Try our new research platform with insights from 80,000+ expert users

Akamai Enterprise Application Access vs CyberArk Privileged Access Manager comparison

 

Comparison Buyer's Guide

Executive Summary
 

Categories and Ranking

Akamai Enterprise Applicati...
Average Rating
9.0
Reviews Sentiment
7.3
Number of Reviews
3
Ranking in other categories
Cloud Access Security Brokers (CASB) (17th), Access Management (21st), ZTNA as a Service (21st), Secure Access Service Edge (SASE) (26th)
CyberArk Privileged Access ...
Average Rating
8.6
Reviews Sentiment
6.9
Number of Reviews
199
Ranking in other categories
User Activity Monitoring (1st), Enterprise Password Managers (3rd), Privileged Access Management (PAM) (1st), Mainframe Security (2nd), Operational Technology (OT) Security (3rd)
 

Featured Reviews

Bill Lee - PeerSpot reviewer
Very scalable, convenient, and stable protection against attacks
Our company uses the solution as a cloud perimeter and VPN. We don't need to use on-premises devices to open firewalls to inbound or outbound traffic.  The solution is very convenient and stable because you don't have to worry about attacks to public IPs or public networks.  The solution has two…
SatishIyer - PeerSpot reviewer
Lets you ensure relevant, compliant access in good time and with an audit trail, yet lacks clarity on MITRE ATT&CK
When I was a component owner for PAM's Privileged Threat Analytics (PTA) component, what I wanted was a clear mapping to the MITRE ATT&CK framework, a framework which has a comprehensive list of use cases. We reached out to the vendor and asked them how much coverage they have of the uses cases found on MITRE, which would have given us a better view of things while I was the product owner. Unfortunately they did not have the capability of mapping onto MITRE's framework at that time. PTA is essentially the monitoring interface of the broker (e.g. Privileged Access Management, the Vault, CPM, PSM, etc.), and it's where you can capture your broker bypass and perform related actions. For this reason, we thought that this kind of mapping would be required, but CyberArk informed us that they did not have the capability we had in mind with regard to MITRE ATT&CK. I am not sure what the situation is now, but it would definitely help to have that kind of alignment with one of the more well-known frameworks like MITRE. For CyberArk as a vendor, it would also help them to clearly spell out in which areas they have full functionality and in which ares they have partial or none. Of course, it also greatly benefits the customers when they're evaluating the product.

Quotes from Members

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
 

Pros

"Application Access's most valuable feature is the accessibility of enterprise tech protection."
"The solution is very convenient and stable because you don't have to worry about attacks to public IPs or public networks."
"The capability of Akamai Enterprise Application Access is what you're looking for, it's giving you the service that you're looking for. It's simple and doesn't use an agent. It uses LCSD responders, and they have a lot of services around the globe. That's the reason that we were very interested in using it because it has a lot of coverage. This is because it's under the GDS umbrella."
"CyberArk has resulted in a massive increase in our security footprint."
"Super stable and easy to scale"
"If properly set up, CyberArk Enterprise Password Vault has good stability, and is a very solid tool. It can run by itself. Its most valuable features are auto password recycling and PSM."
"The most valuable feature is that it is flexible. It has many connectors. that have done well, the EPV and SSH sessions are all being recorded and everything works fine."
"It is scalable."
"CyberArk has helped us to identify, store, protect, and monitor the usage of privileged accounts."
"We are able to rotate credentials and have privileged account access."
"Ensures accounts are managed according to corporate policies."
 

Cons

"The solution has two agents so should combine its enterprise application and security access into one agent."
"We need another approach to bring the solution to the cloud. In addition to Access Management, we would like to see if we can jump into Directories. I think ADs are going to go away and everything is going to be cloud-based and minimize the use of ADs because of the cost and some other dependencies to the cloud. Every time you buy AD it is more hardware, and everything's changing to software. The network's changing, the applications are changing, and for IT it is hard to keep up with it."
"The technical enablement sessions are quite limited, and Akamai could help by providing more of them."
"I would like to see improvement in the custom connector for integration with different devices."
"The one place where we found that this product really needs to improve is the cloud. Simple integrations don't exist, even today. We don't have anything specific on CyberArk for managing, SaaS products, SaaS vendors, SaaS credentials. I understand it's a vendor-based thing and that they have to coordinate with the other vendors to be able to do that, and there are integrations coming. But these are the major places where CyberArk definitely needs to invest some more time."
"There is a little bit of confusion in the implementation part, especially when one tries to understand the actual working of the product."
"I would like to see better usability for non-technical people."
"Currently, in Secure Connect, an end user is required to enter account information manually, and cannot save any of this information for future use."
"Report creation could be improved. The policies could be more customized."
"The admin interface of the Password Vault Web Access (PVWA) is moving from an old style (the classic interface) to a new style (the v10 interface) and unfortunately, this process is quite slow."
"I would prefer that this is a fully-managed service, rather than have to manage the software ourselves and keep it up to date."
 

Pricing and Cost Advice

"Licensing is based on user count."
"The license can be shared based on the number of active users."
"The price is great it is all-inclusive, they use an enterprise cost model. That's what we like compared to other users. This is one of the main attractions of Akamai Enterprise Application Access. It's already an enterprise cost model established with us for services."
"Overall, its pricing is really good. The main difference from all the other vendors is that they have one package that covers all the functionality and modules of the basic PAM, except the add-on modules like adware and server protection. It also doesn't include the licenses for domain controller protection or maybe an API call-related feature. For the basic privileged access management, the bundle pricing is really good, but when it comes to an agent-based solution for advanced cyber protection or application identity managers, it is expensive. Services are also very expensive if you hire the services team from CyberArk, but these guys are really good. For a couple of large banking projects, we had an experience with them. The banks wanted to have things quickly and efficiently, so we had to hire them. If we take four weeks, these guys can do everything on a weekend. They charge quite a big sum of money, but they know the system well."
"The solution is cost-effective for the features."
"The product's licensing is yearly. I would rate the solution's pricing a six out of ten."
"The price of CyberArk Privileged Access Manager could be less expensive."
"It's per-company, license-based."
"Although CyberArk Privileged Access Management is expensive, its protection capabilities outweigh the cost."
"I'm a technician so I don't handle the licensing for CyberArk Privileged Access Manager, but I know that the price for the core license is about €140 per year. There's another type of license, the external vendor license, and that's about €600 and you can manage twenty devices. From what I know, the price for one device in a subscription is about €65 per year. You can buy the CyberArk Endpoint Privilege Manager too, or you can buy some other application or application license with CyberArk Privileged Access Manager, but all other features, such as the Analytics Server is included in the basic CyberArk license. With WALLIX, you need to buy separate licenses for the features."
"The price of this solution is quite reasonable."
report
Use our free recommendation engine to learn which Access Management solutions are best for your needs.
824,067 professionals have used our research since 2012.
 

Top Industries

By visitors reading reviews
Computer Software Company
15%
Manufacturing Company
14%
Financial Services Firm
11%
Healthcare Company
5%
Educational Organization
32%
Financial Services Firm
12%
Computer Software Company
11%
Manufacturing Company
6%
 

Company Size

By reviewers
Large Enterprise
Midsize Enterprise
Small Business
No data available
 

Questions from the Community

What do you like most about Akamai Enterprise Application Access?
The solution is very convenient and stable because you don't have to worry about attacks to public IPs or public networks.
What is your experience regarding pricing and costs for Akamai Enterprise Application Access?
The license can be shared based on the number of active users. If you have 5,000 users but only 1,000 active users at one time, then you buy a license for 1,000 users.
What needs improvement with Akamai Enterprise Application Access?
The solution has two agents so should combine its enterprise application and security access into one agent. It is more comfortable for users if they don't have to install two agents.
How does Sailpoint IdentityIQ compare with CyberArk PAM?
We evaluated Sailpoint IdentityIQ before ultimately choosing CyberArk. Sailpoint Identity Platform is a solution to manage risks in cloud enterprise environments. It automates and streamlines the m...
What do you like most about CyberArk Privileged Access Manager?
The most valuable features of the solution are control and analytics.
What is your experience regarding pricing and costs for CyberArk Privileged Access Manager?
CyberArk Privileged Access Manager comes at a high cost. But the solution is worth its price.
 

Also Known As

Soha
CyberArk Privileged Access Security, CyberArk Enterprise Password Vault
 

Learn More

 

Overview

 

Sample Customers

Bugcrowd, InPowered, Spirent Communications
Rockwell Automation
Find out what your peers are saying about Akamai Enterprise Application Access vs. CyberArk Privileged Access Manager and other solutions. Updated: December 2024.
824,067 professionals have used our research since 2012.