We performed a comparison between CyberArk Privileged Access Manager and Teramind based on real PeerSpot user reviews.
Find out what your peers are saying about CyberArk, Proofpoint, Amazon Web Services (AWS) and others in User Activity Monitoring."If any intruder gets inside, they would not be able to move around nor do lateral movements. It minimize any attack problems within our network."
"Technical support is very helpful whenever we have any questions."
"It has the ability to scale out. We have scaled out quite a bit with our product and use of it to get to multiple locations and businesses, so it has the breadth to do that."
"It gives us the capability to rotate passwords."
"We have demoted a lot of domain admins and taken a lot of that away from people, giving it a shared account structure."
"The combination of CPM and PSM resolves a lot of use cases."
"It has helped from an auditing perspective identify who has access to privileged accounts."
"Central Password Manager is useful for agentless automated password management through AD integration as well as endpoints for different devices."
"The product provides data protection and employee monitoring features in a single console."
"The solution needs better features for end users to manage their own whitelisting for API retrieval."
"There is room for improvement in the availability of custom connectors on the marketplace for this solution. Additionally, their services for the CICD pipeline and ease of integration could be improved."
"They are sometimes not flexible with things. For instance, from one day to another, there might be something that had been done years ago by CyberArk, then they say, "We do not support that." You then have to initiate a complaint and start working with them. Things might become complicated and months pass while you are working with them. Usually, they are good and fast, but sometimes they seem to be blocked with problems, e.g., you will suddenly be working with another team instead of the team that you were working with the day before."
"Stability is a huge concern right now. We are on a version which is very unstable. We have to upgrade to stabilize it. It is fine, but the problem is we have to hire CyberArk to do the upgrade. This costs money, and it is their bug."
"I would love them to improve their UI customizing features."
"The one place where we found that this product really needs to improve is the cloud. Simple integrations don't exist, even today. We don't have anything specific on CyberArk for managing, SaaS products, SaaS vendors, SaaS credentials. I understand it's a vendor-based thing and that they have to coordinate with the other vendors to be able to do that, and there are integrations coming. But these are the major places where CyberArk definitely needs to invest some more time."
"Overall what I would really love to see is the third-party PAS reporter tool pulled more into the overall solution, ideally as its own deployable component service installation package."
"The current interface is not very intuitive."
"The user experience should be improved."
More CyberArk Privileged Access Manager Pricing and Cost Advice →
CyberArk Privileged Access Manager is ranked 1st in User Activity Monitoring with 142 reviews while Teramind is ranked 5th in User Activity Monitoring with 1 review. CyberArk Privileged Access Manager is rated 8.8, while Teramind is rated 0.0. The top reviewer of CyberArk Privileged Access Manager writes "Lets you ensure relevant, compliant access in good time and with an audit trail, yet lacks clarity on MITRE ATT&CK". On the other hand, the top reviewer of Teramind writes "A stable solution that provides data protection and employee monitoring features in a single console". CyberArk Privileged Access Manager is most compared with Cisco ISE (Identity Services Engine), Microsoft Entra ID, Delinea Secret Server, WALLIX Bastion and One Identity Safeguard, whereas Teramind is most compared with ObserveIT and Veriato.
See our list of best User Activity Monitoring vendors.
We monitor all User Activity Monitoring reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.