CyberArk Privileged Access Manager vs Symantec Privileged Access Manager comparison

Cancel
You must select at least 2 products to compare!
Comparison Buyer's Guide
Executive Summary

We performed a comparison between CyberArk Privileged Access Manager and Symantec Privileged Access Manager based on real PeerSpot user reviews.

Find out in this report how the two Privileged Access Management (PAM) solutions compare in terms of features, pricing, service and support, easy of deployment, and ROI.
To learn more, read our detailed CyberArk Privileged Access Manager vs. Symantec Privileged Access Manager Report (Updated: March 2024).
767,319 professionals have used our research since 2012.
Featured Review
Quotes From Members
We asked business professionals to review the solutions they use.
Here are some excerpts of what they said:
Pros
"Provides improved security around having your credentials locked down and rotated regularly.""We are able to rotate privileged user passwords to eliminate fraudulent use.""It enables companies to automate password management on target systems gaining a more secure access management approach.""The technical support for this solution is very good. If I was to rate it on a scale of one to five, I would give it a five.""With CyberArk, you can be fully confident that your existing accounts are secure. You will be 100 percent""It takes people out of the machine work of ensuring credentials remain up-to-date, and handles connection brokering such that human usage and credential management remain independent.""For a while, there were individual IDs having privileged access. We wanted to restrict that. We implemented the solution so that it can be more of internal control. We can have session recordings happening and reduce our attacks.""It has helped us with our adoption with other teams, and it has also helped us to integrate it at the ground level."

More CyberArk Privileged Access Manager Pros →

"CA PAM is working well for us.""The DB clustering is a really good benefit of using CA PAM.""We have received good support from the tech support team.""The interface is very friendly, colorful, and bold.""Password Management and Session Recording. The simplicity and ease that it is to be up and running out-of-the-box is very much appreciated.""It's easy to use and easy to configure.""Stability is solid as a rock.""It reduces the viral attacks on my website. It also allows certain users access to see what happens daily."

More Symantec Privileged Access Manager Pros →

Cons
"CyberArk PAM could greatly benefit from an under-the-hood update; integrating machine learning algorithms could provide predictive insights.""Initially, there was a lot of hiccups, because there were a lot of transitions due to manual installations.""It is easily customized, and that customization makes it very easy to start trying to shoehorn the solution into roles it was never intended to fill.""Online help needs to be looked into with live agent support.""We don't often contact technical support, but when we do it, the response could be faster and better.""For users to access a system via CyberArk Privileged Session Manager, a universal connector needs to be coded in a language called AutoIT and its support for web browsers is so-so. Other products like Centrify have browser plugins that can help automate the process when using their products.""Sometimes the infrastructure team is hesitant to provide more resources.""One of our current issues is a publishing issue. If we whitelist Google Chrome, all the events of Google Chrome should be gone. It is not happening."

More CyberArk Privileged Access Manager Cons →

"The service account management functionality needs to be extended to application pools, SQL database, PowerShell scripts, service account discovery, etc.""The setup is complex.""Bring more technology into the portfolio and being able to collapse those products into a much more integrated way.""They need to have zero tier and active-active setup ​with zero minimum downtime, which they are working on it. ​""Instead of just giving passwords to the user based on job function, from auditing perspective, turn that cycle around. That would really help from an auditing standpoint.""I wish it could create local accounts on desktops.""They need to do a little bit more on the mainframe side.​""What I hope happens with the new product CA PAM is to keep all the useful features that exist in PA, but what I’ve noticed with many new products is the UI gets polished but systems lags stability and performance or it adds additional complexity instead of simplifying the user experience."

More Symantec Privileged Access Manager Cons →

Pricing and Cost Advice
  • "Pricing and licensing depend on the environment."
  • "It is not a cheap solution. It is expensive as compared with other solutions. However, it is one of the best solutions in their domain."
  • "It can be an expensive product."
  • "Cost efficiency is the number one thing that can be improved in my mind. This would change lots of companies minds on purchasing the product."
  • "The cost is high compared to other products."
  • "CyberArk provides all the features bundled. This is compared to other vendors who provide them as a different license for each functionality."
  • "Our risk is definitely significantly lower. Also, our resources are low."
  • "If you are looking at implementing this solution, buy the training and go to it."
  • More CyberArk Privileged Access Manager Pricing and Cost Advice →

  • "Don’t go with an agent model. Don’t go with a model that has you buying a thousand different parts. Go with PAM that gives you everything, or you’ll just be paying costs of implementing another tool that PAM would have just given you up front."
  • "The prices are not low, but one can ask for a discount. It’s not the cheapest PAM solution."
  • "Appliances are relatively cheap, don’t skimp. Make sure you have redundancy, high availability, and enough appliances to manage the concurrent workload."
  • "Cost-wise, CA was better compared to others in the market. ​"
  • "Pricing is fair compared to other top vendors."
  • "The licensing is simple and scalable."
  • "I would prefer better licensing options for the 20-100 users we have at a given time."
  • "It is more expensive than other solutions on the market."
  • More Symantec Privileged Access Manager Pricing and Cost Advice →

    report
    Use our free recommendation engine to learn which Privileged Access Management (PAM) solutions are best for your needs.
    767,319 professionals have used our research since 2012.
    Questions from the Community
    Top Answer:We evaluated Sailpoint IdentityIQ before ultimately choosing CyberArk. Sailpoint Identity Platform is a solution to manage risks in cloud enterprise environments. It automates and streamlines the… more »
    Top Answer:The product is expensive. I rate the product’s pricing a seven out of ten, where one is cheap and ten is expensive.
    Top Answer:We can check the activities in the server for fragile files and documents in case of any issues.
    Top Answer:The product's pricing depends on the agreement. They offer per-device, per-user, or monthly and yearly licensing models.
    Top Answer:There should be some training platform similar to Microsoft and IBM. We can't find useful documentation or YouTube videos to learn about the process. They should include some assignments in the test… more »
    Ranking
    Views
    11,160
    Comparisons
    6,378
    Reviews
    34
    Average Words per Review
    621
    Rating
    8.9
    Views
    860
    Comparisons
    546
    Reviews
    3
    Average Words per Review
    424
    Rating
    6.7
    Comparisons
    Also Known As
    CyberArk Privileged Access Security
    CA PAM, Xceedium Xsuite, CA Privileged Access Manager
    Learn More
    Overview

    CyberArk Privileged Access Manager is a next-generation solution that allows users to secure both their applications and their confidential corporate information. It is extremely flexible and can be implemented across a variety of environments. This program runs with equal efficiency in a fully cloud-based, hybrid, or on-premises environment. Users can now protect their critical infrastructure and access it in any way that best meets their needs.

    CyberArk Privileged Access Manager possesses a simplified and unified user interface. Users are able to manage the solution from one place. The UI allows users to view and manage all of the information and controls that administrators need to be able to easily access. Very often, management UIs do not have all of the controls and information streamlined in a single location. This platform provides a level of visibility that ensures users will be able to view all of their system’s most critical information at any time that they wish.

    Benefits of CyberArk Privileged Access Manager

    Some of CyberArk Privileged Access Manager’s benefits include:

    • The ability to manage IDs and permissions across a cloud environment. In a world where being able to work remotely is becoming increasingly important, CyberArk Privileged Access Manager is a very valuable tool. Administrators do not need to worry about infrastructure security when they are away from the office. They can assign and manage security credentials from anywhere in the world.
    • The ability to manage the program from a single centralized UI. CyberArk Privileged Access Manager’s UI contains all of the system controls and information. Users now have the ability to view and use all of their system’s most critical information and controls from one place.
    • The ability to automate user management tasks. Administrators can save valuable time by assigning certain management tasks to be fulfilled by the system itself. Users can now reserve their time for tasks that are most pressing. It can also allow for the system to simplify the management process by having the platform perform the most complex functions.

    Reviews from Real Users

    CyberArk Privileged Access Manager’s software stands out among its competitors for one very fundamental reason. CyberArk Privileged Access Manager is an all-in-one solution. Users are given the ability to accomplish with a single platform what might usually only be accomplished with multiple solutions.

    PeerSpot users note the truly all-in-one nature of this solution. Mateusz K., IT Manager at a financial services firm, wrote, "It improves security in our company. We have more than 10,000 accounts that we manage in CyberArk. We use these accounts for SQLs, Windows Server, and Unix. Therefore, keeping these passwords up-to-date in another solution or software would be impossible. Now, we have some sort of a platform to manage passwords, distribute the inflow, and manage IT teams as well as making regular changes to it according to the internal security policies in our bank."

    Hichem T.-B., CDO & Co-Founder at ELYTIK, noted that “This is a complete solution that can detect cyber attacks well. I have found the proxy features most valuable for fast password web access.”

    CA Privileged Access Manager is a simple-to-deploy, automated, proven solution for privileged access management in physical, virtual and cloud environments. It enhances security by protecting sensitive administrative credentials such as root and administrator passwords, controlling privileged user access, proactively enforcing policies and monitoring and recording privileged user activity across all IT resources.  It includes CA PAM Server Control (previously CA Privileged Identity Manager) for fine-grained protection of critical servers

    Sample Customers
    Rockwell Automation
    NEOVERA, Telesis, eSoft
    Top Industries
    REVIEWERS
    Financial Services Firm24%
    Computer Software Company13%
    Insurance Company12%
    Healthcare Company9%
    VISITORS READING REVIEWS
    Educational Organization30%
    Computer Software Company12%
    Financial Services Firm10%
    Manufacturing Company5%
    REVIEWERS
    Retailer20%
    Financial Services Firm20%
    Logistics Company15%
    Government10%
    VISITORS READING REVIEWS
    Computer Software Company16%
    Financial Services Firm14%
    Manufacturing Company14%
    Comms Service Provider10%
    Company Size
    REVIEWERS
    Small Business21%
    Midsize Enterprise13%
    Large Enterprise66%
    VISITORS READING REVIEWS
    Small Business14%
    Midsize Enterprise38%
    Large Enterprise48%
    REVIEWERS
    Small Business28%
    Midsize Enterprise9%
    Large Enterprise63%
    VISITORS READING REVIEWS
    Small Business15%
    Midsize Enterprise7%
    Large Enterprise79%
    Buyer's Guide
    CyberArk Privileged Access Manager vs. Symantec Privileged Access Manager
    March 2024
    Find out what your peers are saying about CyberArk Privileged Access Manager vs. Symantec Privileged Access Manager and other solutions. Updated: March 2024.
    767,319 professionals have used our research since 2012.

    CyberArk Privileged Access Manager is ranked 1st in Privileged Access Management (PAM) with 142 reviews while Symantec Privileged Access Manager is ranked 18th in Privileged Access Management (PAM) with 50 reviews. CyberArk Privileged Access Manager is rated 8.8, while Symantec Privileged Access Manager is rated 7.8. The top reviewer of CyberArk Privileged Access Manager writes "Lets you ensure relevant, compliant access in good time and with an audit trail, yet lacks clarity on MITRE ATT&CK". On the other hand, the top reviewer of Symantec Privileged Access Manager writes "Allows IT and consultants to access the infrastructure environment but needs more security and better support". CyberArk Privileged Access Manager is most compared with Cisco ISE (Identity Services Engine), Microsoft Entra ID, Delinea Secret Server, WALLIX Bastion and One Identity Safeguard, whereas Symantec Privileged Access Manager is most compared with Cisco ISE (Identity Services Engine), BeyondTrust Endpoint Privilege Management, ARCON Privileged Access Management, Delinea Secret Server and VMware Identity Manager. See our CyberArk Privileged Access Manager vs. Symantec Privileged Access Manager report.

    See our list of best Privileged Access Management (PAM) vendors.

    We monitor all Privileged Access Management (PAM) reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.