We performed a comparison between CyberArk Privileged Access Manager and Keeper based on real PeerSpot user reviews.
Find out what your peers are saying about CyberArk, Delinea, BeyondTrust and others in Privileged Access Management (PAM)."We have demoted a lot of domain admins and taken a lot of that away from people, giving it a shared account structure."
"Helped us meet our standards and requirements to help us comply with industry standards and banking regulations."
"It has the ability to scale out. We have scaled out quite a bit with our product and use of it to get to multiple locations and businesses, so it has the breadth to do that."
"With PAM in place, we've experienced a significant reduction in potential security breaches."
"We found the initial setup to be easy."
"I like the integrations for external applications."
"It enables companies to automate password management on target systems gaining a more secure access management approach."
"All access to our servers by both staff and vendors is monitored and recorded."
"The chat support is quick. I have never encountered any problems. On the contrary, they have been very helpful and kind."
"Enables IT department to force very complex passwords for certain users."
"Password sharing and SSO. These features almost become a necessity to make sure that company data is safe and reduce the possibility of data breach."
"Auto login across platforms allows for no copying and pasting."
"I like a couple of things about this solution. Being able to share passwords with other people is valuable. You can see if the information is out on the dark web and whether you have weak passwords and the last time they were changed. You could also have the 2FA or MFA codes embedded in the application so that you don't have to use your phone or any other 2FA device, which is something very important."
"The generator of complex passwords keeps me safe from being hacked."
"I like Keeper's mobility and its accessibility."
"It is nice to be able to use my Touch ID and have access to all my passwords in one place."
"Initial setup is complex. Lots of architecture, lots of planning, and lots of education and training are needed."
"There is a learning curve when it comes to planning out the deployment strategy, but once it is defined, it runs itself."
"I'd like to see a more expansive SSH tunneling situation through PSMP. Right now you have an account that exists in the vault and you say, "I want to create a tunnel using this account." I'd like to see something that is not account-based where I could say, "I want to create a tunnel to this machine over here," and then authenticate through the PSMP and then your tunnel is set up. You wouldn't need to then authenticate to a machine."
"The solution needs better features for end users to manage their own whitelisting for API retrieval."
"It can be integrated with other systems, but it is not easy to integrate. It takes too long to integrate it. Its integration should be easier and simpler."
"The tool’s pricing and scalability can be better."
"Some of the additional features that we are looking at are in the Conjur product. I am specifically discussing key management, API Keys, and things for connecting applications in the CI/CD pipelines."
"It needs better documentation with more examples for the configuration files and API/REST integration"
"If you purchase the premium, then after the subscription expires, you cannot edit your passwords any longer, even if you could before you purchased the paid subscription."
"I would add a category for personal documents or photos of ID cards."
"The technical support has no experience."
"The technical support for this solution could be faster support and improved if they had a better understanding of my questions."
"They could possibly add a pre-designed contact feature that would work similar to a cell phone contact feature."
"Needs to provide an API to be integrated with the information systems and offer secure file hosting service with sharing and editing capabilities."
"I would like to see a way to store files and photos in the next update. If it already does this, I have yet to explore it."
"API possible needs improvement. Although, this feature is for enterprises which need more then the usual usage."
More CyberArk Privileged Access Manager Pricing and Cost Advice →
CyberArk Privileged Access Manager is ranked 1st in Privileged Access Management (PAM) with 143 reviews while Keeper is ranked 11th in Enterprise Password Managers with 32 reviews. CyberArk Privileged Access Manager is rated 8.8, while Keeper is rated 9.2. The top reviewer of CyberArk Privileged Access Manager writes "Lets you ensure relevant, compliant access in good time and with an audit trail, yet lacks clarity on MITRE ATT&CK". On the other hand, the top reviewer of Keeper writes "It's an inexpensive, scalable solution that has improved our security". CyberArk Privileged Access Manager is most compared with Cisco ISE (Identity Services Engine), Microsoft Entra ID, Delinea Secret Server, WALLIX Bastion and One Identity Safeguard, whereas Keeper is most compared with HashiCorp Vault, Azure Key Vault, LastPass, Delinea Secret Server and AWS Secrets Manager.
We monitor all Privileged Access Management (PAM) reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.