No more typing reviews! Try our Samantha, our new voice AI agent.

CyberArk vs Teleport comparison

 

Comparison Buyer's Guide

Executive SummaryUpdated on Mar 29, 2026

Review summaries and opinions

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
 

Categories and Ranking

CyberArk Privileged Access ...
Ranking in Privileged Access Management (PAM)
1st
Average Rating
8.6
Reviews Sentiment
6.8
Number of Reviews
230
Ranking in other categories
User Activity Monitoring (1st), Enterprise Password Managers (3rd), Mainframe Security (1st), Operational Technology (OT) Security (3rd)
Teleport
Ranking in Privileged Access Management (PAM)
6th
Average Rating
8.4
Reviews Sentiment
5.4
Number of Reviews
8
Ranking in other categories
Identity and Access Management as a Service (IDaaS) (IAMaaS) (13th), Identity Security and Posture Management (ISPM) (2nd)
 

Mindshare comparison

As of May 2026, in the Privileged Access Management (PAM) category, the mindshare of CyberArk Privileged Access Manager is 10.4%, down from 18.5% compared to the previous year. The mindshare of Teleport is 3.2%, down from 3.7% compared to the previous year. It is calculated based on PeerSpot user engagement data.
Privileged Access Management (PAM) Mindshare Distribution
ProductMindshare (%)
CyberArk Privileged Access Manager10.4%
Teleport3.2%
Other86.4%
Privileged Access Management (PAM)
 

Featured Reviews

Atul-Gujar - PeerSpot reviewer
CyberArk manager at a comms service provider with 10,001+ employees
Secures critical infrastructures with essential user session audit records
A potential area for improvement is enhancing support for cluster environments and distributed Vaults. Clients in multiple countries that need central access have different challenges that require better solutions from CyberArk. For financial services, CyberArk can improve incident response by ensuring fast support for critical priority tickets to meet compliance requirements. Providing more documentation on CyberArk is recommended for new team members to enhance their troubleshooting capabilities. I understand it's up to the client, but 99% fail to change the demo key, so it's crucial for CyberArk to emphasize changing the key and documenting it as part of the installation process.
Yess Kumar - PeerSpot reviewer
SRE at a tech vendor with 5,001-10,000 employees
Centralized access has strengthened security and simplified day-to-day infrastructure operations
Teleport has been a solid and secure access management solution, but there are a few areas that could be improved, particularly around the initial setup and RBAC configuration. Beyond onboarding and RBAC complexity, there are areas that could be enhanced from an integration perspective. While SSO integration works well, deeper out-of-the-box integrations with SIEM and monitoring tools would be beneficial.

Quotes from Members

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
 

Pros

"I find value in notifications from CyberArk when passwords fail verification and have other issues."
"What I found most valuable in CyberArk Privileged Access Manager is the Session Manager as it allows you to split the connection between the administrator site and the target site. I also found the Password Manager valuable as it lets you rotate the passwords of privileged users."
"If properly set up, CyberArk Enterprise Password Vault has good stability, and is a very solid tool. It can run by itself. Its most valuable features are auto password recycling and PSM."
"The most important feature is managing the credentials and implementing those policies which rotate the credentials. Session Manager is also key in not letting the users have access to those credentials. Instead, CyberArk actually manages everything by itself."
"CyberArk is a solution to problems being faced by multiple companies and organizations, as it removes security threats and vulnerabilities from an organization in a secure way, and your credentials are handled in a secure way, so it solves this pain area in a company, and that is why I think they are one of the top tools."
"CyberArk has resulted in a massive increase in our security footprint."
"I find the threat analytics is an important feature, as CyberArk can look at the log details and analyze who is using the applications, which are their locations, and which are the IP locations from which they are accessing, enabling the solution to find the exact location the threat is emanating from, which we really value."
"The credentials management capability is key to ensuring that the credentials are kept secure and that access to them is done on a temporary and event-driven basis."
"Teleport definitely reduced the risks; we are no longer exposing root-level accounts for people that are meant to have an elevated account."
"Teleport changed our workflow by centralizing access control and reducing manual SSH key management."
"Teleport has helped us minimize incidents and maintain our uplinking time and uptime, and our organization's uptime is 99.90%, which is almost 100%."
"Teleport has positively impacted my organization by being very helpful for productivity and team collaboration, especially since the old tool we used took a lot of time to get approvals."
"I would definitely advise others looking into using Teleport to try it out if they are seeking a tunneling or proxying solution to streamline obtaining access without dealing with DNS or SSH, as it is straightforward to install, can be tested in various environments, and is a truly exceptional product that is easy to use."
"I recommend it for its straightforward setup and strong security features."
"Regarding how Teleport has positively impacted my organization, I have learned a lot of things through it, I understand how to deliver and receive content, and I have learned many things related to RF signals where we lose packets."
"Teleport changed our workflow by centralizing access control and reducing manual SSH key management."
 

Cons

"Customer support is somewhat lacking. They are often unavailable on Fridays, and the support process, such as raising a call or case, can take too long."
"CyberArk lacks the following functions for a better IAM like solution: - Provision accounts for systems and directories. - Create access to the systems. - Monitor if any new account has been created into the system. - Better GUI for the end-user and also for administrators."
"It is very expensive. They charge for every single thing they offer."
"PAM could be more user-friendly and CyberArk could update the documentation to include more real-world examples. You have to learn it yourself through trial and error. In particular, the online documentation should have more information about troubleshooting."
"The web access piece needs improvement. We have version 9.5 or 9.9.5, and now we have to upgrade to version 10."
"Pricing is a concern for me because it is not very user-friendly for startups, new users, or very small organizations."
"I would say there are scalability issues. After the solution is deployed, resizing it is difficult."
"It can be integrated with other systems, but it is not easy to integrate. It takes too long to integrate it. Its integration should be easier and simpler."
"I cannot download or share session recordings directly with others, which would be useful for documentation or reviews."
"Teleport is simple to use, but sometimes it requires extra research for more unique tasks, which slightly detracts from its overall quality."
"Teleport has been a solid and secure access management solution, but there are a few areas that could be improved, particularly around the initial setup and RBAC configuration."
"I think it should have less complexity to set up on self-hosted because it is still a difficult process and I spend a lot of time using it on self-host."
"I rate it a seven because, as I mentioned, there is a security threat regarding clipboard access."
"Sometimes our devices do not reflect the error, and then we work on why it is not showing any alarm or issue, even though we experience distortion or issues on the TS."
"Managing 700 to 800 services is not easy."
"I cannot download or share session recordings directly with others, which would be useful for documentation or reviews."
 

Pricing and Cost Advice

"The cost is high compared to other products."
"Pricing and licensing depend on the environment."
"Quite expensive"
"CyberArk provides all the features bundled. This is compared to other vendors who provide them as a different license for each functionality."
"Since CyberArk is at the top of the Gartner list, the cost is indeed on the higher side, but customers must discern which entities are essential to purchase. They should weigh the cost against the quality received."
"There are additional features added to our CyberArk Privileged Access Manager license. For example, features that allow us to integrate into various kinds of platforms."
"Network and security licenses are currently being managed by other outsource vendors, so they are facing some type of problems in the digital aspect."
"From a client perspective, CyberArk's pricing is fair but there is a significant increase each year. They should limit the price increase because this could potentially drive customers to other partners. Price changes should be at defined intervals. There should not be sudden jumps."
Information not available
report
Use our free recommendation engine to learn which Privileged Access Management (PAM) solutions are best for your needs.
893,244 professionals have used our research since 2012.
 

Top Industries

By visitors reading reviews
Financial Services Firm
13%
Manufacturing Company
11%
Computer Software Company
7%
Comms Service Provider
6%
Comms Service Provider
13%
Financial Services Firm
12%
Computer Software Company
11%
Manufacturing Company
7%
 

Company Size

By reviewers
Large Enterprise
Midsize Enterprise
Small Business
By reviewers
Company SizeCount
Small Business59
Midsize Enterprise42
Large Enterprise174
By reviewers
Company SizeCount
Small Business1
Midsize Enterprise2
Large Enterprise6
 

Questions from the Community

How does Sailpoint IdentityIQ compare with CyberArk PAM?
We evaluated Sailpoint IdentityIQ before ultimately choosing CyberArk. Sailpoint Identity Platform is a solution to manage risks in cloud enterprise environments. It automates and streamlines the m...
What do you like most about CyberArk Privileged Access Manager?
The most valuable features of the solution are control and analytics.
What is your experience regarding pricing and costs for CyberArk Privileged Access Manager?
My thoughts on the pricing of CyberArk Privileged Access Manager depend entirely on the vendors' requirements. If they want their things to be secure, they have to spend accordingly. We have four t...
What needs improvement with Teleport?
Teleport has been a solid and secure access management solution, but there are a few areas that could be improved, particularly around the initial setup and RBAC configuration. Beyond onboarding an...
What is your primary use case for Teleport?
Teleport serves as our centralized and secure SSH access management solution across our infrastructure. Instead of distributing static SSH keys to engineers, we integrated Teleport with our SSO pro...
What advice do you have for others considering Teleport?
My main advice would be to clearly define your access control requirements before implementation, since Teleport is powerful and its flexibility around RBAC and policy design means you will get the...
 

Also Known As

CyberArk Privileged Access Security, CyberArk Enterprise Password Vault
No data available
 

Overview

 

Sample Customers

Rockwell Automation
Information Not Available
Find out what your peers are saying about CyberArk Privileged Access Manager vs. Teleport and other solutions. Updated: April 2026.
893,244 professionals have used our research since 2012.