We performed a comparison between Akamai Enterprise Application Access and CyberArk Privileged Access Manager based on real PeerSpot user reviews.
Find out in this report how the two Access Management solutions compare in terms of features, pricing, service and support, easy of deployment, and ROI."Application Access's most valuable feature is the accessibility of enterprise tech protection."
"The solution is very convenient and stable because you don't have to worry about attacks to public IPs or public networks."
"The capability of Akamai Enterprise Application Access is what you're looking for, it's giving you the service that you're looking for. It's simple and doesn't use an agent. It uses LCSD responders, and they have a lot of services around the globe. That's the reason that we were very interested in using it because it has a lot of coverage. This is because it's under the GDS umbrella."
"Password rotation, session recording & isolation and on-demand privileges."
"We found the initial setup to be easy."
"It has the ability to scale out. We have scaled out quite a bit with our product and use of it to get to multiple locations and businesses, so it has the breadth to do that."
"I appreciate the ease of use for support analysts."
"It is one of the best solutions in the market. Ever since I started using this solution, there has not been any compromise when it comes to our lab."
"The solution is stable."
"The users have the ability to rotate passwords on a daily basis with a Reconcile Account. Or, if they want to do one-time password checkouts, we can manage those, check in, check out. I like the flexibility of the changing of the password, specifically."
"It provides an accountability to the individuals who are using it, knowing that it is audited and tracked."
"The solution has two agents so should combine its enterprise application and security access into one agent."
"The technical enablement sessions are quite limited, and Akamai could help by providing more of them."
"We need another approach to bring the solution to the cloud. In addition to Access Management, we would like to see if we can jump into Directories. I think ADs are going to go away and everything is going to be cloud-based and minimize the use of ADs because of the cost and some other dependencies to the cloud. Every time you buy AD it is more hardware, and everything's changing to software. The network's changing, the applications are changing, and for IT it is hard to keep up with it."
"In the beginning, CyberArk Privileged Access Manager didn't have a multifactor authentication feature, so that was an area for improvement, but now it's part of the solution. Having just one console for two CyberArk products would be good, particularly for the CyberArk Privileged Access Manager and the CyberArk Endpoint Privilege Manager, with the latter being a product for endpoint management that supports the workstations and allows you to manage workstations. In the next update of CyberArk Privileged Access Manager, it would be good to have a local agent where you can manage all users and processes, and have an agent on the servers such as Linux and Windows."
"For users to access a system via CyberArk Privileged Session Manager, a universal connector needs to be coded in a language called AutoIT and its support for web browsers is so-so. Other products like Centrify have browser plugins that can help automate the process when using their products."
"I would like easier integrations for creating an online dashboard that executives would look at or are able to run reports from the tool."
"The initial setup of CyberArk is a challenge if you do not have prior experience with it."
"Sometimes the infrastructure team is hesitant to provide more resources."
"We would, of course, always prefer it if the pricing was cheaper."
"The major pain point that we have is the capacity of CyberArk due to the sheer volume of NPAs that we are managing. We are a large organization and we have hundreds of thousands of non-personal accounts to manage. We have already found out that there are certain capacity limitations within CyberArk that might introduce performance issues. From my perspective, something that would be valuable would be if the vault could hold more passwords and be more scalable."
"CyberArk has to continue to evolve with that threat landscape to make sure that they're still protecting those credentials that are owned by those that have privileged accounts in the firms."
More Akamai Enterprise Application Access Pricing and Cost Advice →
More CyberArk Privileged Access Manager Pricing and Cost Advice →
Akamai Enterprise Application Access is ranked 17th in Access Management with 3 reviews while CyberArk Privileged Access Manager is ranked 1st in Privileged Access Management (PAM) with 143 reviews. Akamai Enterprise Application Access is rated 9.0, while CyberArk Privileged Access Manager is rated 8.8. The top reviewer of Akamai Enterprise Application Access writes "Very scalable, convenient, and stable protection against attacks". On the other hand, the top reviewer of CyberArk Privileged Access Manager writes "Lets you ensure relevant, compliant access in good time and with an audit trail, yet lacks clarity on MITRE ATT&CK". Akamai Enterprise Application Access is most compared with Zscaler Zero Trust Exchange, Zscaler Internet Access, Appgate SDP, Netskope and VMware SD-WAN, whereas CyberArk Privileged Access Manager is most compared with Cisco ISE (Identity Services Engine), Microsoft Entra ID, Delinea Secret Server, WALLIX Bastion and One Identity Safeguard. See our Akamai Enterprise Application Access vs. CyberArk Privileged Access Manager report.
See our list of best Access Management vendors.
We monitor all Access Management reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.