We performed a comparison between Akamai Enterprise Application Access and CyberArk Privileged Access Manager based on real PeerSpot user reviews.
Find out in this report how the two Access Management solutions compare in terms of features, pricing, service and support, easy of deployment, and ROI."Application Access's most valuable feature is the accessibility of enterprise tech protection."
"The capability of Akamai Enterprise Application Access is what you're looking for, it's giving you the service that you're looking for. It's simple and doesn't use an agent. It uses LCSD responders, and they have a lot of services around the globe. That's the reason that we were very interested in using it because it has a lot of coverage. This is because it's under the GDS umbrella."
"The solution is very convenient and stable because you don't have to worry about attacks to public IPs or public networks."
"The technical support for this solution is very good. If I was to rate it on a scale of one to five, I would give it a five."
"We found the initial setup to be easy."
"All access to our servers by both staff and vendors is monitored and recorded."
"You can write different types of policies for custom business needs or any developer needs. If they need certain functions allocated, they can be customized easily."
"Our go-to solution for securing against the pass the hash attack vector and auditing privileged account usage."
"If any intruder gets inside, they would not be able to move around nor do lateral movements. It minimize any attack problems within our network."
"Their legacy of more than 20 years is very valuable. It brings a lot of stability to the product and a wide variety of integration with the ecosystem. Because of these factors, it has also been very successful in deployment. So, the legacy and integration with other technologies make the PAM platform very stable and strong. In terms of features, most of the other vendors are still focusing just on the privileged access management or session recording, but CyberArk has incorporated artificial intelligence to make PAM a more proactive system. They have implemented threat analytics into this, and there is also a lot of focus on domain controller production, Windows Server protection, and stuff like that. They have also further advanced it with the security on the cloud and DevOps systems. They have a bundle licensing model, which really helps. They don't have a complex licensing model. Even though in our market, people say CyberArk is expensive as compared to some of the other products, but in terms of overall value and as a bundling solution, it is an affordable and highly scalable product."
"The most valuable feature is that it always provides flexibility, password quality and one-time user check-in and check-out."
"We need another approach to bring the solution to the cloud. In addition to Access Management, we would like to see if we can jump into Directories. I think ADs are going to go away and everything is going to be cloud-based and minimize the use of ADs because of the cost and some other dependencies to the cloud. Every time you buy AD it is more hardware, and everything's changing to software. The network's changing, the applications are changing, and for IT it is hard to keep up with it."
"The solution has two agents so should combine its enterprise application and security access into one agent."
"The technical enablement sessions are quite limited, and Akamai could help by providing more of them."
"In the beginning, CyberArk Privileged Access Manager didn't have a multifactor authentication feature, so that was an area for improvement, but now it's part of the solution. Having just one console for two CyberArk products would be good, particularly for the CyberArk Privileged Access Manager and the CyberArk Endpoint Privilege Manager, with the latter being a product for endpoint management that supports the workstations and allows you to manage workstations. In the next update of CyberArk Privileged Access Manager, it would be good to have a local agent where you can manage all users and processes, and have an agent on the servers such as Linux and Windows."
"Currently, in Secure Connect, an end user is required to enter account information manually, and cannot save any of this information for future use."
"Stability is a huge concern right now. We are on a version which is very unstable. We have to upgrade to stabilize it. It is fine, but the problem is we have to hire CyberArk to do the upgrade. This costs money, and it is their bug."
"The initial setup of CyberArk Privileged Access Manager difficulty depends on the environment that you are implementing it into. However, it typically is simple."
"There is a learning curve when it comes to planning out the deployment strategy, but once it is defined, it runs itself."
"There is some stuff that we still have not fully integrated, which is our AIM solution. We are having all types of issues with it. I have been working with Level 3 support on it, but otherwise, from a functionality perspective, everything has been working except for the AIM solution."
"Sometimes the infrastructure team is hesitant to provide more resources."
"More than the product itself, there is room for improvement in the documentation. The documentation should be very detailed and very structured. It has a lot of good information, on one level, but I feel that it could be more elaborate and more structured."
More Akamai Enterprise Application Access Pricing and Cost Advice →
More CyberArk Privileged Access Manager Pricing and Cost Advice →
Akamai Enterprise Application Access is ranked 18th in Access Management with 3 reviews while CyberArk Privileged Access Manager is ranked 1st in Privileged Access Management (PAM) with 144 reviews. Akamai Enterprise Application Access is rated 9.0, while CyberArk Privileged Access Manager is rated 8.8. The top reviewer of Akamai Enterprise Application Access writes "Very scalable, convenient, and stable protection against attacks". On the other hand, the top reviewer of CyberArk Privileged Access Manager writes "Lets you ensure relevant, compliant access in good time and with an audit trail, yet lacks clarity on MITRE ATT&CK". Akamai Enterprise Application Access is most compared with Zscaler Zero Trust Exchange, Zscaler Internet Access, Appgate SDP, Netskope and Microsoft Defender for Cloud Apps, whereas CyberArk Privileged Access Manager is most compared with Cisco ISE (Identity Services Engine), Microsoft Entra ID, Delinea Secret Server, WALLIX Bastion and One Identity Safeguard. See our Akamai Enterprise Application Access vs. CyberArk Privileged Access Manager report.
See our list of best Access Management vendors.
We monitor all Access Management reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.