We performed a comparison between CyberArk Privileged Access Manager and Delinea Privileged Access Service based on real PeerSpot user reviews.
Find out in this report how the two Privileged Access Management (PAM) solutions compare in terms of features, pricing, service and support, easy of deployment, and ROI."We are able to rotate privileged user passwords to eliminate fraudulent use."
"It helps our customers in their software requirement imports."
"The product is an important security measure against credential theft. It ensures session isolation and password rotation including pushing passwords to the endpoints."
"Creating policies and the password rotation feature have been valuable. We don't have to memorize our password for the ADM account."
"The solution is stable."
"CyberArk has resulted in a massive increase in our security footprint."
"You can easily manage more than 4000 accounts with one PSM."
"The automatic change of the password and Privileged Session Manager (PSM) are the most valuable features. With Privileged Session Manager, you can control the password management in a centralized way. You can activate these features in a session; the session isolation and recording. You apply the full intermediation principle. So, you must pass through CyberArk PAM to get access to the target system. You don't need to know the password, and everything that you do is registered and auditable. In this case, no one gets to touch the password directly. Also, you can implement detection and response behavior in case of a breach."
"Delinea Privileged Access Service's UI part was very user-friendly for secure credential storage and management."
"This is a cloud-based application, which makes it very easy to deploy."
"The most valuable feature of Delinea Privileged Access Service is we can use the server as a jump host. It is simple to manage the accounts on the system."
"The privileged account management feature is what I like most."
"The vault and auditing capabilities are the most valuable feature because they include multiple reports that allow us to create our own reports."
"The solution is flexible."
"The solution provides secure access to environments."
"The most valuable feature is the author's discovery of assets."
"The product could be easier to use. More work needs to be done on this aspect; it is not good enough yet. It also takes up a lot of server space. Sometimes we need to use up to seven servers."
"CyberArk Privileged Access Manager could improve the integration with other solutions and ease of use. Additionally, there should be a feature to have remote connections without a VPN."
"What could be improved in CyberArk Privileged Access Manager is the licensing model. It should be more flexible in terms of the users. Currently, it's based on the number of users, but many users only log in once in four months or once in five months. It would be great if the licensing model could be modified based on user needs. We even have users who have not logged in even once."
"The initial setup has room for improvement to be more straightforward."
"CyberArk has a lot on the privileged access side but they have to concentrate more on the application side as well."
"The documentation is rather basic and it is missing many use cases."
"Performance of PIM could be better and intended for usability as well as security."
"Some aspects of the administration need improvement, though they have recently made improvements to the API. However, the management with the interface and configuration are not so user-friendly. It has not changed much during all the years that CyberArk has been on the market. The management part, like platform management as well as PSM connectors definition and management, could be improved, even if it has already been done with the API."
"There needs to be a notification when a password is near expiration."
"The integration with sync could be improved."
"Although the interface is intuitive, it could be a little more user-friendly."
"It is difficult to integrate the product with other IT systems."
"I would like for there to be a suitable solution to deploy a low-spec version for desktop password management to all our staff."
"With Delinea Privileged Access Service, when installing the identity connectors to configure with AD, the configuration was not happening properly."
"The pricing and presence could be improved."
"This solution needs better integration with third-party solutions because their ability to support other tools is very weak."
More CyberArk Privileged Access Manager Pricing and Cost Advice →
More Delinea Privileged Access Service Pricing and Cost Advice →
CyberArk Privileged Access Manager is ranked 1st in Privileged Access Management (PAM) with 144 reviews while Delinea Privileged Access Service is ranked 10th in Privileged Access Management (PAM) with 10 reviews. CyberArk Privileged Access Manager is rated 8.8, while Delinea Privileged Access Service is rated 8.0. The top reviewer of CyberArk Privileged Access Manager writes "Lets you ensure relevant, compliant access in good time and with an audit trail, yet lacks clarity on MITRE ATT&CK". On the other hand, the top reviewer of Delinea Privileged Access Service writes "Very cost-effective and provides secure access to environments". CyberArk Privileged Access Manager is most compared with Cisco ISE (Identity Services Engine), Microsoft Entra ID, Delinea Secret Server, WALLIX Bastion and One Identity Safeguard, whereas Delinea Privileged Access Service is most compared with Microsoft Purview Privileged Access Management, Azure Key Vault, Delinea Secret Server, SAP Identity Management and SailPoint Identity Security Cloud. See our CyberArk Privileged Access Manager vs. Delinea Privileged Access Service report.
See our list of best Privileged Access Management (PAM) vendors.
We monitor all Privileged Access Management (PAM) reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.