Try our new research platform with insights from 80,000+ expert users

ARCON Privileged Access Management vs CyberArk Privileged Access Manager comparison

 

Comparison Buyer's Guide

Executive SummaryUpdated on Oct 6, 2024

Review summaries and opinions

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
 

Categories and Ranking

ARCON Privileged Access Man...
Ranking in Privileged Access Management (PAM)
4th
Average Rating
7.8
Reviews Sentiment
7.5
Number of Reviews
35
Ranking in other categories
No ranking in other categories
CyberArk Privileged Access ...
Ranking in Privileged Access Management (PAM)
1st
Average Rating
8.6
Reviews Sentiment
6.9
Number of Reviews
203
Ranking in other categories
User Activity Monitoring (1st), Enterprise Password Managers (3rd), Mainframe Security (2nd), Operational Technology (OT) Security (3rd)
 

Mindshare comparison

As of January 2025, in the Privileged Access Management (PAM) category, the mindshare of ARCON Privileged Access Management is 4.1%, down from 5.1% compared to the previous year. The mindshare of CyberArk Privileged Access Manager is 20.5%, down from 23.6% compared to the previous year. It is calculated based on PeerSpot user engagement data.
Privileged Access Management (PAM)
 

Featured Reviews

PRAVINKHISMATRAO - PeerSpot reviewer
Enhanced compliance and security through detailed action recordings
We have used ARCON Privileged Access Management for recording videos of user actions taken after logging into systems. Around thirty people, including network engineers, server engineers, and application engineers, use it in the company There hasn't been a notable financial benefit for our…
Lasantha Wijesinghe - PeerSpot reviewer
We have visibility and control through real-time user behavior analytics
It took us some time to realize its benefits because there was a learning curve for us. It took us about a year to get our heads around this product and start effectively using it. It is a journey. It takes at least five years for any company to make this product very useful and reach maturity. It is not only the product's fault. The company needs to have a vision, and the company culture needs to go with it. Senior leadership needs to support the vision. You need to have lots of ingredients for success. If everything is in place, you will see success after one year. In the first year, it is a struggle for everybody. My company was bought by a bigger company, and they were very new to privileged access management. Everybody was struggling. The advice I would give is to have a good vision for privileged access management. You need dedicated teams, senior management support, and proper company policies and standards before implementing the solution. Start building knowledge slowly and avoid jumping into the deep end without preparation. I would rate CyberArk Privileged Access Manager a nine out of ten.

Quotes from Members

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
 

Pros

"That dashboard is okay."
"Logging, particularly screen recording for Windows RDP sessions. Also, command-logging for SSH sessions. This really helps us to see what commands/changes have been executed in a particular service at a given point of time, and by whom."
"Video and audio logs are there for any activities that the privileged admin carries out."
"Previously, we had to go through some effort to change the credentials of our devices. The process was subject to human error... For things like managing credentials, some kind of register had to be maintained. With the Password Vault of ARCON, all these processes are automated. The credentials are changed, as per the schedule. The information is encrypted, kept in our vault, and sent to all the email addresses within the ARCON solution itself."
"Recording all videos of commands entered into devices is highly valuable."
"One of the main benefits we've experienced is that Arcon helps us manage all our team's tasks and provides recording capabilities."
"By manually keeping the user logs, we can understand and manage all the operationalized tasks."
"The deployment process for the solution was easy...The solution's technical support team was good."
"It is a single tool that isolates possible kinds of malware. You get lateral movement blocking and auditing information, e.g., you know who is doing what. You are getting protections from the service as well as a useful environment. All your admins can easily go in and out of your company while accessing your servers in a secure way, even if they are working abroad."
"The fact that I can put my vault here in a central location on one net for example, and I'll have a CPM in California, a CPM in Texas, a CPM in New York, a CPM in Florida, and actually be able to grow with my company and not necessarily have to continue to grow my vault until I get to a certain number accounts - yet I can still manage everything across the country, if not the world - I love that. I love the flexibility and the capability of being able to pull those components out."
"This solution is quite stable."
"What I found most valuable in CyberArk Privileged Access Manager is the Session Manager as it allows you to split the connection between the administrator site and the target site. I also found the Password Manager valuable as it lets you rotate the passwords of privileged users."
"I appreciate the ease of use for support analysts."
"We are able to rotate privileged user passwords to eliminate fraudulent use."
"I find value in notifications from CyberArk when passwords fail verification and have other issues."
"We know when passwords will be expiring so we can force users to change their passwords, as well as requiring specific password requirements for length, complexity, etc."
 

Cons

"Sometimes it gets stuck between servers and I would like to see this improved in the future."
"We would like to see support for privileged accounts used in web-based systems like Blue Coat Secure Web Gateway, VMware ESXI management tools, etc."
"If you take Microsoft hypervisor - which comes with its own interface, its own web layer, etc. - something like that also requires privileged IDs. As per our institution policy now, everything has to come through ARCON. We have demanded that these kind of advanced features also should be there."
"Initially, there were some issues with .NET applications in Windows 10 systems."
"Bulk password automation is not available in ARCON when compared to other products."
"I'd also suggest adding a browser isolation feature to prevent cache storage on endpoints and mitigate cache-based attacks."
"It should support the SQL Always On platform with FQDN name instead of IP."
"A few areas for improvement in ARCON would be performance optimization, ensuring smoother management."
"The product could be easier to use. More work needs to be done on this aspect; it is not good enough yet. It also takes up a lot of server space. Sometimes we need to use up to seven servers."
"The current interface is not very intuitive."
"Having a centralized place to manage the solution has been something that I have always wanted, and they are starting to understand that and bring things back together."
"The PTA could be improved. Currently, companies often have multiple domains and sometimes it's difficult to implement CyberArk in this kind of infrastructure. For example, you can add CPM (Central Policy Manager) and PSM (Privileged Session Manager and PVWA (Password Vault Web Access) for access, but if you want to add PTA (Privileged Threat Analysis) to scan Vault logs, it is difficult because this component may be adding multiple domain environments."
"The installation process should be easier and more user-friendly so that you don't need to hire a third party to deploy it."
"The Vault's disaster recovery features need improvement."
"Sometimes the infrastructure team is hesitant to provide more resources."
"It should be easy to use for non-technical people. Its interface can be a bit difficult. Some parts of its interface are not very intuitive. Some of the controls are hidden, and instead of having a screen with all the controls for that account on it, you have to use menus and other similar things."
 

Pricing and Cost Advice

"The product's pricing is a good value. It's appropriately priced. The product has all the required features. It doesn't work in some of the areas but, right now overall, it's pretty good."
"Their licensing model is very simple, as it is based on the number of endpoints which you want to manage along with the number of users and administrators which you want to use."
"Pricing and licensing are good, very aggressive."
"The solution’s pricing is neither cheap nor expensive."
"We have a subscription to use this solution."
"It is good value for our business. According to me, their competitors are more costly. Therefore, it is quite affordable. I find the ARCON to be much cheaper than the other products in the market."
"I am not in a position to give any financials, but whatever we have paid, it is value for money. Their licensing model is good. They have been flexible for us."
"ARCON is a will give you all the features in a very cost-effective solution. Pricing and licensing is very good compared to other players in the market."
"I would rate the cost of CyberArk Privileged Access Manager seven out of ten with ten being the most expensive."
"CyberArk Enterprise Password Vault is a very expensive product."
"I haven't seen the numbers. I know it is not cheap, but I don't know what it is. I would rate it a six out of ten in terms of pricing. It is definitely more expensive than the other product, but it also provides more functionality, and it is modular too. So, we pay for the functionality we're actually going to use, and that's nice."
"CyberArk provides all the features bundled. This is compared to other vendors who provide them as a different license for each functionality."
"The license CyberArk Privileged Access Manager is on an annual basis."
"In comparison to other products on the market, CyberArk is a more costly product."
"The solution is available at a high price"
"They have two types of licensing: purchase and subscription. You have to pay for each admin user, such as Microsoft admin, mail admin, database admin, etc."
report
Use our free recommendation engine to learn which Privileged Access Management (PAM) solutions are best for your needs.
831,158 professionals have used our research since 2012.
 

Top Industries

By visitors reading reviews
Educational Organization
65%
Computer Software Company
9%
Financial Services Firm
3%
Retailer
2%
Educational Organization
33%
Financial Services Firm
12%
Computer Software Company
11%
Manufacturing Company
6%
 

Company Size

By reviewers
Large Enterprise
Midsize Enterprise
Small Business
 

Questions from the Community

What needs improvement with ARCON Privileged Access Management?
In terms of improvements, I suggest implementing password rotation for service-based accounts, as that should be included.
How does Sailpoint IdentityIQ compare with CyberArk PAM?
We evaluated Sailpoint IdentityIQ before ultimately choosing CyberArk. Sailpoint Identity Platform is a solution to manage risks in cloud enterprise environments. It automates and streamlines the m...
What do you like most about CyberArk Privileged Access Manager?
The most valuable features of the solution are control and analytics.
What is your experience regarding pricing and costs for CyberArk Privileged Access Manager?
CyberArk Privileged Access Manager is more expensive than its competitors, such as BeyondTrust, Delinea, and ManageEngine PAM360. While ManageEngine PAM360 offers similar flexibility and support at...
 

Also Known As

ARCON ARCOS, ARCON PAM
CyberArk Privileged Access Security, CyberArk Enterprise Password Vault
 

Learn More

 

Overview

 

Sample Customers

RAK Bank, AXIS Bank, Reliance Capital, Kotak Life Insurance, MTS
Rockwell Automation
Find out what your peers are saying about ARCON Privileged Access Management vs. CyberArk Privileged Access Manager and other solutions. Updated: January 2025.
831,158 professionals have used our research since 2012.