BrettZychIdentity and Access Management Advisor at a energy/utilities company
Tor NordhagenExecutive Director at Semaphore
We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
"Our most valuable features would probably be key rotation, the SKM or SSH key manager, and account discovery."
"Security is the solution's most valuable feature. As far as I know, this solution is the most secure system of this class on the market today, even considering another management system like Fudo Security, which we also use. The integration capabilities are very good; it helps strengthen our overall security."
"Session monitoring is excellent. It may be the solution's most valuable aspect."
"The most valuable feature is that it is flexible. It has many connectors. that have done well, the EPV and SSH sessions are all being recorded and everything works fine."
"The most valuable feature is the special management. It records the activity and the actions that we use for auditing."
"Service count rotation is probably one of my favorite features... The ability to automatically rotate any password I need to really helps with the entire enterprise strategy that we're pushing right now."
"The most valuable feature is the ability to delegate access to admins when they need it."
"The interface is very simple to use."
"It offers the possibility of secure administration of hardware devices, as well as Linux systems administration from a Windows environment."
"Ease of use because of its monolithic software."
"The most valuable feature is session monitoring."
"The user interface is quite good. It's very straightforward."
"I find it really easy and computer confident, and the experience with the product is really good. Additionally, customizations are easy."
"The GUI interface is well-designed and user-friendly."
"What I like best about this product is the interface."
"I have found the password management and the secret management features to be the most valuable. Our customers find its ease of integration and the use of power shells really attractive."
"I think they can improve account onboarding. For instance, you have to use the Password Vault utility, whereas in Thycotic I think there is a feature in the user interface that allows you to upload your account with an Excel file. So I'd like to have a similar thing in CyberArk."
"The solution is too big and complex for any businesses that are small or medium-sized. They should offer a more compact version or make a solution better suited to smaller businesses."
"The initial setup could be simplified. Right now, in comparison to its nearest competitors, it's quite complex."
"In the next release, they could simplify the setup and I would like some tasks added like file sharing. When a client connects to CyberArk and wants to put a file on the server, they cannot."
"The stability depends on the infrastructure it is installed on, which is important because CyberArk does not have the hardware appliance."
"I'd like it to be a little more granular. I want a little bit more control over exactly what we do. I know if you do that, you add more knobs and dials to deal with, but that's just my personal approach: granular access."
"I would prefer that this is a fully-managed service, rather than have to manage the software ourselves and keep it up to date."
"The installation process should be easier and more user-friendly so that you don't need to hire a third party to deploy it."
"I would like to see the shadowing of ongoing terminal sessions (Remote Desktop Mirroring)."
"Documentation could be improved if they were to include more about connectors. There is not enough documentation."
"Having more detailed reporting would improve this solution."
"There could be tweaks here and there. For example, instead of going to one main function to do this and another main function to do that, the solution could remap the user interface so that a person only has to go through one function. The way that function branches off should make a bit more sense."
"There are some things that I know are really important to include like A/B version features which are available in Windows. I would say that they should be included in the road map."
"This product is excellent in every way except minor details in handling extremely large environments."
"I think that the main interface should integrate better with non-standard applications and clients, to connect with other systems."
"We always ask for partner enablement, which is more like a soft requirement rather than a product requirement. It would be great if they can provide us deeper knowledge of their products for integration."
"This solution is expensive."
"The price of this solution is expensive."
"This product is very expensive."
"CyberArk is very expensive and there are additional fees for add-ons."
"It's per-company, license-based."
"The price of this solution is good."
"Pricing is comparable to competing products."
"The pricing is standard in this business and we have no complaints about it."
"Its price is okay. We don't compete on pricing. We seldom use price to win over our competitors. We prefer it this way because if we can sustain the price, we make more margin as well. We don't want the price to go down to the bottom where despite the win, there's no margin at all."
"Secret Server is expensive when compared to the cost to some alternatives."
"There are different plans and additional licensing costs that can be instituted for add-ons."
Secret Server is a fully-featured Privileged Access Management (PAM) solution available both on premise and in the cloud. It empowers security and IT ops teams to secure and manage all types of privileged accounts and offers the fastest time to value of any PAM solution.
CyberArk Enterprise Password Vault is ranked 1st in Enterprise Password Managers with 12 reviews while Thycotic Secret Server is ranked 2nd in Enterprise Password Managers with 9 reviews. CyberArk Enterprise Password Vault is rated 8.6, while Thycotic Secret Server is rated 8.2. The top reviewer of CyberArk Enterprise Password Vault writes "Stable, good support, and secures each password with individual encryption". On the other hand, the top reviewer of Thycotic Secret Server writes "Excellent access management that can serve very large networks". CyberArk Enterprise Password Vault is most compared with HashiCorp Vault, Microsoft Azure Key Vault, AWS Secrets Manager, LastPass Enterprise and BeyondTrust Password Safe, whereas Thycotic Secret Server is most compared with CyberArk PAS, HashiCorp Vault, Microsoft Azure Key Vault, IBM Security Secret Server and LastPass Enterprise. See our CyberArk Enterprise Password Vault vs. Thycotic Secret Server report.
See our list of best Enterprise Password Managers vendors.
We monitor all Enterprise Password Managers reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.