Anonymous UserI.S. Architect at a insurance company
BrettZychIdentity and Access Management Advisor at a energy/utilities company
We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
"BeyondTrust Password Safe's features that I have found most valuable are really those that are knitted in. That is their Smart Rules and Smart Groups, where you design your administration model so you create your AD groups and your asset groups, and configure Password Safe."
"Session recording, password rotation, and password vaulting are the most valuable features."
"Our most valuable features would probably be key rotation, the SKM or SSH key manager, and account discovery."
"Security is the solution's most valuable feature. As far as I know, this solution is the most secure system of this class on the market today, even considering another management system like Fudo Security, which we also use. The integration capabilities are very good; it helps strengthen our overall security."
"Session monitoring is excellent. It may be the solution's most valuable aspect."
"The most valuable feature is that it is flexible. It has many connectors. that have done well, the EPV and SSH sessions are all being recorded and everything works fine."
"The most valuable feature is the special management. It records the activity and the actions that we use for auditing."
"Service count rotation is probably one of my favorite features... The ability to automatically rotate any password I need to really helps with the entire enterprise strategy that we're pushing right now."
"The most valuable feature is the ability to delegate access to admins when they need it."
"The interface is very simple to use."
"The only negative thing I can say is that BeyondTrust was recently bought by Bomgar and the marriage of the multiple companies coming together in the merger has caused a little bit of a hiccup right now in their software versions."
"Its documentation can be improved. Its documentation is currently complicated, and it is not good. It needs to be better. Their technical support can also be improved. It is not bad, but it can be better."
"I think they can improve account onboarding. For instance, you have to use the Password Vault utility, whereas in Thycotic I think there is a feature in the user interface that allows you to upload your account with an Excel file. So I'd like to have a similar thing in CyberArk."
"The solution is too big and complex for any businesses that are small or medium-sized. They should offer a more compact version or make a solution better suited to smaller businesses."
"The initial setup could be simplified. Right now, in comparison to its nearest competitors, it's quite complex."
"In the next release, they could simplify the setup and I would like some tasks added like file sharing. When a client connects to CyberArk and wants to put a file on the server, they cannot."
"The stability depends on the infrastructure it is installed on, which is important because CyberArk does not have the hardware appliance."
"I'd like it to be a little more granular. I want a little bit more control over exactly what we do. I know if you do that, you add more knobs and dials to deal with, but that's just my personal approach: granular access."
"I would prefer that this is a fully-managed service, rather than have to manage the software ourselves and keep it up to date."
"The installation process should be easier and more user-friendly so that you don't need to hire a third party to deploy it."
"It has subscription-based licensing. BeyondTrust is three times less expensive than CyberArk."
"This solution is expensive."
"The price of this solution is expensive."
"This product is very expensive."
"CyberArk is very expensive and there are additional fees for add-ons."
"It's per-company, license-based."
Password Safe unifies privileged password and privileged session management, providing secure discovery, management, auditing, and monitoring for any privileged credential. Password Safe enables organizations to achieve complete control and accountability over privileged accounts.
CyberArk Enterprise Password Vault, a component of the CyberArk Privileged Access Manager Solution, is designed to discover, secure, rotate and control access to privileged account passwords used to access systems throughout the enterprise IT environment. The solution enables organizations to understand the scope of their privileged account risks and put controls in place to mitigate those risks. Flexible policies enable organizations to enforce granular privileged access controls, automate workflows and rotate passwords at a regular cadence without requiring manual IT effort. To demonstrate compliance, organizations can easily report on which users accessed what privileged accounts, when and why.
BeyondTrust Password Safe is ranked 9th in Enterprise Password Managers with 3 reviews while CyberArk Enterprise Password Vault is ranked 1st in Enterprise Password Managers with 12 reviews. BeyondTrust Password Safe is rated 7.6, while CyberArk Enterprise Password Vault is rated 8.6. The top reviewer of BeyondTrust Password Safe writes "One of the best kept secrets". On the other hand, the top reviewer of CyberArk Enterprise Password Vault writes "Stable, good support, and secures each password with individual encryption". BeyondTrust Password Safe is most compared with Microsoft Azure Key Vault, HashiCorp Vault, Thycotic Secret Server, LastPass Business and Keeper, whereas CyberArk Enterprise Password Vault is most compared with HashiCorp Vault, Microsoft Azure Key Vault, AWS Secrets Manager, LastPass Business and ManageEngine Password Manager Pro. See our BeyondTrust Password Safe vs. CyberArk Enterprise Password Vault report.
See our list of best Enterprise Password Managers vendors.
We monitor all Enterprise Password Managers reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.