CyberArk PAS vs. SafeBreach

As of May 2019, CyberArk PAS is ranked 1st in Advanced Threat Protection with 60 reviews vs SafeBreach which is ranked 17th in Advanced Threat Protection. The top reviewer of CyberArk PAS writes "Gives us the security of all credentials in one place and lightens our administrative load". CyberArk PAS is most compared with SailPoint IdentityIQ, Cisco ISE (Identity Services Engine) and BeyondTrust Endpoint Privilege Management. SafeBreach is most compared with Acalvio, Fireglass and FireEye Network Security.
You must select at least 2 products to compare!
CyberArk PAS Logo
42,726 views|15,621 comparisons
SafeBreach Logo
962 views|354 comparisons
Most Helpful Review
Use SafeBreach? Share your opinion.
Find out what your peers are saying about CyberArk, Palo Alto Networks, FireEye and others in Advanced Threat Protection. Updated: April 2019.
341,056 professionals have used our research since 2012.
Quotes From Members

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:

Pricing and Cost Advice
In comparison to other products on the market, CyberArk is a more costly product.This solution is considered to be more expensive than others out there on the market today.I do not have any opinions to add about the pricing of the product.No, I do not have any advice on the price of the product.Network and security licenses are currently being managed by other outsource vendors, so they are facing some type of problems in the digital aspect.With reducing the privileged account access, there has been a huge improvement. They are now bringing more accounts on a little at a time.If you are looking at implementing this solution, buy the training and go to it.Our risk is definitely significantly lower. Also, our resources are low.

Read more »

Information Not Available
Use our free recommendation engine to learn which Advanced Threat Protection solutions are best for your needs.
341,056 professionals have used our research since 2012.
Average Words per Review
Avg. Rating
Average Words per Review
Avg. Rating
Top Comparisons
Compared 10% of the time.
Compared 43% of the time.
Compared 34% of the time.
Also Known As
CyberArk Privileged Access Security, CyberArk Privileged Account Security, SSH Key Manager, Privileged Session Manager, Privileged Threat Analytics, Application Identity Manager, On-Demand Privileges Manager, Endpoint Privilege Manager

CyberArk is the trusted expert in privileged account security. Designed from the ground up with a focus on security, CyberArk has developed a powerful, modular technology platform that provides the industry's most comprehensive Privileged Account Security Solution.

SafeBreach lightweight simulators play the role of the hacker. Deploy them in critical segments of your network, in the cloud or on your endpoint to simulate the entire kill chain- infiltration, lateral movement and exfiltration. Both network and endpoint simulators are available.

The Safebreach orchestration platform manages and executes the Hacker's Playbook™ of breach methods on our simulators. Our patent-pending technology simulates breach scenarios without impacting users or infrastructure, but while validating the effectiveness of your security solutions. Breach methods are constantly updated by SafeBreach Labs, our team of offensive security researchers.

Learn more about CyberArk PAS
Learn more about SafeBreach
Sample Customers
Rockwell Automation
Information Not Available
Top Industries
Financial Services Firm28%
Insurance Company15%
Healthcare Company10%
Energy/Utilities Company8%
Financial Services Firm32%
Comms Service Provider11%
Energy/Utilities Company10%
No Data Available
Company Size
Small Business17%
Midsize Enterprise9%
Large Enterprise74%
Small Business11%
Midsize Enterprise11%
Large Enterprise78%
No Data Available
Find out what your peers are saying about CyberArk, Palo Alto Networks, FireEye and others in Advanced Threat Protection. Updated: April 2019.
341,056 professionals have used our research since 2012.
We monitor all Advanced Threat Protection reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.

Sign Up with Email