Over 258,440 professionals have used IT Central Station research.
Compare the best Enterprise Password Managers vendors based on product reviews, ratings, and comparisons.
All reviews and ratings are from real users, validated by our triple authentication process.
The total ranking of a product, represented by the bar length, is based on a weighted aggregate score.
The score is calculated as follows: The product with the highest count in each area gets the highest available score.
(20 points for Reviews; 16 points for Views, Comparisons, and Followers.)
Every other product gets assigned points based on its total in proportion to the #1 product in
that area. For example, if a product has 80% of the number of reviews compared to the product
with the most reviews then the product's score for reviews would be 20% (weighting factor) *
80% = 16. For Average Rating, the maximum score is 32 points awarded linearly based on our
rating scale of 1-10. If a product has fewer than ten reviews, the point contribution
for Average Rating is reduced (one-third reduction in points for products with 5-9 reviews;
two-thirds reduction for products with fewer than five reviews). Reviews that are more than 24 months old,
as well as those written by resellers, are completely excluded from the ranking algorithm.
Randomizing local accounts on all endpoints * ERPM's greatest ability is that it can easily randomize ALL local accounts on almost any endpoint. One of biggest security risks that occur within a company is the ability of an attacker to... more»
One of the features that ERPM is capable of providing is giving users the ability to 'request' admin credentials on their machines for a specific purpose (provided you have removed all users from local admin on their machines). You can force... more»
There is no group inheritance. The management through the plugin is poor. It consumes tons of client resources especially as an administrator. The plugin crashes from time to time. URL recognition is difficult especially when adding new... more»
We can access our sign-ins and passwords on up to five devices per user. This means I can access a given site and my login and password for that site from my home and office computers as well as my phone and iPad. We can share passwords and... more»
I personally add fields and save contact phone numbers or agency codes which I now can access wherever I am. I used to have to wait until I got to the office to get a password or some key information. It has saved me trips. We have 16 people... more»
I am very satisfied with the current features. They could possibly add a pre-designed contact feature that would work similar to a cell phone contact feature. The information that I need along with the web address and the passwords is often... more»
Auditing and control are the most valuable. You can control password management almost to the max, giving you, your users and your auditors great flexibility without compromising security. The auditing and control is more valuable to the... more»
Recertification of accounts and users, whereas previously 100s of accounts reside on devices, targets, applications, etc., now, due to using the vault and recertification, owners are in total control of their accounts and usage. Dual control... more»
Small things such as resizing pop-ups but mainly the reporting possibilities: These are quite poor in my honest opinion. If you really want custom reports you actually need to export data to an Access database and create your own queries and... more»
We have benefited as follows: * Automation of the rotation of privileged credentials across the enterprise * The Active Directory discovery almost always uncovers previously undiscovered accounts that are running processes in the environment... more»
The included session recording is not very robust. The session recording feature is supplementary to the core product. It is an implementation of Microsoft Expressions and IIS Media components, freely available from Microsoft, that plugs into... more»
The secured vault storage offers great capabilities for structuring and accessing data. Central Password Manager is useful for agentless automated password management on endpoints. Privileged Session Manager is good for provisioning,... more»
CyberArk provided an audit trail for all account operations, including session recordings for all activities performed with high privilege accounts. It also gave us the ability to define various access controls per group, enabling us to... more»
The product documentation could be a little more precise in certain aspects with clearer explanations for functionality limitations. New functionalities or discovered bugs take a little longer to patch. We would greatly appreciate quicker... more»
-Ease of use and simple graphic interface. -Strong security with AES 256 encryption, dual factor authentication,password to access keeper is encrypted and not keys are not held by Keeper, 100,000 PBKDF2 iterations. -Simple to sync between all... more»
-Ability to store and share certain user ID's & passwords with specific people or groups depending on need to know. -If a password or ID is forgotten, it's easy to lookup. -Enables IT department to force very complex passwords for certain... more»
-Ability to store 'files' from IOS & Android devices. You can store pics from these devices currently. Most file formats can be uploaded from PC's/Macs -Not an area for improvement per se, but to continue being on top of the latest... more»
When our field engineers logged into a workstation, they had to use the local admin password. They maintain 12,000 workstations. We used ERPM to create a new local admin account that is managed by ERPM, created a management set and defined... more»
Macs: The support team wasn't too knowledgeable about how to deploy the above solution to MAC workstations. We deployed a solution where our desktop support team would use a local admin password created and managed by ERPM. There is a default... more»
* Heart beats – it tells me when passwords on file are no longer working. This could be an oversight, but could also be a sign of hacker activity. * Secret Expiry – reports on passwords that haven’t been changed and may be out of policy. *... more»
We previously had a very lax password policy, and passwords were stored in Excel spreadsheets. Passwords were often not documented, or the documented password was not updated if changed. We now have a much stricter, safer password policy.... more»
Session recording could offer more control and block certain actions or commands. I have experience of other products that focus on session recording, so I’m aware of what advanced functionality can be achieved. Specifically, I’m referring... more»
Systems Administrator at a university with 1,001-5,000 employees
What do you think of Thycotic Secret Server?
I have been a proud Thycotic Secret Server customer since 2008. Back in those days, my organization used Secret Server as a secure vault to store all of our highly privileged accounts and their passwords. I manage our Secret Server environment, and over the years we have heavily utilized this product across our entire University to harden our security posture and meet compliance requirements. Secret Server has helped us eliminate many of the manual processes that we performed regarding password changing and rotation, as well as the data we stored in Microsoft Excel. We love the fact that the product discovers privileged accounts across our infrastructure so that we can securely store and manage them appropriately, as well as rotate their passwords to meet our password policy...
Referring to Secret Server v10, we want the ability to add subfolders to the "\Personal Folders" container. We had to rename it to "\Personal Secrets" to avoid confusion. Otherwise, you can create as many top-level folders and subfolders as... more»
The features that I value most are the PSM connect option, where an authorized user doesn't even require a password to open a session to perform their role. Another feature that I think is really valuable is being able to monitor a user's... more»
This tool has definitely helped us manage all the privilege accounts, which mostly have access to the organization's crown-jewel data. Additionally, having a monitoring system puts extra visibility on these account's activities, so any... more»
I think there can be improvement in providing information on how to develop connectors for various applications’ APIs. Additionally, I think the user experience needs to improve. It's not very intuitive at the moment. An account could be more... more»
Parts and Logistics Manager at a manufacturing company
What do you think of Keeper?
Password Generator Ease of use Multi-platform 24/7 support Affordability
• Improvements to My Organization
It provides a simple way to share new passwords for the various sites we work with; no need to write down passwords in a notebook for safekeeping!
• Room for Improvement
I have not encountered any problems or areas that need improvement at this time.
• Use of Solution
I have used it for more than five years.
• Deployment Issues
I have not encountered any deployment issues.
• Stability Issues
I have not encountered any stability issues.
• Scalability Issues
I have not encountered any scalability issues.
• Customer Service and Technical Support
Customer Service: Customer service is fantastic. They are very responsive to my...
Session recording generally works but intermittently stops. The permission model for individual accounts could be made better. It would also be nice to be able to group accounts together, specifically with domain accounts. Currently, the product is centered around nodes and machines. The permission model is based around what they call Management Sets. Management... more»
I love the ease with which I can have hundreds of unique, complex passwords which sync between my phone, tablet, and laptop. I have only one password to remember, which is the one to get me into Keeper. Everything else provides top-notch... more»
Having the unique passwords has provided an additional level of cyber security for my home, business, and, personal life. It is efficient and private. This is a vast improvement over my old process of writing them down in a little notebook... more»
I love the ease of remembering only one master password and letting Keeper create unique, complex passwords for each of the hundreds of websites I connect with. I am able to customize particular labels as needed and Keeper tracks those. For... more»
I have been able to set up different websites in particular folders of my creation. I find them easily and can change passwords easily when I want to. Keeper helps me be efficient and maintain high-quality web hygiene.
The automatic filling of usernames and passwords by the Keeper browser extensions has been one of my favorite features. Another feature is the generator of complex passwords by Keeper. It keeps me safe from being hacked!
This has greatly freed up what used to be required times in the office to access the various pieces of data and information needed to login to conduct business. No more waiting for a password reset or recovery by an administrator. With... more»
I am pretty pleased with the product as is. There is not much more I would add other than perhaps a category for personal documents or photos of ID cards. I would not want to take away from the functionality of it as it exists today.
Senior Consultant (CyberArk) at a tech company with 1,001-5,000 employees
What do you think of CyberArk Enterprise Password Vault?
EPV (Enterprise Password Vault) is the most valuable feature of the product to me. It is the core of the product, where it stores the passwords it needs to protect. It protects privileged IDs within a secure digital vault.
• Room for Improvement
User friendliness and reporting: While the PVWA (Password Vault Web Access) provides a web console for the end user and administrator to access the solution, there is room for improvement. (E.g.: show tips when the mouse hovers over.) Reportingprovides very detailed information; however, it requires customization before it is presentable.
• Use of Solution
I first got introduced to CyberArk around 2012.
• Stability Issues
No issue with stability. The solution provides an HA option.
• Scalability Issues
Keeper helped me stay organized by not having to write down passwords and/or logins every time I created a new login or password. I do not have to write the information in a book or binder that could be easily viewed by anyone else, friend or... more»
Only one single password should be remembered. Works on all my devices: Windows, Android, iOS and has integration with web browsers. Easy to use interface (folders, attachments), possibility to generate password with different levels of... more»
I use Keeper as my work and personal passwords storage. It's my personal decision and I also recommended it to my colleagues. It is very handy to operate with passwords that need to be changed regularly because of the embedded password... more»
Not sure which Enterprise Password Managers solution is right for you?Download our free Enterprise Password Managers Report and find out what your peers are saying about Keeper, CyberArk, Thycotic, and more!