We performed a comparison between ARCON Privileged Access Management and CyberArk Privileged Access Manager based on real PeerSpot user reviews.
Find out in this report how the two Privileged Access Management (PAM) solutions compare in terms of features, pricing, service and support, easy of deployment, and ROI."The deployment process for the solution was easy...The solution's technical support team was good."
"Video and audio logs are there for any activities that the privileged admin carries out."
"After storing the administrator password in this password vault of the solution, the solution can automatically go and change the password based on the defined frequency with the defined complexity."
"Session recording is the most valuable feature, as it covers compliance and it also covers our in-house applications."
"The most valuable feature is it is easy to use and the interface is intuitive."
"It gives us a lot of comfort in terms of security level. Our infrastructure devices and servers are secured and nobody can have unauthorized access to them."
"We use ARCON Privileged Access Management to monitor and record our admin users' activity."
"For compliance, each change I do, in each of the servers, is clearly recorded. We recently faced an audit and this was an awesome feature. Even our auditor had praise for it saying, "This is really a good feature.""
"Central Password Manager is useful for agentless automated password management through AD integration as well as endpoints for different devices."
"The automatic password management is the most important feature. The second most important feature is the ability to enforce dual control on the release of those passwords. The combination of these two features is the most important thing for us because we can show that we're in control of who uses any non-personal account, and when they do so."
"What I found most valuable in CyberArk Privileged Access Manager is the Session Manager as it allows you to split the connection between the administrator site and the target site. I also found the Password Manager valuable as it lets you rotate the passwords of privileged users."
"There are no issues with scalability. Our clients are very happy to use the product."
"We are able to know who is accessing what and when; having accountability."
"The integrations are the most valuable aspect of CyberArk Privileged Access Manager. The software offers pre-built integrations, and our team can also create custom connectors. This flexibility allows us to integrate with systems that we previously didn't consider integrating with, making it a significant advantage for us."
"It is a central repository. Therefore, if someone needs to access a server, then they go through CyberArk PAM. It provides a secure way to do this and CyberArk PAM records everything. For example, if you are connecting to a Linux server, then once you get into the Linux server and if it is integrated with CyberArk, it will automatically start recording everything that is being done. In most banks, seeing the recordings is very useful. If there are any gaps or something has happened which shouldn't have happened, then we can check the logs and videos. So, it gives security, in a robust manner, to the organization."
"The product is an important security measure against credential theft. It ensures session isolation and password rotation including pushing passwords to the endpoints."
"I would like to see a "wild card" kind of a feature or something that would enable us to search the video."
"If an ID gets locked, the tool cannot unlock it, making it an area where improvements are required."
"It should be browser-agnostic and, frankly, it is working well on Internet Explorer. It should work on popular browsers like Mozilla and Firefox."
"It should support the SQL Always On platform with FQDN name instead of IP."
"For the in-house built applications, they need to provide good, solid access through their portal."
"We expect improvement in the dashboards to provide visibility of password compliance status, whenever a password is opened from the vault. Also, flexibility to customize the live dashboard."
"This product is lacking in terms of dashboarding analytics and should have user behavior analytics. It should also have better dashboarding for executive management and security managers, which this product is missing."
"We would like to see support for privileged accounts used in web-based systems like Blue Coat Secure Web Gateway, VMware ESXI management tools, etc."
"They are sometimes not flexible with things. For instance, from one day to another, there might be something that had been done years ago by CyberArk, then they say, "We do not support that." You then have to initiate a complaint and start working with them. Things might become complicated and months pass while you are working with them. Usually, they are good and fast, but sometimes they seem to be blocked with problems, e.g., you will suddenly be working with another team instead of the team that you were working with the day before."
"There is some stuff that we still have not fully integrated, which is our AIM solution. We are having all types of issues with it. I have been working with Level 3 support on it, but otherwise, from a functionality perspective, everything has been working except for the AIM solution."
"The admin interface of the Password Vault Web Access (PVWA) is moving from an old style (the classic interface) to a new style (the v10 interface) and unfortunately, this process is quite slow."
"There is room for improvement in the availability of custom connectors on the marketplace for this solution. Additionally, their services for the CICD pipeline and ease of integration could be improved."
"The initial setup was somewhat complex."
"The initial setup has room for improvement to be more straightforward."
"The issue of technical support is crucial, as there are not many specialized partners available in Brazil to provide this service. While English language support is of good quality, there is a significant shortage of partners capable of meeting the demand locally."
"They can do a better job in the PSM space."
More ARCON Privileged Access Management Pricing and Cost Advice →
More CyberArk Privileged Access Manager Pricing and Cost Advice →
ARCON Privileged Access Management is ranked 8th in Privileged Access Management (PAM) with 32 reviews while CyberArk Privileged Access Manager is ranked 1st in Privileged Access Management (PAM) with 142 reviews. ARCON Privileged Access Management is rated 7.8, while CyberArk Privileged Access Manager is rated 8.8. The top reviewer of ARCON Privileged Access Management writes "Offers good session monitoring and recording features". On the other hand, the top reviewer of CyberArk Privileged Access Manager writes "Lets you ensure relevant, compliant access in good time and with an audit trail, yet lacks clarity on MITRE ATT&CK". ARCON Privileged Access Management is most compared with Cisco ISE (Identity Services Engine), BeyondTrust Endpoint Privilege Management, ManageEngine PAM360, Delinea Secret Server and WALLIX Bastion, whereas CyberArk Privileged Access Manager is most compared with Cisco ISE (Identity Services Engine), Microsoft Entra ID, Delinea Secret Server, WALLIX Bastion and CyberArk Identity. See our ARCON Privileged Access Management vs. CyberArk Privileged Access Manager report.
See our list of best Privileged Access Management (PAM) vendors.
We monitor all Privileged Access Management (PAM) reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.