CyberArk Privileged Access Manager is a next-generation solution that allows users to secure both their applications and their confidential corporate information. It is extremely flexible and can be implemented across a variety of environments. This program runs with equal efficiency in a fully cloud-based, hybrid, or on-premises environment. Users can now protect their critical infrastructure and access it in any way that best meets their needs.



| Product | Market Share (%) |
|---|---|
| CyberArk Privileged Access Manager | 11.2% |
| Delinea Secret Server | 5.0% |
| WALLIX Bastion | 4.5% |
| Other | 79.3% |
| Type | Title | Date | |
|---|---|---|---|
| Category | Privileged Access Management (PAM) | Feb 8, 2026 | Download |
| Product | Reviews, tips, and advice from real users | Feb 8, 2026 | Download |
| Comparison | CyberArk Privileged Access Manager vs One Identity Safeguard | Feb 8, 2026 | Download |
| Comparison | CyberArk Privileged Access Manager vs Delinea Secret Server | Feb 8, 2026 | Download |
| Comparison | CyberArk Privileged Access Manager vs CyberArk Endpoint Privilege Manager | Feb 8, 2026 | Download |
| Title | Rating | Mindshare | Recommending | |
|---|---|---|---|---|
| Azure Key Vault | 4.3 | N/A | 98% | 52 interviewsAdd to research |
| Okta Platform | 4.3 | 3.1% | 95% | 93 interviewsAdd to research |
| Company Size | Count |
|---|---|
| Small Business | 45 |
| Midsize Enterprise | 27 |
| Large Enterprise | 133 |
| Company Size | Count |
|---|---|
| Small Business | 605 |
| Midsize Enterprise | 334 |
| Large Enterprise | 1313 |
CyberArk Privileged Access Manager possesses a simplified and unified user interface. Users are able to manage the solution from one place. The UI allows users to view and manage all of the information and controls that administrators need to be able to easily access. Very often, management UIs do not have all of the controls and information streamlined in a single location. This platform provides a level of visibility that ensures users will be able to view all of their system’s most critical information at any time that they wish.
Benefits of CyberArk Privileged Access Manager
Some of CyberArk Privileged Access Manager’s benefits include:
Reviews from Real Users
CyberArk Privileged Access Manager’s software stands out among its competitors for one very fundamental reason. CyberArk Privileged Access Manager is an all-in-one solution. Users are given the ability to accomplish with a single platform what might usually only be accomplished with multiple solutions.
PeerSpot users note the truly all-in-one nature of this solution. Mateusz K., IT Manager at a financial services firm, wrote, "It improves security in our company. We have more than 10,000 accounts that we manage in CyberArk. We use these accounts for SQLs, Windows Server, and Unix. Therefore, keeping these passwords up-to-date in another solution or software would be impossible. Now, we have some sort of a platform to manage passwords, distribute the inflow, and manage IT teams as well as making regular changes to it according to the internal security policies in our bank."
Hichem T.-B., CDO & Co-Founder at ELYTIK, noted that “This is a complete solution that can detect cyber attacks well. I have found the proxy features most valuable for fast password web access.”
CyberArk Privileged Access Manager was previously known as CyberArk Privileged Access Security, CyberArk Enterprise Password Vault.
Rockwell Automation
| Author info | Rating | Review Summary |
|---|---|---|
| CyberArk manager at a comms service provider with 10,001+ employees | 4.5 | I've used CyberArk Privileged Access Manager for over nine years; it's highly secure, scalable, and audit-friendly, though costly. It excels in compliance and control, with room for improvement in cluster support, documentation, and first-level technical support. |
| CyberArk Engineer at Tata Consultancy | 5.0 | I've used CyberArk Privileged Access Manager for three years, and it provides secure password management, strong monitoring, and end-to-end protection. It's scalable and stable, with helpful support, though adding AI automation could enhance its functionality further. |
| Senior CyberArk architect at a consultancy with 11-50 employees | 4.5 | I've used CyberArk Privileged Access Manager for over nine years to manage and secure privileged accounts, valuing its strong password rotation and monitoring, though service account integration and notification improvements are needed, especially in healthcare environments. |
| Senior PAM Consultant at iC Consult GmbH | 4.0 | As a CyberArk administrator, I find its password management and automation features invaluable, especially with API integrations. However, its reporting capabilities need improvement. CyberArk competes well with Delinea and others but excels in session management and compliance support. |
| Head of Sales Services Department at a comms service provider with 51-200 employees | 4.0 | CyberArk Privileged Access Manager effectively controls third-party and IT personnel access, enhancing operational efficiency and compliance. While configuration can be challenging, its benefits, including reducing personnel needs and improving security, outweigh these drawbacks. |
| Technical Architect at a tech vendor with 10,001+ employees | 4.0 | We utilize CyberArk Privileged Access Manager for enhanced security and audit functionality. Its user-friendly interface simplifies credential management, while updates ensure compliance and security. Improvements in delegated roles are needed, but the tool significantly benefits our operational efficiency and security posture. |
| Senior Engineer at a tech vendor with 1,001-5,000 employees | 4.5 | CyberArk Privileged Access Manager effectively manages various privileged accounts across different systems, offering excellent support and frequent upgrades. While improvements in Privileged Threat Analytics are needed, it efficiently automates tasks and enhances security, saving time and mitigating threats. |
| Technical Support Analyst at Capgemini | 4.5 | CyberArk Privileged Access Manager offers end-to-end privileged access and session management with secure vaulting and session recording features. It integrates with tools like Splunk. Despite its higher price and longer SLA, its quality and capabilities justify the investment. |