CyberArk Enterprise Password Vault vs Leiberman RED Identity Management [EOL] comparison

Cancel
You must select at least 2 products to compare!
Comparison Buyer's Guide
Executive Summary

We performed a comparison between CyberArk Enterprise Password Vault and Leiberman RED Identity Management [EOL] based on real PeerSpot user reviews.

Find out what your peers are saying about Microsoft, HashiCorp, Amazon Web Services (AWS) and others in Enterprise Password Managers.
To learn more, read our detailed Enterprise Password Managers Report (Updated: March 2024).
767,667 professionals have used our research since 2012.
Featured Review
Quotes From Members
We asked business professionals to review the solutions they use.
Here are some excerpts of what they said:
Pros
"Password Vault's policy configuration is very good - when you receive an attack, you can segment the structure of the project in order to isolate parts or users.""CyberArk has a lot of modules.""Previously, we used to share passwords for service and normal admin accounts among team members. However, since we started managing it through the product, we've transitioned to individual admin accounts or implemented dual control for shared accounts. With dual control, exclusive checking and checkout options are available, and passwords are not stored in clear text anywhere in the credentials.""The logs and reporting features are impressive.""CyberArk probably has probably the best vault on the market because of the multiple layered security and each password getting its own encryption.""The most valuable feature is privileged session management.""We use the solution for password vaulting, password rotation, session management, and secret management.""Password Vault's main advantage is its scalability. We constantly see huge enterprises implementing something like this, and the privileged session management is an excellent piece. You can kind of watch videos of whatever an admin has done."

More CyberArk Enterprise Password Vault Pros →

"It's more of a risk reduction. It takes passwords that are not being managed properly and manages them automatically which really reduces risk."

More Leiberman RED Identity Management [EOL] Pros →

Cons
"The initial setup can get complex.""The tool needs to improve its usage and interface. They need to have a modern and useful interface. I want the product to improve its integration capabilities as well since some of the integration features do not work always.""The technical support is very poor.""The interface could be improved it is not user-friendly, but they have improved but it could still improve. In the policies configuration, it would be a benefit to have more details.""We should be able to join small components.""The price is high compared to Azure Key Vault. It's the most expensive solution.""The solution is too big and complex for any businesses that are small or medium-sized. They should offer a more compact version or make a solution better suited to smaller businesses.""Upgrading the product is very difficult, so this could be an area for improvement."

More CyberArk Enterprise Password Vault Cons →

"They should improve the application password management. The capability to manage high availability application passwords is its biggest shortcoming."

More Leiberman RED Identity Management [EOL] Cons →

Pricing and Cost Advice
  • "This solution is expensive."
  • "The price of this solution is expensive."
  • "This product is very expensive."
  • "CyberArk is very expensive and there are additional fees for add-ons."
  • "It's per-company, license-based."
  • "It's an affordable platform."
  • "Licensing fees are paid on a yearly basis."
  • "Quite expensive"
  • More CyberArk Enterprise Password Vault Pricing and Cost Advice →

    Information Not Available
    report
    Use our free recommendation engine to learn which Enterprise Password Managers solutions are best for your needs.
    767,667 professionals have used our research since 2012.
    Questions from the Community
    Top Answer:Previously, we used to share passwords for service and normal admin accounts among team members. However, since we started managing it through the product, we've transitioned to individual admin… more »
    Top Answer:The tool's UI has bugs and lags. It needs to be improved. The deployment process can be complex due to multiple components for various functionalities, each requiring separate infrastructure… more »
    Ask a question

    Earn 20 points

    Ranking
    Views
    7,745
    Comparisons
    4,796
    Reviews
    14
    Average Words per Review
    545
    Rating
    8.4
    Unranked
    In Enterprise Password Managers
    Comparisons
    Also Known As
    Rapid Enterprise Defense Identity Management, Enterprise Random Password Manager
    Learn More
    CyberArk
    Video Not Available
    BeyondTrust
    Video Not Available
    Overview

    CyberArk Enterprise Password Vault, a vital component of the CyberArk Privileged Access Manager Solution (PAM), is designed to create, secure, rotate, and control access to privileged accounts and credentials used to access systems throughout an enterprise IT ecosystem. CyberArk Enterprise Password Vault enables enterprise organizations to better understand the scope of their privileged account risks and put controls in place to prevent malicious or inappropriate account or credential access.

    CyberArk Enterprise Password Vault uses a Central Policy Manager protocol (CPM) to perform the basic password management functions.

    • Verify Password Task - The CPM will pull the password from the vault and use it to log into the application or device to verify that the password is indeed correct and satisfies all the password safety protocols.
    • Change Password Task - The CPM will pull the password from the vault and create a new password that meets all preset protocols. It will send it to the device or application and then begin the process of changing it, using the same method that might be performed manually. The CPM will then update the password in the vault.
    • Reconcile Password Task - This task is utilized when there is a failure in either the Verify Password Task or the Change Password Task. Using a pre-established reconcile account from the vault, the CPM will use the reconcile account credentials to reset or fix problematic password issues due to changed passwords not being updated properly, new accounts being established, or any other failure with the above tasks.

    Enterprise organizations can utilize the easily adaptable policies and protocols to enforce granular privileged access controls, automate workflows, and rotate passwords at prescribed regular intervals without requiring any manual IT effort. Additionally, to satisfy compliance regulations, organizations can easily generate reports to prove that passwords are being changed regularly according to guidelines, meet strict password safety protocols, and report on which users accessed what privileged accounts, when, why, and what device they were using. Enterprise organizations can know at all times that data has remained secure at all times. CyberArk Password Vault will have enterprise organizations audit-ready at all times, keeping them safe and secure from risks while maximizing productivity and profitability.

    Reviews from Real Users

    Irma S., a program manager at a HR/Recruiting firm, said, "I love how easily we could operate within Password Vault and get things done. It was almost effortless."

    Another user, who is a security delivery analyst at a computer software company, relates that CyberArk Password Vault offers, “Good policy configuration and tech support.”



    Enterprise Random Password Manager (ERPM) is a Proactive Cyber Defense Platform that protects organizations against malicious insiders, advanced persistent threats (APTs) and other sophisticated cyber attacks – on-premises, in the cloud and in hybrid environments.

    Sample Customers
    AstraZeneca, Time, DBS, Novartis, Motorola, BT, pwc, Braun, Deloitte, Williams, Revlon, Belgacom, Barclays
    CME, VISA, Commerzbank, Rothschild, NMS, MHA, UAM, Tulane University, NYC, Lasko, Shell, ComEd, Petco, NetApp, Sharp, At&T, Brocade, Fox, CSC
    Top Industries
    REVIEWERS
    Financial Services Firm31%
    Computer Software Company19%
    Comms Service Provider14%
    Energy/Utilities Company6%
    VISITORS READING REVIEWS
    Financial Services Firm24%
    Computer Software Company11%
    Insurance Company7%
    Government7%
    No Data Available
    Company Size
    REVIEWERS
    Small Business19%
    Midsize Enterprise21%
    Large Enterprise60%
    VISITORS READING REVIEWS
    Small Business15%
    Midsize Enterprise11%
    Large Enterprise75%
    No Data Available
    Buyer's Guide
    Enterprise Password Managers
    March 2024
    Find out what your peers are saying about Microsoft, HashiCorp, Amazon Web Services (AWS) and others in Enterprise Password Managers. Updated: March 2024.
    767,667 professionals have used our research since 2012.

    CyberArk Enterprise Password Vault is ranked 4th in Enterprise Password Managers with 47 reviews while Leiberman RED Identity Management [EOL] doesn't meet the minimum requirements to be ranked in Enterprise Password Managers. CyberArk Enterprise Password Vault is rated 8.4, while Leiberman RED Identity Management [EOL] is rated 7.8. The top reviewer of CyberArk Enterprise Password Vault writes "Helps to store system accounts ". On the other hand, the top reviewer of Leiberman RED Identity Management [EOL] writes "It’s greatest ability is that it can easily randomize all local accounts on almost any endpoint". CyberArk Enterprise Password Vault is most compared with Azure Key Vault, HashiCorp Vault, AWS Secrets Manager, Delinea Secret Server and BeyondTrust Password Safe, whereas Leiberman RED Identity Management [EOL] is most compared with .

    See our list of best Enterprise Password Managers vendors.

    We monitor all Enterprise Password Managers reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.