We performed a comparison between Akamai Enterprise Application Access and CyberArk Privileged Access Manager based on real PeerSpot user reviews.
Find out in this report how the two Access Management solutions compare in terms of features, pricing, service and support, easy of deployment, and ROI."The solution is very convenient and stable because you don't have to worry about attacks to public IPs or public networks."
"The capability of Akamai Enterprise Application Access is what you're looking for, it's giving you the service that you're looking for. It's simple and doesn't use an agent. It uses LCSD responders, and they have a lot of services around the globe. That's the reason that we were very interested in using it because it has a lot of coverage. This is because it's under the GDS umbrella."
"Application Access's most valuable feature is the accessibility of enterprise tech protection."
"You can gradually implement CyberArk, starting with more easily attainable goals."
"Increased our insight into how privileged accounts are being used and distributed within our footprint."
"We also use CyberArk’s Secrets Manager. Because AWS is the biggest area for us, we have accounts in AWS that are being rotated by CyberArk. We also have a manual process for the most sensitive of our AWS accounts, like root accounts. We've used Secrets Manager on those and that has resulted in a significant risk reduction, as well."
"The technical support is good."
"It is useful for protecting passwords. If you need to do access security management, you can first use the CyberArk console, and after that, you can connect the firewall interface or firewall command line. Similarly, if you need to do an RDP session, you need to first log in to CyberArk before connecting to the Windows RDP session. This way, the admin doesn't know the password, and that password is changed immediately. To change the password, you first discover the old password in the network, and after that, you can change the password."
"The most important feature is managing the credentials and implementing those policies which rotate the credentials. Session Manager is also key in not letting the users have access to those credentials. Instead, CyberArk actually manages everything by itself."
"Ensures accounts are managed according to corporate policies."
"The biggest feature is the security of the overall solution. It's very secure. The vaulting technology and the number of security layers involved in the vault, where privileged accounts are actually stored, is the heart of the solution."
"The technical enablement sessions are quite limited, and Akamai could help by providing more of them."
"The solution has two agents so should combine its enterprise application and security access into one agent."
"We need another approach to bring the solution to the cloud. In addition to Access Management, we would like to see if we can jump into Directories. I think ADs are going to go away and everything is going to be cloud-based and minimize the use of ADs because of the cost and some other dependencies to the cloud. Every time you buy AD it is more hardware, and everything's changing to software. The network's changing, the applications are changing, and for IT it is hard to keep up with it."
"The continuous scanning of the assets is limited to Windows and Unix. We like to have the solution scan any databases, network devices, and security devices for privileged accounts. That would be very helpful."
"There should be more models and licensing plans for this software."
"The Vault's disaster recovery features need improvement."
"I think having a distributed architecture would certainly help this solution."
"The support services could act faster when people reach out to resolve issues."
"Initially, there was a lot of hiccups, because there were a lot of transitions due to manual installations."
"Sometimes the infrastructure team is hesitant to provide more resources."
"The product documentation has to be more precise in certain aspects with explanations for functionality limitations along with reference material or screenshots."
More Akamai Enterprise Application Access Pricing and Cost Advice →
More CyberArk Privileged Access Manager Pricing and Cost Advice →
Akamai Enterprise Application Access is ranked 18th in Access Management with 3 reviews while CyberArk Privileged Access Manager is ranked 1st in Privileged Access Management (PAM) with 144 reviews. Akamai Enterprise Application Access is rated 9.0, while CyberArk Privileged Access Manager is rated 8.8. The top reviewer of Akamai Enterprise Application Access writes "Very scalable, convenient, and stable protection against attacks". On the other hand, the top reviewer of CyberArk Privileged Access Manager writes "Lets you ensure relevant, compliant access in good time and with an audit trail, yet lacks clarity on MITRE ATT&CK". Akamai Enterprise Application Access is most compared with Zscaler Zero Trust Exchange, Zscaler Internet Access, Appgate SDP, Netskope and Microsoft Defender for Cloud Apps, whereas CyberArk Privileged Access Manager is most compared with Cisco ISE (Identity Services Engine), Microsoft Entra ID, Delinea Secret Server, WALLIX Bastion and One Identity Safeguard. See our Akamai Enterprise Application Access vs. CyberArk Privileged Access Manager report.
See our list of best Access Management vendors.
We monitor all Access Management reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.