We performed a comparison between CyberArk Privileged Access Manager and SAP Customer Data Cloud based on real PeerSpot user reviews.
Find out what your peers are saying about CyberArk, Delinea, BeyondTrust and others in Privileged Access Management (PAM)."The most important feature is managing the credentials and implementing those policies which rotate the credentials. Session Manager is also key in not letting the users have access to those credentials. Instead, CyberArk actually manages everything by itself."
"It allows users to self-provision access to the accounts that they need."
"The most valuable feature is Special Monitoring."
"It has the ability to scale out. We have scaled out quite a bit with our product and use of it to get to multiple locations and businesses, so it has the breadth to do that."
"Creating policies and the password rotation feature have been valuable. We don't have to memorize our password for the ADM account."
"The product is for hardening access and making the organization more secure, therefore reducing chances of a breach."
"Because we now have the ability to grant access to management utilities like DNS Manager, Sequel Studio, and MMC, in a secure fashion, without system admins being required to continually reenter various passwords that are stored who knows where, it has really made the system admin's job much easier. It has made the PSM's job much easier. It has made the auditor's job and the security team's job and the access manager's job significantly easier, because we're able to move much more quickly toward a role-based access management system, and that is really streamlining the whole onboarding/offboarding management process."
"PSM (Privilege Session Manager."
"SAP CDC is very easy to use and the best part about this tool is its documentation."
"The current user interface is a little dated. However, I hear there are changes coming in the next version."
"They need to provide better training for the System Integrator."
"We'd like to see the creation of some kind of memo field for each device account, which could be used, in our network at least, to leave a note about the device for either the security or network engineering team members."
"Stability is a huge concern right now. We are on a version which is very unstable. We have to upgrade to stabilize it. It is fine, but the problem is we have to hire CyberArk to do the upgrade. This costs money, and it is their bug."
"The initial setup of CyberArk is a challenge if you do not have prior experience with it."
"Make it easier to deploy."
"If you are an administrator or architect, then the solution is kind of complicated, as it is mostly focused on the end user. So, they need to also focus on the people who are implementing it."
"We found a lot of errors during the initial setup. They should work to improve the implementation experience and to remove errors from the process."
"I have struggled to give different access to different users in the same application."
More CyberArk Privileged Access Manager Pricing and Cost Advice →
Earn 20 points
CyberArk Privileged Access Manager is ranked 1st in Privileged Access Management (PAM) with 144 reviews while SAP Customer Data Cloud is ranked 2nd in Social Login. CyberArk Privileged Access Manager is rated 8.8, while SAP Customer Data Cloud is rated 8.0. The top reviewer of CyberArk Privileged Access Manager writes "Lets you ensure relevant, compliant access in good time and with an audit trail, yet lacks clarity on MITRE ATT&CK". On the other hand, the top reviewer of SAP Customer Data Cloud writes "Enables us to sell products which creates significant revenue but their disaster recovery needs improvement". CyberArk Privileged Access Manager is most compared with Cisco ISE (Identity Services Engine), Microsoft Entra ID, Delinea Secret Server, WALLIX Bastion and One Identity Safeguard, whereas SAP Customer Data Cloud is most compared with Auth0, SAP Identity Management, Okta Workforce Identity, ForgeRock and Symantec VIP Access Manager.
We monitor all Privileged Access Management (PAM) reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.