Try our new research platform with insights from 80,000+ expert users

CyberArk vs Teleport comparison

 

Comparison Buyer's Guide

Executive SummaryUpdated on Jun 15, 2025

Review summaries and opinions

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
 

Categories and Ranking

CyberArk Privileged Access ...
Ranking in Privileged Access Management (PAM)
1st
Average Rating
8.6
Reviews Sentiment
6.8
Number of Reviews
224
Ranking in other categories
User Activity Monitoring (1st), Enterprise Password Managers (2nd), Mainframe Security (2nd), Operational Technology (OT) Security (3rd)
Teleport
Ranking in Privileged Access Management (PAM)
14th
Average Rating
9.0
Reviews Sentiment
6.4
Number of Reviews
1
Ranking in other categories
Identity and Access Management as a Service (IDaaS) (IAMaaS) (21st)
 

Mindshare comparison

As of July 2025, in the Privileged Access Management (PAM) category, the mindshare of CyberArk Privileged Access Manager is 17.1%, down from 22.3% compared to the previous year. The mindshare of Teleport is 3.7%, up from 1.8% compared to the previous year. It is calculated based on PeerSpot user engagement data.
Privileged Access Management (PAM)
 

Featured Reviews

Abdul Durrani - PeerSpot reviewer
Enables granular and secure access with just-in-time access and Zero Trust model
CyberArk provides a good amount of control over access types. However, as a future enhancement, having additional features for cross-platform integration would be beneficial. It would be good to have integrations with other tools and firewalls, such as Zscaler and CrowdStrike. Although I am not fully aware of recent updates, more cross-platform integration would be valuable. A SOC analyst would like to have centralized access in terms of information flowing in even for privileged access management. They would like to have control over everything instead of opening four to five tabs for different sorts of information. Cross-platform integration would help with that. Customers also want CyberArk's pricing to be better so that they can implement it further and have more licenses. Implementing a privileged access management solution can be challenging. It would be great if CyberArk could provide recommendations based on the compliance standards of an organization. It would help system admins ensure that all the required ports are closed and the systems are being managed properly. If any system is not being used anymore, any ports opened for that system need to be closed. Having such recommendations would be helpful.
Jyothikumar C - PeerSpot reviewer
Streamlined access management through integration and simplified setup
Teleport has replaced earlier methods like a bastion server or a jump server, which required connecting to physical servers. It integrates well with single sign-on (SSO) and Ansible Playbooks, allowing me to manage inventories easily. Teleport provides a straightforward setup process with a single command line, making it easier to manage the onboarding and offboarding of team members.

Quotes from Members

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
 

Pros

"Considering all those factors and being the best tool in the market for Privileged Access Management, it is recommended."
"We are able to know who is accessing what and when; having accountability."
"The Vault offers great capabilities for structuring and accessing data."
"Because we now have the ability to grant access to management utilities like DNS Manager, Sequel Studio, and MMC, in a secure fashion, without system admins being required to continually reenter various passwords that are stored who knows where, it has really made the system admin's job much easier. It has made the PSM's job much easier. It has made the auditor's job and the security team's job and the access manager's job significantly easier, because we're able to move much more quickly toward a role-based access management system, and that is really streamlining the whole onboarding/offboarding management process."
"The impact of CyberArk Privileged Access Manager on customer operational efficiency is quite positive."
"Increased our insight into how privileged accounts are being used and distributed within our footprint."
"We are able to rotate privileged user passwords to eliminate fraudulent use."
"The combination of CPM and PSM resolves a lot of use cases."
"Teleport has replaced earlier methods like a bastion server or a jump server, which required connecting to physical servers."
"I recommend it for its straightforward setup and strong security features."
 

Cons

"Improvements in CyberArk Privileged Access Manager should focus on simplifying installation and upgrade times, and also consider making professional services training more accessible to implementers and partners."
"I'd like to see a more expansive SSH tunneling situation through PSMP. Right now you have an account that exists in the vault and you say, "I want to create a tunnel using this account." I'd like to see something that is not account-based where I could say, "I want to create a tunnel to this machine over here," and then authenticate through the PSMP and then your tunnel is set up. You wouldn't need to then authenticate to a machine."
"Report creation could be improved. The policies could be more customized."
"It could be more user-friendly. Sometimes I encounter issues, and I do not know what the issue is. It takes a lot of time to find the error and fix it. Sometimes it gives an error, but I do not know what the error is. I have to find the documents, but it does not provide all the details needed to fix the error. This is one of the day-to-day issues with CyberArk."
"This is probably a common thing, but they do ask for a lot of log files, a lot of information. They ask you to provide a lot of information to them before they're willing to give you anything at all upfront. It would be better if they were a little more give-and-take upfront: "Why don't you try these couple of things while we take your log files and stuff and go research them?" A little bit of that might be more helpful."
"The stability depends on the infrastructure it is installed on, which is important because CyberArk does not have the hardware appliance."
"We had an issue with the Copy feature... Apparently, in version 10, that Copy feature does not work. You actually have to click Show and then copy the password from within Show and then paste it. We've had a million tickets and we had to figure out a workaround to it."
"What could be improved in CyberArk Privileged Access Manager is the licensing model. It should be more flexible in terms of the users. Currently, it's based on the number of users, but many users only log in once in four months or once in five months. It would be great if the licensing model could be modified based on user needs. We even have users who have not logged in even once."
"I cannot download or share session recordings directly with others, which would be useful for documentation or reviews."
"I cannot download or share session recordings directly with others, which would be useful for documentation or reviews."
 

Pricing and Cost Advice

"I do not have any opinions to add about the pricing of the product."
"The product’s pricing is feasible for enterprise customers. The pricing is expensive for smaller businesses. You need to pay additional costs for service implementation and local support."
"The price of CyberArk Privileged Access Manager is expensive. There are no other fees other than the standard licensing fees."
"CyberArk is very expensive and there are additional fees for add-ons."
"I focus more on the technical side, but I hear customers say that if CyberArk was more affordable, they might have acquired more licenses. Some clients consider alternative solutions due to pricing concerns."
"The cost is high compared to other products."
"My company always complains about the cost of CyberArk Privileged Access Manager because it's too high."
"The solution is cost-effective for the features."
Information not available
report
Use our free recommendation engine to learn which Privileged Access Management (PAM) solutions are best for your needs.
860,592 professionals have used our research since 2012.
 

Top Industries

By visitors reading reviews
Educational Organization
18%
Financial Services Firm
14%
Computer Software Company
13%
Manufacturing Company
7%
Computer Software Company
17%
Financial Services Firm
12%
Comms Service Provider
10%
University
7%
 

Company Size

By reviewers
Large Enterprise
Midsize Enterprise
Small Business
No data available
 

Questions from the Community

How does Sailpoint IdentityIQ compare with CyberArk PAM?
We evaluated Sailpoint IdentityIQ before ultimately choosing CyberArk. Sailpoint Identity Platform is a solution to manage risks in cloud enterprise environments. It automates and streamlines the m...
What do you like most about CyberArk Privileged Access Manager?
The most valuable features of the solution are control and analytics.
What needs improvement with Teleport?
I cannot download or share session recordings directly with others, which would be useful for documentation or reviews. Additionally, while the backend worker can be upgraded, there is a limitation...
What is your primary use case for Teleport?
I use Teleport to replace the normal authentication mechanism as part of a zero-trust architecture. It is particularly useful because, in a remote environment, I cannot trust any devices. I can sha...
What advice do you have for others considering Teleport?
I rate Teleport nine out of ten. Security-wise, it is very secure and easy to use for remote access. I recommend it for its straightforward setup and strong security features.
 

Also Known As

CyberArk Privileged Access Security, CyberArk Enterprise Password Vault
No data available
 

Overview

 

Sample Customers

Rockwell Automation
Information Not Available
Find out what your peers are saying about CyberArk, Delinea, One Identity and others in Privileged Access Management (PAM). Updated: June 2025.
860,592 professionals have used our research since 2012.