We performed a comparison between CyberArk Privileged Access Manager and Perimeter 81 based on real PeerSpot user reviews.
Find out what your peers are saying about CyberArk, Delinea, BeyondTrust and others in Privileged Access Management (PAM)."It has helped us with our adoption with other teams, and it has also helped us to integrate it at the ground level."
"It helps our customers in their software requirement imports."
"The most valuable feature of CyberArk Privileged Access Manager is privileged threat analytics."
"I'm no longer the product owner for PAM, but I can say that the most useful feature is the vault functionality, which keeps all your passwords secure in a digital vault."
"It is a robust product."
"Within the solution, I love the fact that everything is recorded. The configuration capabilities are great, too."
"Their legacy of more than 20 years is very valuable. It brings a lot of stability to the product and a wide variety of integration with the ecosystem. Because of these factors, it has also been very successful in deployment. So, the legacy and integration with other technologies make the PAM platform very stable and strong. In terms of features, most of the other vendors are still focusing just on the privileged access management or session recording, but CyberArk has incorporated artificial intelligence to make PAM a more proactive system. They have implemented threat analytics into this, and there is also a lot of focus on domain controller production, Windows Server protection, and stuff like that. They have also further advanced it with the security on the cloud and DevOps systems. They have a bundle licensing model, which really helps. They don't have a complex licensing model. Even though in our market, people say CyberArk is expensive as compared to some of the other products, but in terms of overall value and as a bundling solution, it is an affordable and highly scalable product."
"We are able to rotate privileged user passwords to eliminate fraudulent use."
"SD-WAN is one of the primary solutions offered by Perimeter 81."
"Perimeter 81 is very pretty."
"Providing access and security allows our company employees to work from home and remotely."
"Our operators can work from home without any problems."
"It has provided a seamless gateway to much-needed platforms."
"The benefits are really built into the underlying protocol, however, Perimeter81 makes these available in a user-friendly way."
"The setup is really easy...I rate the support team a ten out of ten."
"Their split tunneling feature has been very valuable to our company since implementing the Perimeter 81 solution."
"The turnaround time for technical support is lengthy."
"The product could be easier to use. More work needs to be done on this aspect; it is not good enough yet. It also takes up a lot of server space. Sometimes we need to use up to seven servers."
"It is very complex and difficult to set up the solution."
"The scalability, sometimes, is lacking. It works really well for more static environments... But for an environment where you're constantly spinning up new infrastructure or new endpoints, sometimes it has a hard time keeping up."
"There is a bit of a learning curve, but it's a pretty complex solution."
"We had an issue with the Copy feature... Apparently, in version 10, that Copy feature does not work. You actually have to click Show and then copy the password from within Show and then paste it. We've had a million tickets and we had to figure out a workaround to it."
"I would like to see better automation in granting access, better tools, more efficient tools, to be able to customize the solution that CyberArk provides."
"The product documentation has to be more precise in certain aspects with explanations for functionality limitations along with reference material or screenshots."
"In the future, maybe P81 can improve the network traffic balancing and redundancy."
"There are a few areas where the solution could be improved. For instance, we sometimes encounter connectivity issues, which can be problematic. Recently, I experienced a connectivity issue while trying to move to Azure. Connectivity issues can be quite frustrating."
"The overall UI could be improved and updated to bring a simpler feel to the application."
"The solution's speed of upload and download is an area where it lacks"
"I have found that the log-in/out process takes quite some time."
"One of the more negative experiences using Perimeter 81 is the fact that I am logged off after a pre-determined amount of time which cuts off access to some of my company's resources."
"Offering in-app explanations detailing what each feature does, its benefits and potential use cases can help users better understand and utilize the tool to its full potential."
"I would suggest adding more networking and security features that allow more customization within their platform."
More CyberArk Privileged Access Manager Pricing and Cost Advice →
CyberArk Privileged Access Manager is ranked 1st in Privileged Access Management (PAM) with 144 reviews while Perimeter 81 is ranked 6th in Secure Access Service Edge (SASE) with 22 reviews. CyberArk Privileged Access Manager is rated 8.8, while Perimeter 81 is rated 9.2. The top reviewer of CyberArk Privileged Access Manager writes "Lets you ensure relevant, compliant access in good time and with an audit trail, yet lacks clarity on MITRE ATT&CK". On the other hand, the top reviewer of Perimeter 81 writes "Great SAML and SCIM support with the ability to deploy site-2-site tunnels with specific IP restrictions". CyberArk Privileged Access Manager is most compared with Cisco ISE (Identity Services Engine), Microsoft Entra ID, Delinea Secret Server, WALLIX Bastion and One Identity Safeguard, whereas Perimeter 81 is most compared with Zscaler Zero Trust Exchange, Cato SASE Cloud Platform, Prisma Access by Palo Alto Networks, Cloudflare Access and Tailscale.
We monitor all Privileged Access Management (PAM) reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.