration would be beneficial. It would be good to have integrations with other tools and firewalls, such as Zscaler and CrowdStrike. Although I am not fully aware of recent updates, more cross-platform integration would be valuable. A SOC analyst would like to have centralized access in terms of information flowing in even for privileged access management. They would like to have control over everything instead of opening four to five tabs for different sorts of information. Cross-platform integration would help with that. Customers also want CyberArk's pricing to be better so that they can implement it further and have more licenses. Implementing a privileged access management solution can be challenging. It would be great if CyberArk could provide recommendations based on the compliance standards of an organization. It would help system admins ensure that all the required ports are closed and the systems are being managed properly. If any system is not being used anymore, any ports opened for that system need to be closed. Having such recommendations would be helpful.
Jyothikumar C - PeerSpot reviewer
Streamlined access management through integration and simplified setup
Teleport has replaced earlier methods like a bastion server or a jump server, which required connecting to physical servers. It integrates well with single sign-on (SSO) and Ansible Playbooks, allowing me to manage inventories easily. Teleport provides a straightforward setup process with a single command line, making it easier to manage the onboarding and offboarding of team members.

Quotes from Members

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
 

Pros

"Password rotation, session recording & isolation and on-demand privileges."
"The most valuable features of CyberArk Privileged Access Manager include quick access, ease of use, and a variety of connection methods beyond the web portal."
"CyberArk has the ability to change the credentials on every platform."
"CyberArk has a lot of modules."
"DVR like video recording and text-based recording for easier audits."
"I would recommend implementing CyberArk Privileged Access Manager as it is the best so far."
"Our most valuable features would probably be key rotation, the SKM or SSH key manager, and account discovery."
"I really like the PTA (Privileged Threat Analytics). I find this the best feature."
"Teleport has replaced earlier methods like a bastion server or a jump server, which required connecting to physical servers."
"I recommend it for its straightforward setup and strong security features."
 

Cons

"What could be improved in CyberArk Privileged Access Manager is the licensing model. It should be more flexible in terms of the users. Currently, it's based on the number of users, but many users only log in once in four months or once in five months. It would be great if the licensing model could be modified based on user needs. We even have users who have not logged in even once."
"I would like to see an easier way to define delegated roles within the administration of the core product."
"My concern and area for improvement revolves around reporting."
"The initial setup could be simplified. Right now, in comparison to its nearest competitors, it's quite complex."
"We have had some performance and stability issues. We have had instances where things weren't as they should be, however, we worked closely with the development support teams once the issues were escalated and managed to find either a resolution or a workaround to stabilize the solution."
"I would like to see a simplification of the product."
"The solution could improve by adding more connectors."
"The tool's UI has bugs and lags. It needs to be improved. The deployment process can be complex due to multiple components for various functionalities, each requiring separate infrastructure management. To simplify this process, consolidating all these components into a single platform could be beneficial. The product's pricing could be cheaper."
"I cannot download or share session recordings directly with others, which would be useful for documentation or reviews."
"I cannot download or share session recordings directly with others, which would be useful for documentation or reviews."
 

Pricing and Cost Advice

"The price of the solution is reasonable."
"The product’s pricing is feasible for enterprise customers. The pricing is expensive for smaller businesses. You need to pay additional costs for service implementation and local support."
"The price of CyberArk Privileged Access Manager could be less expensive."
"Pricing is quite high and it could be improved."
"Compared to other solutions, it is costly."
"I haven't seen the numbers. I know it is not cheap, but I don't know what it is. I would rate it a six out of ten in terms of pricing. It is definitely more expensive than the other product, but it also provides more functionality, and it is modular too. So, we pay for the functionality we're actually going to use, and that's nice."
"It is in line with its competitors, but all such solutions cost too much money."
"The price of this solution is quite reasonable."
Information not available
report
Use our free recommendation engine to learn which Privileged Access Management (PAM) solutions are best for your needs.
851,604 professionals have used our research since 2012.
 

Top Industries

By visitors reading reviews
Educational Organization
33%
Financial Services Firm
12%
Computer Software Company
11%
Manufacturing Company
6%
Computer Software Company
19%
Financial Services Firm
13%
Comms Service Provider
11%
University
7%
 

Company Size

By reviewers
Large Enterprise
Midsize Enterprise
Small Business
No data available
 

Questions from the Community

How does Sailpoint IdentityIQ compare with CyberArk PAM?
We evaluated Sailpoint IdentityIQ before ultimately choosing CyberArk. Sailpoint Identity Platform is a solution to manage risks in cloud enterprise environments. It automates and streamlines the m...
What do you like most about CyberArk Privileged Access Manager?
The most valuable features of the solution are control and analytics.
What is your experience regarding pricing and costs for CyberArk Privileged Access Manager?
With the current model of licensing, for my use cases, sometimes it's hard to convince the management and get budget approvals for it. It's expensive and you're not getting anything new. It's just ...
What needs improvement with Teleport?
I cannot download or share session recordings directly with others, which would be useful for documentation or reviews. Additionally, while the backend worker can be upgraded, there is a limitation...
What is your primary use case for Teleport?
I use Teleport to replace the normal authentication mechanism as part of a zero-trust architecture. It is particularly useful because, in a remote environment, I cannot trust any devices. I can sha...
What advice do you have for others considering Teleport?
I rate Teleport nine out of ten. Security-wise, it is very secure and easy to use for remote access. I recommend it for its straightforward setup and strong security features.
 

Also Known As

CyberArk Privileged Access Security, CyberArk Enterprise Password Vault
No data available
 

Overview

 

Sample Customers

Rockwell Automation
Information Not Available
Find out what your peers are saying about CyberArk, Delinea, One Identity and others in Privileged Access Management (PAM). Updated: May 2025.
851,604 professionals have used our research since 2012.