We performed a comparison between CyberArk Privileged Access Manager and Delinea Privileged Access Service based on real PeerSpot user reviews.
Find out in this report how the two Privileged Access Management (PAM) solutions compare in terms of features, pricing, service and support, easy of deployment, and ROI."It takes people out of the machine work of ensuring credentials remain up-to-date, and handles connection brokering such that human usage and credential management remain independent."
"It is very simple to use."
"You can easily manage more than 4000 accounts with one PSM."
"The solution is scalable."
"I really like the PTA (Privileged Threat Analytics). I find this the best feature."
"It provides an accountability to the individuals who are using it, knowing that it is audited and tracked."
"The most valuable feature of CyberArk Privileged Access Manager is the vault. I am satisfied with the interface and the documentation."
"The technical support for this solution is very good. If I was to rate it on a scale of one to five, I would give it a five."
"The most valuable feature of Delinea Privileged Access Service is we can use the server as a jump host. It is simple to manage the accounts on the system."
"The most valuable feature is the author's discovery of assets."
"This is a cloud-based application, which makes it very easy to deploy."
"There are benefits in the security realm. We use Delinea at an enterprise level. I imagine there are productivity gains, but moreover, it's the security. We don’t enable staff to see the passwords of boxes but it's all being tracked and logged now."
"The vault and auditing capabilities are the most valuable feature because they include multiple reports that allow us to create our own reports."
"Delinea Privileged Access Service's UI part was very user-friendly for secure credential storage and management."
"The solution provides secure access to environments."
"The privileged account management feature is what I like most."
"Over the past seven years, I have seen a lot of ups and downs with the product."
"When I was a component owner for PAM's Privileged Threat Analytics (PTA) component, what I wanted was a clear mapping to the MITRE ATT&CK framework, a framework which has a comprehensive list of use cases. We reached out to the vendor and asked them how much coverage they have of the uses cases found on MITRE, which would have given us a better view of things while I was the product owner. Unfortunately they did not have the capability of mapping onto MITRE's framework at that time."
"There is a bit of a learning curve, but it's a pretty complex solution."
"I would like to see improvement in the custom connector for integration with different devices."
"More additional features as far as the REST is concerned, because we have something which was the predecessor to REST. A lot of the features which were in the predecessor have not necessarily been ported over to REST yet."
"For users to access a system via CyberArk Privileged Session Manager, a universal connector needs to be coded in a language called AutoIT and its support for web browsers is so-so. Other products like Centrify have browser plugins that can help automate the process when using their products."
"The major pain point that we have is the capacity of CyberArk due to the sheer volume of NPAs that we are managing. We are a large organization and we have hundreds of thousands of non-personal accounts to manage. We have already found out that there are certain capacity limitations within CyberArk that might introduce performance issues. From my perspective, something that would be valuable would be if the vault could hold more passwords and be more scalable."
"The solution needs better features for end users to manage their own whitelisting for API retrieval."
"The initial setup is a bit complex."
"It is difficult to integrate the product with other IT systems."
"Enhancing the solution by incorporating additional features to make it comprehensive would be beneficial. It would be more convenient to have a complete package solution that consolidates all the features in one place, making it easier to manage. Currently, I am required to access two separate servers for reports, which could be avoided if all the necessary features were available in a single location. This would be highly advantageous for managing everything effectively."
"With Delinea Privileged Access Service, when installing the identity connectors to configure with AD, the configuration was not happening properly."
"Although the interface is intuitive, it could be a little more user-friendly."
"I would like for there to be a suitable solution to deploy a low-spec version for desktop password management to all our staff."
"There needs to be a notification when a password is near expiration."
"The pricing and presence could be improved."
More CyberArk Privileged Access Manager Pricing and Cost Advice →
More Delinea Privileged Access Service Pricing and Cost Advice →
CyberArk Privileged Access Manager is ranked 1st in Privileged Access Management (PAM) with 142 reviews while Delinea Privileged Access Service is ranked 12th in Privileged Access Management (PAM) with 10 reviews. CyberArk Privileged Access Manager is rated 8.8, while Delinea Privileged Access Service is rated 8.0. The top reviewer of CyberArk Privileged Access Manager writes "Lets you ensure relevant, compliant access in good time and with an audit trail, yet lacks clarity on MITRE ATT&CK". On the other hand, the top reviewer of Delinea Privileged Access Service writes "Very cost-effective and provides secure access to environments". CyberArk Privileged Access Manager is most compared with Cisco ISE (Identity Services Engine), Microsoft Entra ID, Delinea Secret Server, WALLIX Bastion and One Identity Safeguard, whereas Delinea Privileged Access Service is most compared with Azure Key Vault, Microsoft Purview Privileged Access Management, Delinea Secret Server, SAP Identity Management and IBM Security Secret Server. See our CyberArk Privileged Access Manager vs. Delinea Privileged Access Service report.
See our list of best Privileged Access Management (PAM) vendors.
We monitor all Privileged Access Management (PAM) reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.