We performed a comparison between ARCON Privileged Access Management and CyberArk Privileged Access Manager based on real PeerSpot user reviews.
Find out in this report how the two Privileged Access Management (PAM) solutions compare in terms of features, pricing, service and support, easy of deployment, and ROI."The entire conversation that is happening between the servers and the client is recorded. It is a good feature if you want to do some analysis, and for investigation."
"One standout feature of ARCON is its ability to resolve lagging issues, especially noticeable in Linux environments."
"It is recording video records for Windows and command-line reports for others, Linux and AIX, of whatever activities being carries by that particular administrator."
"The initial setup was very simple. There was only one server we had to setup. We needed to store all the passwords, and a secure database is used."
"The video logs help us to identify any misuse of privileged accounts."
"100% compliant and you don't have to maintain ID management for each and every user."
"The deployment process for the solution was easy...The solution's technical support team was good."
"One important feature is the administrator access, mainly for Windows machines as well as Linux machines. It is important for us because there is accountability associated with each user ID. And the recordings are also helpful."
"CyberArk Privileged Access Manager's main benefit is it provides secure access to our servers. There are features to capture the user activity, it provides video recording processing. If the users are logged in to the server, we can see what activities they are performing. It's a very nice tool for Privileged Access Management. They have plenty of useful services and the solution has fulfilled our needs."
"I find value in notifications from CyberArk when passwords fail verification and have other issues."
"Technical support has been very responsive in navigating challenges. It is very easy to open a ticket."
"I love the ability to customize the passwords: the forbidden characters, the length of the password, the number of capital, lowercase, and special characters. You can customize the password so that it tailor fits, for example, mainframes that can't have more than eight characters. You can say, "I want a random password that doesn't have these special characters, but it is exactly eight characters," so that it doesn't throw errors."
"Within the solution, I love the fact that everything is recorded. The configuration capabilities are great, too."
"The technical support is good."
"The password management feature is valuable."
"The Password Upload Utility tool makes it easier when setting up a Safe that contains multiple accounts and has cut down the amount of time that it takes to complete the task."
"It should support the SQL Always On platform with FQDN name instead of IP."
"I'll provide feedback on additional features after the project is completed. I think it would be better to comment on that after the implementation is finished."
"This product is lacking in terms of dashboarding analytics and should have user behavior analytics. It should also have better dashboarding for executive management and security managers, which this product is missing."
"The auto-password change feature which was recently added. It is supposed to change the password. However, in some cases, while changing the password, it has caused me to lose to connection due to network-related issues or something similar. What we need to have is a type of log for failure of password change."
"The solution needs more work on the password management side of things. Password management is a big challenge for us, and I would like to improve this aspect. We're finding that BeyondTrust is better in this regard, which is why we're probably going to migrate over. It will offer better security I think."
"There are no APIs readily available... I'm working on automation for ARCON so that whatever the ARCON administrator is doing will be automated, rather than having to do it manually. For that, I had to spend months to get the API developed myself. Having that handy out of the box, that would really help..."
"They they should focus on support. The support needs to be very strong. Since the product is becoming stronger, their support team also should be equally strong. They should respond to open queries within the time limit they have set. Their support team should be more technical, to understand the issue or the set up."
"I would like to see a "wild card" kind of a feature or something that would enable us to search the video."
"Some aspects of the administration need improvement, though they have recently made improvements to the API. However, the management with the interface and configuration are not so user-friendly. It has not changed much during all the years that CyberArk has been on the market. The management part, like platform management as well as PSM connectors definition and management, could be improved, even if it has already been done with the API."
"This is probably a common thing, but they do ask for a lot of log files, a lot of information. They ask you to provide a lot of information to them before they're willing to give you anything at all upfront. It would be better if they were a little more give-and-take upfront: "Why don't you try these couple of things while we take your log files and stuff and go research them?" A little bit of that might be more helpful."
"The solution should be able to mitigate internal threats"
"The solution could improve by adding more connectors."
"I'm not a fan of technical support with CyberArk. It's like jumping through red tape and hoops. Quite frankly, it's almost like when you call CyberArk you get the Help Desk or the level-one. I'm a level-one. I got the CCD, I know how to do the initial troubleshooting. When I call CyberArk it's because I can't figure the problem out. So I need a level-two, three, four. I don't need you to tell me, "Hey, open a ticket and then give me logs.""
"I think having a distributed architecture would certainly help this solution."
"It is easily customized, and that customization makes it very easy to start trying to shoehorn the solution into roles it was never intended to fill."
"The initial setup was somewhat complex."
More ARCON Privileged Access Management Pricing and Cost Advice →
More CyberArk Privileged Access Manager Pricing and Cost Advice →
ARCON Privileged Access Management is ranked 8th in Privileged Access Management (PAM) with 32 reviews while CyberArk Privileged Access Manager is ranked 1st in Privileged Access Management (PAM) with 144 reviews. ARCON Privileged Access Management is rated 7.8, while CyberArk Privileged Access Manager is rated 8.8. The top reviewer of ARCON Privileged Access Management writes "Offers good session monitoring and recording features". On the other hand, the top reviewer of CyberArk Privileged Access Manager writes "Lets you ensure relevant, compliant access in good time and with an audit trail, yet lacks clarity on MITRE ATT&CK". ARCON Privileged Access Management is most compared with Cisco ISE (Identity Services Engine), ManageEngine PAM360, BeyondTrust Endpoint Privilege Management, Delinea Secret Server and WALLIX Bastion, whereas CyberArk Privileged Access Manager is most compared with Cisco ISE (Identity Services Engine), Microsoft Entra ID, Delinea Secret Server, WALLIX Bastion and CyberArk Identity. See our ARCON Privileged Access Management vs. CyberArk Privileged Access Manager report.
See our list of best Privileged Access Management (PAM) vendors.
We monitor all Privileged Access Management (PAM) reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.