We performed a comparison between CyberArk Privileged Access Manager and Delinea Privileged Access Service based on real PeerSpot user reviews.
Find out in this report how the two Privileged Access Management (PAM) solutions compare in terms of features, pricing, service and support, easy of deployment, and ROI."Provides improved security around having your credentials locked down and rotated regularly."
"Lessens the risk with privileged access."
"The fact that I can put my vault here in a central location on one net for example, and I'll have a CPM in California, a CPM in Texas, a CPM in New York, a CPM in Florida, and actually be able to grow with my company and not necessarily have to continue to grow my vault until I get to a certain number accounts - yet I can still manage everything across the country, if not the world - I love that. I love the flexibility and the capability of being able to pull those components out."
"They just released Marketplace, and they are constantly releasing updates to the components and adding new components, like Conjur. This is something that we ran into with Secret Server and DevOps, so it is already scalable, but becoming more so in the future."
"It is scalable."
"We can make a policy that affects everybody instantly."
"I really like the PTA (Privileged Threat Analytics). I find this the best feature."
"We are able to rotate privileged user passwords to eliminate fraudulent use."
"The vault and auditing capabilities are the most valuable feature because they include multiple reports that allow us to create our own reports."
"Delinea Privileged Access Service's UI part was very user-friendly for secure credential storage and management."
"The most valuable feature of Delinea Privileged Access Service is we can use the server as a jump host. It is simple to manage the accounts on the system."
"The most valuable feature is the author's discovery of assets."
"There are benefits in the security realm. We use Delinea at an enterprise level. I imagine there are productivity gains, but moreover, it's the security. We don’t enable staff to see the passwords of boxes but it's all being tracked and logged now."
"The privileged account management feature is what I like most."
"The solution provides secure access to environments."
"The solution is flexible."
"For users to access a system via CyberArk Privileged Session Manager, a universal connector needs to be coded in a language called AutoIT and its support for web browsers is so-so. Other products like Centrify have browser plugins that can help automate the process when using their products."
"I would like to see improvement in the custom connector for integration with different devices."
"Some of the additional features that we are looking at are in the Conjur product. I am specifically discussing key management, API Keys, and things for connecting applications in the CI/CD pipelines."
"The initial setup of CyberArk Privileged Access Manager difficulty depends on the environment that you are implementing it into. However, it typically is simple."
"The web access piece needs improvement. We have version 9.5 or 9.9.5, and now we have to upgrade to version 10."
"They need to provide better training for the System Integrator."
"One of our current issues is a publishing issue. If we whitelist Google Chrome, all the events of Google Chrome should be gone. It is not happening."
"There is a learning curve when it comes to planning out the deployment strategy, but once it is defined, it runs itself."
"I would like for there to be a suitable solution to deploy a low-spec version for desktop password management to all our staff."
"The integration with sync could be improved."
"Enhancing the solution by incorporating additional features to make it comprehensive would be beneficial. It would be more convenient to have a complete package solution that consolidates all the features in one place, making it easier to manage. Currently, I am required to access two separate servers for reports, which could be avoided if all the necessary features were available in a single location. This would be highly advantageous for managing everything effectively."
"The pricing and presence could be improved."
"With Delinea Privileged Access Service, when installing the identity connectors to configure with AD, the configuration was not happening properly."
"The initial setup is a bit complex."
"Although the interface is intuitive, it could be a little more user-friendly."
"It is difficult to integrate the product with other IT systems."
More CyberArk Privileged Access Manager Pricing and Cost Advice →
More Delinea Privileged Access Service Pricing and Cost Advice →
CyberArk Privileged Access Manager is ranked 1st in Privileged Access Management (PAM) with 142 reviews while Delinea Privileged Access Service is ranked 12th in Privileged Access Management (PAM) with 10 reviews. CyberArk Privileged Access Manager is rated 8.8, while Delinea Privileged Access Service is rated 8.0. The top reviewer of CyberArk Privileged Access Manager writes "Lets you ensure relevant, compliant access in good time and with an audit trail, yet lacks clarity on MITRE ATT&CK". On the other hand, the top reviewer of Delinea Privileged Access Service writes "Very cost-effective and provides secure access to environments". CyberArk Privileged Access Manager is most compared with Cisco ISE (Identity Services Engine), Microsoft Entra ID, Delinea Secret Server, WALLIX Bastion and One Identity Safeguard, whereas Delinea Privileged Access Service is most compared with Azure Key Vault, Microsoft Purview Privileged Access Management, Delinea Secret Server, SAP Identity Management and IBM Security Secret Server. See our CyberArk Privileged Access Manager vs. Delinea Privileged Access Service report.
See our list of best Privileged Access Management (PAM) vendors.
We monitor all Privileged Access Management (PAM) reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.