We performed a comparison between CyberArk Privileged Access Manager and Sectona Privileged Access Management based on real PeerSpot user reviews.
Find out in this report how the two Privileged Access Management (PAM) solutions compare in terms of features, pricing, service and support, easy of deployment, and ROI."The most valuable feature is that it always provides flexibility, password quality and one-time user check-in and check-out."
"If any intruder gets inside, they would not be able to move around nor do lateral movements. It minimize any attack problems within our network."
"It helps our customers in their software requirement imports."
"We can make a policy that affects everybody instantly."
"CyberArk has the ability to change the credentials on every platform."
"The biggest feature is the security of the overall solution. It's very secure. The vaulting technology and the number of security layers involved in the vault, where privileged accounts are actually stored, is the heart of the solution."
"It is a single tool that isolates possible kinds of malware. You get lateral movement blocking and auditing information, e.g., you know who is doing what. You are getting protections from the service as well as a useful environment. All your admins can easily go in and out of your company while accessing your servers in a secure way, even if they are working abroad."
"It is scalable."
"The most valuable feature is the risk management. When a Privileged user performs a certain command, such as running a script, the system highlights it in the risk management section as high, critical, or medium risk."
"The most valuable features of Sectona Privileged Access Management include robust session monitoring for privileged users."
"A key factor for my company is support, and Sectona Privileged Access Management has good support. Another valuable feature of Sectona Privileged Access Management is that it's easy to onboard."
"The most valuable feature of Sectona Privileged Access Management for protecting Privileged accounts is its built-in launcher. Additionally, the single sign-on capability is good. Sectona's session recording feature is particularly noteworthy because it utilizes minimal storage. Instead of recording entire sessions, it captures activity only when necessary, optimizing storage space."
"It is easily customized, and that customization makes it very easy to start trying to shoehorn the solution into roles it was never intended to fill."
"It can be integrated with other systems, but it is not easy to integrate. It takes too long to integrate it. Its integration should be easier and simpler."
"We found a lot of errors during the initial setup. They should work to improve the implementation experience and to remove errors from the process."
"Integration with the ticketing system should allow any number of fields to be used for validation before allowing a user to be evaluated and able to access a server."
"There is a learning curve when it comes to planning out the deployment strategy, but once it is defined, it runs itself."
"The authentication port is available in CyberArk Alero but not Fortinet products."
"It's a big program. To scale excessively, locally, on an on-prem application, takes a lot of servers."
"As a customer, I might need a plugin for a specific product, or an application, and CyberArk might have already worked with some other client on it. There has to be some platform where it is available for everybody else to go and grab it, instead of my having to reinvent the wheel."
"Sectona needs to think about SaaS solutions and cloud use cases. For example, we need to be able to integrate Sectona PAM with next-generation applications such as Docker and Lambda, as well as ITD pipelines that use privileged user data."
"I would like to see future updates include robust support for cloud environments as organizations increasingly move towards cloud-based solutions."
"As I don't have at least one to two years of experience with Sectona Privileged Access Management, I cannot share areas for improvement in the solution. To me, Sectona Privileged Access Management has reasonable pricing, but it could still be improved. I'm also unsure if Sectona Privileged Access Management could cover the requirements of large-sized companies, but for small-sized to medium-sized companies, I'd recommend the solution."
"Sectona Privileged Access Management needs to improve its stability. It needs to enhance the product's stability because of frequent updates. This is crucial for a solution like Privileged Access Management, as organizations rely on stability. When it becomes unstable, it causes panic."
More CyberArk Privileged Access Manager Pricing and Cost Advice →
More Sectona Privileged Access Management Pricing and Cost Advice →
CyberArk Privileged Access Manager is ranked 1st in Privileged Access Management (PAM) with 144 reviews while Sectona Privileged Access Management is ranked 17th in Privileged Access Management (PAM) with 4 reviews. CyberArk Privileged Access Manager is rated 8.8, while Sectona Privileged Access Management is rated 7.8. The top reviewer of CyberArk Privileged Access Manager writes "Lets you ensure relevant, compliant access in good time and with an audit trail, yet lacks clarity on MITRE ATT&CK". On the other hand, the top reviewer of Sectona Privileged Access Management writes "Effective risk management, feature of recording all privileged user activities in a compressed format but limited SaaS capability". CyberArk Privileged Access Manager is most compared with Cisco ISE (Identity Services Engine), Microsoft Entra ID, Delinea Secret Server, WALLIX Bastion and One Identity Safeguard, whereas Sectona Privileged Access Management is most compared with ARCON Privileged Access Management. See our CyberArk Privileged Access Manager vs. Sectona Privileged Access Management report.
See our list of best Privileged Access Management (PAM) vendors.
We monitor all Privileged Access Management (PAM) reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.