ARCON Privileged Access Management vs BeyondTrust Endpoint Privilege Management vs CyberArk Privileged Access Manager vs One Identity Safeguard vs Symantec Privileged Access Manager comparison

Cancel
You must select at least 2 products to compare!
Comparison Buyer's Guide
Executive Summary

We performed a comparison between ARCON Privileged Access Management, BeyondTrust Endpoint Privilege Management, CyberArk Privileged Access Manager, One Identity Safeguard, and Symantec Privileged Access Manager based on real PeerSpot user reviews.

Find out what your peers are saying about CyberArk, Delinea, BeyondTrust and others in Privileged Access Management (PAM).
To learn more, read our detailed Privileged Access Management (PAM) Report (Updated: April 2024).
771,346 professionals have used our research since 2012.
Featured Review
report
Use our free recommendation engine to learn which Privileged Access Management (PAM) solutions are best for your needs.
771,346 professionals have used our research since 2012.
Questions from the Community
Top Answer:Some options are required in the tool, especially to help in scenarios where if a user's ID gets locked, that person… more »
Top Answer:This is an inside-out --- outside-in --- inside-in question, as an insider can be an outsider as well. There is no short… more »
Top Answer:The solution's least privilege enforcement has helped us ensure access is given to only the required people.
Top Answer:On a scale from one to ten, where one is cheap and ten is expensive, I rate the solution's pricing a seven out of ten.
Top Answer:We evaluated Sailpoint IdentityIQ before ultimately choosing CyberArk. Sailpoint Identity Platform is a solution to… more »
Top Answer:The product is expensive. I rate the product’s pricing a seven out of ten, where one is cheap and ten is expensive.
Top Answer:The identity discovery is good, and the performance is pretty good value.
Top Answer:They have comparable pricing. All identity products are essentially priced in a similar way. It's a per-user base… more »
Top Answer:Something for One Identity to look at is having integration guidelines for how to logically group accounts. This is… more »
Top Answer:We can check the activities in the server for fragile files and documents in case of any issues.
Top Answer:The product's pricing depends on the agreement. They offer per-device, per-user, or monthly and yearly licensing models.
Top Answer:There should be some training platform similar to Microsoft and IBM. We can't find useful documentation or YouTube… more »
Ranking
Views
3,499
Comparisons
1,320
Reviews
10
Average Words per Review
373
Rating
7.7
Views
4,141
Comparisons
1,784
Reviews
10
Average Words per Review
643
Rating
7.9
Views
10,944
Comparisons
6,238
Reviews
33
Average Words per Review
626
Rating
8.9
Views
3,615
Comparisons
1,563
Reviews
14
Average Words per Review
950
Rating
7.7
Views
865
Comparisons
540
Reviews
3
Average Words per Review
424
Rating
6.7
Comparisons
Also Known As
ARCON ARCOS, ARCON PAM
BeyondTrust PowerBroker, BeyondTrust Endpoint Privilege Management for Windows, BeyondTrust Endpoint Privilege Management for Mac, BeyondTrust Endpoint Privilege Management for Linux, BeyondTrust Endpoint Privilege Management for Unix, Avecto Defendpoint
CyberArk Privileged Access Security
CA PAM, Xceedium Xsuite, CA Privileged Access Manager
Learn More
Overview

ARCON PAM is a full blown Privileged Access Management solution. It has a robust password vaulting technology that comes with AES- 256 Database encryption. Dual Factor Authentication, 4Eye Authentication functionalities and Granular Access Control enables an enterprise to block any unauthorized access attempt to critical information assets. All access is based on “Need to know” and “Need to do” basis. It has the largest connector stack. Its Single Sign On enables seamless access to a host of devices with just a single click.

The Solution enables an enterprise to monitor and analyze advanced threats in a real time. It has the best-in-class real-time threat analytics. It provides comprehensive audit trails and session recordings to ensure that all activities are tracked and these logs are encrypted and separately stored creating a legal hold.

Further, it has a highly scalable architecture that easily integrates with Third Party SIEM Solutions. It also supports cloud environment.

ARCON PAM is full-functionality solution at the most optimum pricing. More than 250 global enterprises spanning wide-ranging industries such as Banking, Financial Services and Insurance (BFSI), Government Organizations, Media, Health Care, and Fintech have deployed ARCON PAM as of today.

While the company continues to be a leader in India and the Middle East, it has gained a solid traction in Africa and APAC market thanks to its well-distributed global channel network and strong industry reputation it enjoys in the cyber security domain.

BeyondTrust Endpoint Privilege Management enables organizations to mitigate attacks by removing excess privileges on Windows, Mac, Unix/Linux and networked devices. Remove excessive end user privileges and control applications on Windows, Mac, Unix, Linux, and networked devices without hindering end-user productivity.

Key Solutions Include:

-ENTERPRISE PASSWORD SECURITY

Discover, manage and monitor all privileged accounts and SSH keys, secure privileged assets, and report on all privileged account activity in a single solution.

-ENDPOINT LEAST PRIVILEGE

Enforce least privilege across all Windows and Mac endpoints, gain visibility into target system vulnerabilities, and control access to privileged applications without disrupting user productivity or compromising security.

-SERVER PRIVILEGE MANAGEMENT

Gain control and visibility over Unix, Linux and Windows server user activity without sharing the root or administrator account.

-A SINGLE PLATFORM FOR MANAGEMENT, POLICY, REPORTING AND THREAT ANALYTICS

Utilize a single solution to manage PAM policies and deployment, understand vulnerability and threat analytics, and provide reporting to multiple stakeholders and complementary security systems.

Learn more at https://www.beyondtrust.com/privilege-management

CyberArk Privileged Access Manager is a next-generation solution that allows users to secure both their applications and their confidential corporate information. It is extremely flexible and can be implemented across a variety of environments. This program runs with equal efficiency in a fully cloud-based, hybrid, or on-premises environment. Users can now protect their critical infrastructure and access it in any way that best meets their needs.

CyberArk Privileged Access Manager possesses a simplified and unified user interface. Users are able to manage the solution from one place. The UI allows users to view and manage all of the information and controls that administrators need to be able to easily access. Very often, management UIs do not have all of the controls and information streamlined in a single location. This platform provides a level of visibility that ensures users will be able to view all of their system’s most critical information at any time that they wish.

Benefits of CyberArk Privileged Access Manager

Some of CyberArk Privileged Access Manager’s benefits include:

  • The ability to manage IDs and permissions across a cloud environment. In a world where being able to work remotely is becoming increasingly important, CyberArk Privileged Access Manager is a very valuable tool. Administrators do not need to worry about infrastructure security when they are away from the office. They can assign and manage security credentials from anywhere in the world.
  • The ability to manage the program from a single centralized UI. CyberArk Privileged Access Manager’s UI contains all of the system controls and information. Users now have the ability to view and use all of their system’s most critical information and controls from one place.
  • The ability to automate user management tasks. Administrators can save valuable time by assigning certain management tasks to be fulfilled by the system itself. Users can now reserve their time for tasks that are most pressing. It can also allow for the system to simplify the management process by having the platform perform the most complex functions.

Reviews from Real Users

CyberArk Privileged Access Manager’s software stands out among its competitors for one very fundamental reason. CyberArk Privileged Access Manager is an all-in-one solution. Users are given the ability to accomplish with a single platform what might usually only be accomplished with multiple solutions.

PeerSpot users note the truly all-in-one nature of this solution. Mateusz K., IT Manager at a financial services firm, wrote, "It improves security in our company. We have more than 10,000 accounts that we manage in CyberArk. We use these accounts for SQLs, Windows Server, and Unix. Therefore, keeping these passwords up-to-date in another solution or software would be impossible. Now, we have some sort of a platform to manage passwords, distribute the inflow, and manage IT teams as well as making regular changes to it according to the internal security policies in our bank."

Hichem T.-B., CDO & Co-Founder at ELYTIK, noted that “This is a complete solution that can detect cyber attacks well. I have found the proxy features most valuable for fast password web access.”

One Identity Safeguard manages and monitors privileged access, enhancing security with features like automatic session recording, real-time monitoring, and credential rotation. It integrates seamlessly, supports compliance with audit trails, and improves operational efficiency across organizations. This robust platform significantly bolsters security protocols while controlling sensitive operations.

CA Privileged Access Manager is a simple-to-deploy, automated, proven solution for privileged access management in physical, virtual and cloud environments. It enhances security by protecting sensitive administrative credentials such as root and administrator passwords, controlling privileged user access, proactively enforcing policies and monitoring and recording privileged user activity across all IT resources.  It includes CA PAM Server Control (previously CA Privileged Identity Manager) for fine-grained protection of critical servers

Sample Customers
RAK Bank, AXIS Bank, Reliance Capital, Kotak Life Insurance, MTS
Aera Energy LLC, Care New England, James Madison University
Rockwell Automation
Cavium
NEOVERA, Telesis, eSoft
Top Industries
REVIEWERS
Financial Services Firm52%
Computer Software Company9%
Healthcare Company9%
Comms Service Provider4%
VISITORS READING REVIEWS
Educational Organization60%
Computer Software Company9%
Financial Services Firm4%
Retailer3%
REVIEWERS
Construction Company13%
Retailer13%
Government13%
Financial Services Firm13%
VISITORS READING REVIEWS
Financial Services Firm14%
Computer Software Company12%
Manufacturing Company10%
Government8%
REVIEWERS
Financial Services Firm23%
Insurance Company13%
Computer Software Company13%
Healthcare Company9%
VISITORS READING REVIEWS
Educational Organization30%
Computer Software Company12%
Financial Services Firm10%
Manufacturing Company5%
REVIEWERS
Financial Services Firm40%
Healthcare Company15%
Manufacturing Company10%
University5%
VISITORS READING REVIEWS
Computer Software Company21%
Financial Services Firm12%
Manufacturing Company7%
Government7%
REVIEWERS
Financial Services Firm19%
Retailer19%
Logistics Company14%
Government10%
VISITORS READING REVIEWS
Computer Software Company16%
Manufacturing Company14%
Financial Services Firm14%
Comms Service Provider10%
Company Size
REVIEWERS
Small Business25%
Midsize Enterprise28%
Large Enterprise47%
VISITORS READING REVIEWS
Small Business10%
Midsize Enterprise65%
Large Enterprise26%
REVIEWERS
Small Business41%
Midsize Enterprise7%
Large Enterprise52%
VISITORS READING REVIEWS
Small Business20%
Midsize Enterprise13%
Large Enterprise67%
REVIEWERS
Small Business21%
Midsize Enterprise13%
Large Enterprise66%
VISITORS READING REVIEWS
Small Business15%
Midsize Enterprise38%
Large Enterprise47%
REVIEWERS
Small Business36%
Midsize Enterprise24%
Large Enterprise40%
VISITORS READING REVIEWS
Small Business24%
Midsize Enterprise20%
Large Enterprise55%
REVIEWERS
Small Business28%
Midsize Enterprise11%
Large Enterprise61%
VISITORS READING REVIEWS
Small Business14%
Midsize Enterprise7%
Large Enterprise79%
Buyer's Guide
Privileged Access Management (PAM)
April 2024
Find out what your peers are saying about CyberArk, Delinea, BeyondTrust and others in Privileged Access Management (PAM). Updated: April 2024.
771,346 professionals have used our research since 2012.