We performed a comparison between CyberArk Privileged Access Manager and Perimeter 81 based on real PeerSpot user reviews.
Find out what your peers are saying about CyberArk, Delinea, BeyondTrust and others in Privileged Access Management (PAM)."The password management feature is valuable."
"I find value in notifications from CyberArk when passwords fail verification and have other issues."
"We've written over a hundred custom connectors ourselves that allow us to do all types of privileged session management for various applications. On top of that, the rest of the API-based central credential providers allow us to get away from credentials that may be hard-coded in the script or some application."
"With CyberArk, you can be fully confident that your existing accounts are secure. You will be 100 percent"
"The voice technology is very good."
"CyberArk has helped us to identify, store, protect, and monitor the usage of privileged accounts."
"I like the integrations for external applications."
"Our go-to solution for securing against the pass the hash attack vector and auditing privileged account usage."
"Providing access and security allows our company employees to work from home and remotely."
"Their split tunneling feature has been very valuable to our company since implementing the Perimeter 81 solution."
"SD-WAN is one of the primary solutions offered by Perimeter 81."
"It keeps us all accountable and ensures secure internet connections while we all work remotely."
"It has provided a seamless gateway to much-needed platforms."
"Our operators can work from home without any problems."
"Perimeter 81 has increased my security and privacy while maintaining solid internet performance."
"Logging back into Perimeter 81 is relatively user-friendly as I just need to re-type my Windows credentials in to access the VPN."
"This product needs professional consulting services to onboard accounts effectively based user profiles."
"It is web-based, but other competitors have apps. We need to get there. It is just smoother to have an app. You don't have all the bugs from having a browser, and people like them better, since you can get to them via mobile."
"The interface on version 9 looks old."
"Having a centralized place to manage the solution has been something that I have always wanted, and they are starting to understand that and bring things back together."
"CyberArk PAM could greatly benefit from an under-the-hood update; integrating machine learning algorithms could provide predictive insights."
"We found a lot of errors during the initial setup. They should work to improve the implementation experience and to remove errors from the process."
"It is easily customized, and that customization makes it very easy to start trying to shoehorn the solution into roles it was never intended to fill."
"The PTA could be improved. Currently, companies often have multiple domains and sometimes it's difficult to implement CyberArk in this kind of infrastructure. For example, you can add CPM (Central Policy Manager) and PSM (Privileged Session Manager and PVWA (Password Vault Web Access) for access, but if you want to add PTA (Privileged Threat Analysis) to scan Vault logs, it is difficult because this component may be adding multiple domain environments."
"One of the more negative experiences using Perimeter 81 is the fact that I am logged off after a pre-determined amount of time which cuts off access to some of my company's resources."
"I would suggest adding more networking and security features that allow more customization within their platform."
"Offering in-app explanations detailing what each feature does, its benefits and potential use cases can help users better understand and utilize the tool to its full potential."
"The platform still lacks relevant dashboards and the ability to customize them based on our needs."
"I'd love to learn more about all of the features. Maybe a monthly spotlight of features or having a banner that explains more ways certain features could be used would be helpful."
"In order to have to bypass the login using the website, a good feature for Perimeter 81 to have is a login instance in the Perimeter 81 application. I'm using a Mac and we don't have that functionality."
"Currently, I am not able to define a different country or location, which can result in negative experiences as the tool is being recognized by websites and this can make it difficult to access them or force me to disable the program temporarily."
"I have found that the log-in/out process takes quite some time."
More CyberArk Privileged Access Manager Pricing and Cost Advice →
CyberArk Privileged Access Manager is ranked 1st in Privileged Access Management (PAM) with 144 reviews while Perimeter 81 is ranked 6th in Secure Access Service Edge (SASE) with 22 reviews. CyberArk Privileged Access Manager is rated 8.8, while Perimeter 81 is rated 9.2. The top reviewer of CyberArk Privileged Access Manager writes "Lets you ensure relevant, compliant access in good time and with an audit trail, yet lacks clarity on MITRE ATT&CK". On the other hand, the top reviewer of Perimeter 81 writes "Great SAML and SCIM support with the ability to deploy site-2-site tunnels with specific IP restrictions". CyberArk Privileged Access Manager is most compared with Cisco ISE (Identity Services Engine), Microsoft Entra ID, Delinea Secret Server, WALLIX Bastion and One Identity Safeguard, whereas Perimeter 81 is most compared with Zscaler Zero Trust Exchange, Cato SASE Cloud Platform, Prisma Access by Palo Alto Networks, Cloudflare Access and Tailscale.
We monitor all Privileged Access Management (PAM) reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.