We performed a comparison between CyberArk Privileged Access Manager and Fudo PAM based on real PeerSpot user reviews.
Find out in this report how the two Privileged Access Management (PAM) solutions compare in terms of features, pricing, service and support, easy of deployment, and ROI."The fact that I can put my vault here in a central location on one net for example, and I'll have a CPM in California, a CPM in Texas, a CPM in New York, a CPM in Florida, and actually be able to grow with my company and not necessarily have to continue to grow my vault until I get to a certain number accounts - yet I can still manage everything across the country, if not the world - I love that. I love the flexibility and the capability of being able to pull those components out."
"The most valuable feature is that it always provides flexibility, password quality and one-time user check-in and check-out."
"They just released Marketplace, and they are constantly releasing updates to the components and adding new components, like Conjur. This is something that we ran into with Secret Server and DevOps, so it is already scalable, but becoming more so in the future."
"CyberArk has been easy for us to implement and the adoption has been good. We've been able to standardize a bunch of things. We've been able to standardize relatively easily with the use of the platforms and managing the policies."
"We like it for the ability to automatically change passwords. At least for my group, that's the best thing."
"The automatic change of the password and Privileged Session Manager (PSM) are the most valuable features. With Privileged Session Manager, you can control the password management in a centralized way. You can activate these features in a session; the session isolation and recording. You apply the full intermediation principle. So, you must pass through CyberArk PAM to get access to the target system. You don't need to know the password, and everything that you do is registered and auditable. In this case, no one gets to touch the password directly. Also, you can implement detection and response behavior in case of a breach."
"The most important feature is managing the credentials and implementing those policies which rotate the credentials. Session Manager is also key in not letting the users have access to those credentials. Instead, CyberArk actually manages everything by itself."
"Within the solution, I love the fact that everything is recorded. The configuration capabilities are great, too."
"Session recording and password management are the two main aspects."
"We are convinced that Fudo PAM is better than competing products like WALLIX."
"it's perfect to control and administer computers in our company."
"Fudo PAM was the most flexible and intuitive interface out of all of the products in the PAM sector."
"The main benefit of the solution is that it's very easy to set up. It only takes a couple of hours to install everything."
"We'd like to see the creation of some kind of memo field for each device account, which could be used, in our network at least, to leave a note about the device for either the security or network engineering team members."
"It is easily customized, and that customization makes it very easy to start trying to shoehorn the solution into roles it was never intended to fill."
"I would like to see better automation in granting access, better tools, more efficient tools, to be able to customize the solution that CyberArk provides."
"Its pricing is a big challenge here. When it started, the product came in at a very low cost. Now, they are the leaders in the market, so the cost has grown and is quite huge."
"The one place where we found that this product really needs to improve is the cloud. Simple integrations don't exist, even today. We don't have anything specific on CyberArk for managing, SaaS products, SaaS vendors, SaaS credentials. I understand it's a vendor-based thing and that they have to coordinate with the other vendors to be able to do that, and there are integrations coming. But these are the major places where CyberArk definitely needs to invest some more time."
"The product documentation has to be more precise in certain aspects with explanations for functionality limitations along with reference material or screenshots."
"The tool’s pricing and scalability can be better."
"I would like to see is the policy export and import. When we expend, we do not want to just hand do a policy."
"Professional training and certification would be great."
"The stability is not very good."
"The configuration is difficult."
"Fudo PAM’s scalability is not very strong."
"I would like to see better server management. You have to know exactly what you're looking for to get the right server."
More CyberArk Privileged Access Manager Pricing and Cost Advice →
CyberArk Privileged Access Manager is ranked 1st in Privileged Access Management (PAM) with 142 reviews while Fudo PAM is ranked 21st in Privileged Access Management (PAM) with 5 reviews. CyberArk Privileged Access Manager is rated 8.8, while Fudo PAM is rated 8.0. The top reviewer of CyberArk Privileged Access Manager writes "Lets you ensure relevant, compliant access in good time and with an audit trail, yet lacks clarity on MITRE ATT&CK". On the other hand, the top reviewer of Fudo PAM writes "Easy to install but needs to provide better server management and organization". CyberArk Privileged Access Manager is most compared with Cisco ISE (Identity Services Engine), Microsoft Entra ID, Delinea Secret Server, WALLIX Bastion and One Identity Safeguard, whereas Fudo PAM is most compared with WALLIX Bastion, Delinea Secret Server, One Identity Safeguard, Teleport and ManageEngine PAM360. See our CyberArk Privileged Access Manager vs. Fudo PAM report.
See our list of best Privileged Access Management (PAM) vendors.
We monitor all Privileged Access Management (PAM) reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.