CyberArk Privileged Access Manager vs Perimeter 81 comparison

Cancel
You must select at least 2 products to compare!
CyberArk Logo
10,944 views|6,238 comparisons
92% willing to recommend
Perimeter 81 Logo
2,793 views|1,603 comparisons
97% willing to recommend
Comparison Buyer's Guide
Executive Summary

We performed a comparison between CyberArk Privileged Access Manager and Perimeter 81 based on real PeerSpot user reviews.

Find out what your peers are saying about CyberArk, Delinea, BeyondTrust and others in Privileged Access Management (PAM).
To learn more, read our detailed Privileged Access Management (PAM) Report (Updated: April 2024).
769,976 professionals have used our research since 2012.
Featured Review
Quotes From Members
We asked business professionals to review the solutions they use.
Here are some excerpts of what they said:
Pros
"Enterprise Password Vault, Privilege Session Manager, and Application Identity Management have been very useful for our client environment.""It is a robust product.""Helped us meet our standards and requirements to help us comply with industry standards and banking regulations.""CyberArk Privileged Access Manager's main benefit is it provides secure access to our servers. There are features to capture the user activity, it provides video recording processing. If the users are logged in to the server, we can see what activities they are performing. It's a very nice tool for Privileged Access Management. They have plenty of useful services and the solution has fulfilled our needs.""The solution helps our developers access internal systems. It also helps us in Privilege Access Management.""They just released Marketplace, and they are constantly releasing updates to the components and adding new components, like Conjur. This is something that we ran into with Secret Server and DevOps, so it is already scalable, but becoming more so in the future.""We like it for the ability to automatically change passwords. At least for my group, that's the best thing.""CyberArk has the ability to change the credentials on every platform."

More CyberArk Privileged Access Manager Pros →

"The feature that I have found to be most valuable is the reputation that the company has regarding privacy. Nowadays, this is critical, especially when you do all of your work online.""Perimeter 81 provides a very secure and non-disruptive experience.""It has provided a seamless gateway to much-needed platforms.""It keeps us all accountable and ensures secure internet connections while we all work remotely.""It connects quickly and stays connected. The user interface is pretty neat too. The app has in-house support with user guides that give you step-by-step walkthroughs on navigating the app. In addition, there is a live chat feature that offers prompt assistance on the go.""The setup is really easy...I rate the support team a ten out of ten.""Logging back into Perimeter 81 is relatively user-friendly as I just need to re-type my Windows credentials in to access the VPN.""Our operators can work from home without any problems."

More Perimeter 81 Pros →

Cons
"The solution could improve by adding more connectors.""There is a lot of room for improvement in the report section. I also work on other tools, such as Thycotic, which allows you to create customized reports for your organization's needs. In CyberArk, there are limited reports, whereas in Thycotic or some of the other PAM tools, because the database is different, you can customize the report based on your needs through SQL queries.""The greatest area of improvement is with the user interface of the Password Vault Web Access component.""The product could be easier to use. More work needs to be done on this aspect; it is not good enough yet. It also takes up a lot of server space. Sometimes we need to use up to seven servers.""Some aspects of the administration need improvement, though they have recently made improvements to the API. However, the management with the interface and configuration are not so user-friendly. It has not changed much during all the years that CyberArk has been on the market. The management part, like platform management as well as PSM connectors definition and management, could be improved, even if it has already been done with the API.""The usual workload is sometimes delayed by the solution.""It is web-based, but other competitors have apps. We need to get there. It is just smoother to have an app. You don't have all the bugs from having a browser, and people like them better, since you can get to them via mobile.""We'd like to see the creation of some kind of memo field for each device account, which could be used, in our network at least, to leave a note about the device for either the security or network engineering team members."

More CyberArk Privileged Access Manager Cons →

"Offering in-app explanations detailing what each feature does, its benefits and potential use cases can help users better understand and utilize the tool to its full potential.""There is a very small amount of downtime.""Its initial setup process is complex for a hybrid environment.""The overall UI could be improved and updated to bring a simpler feel to the application.""I'd love to learn more about all of the features. Maybe a monthly spotlight of features or having a banner that explains more ways certain features could be used would be helpful.""I would suggest adding more networking and security features that allow more customization within their platform.""One of our challenges is ensuring the security of our cloud-based operations.""What would be useful would be a notification/warning that a session is due to timeout after exceeding the default connection limit."

More Perimeter 81 Cons →

Pricing and Cost Advice
  • "Pricing and licensing depend on the environment."
  • "It is not a cheap solution. It is expensive as compared with other solutions. However, it is one of the best solutions in their domain."
  • "It can be an expensive product."
  • "Cost efficiency is the number one thing that can be improved in my mind. This would change lots of companies minds on purchasing the product."
  • "The cost is high compared to other products."
  • "CyberArk provides all the features bundled. This is compared to other vendors who provide them as a different license for each functionality."
  • "Our risk is definitely significantly lower. Also, our resources are low."
  • "If you are looking at implementing this solution, buy the training and go to it."
  • More CyberArk Privileged Access Manager Pricing and Cost Advice →

  • "Overall I am very happy with the solution’s flexibility and pricing."
  • "The cost of the solution's licenses depends on the particular use cases."
  • "The solution is priced appropriately considering its uses. For an essential license, a user pays only 30 USD per month. For an enterprise version, the prices can be negotiated with the company."
  • "Perimeter 81 charges separately for gateways and VPN connectivity, but compared to Azure, it seemed more reasonable."
  • More Perimeter 81 Pricing and Cost Advice →

    report
    Use our free recommendation engine to learn which Privileged Access Management (PAM) solutions are best for your needs.
    769,976 professionals have used our research since 2012.
    Questions from the Community
    Top Answer:We evaluated Sailpoint IdentityIQ before ultimately choosing CyberArk. Sailpoint Identity Platform is a solution to manage risks in cloud enterprise environments. It automates and streamlines the… more »
    Top Answer:The product is expensive. I rate the product’s pricing a seven out of ten, where one is cheap and ten is expensive.
    Top Answer:Even after restarting, it tries to quickly reestablish connection which is very helpful.
    Top Answer:It's essential to consider the organization's specific requirements and budget. Here are some general recommendations: * Evaluate your needs * Understand pricing models * Request a quote * Compare… more »
    Top Answer:In terms of improvement, Perimeter 81 could enhance its reporting and analytics capabilities to provide more detailed insights into network activity. Additionally, expanding integration options with a… more »
    Ranking
    Views
    10,944
    Comparisons
    6,238
    Reviews
    33
    Average Words per Review
    626
    Rating
    8.9
    5th
    out of 34 in ZTNA as a Service
    Views
    2,793
    Comparisons
    1,603
    Reviews
    14
    Average Words per Review
    548
    Rating
    9.1
    Comparisons
    Also Known As
    CyberArk Privileged Access Security
    Learn More
    Overview

    CyberArk Privileged Access Manager is a next-generation solution that allows users to secure both their applications and their confidential corporate information. It is extremely flexible and can be implemented across a variety of environments. This program runs with equal efficiency in a fully cloud-based, hybrid, or on-premises environment. Users can now protect their critical infrastructure and access it in any way that best meets their needs.

    CyberArk Privileged Access Manager possesses a simplified and unified user interface. Users are able to manage the solution from one place. The UI allows users to view and manage all of the information and controls that administrators need to be able to easily access. Very often, management UIs do not have all of the controls and information streamlined in a single location. This platform provides a level of visibility that ensures users will be able to view all of their system’s most critical information at any time that they wish.

    Benefits of CyberArk Privileged Access Manager

    Some of CyberArk Privileged Access Manager’s benefits include:

    • The ability to manage IDs and permissions across a cloud environment. In a world where being able to work remotely is becoming increasingly important, CyberArk Privileged Access Manager is a very valuable tool. Administrators do not need to worry about infrastructure security when they are away from the office. They can assign and manage security credentials from anywhere in the world.
    • The ability to manage the program from a single centralized UI. CyberArk Privileged Access Manager’s UI contains all of the system controls and information. Users now have the ability to view and use all of their system’s most critical information and controls from one place.
    • The ability to automate user management tasks. Administrators can save valuable time by assigning certain management tasks to be fulfilled by the system itself. Users can now reserve their time for tasks that are most pressing. It can also allow for the system to simplify the management process by having the platform perform the most complex functions.

    Reviews from Real Users

    CyberArk Privileged Access Manager’s software stands out among its competitors for one very fundamental reason. CyberArk Privileged Access Manager is an all-in-one solution. Users are given the ability to accomplish with a single platform what might usually only be accomplished with multiple solutions.

    PeerSpot users note the truly all-in-one nature of this solution. Mateusz K., IT Manager at a financial services firm, wrote, "It improves security in our company. We have more than 10,000 accounts that we manage in CyberArk. We use these accounts for SQLs, Windows Server, and Unix. Therefore, keeping these passwords up-to-date in another solution or software would be impossible. Now, we have some sort of a platform to manage passwords, distribute the inflow, and manage IT teams as well as making regular changes to it according to the internal security policies in our bank."

    Hichem T.-B., CDO & Co-Founder at ELYTIK, noted that “This is a complete solution that can detect cyber attacks well. I have found the proxy features most valuable for fast password web access.”

    Perimeter 81 is a cloud-based network security and software-defined perimeter (SDP) solution designed to provide secure access to resources in the cloud, data centers, and on-premises environments. It offers a unified platform for organizations to manage and secure their network infrastructure, regardless of the location or type of resources.  

    Perimeter 81 Benefits:

    • Easy to use
    • Flexible access policies
    • Strong encryption and authentication protocols
    • Scalable
    • Compatible with various devices and platforms

    Perimeter 81 Features:

    • Secure Network Access: Perimeter 81 provides secure access to internal resources and cloud-based applications through its client applications and gateways.
    • Software-Defined Perimeter (SDP): SDP is a security framework that focuses on dynamically creating secure connections between users and resources on a need-to-know basis. 
    • Zero Trust Network Access (ZTNA): Perimeter 81 follows the Zero Trust security model, which assumes that no user or device can be inherently trusted. 
    • Multi-Cloud and Hybrid Cloud Support: Perimeter 81 is designed to secure access to resources across multi-cloud and hybrid cloud environments.
    • User and Device Management: The solution offers centralized user and device management capabilities, allowing administrators to define access policies, manage user roles, and enforce multi-factor authentication (MFA) for enhanced security. 
    • Network Segmentation: Perimeter 81 enables organizations to segment their network resources, creating isolated environments based on logical groupings. 
    • Centralized Management and Analytics: Perimeter 81 provides a centralized management console where administrators can configure and monitor their network security settings.

    Reviews from Real Users

    PeerSpot user, Frontend Developer at Limelight Networks, states that "We use some VPN solutions, and Perimeter 81 has the best user experience for desktop or mobile".

    Daniel Goldfeld, Vice President of Customer Success at Mine - The All-in-One Privacy Suite, says that Perimeter 81 has "Great SAML and SCIM support with the ability to deploy site-2-site tunnels with specific IP restrictions".

    Another PeerSpot user, Accounts Payable Specialist at Simera, writes that "The feature that I have found to be most valuable is the reputation that the company has regarding privacy. Nowadays, this is critical, especially when you do all of your work online."

      Sample Customers
      Rockwell Automation
      Aqua Security, Cognito, Multipoint, Kustomer, Postman, Meredith
      Top Industries
      REVIEWERS
      Financial Services Firm23%
      Insurance Company13%
      Computer Software Company13%
      Healthcare Company9%
      VISITORS READING REVIEWS
      Educational Organization30%
      Computer Software Company12%
      Financial Services Firm10%
      Manufacturing Company5%
      REVIEWERS
      Computer Software Company58%
      University8%
      Media Company8%
      Construction Company8%
      VISITORS READING REVIEWS
      Computer Software Company22%
      Financial Services Firm7%
      Manufacturing Company7%
      Government6%
      Company Size
      REVIEWERS
      Small Business21%
      Midsize Enterprise13%
      Large Enterprise66%
      VISITORS READING REVIEWS
      Small Business15%
      Midsize Enterprise38%
      Large Enterprise48%
      REVIEWERS
      Small Business48%
      Midsize Enterprise30%
      Large Enterprise22%
      VISITORS READING REVIEWS
      Small Business34%
      Midsize Enterprise19%
      Large Enterprise47%
      Buyer's Guide
      Privileged Access Management (PAM)
      April 2024
      Find out what your peers are saying about CyberArk, Delinea, BeyondTrust and others in Privileged Access Management (PAM). Updated: April 2024.
      769,976 professionals have used our research since 2012.

      CyberArk Privileged Access Manager is ranked 1st in Privileged Access Management (PAM) with 142 reviews while Perimeter 81 is ranked 5th in ZTNA as a Service with 22 reviews. CyberArk Privileged Access Manager is rated 8.8, while Perimeter 81 is rated 9.2. The top reviewer of CyberArk Privileged Access Manager writes "Lets you ensure relevant, compliant access in good time and with an audit trail, yet lacks clarity on MITRE ATT&CK". On the other hand, the top reviewer of Perimeter 81 writes "Great SAML and SCIM support with the ability to deploy site-2-site tunnels with specific IP restrictions". CyberArk Privileged Access Manager is most compared with Cisco ISE (Identity Services Engine), Microsoft Entra ID, Delinea Secret Server, WALLIX Bastion and One Identity Safeguard, whereas Perimeter 81 is most compared with Zscaler Zero Trust Exchange, Cato SASE Cloud Platform, Prisma Access by Palo Alto Networks, Cloudflare Access and Tailscale.

      We monitor all Privileged Access Management (PAM) reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.