Try our new research platform with insights from 80,000+ expert users

ARCON Privileged Access Management vs CyberArk Privileged Access Manager comparison

 

Comparison Buyer's Guide

Executive SummaryUpdated on Oct 6, 2024
 

Categories and Ranking

ARCON Privileged Access Man...
Ranking in Privileged Access Management (PAM)
6th
Average Rating
7.8
Reviews Sentiment
7.5
Number of Reviews
35
Ranking in other categories
No ranking in other categories
CyberArk Privileged Access ...
Ranking in Privileged Access Management (PAM)
1st
Average Rating
8.6
Reviews Sentiment
6.9
Number of Reviews
197
Ranking in other categories
User Activity Monitoring (1st), Enterprise Password Managers (3rd), Mainframe Security (2nd), Operational Technology (OT) Security (3rd)
 

Mindshare comparison

As of December 2024, in the Privileged Access Management (PAM) category, the mindshare of ARCON Privileged Access Management is 4.1%, down from 4.9% compared to the previous year. The mindshare of CyberArk Privileged Access Manager is 20.9%, down from 23.8% compared to the previous year. It is calculated based on PeerSpot user engagement data.
Privileged Access Management (PAM)
 

Featured Reviews

SarojMohapatra - PeerSpot reviewer
Offers good session monitoring and recording features
Some options are required in the tool, especially to help in scenarios where if a user's ID gets locked, that person cannot unlock the ID from ARCON Privileged Access Management. Even the technical team in my company cannot unlock any locked ID with the help of the tool. Even if there is an admin password, ARCON Privileged Access Management releases it using its functionalities, allowing users to generate a password during an emergency. If an ID gets locked, the tool cannot unlock it, making it an area where improvements are required.
SatishIyer - PeerSpot reviewer
Lets you ensure relevant, compliant access in good time and with an audit trail, yet lacks clarity on MITRE ATT&CK
When I was a component owner for PAM's Privileged Threat Analytics (PTA) component, what I wanted was a clear mapping to the MITRE ATT&CK framework, a framework which has a comprehensive list of use cases. We reached out to the vendor and asked them how much coverage they have of the uses cases found on MITRE, which would have given us a better view of things while I was the product owner. Unfortunately they did not have the capability of mapping onto MITRE's framework at that time. PTA is essentially the monitoring interface of the broker (e.g. Privileged Access Management, the Vault, CPM, PSM, etc.), and it's where you can capture your broker bypass and perform related actions. For this reason, we thought that this kind of mapping would be required, but CyberArk informed us that they did not have the capability we had in mind with regard to MITRE ATT&CK. I am not sure what the situation is now, but it would definitely help to have that kind of alignment with one of the more well-known frameworks like MITRE. For CyberArk as a vendor, it would also help them to clearly spell out in which areas they have full functionality and in which ares they have partial or none. Of course, it also greatly benefits the customers when they're evaluating the product.

Quotes from Members

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
 

Pros

"Technical support is good. I rate the technical support an eight out of ten."
"With this log available, we can drill down to the activities performed by the people within our kiosk. There is a great feature where in the case of Unix servers, we have our own text-based logs. In the case of Window's server, we cannot create a text-based log, so our kiosk takes the screenshot or picture of the screen when I am working. It does this every three seconds."
"The user interface, overall, is really good. If I have some 20 servers in my ID, I can easily see for which servers I have read-only access, for which servers I have prompt-access, and for which servers I have server admin access."
"For compliance, each change I do, in each of the servers, is clearly recorded. We recently faced an audit and this was an awesome feature. Even our auditor had praise for it saying, "This is really a good feature.""
"The initial setup was very simple. There was only one server we had to setup. We needed to store all the passwords, and a secure database is used."
"100% compliant and you don't have to maintain ID management for each and every user."
"The technical support is excellent."
"It was very easy for us to move this application and database from on-premise to cloud, as well as configure new things, such as load balancing. The product is very compatible."
"It enables companies to automate password management on target systems gaining a more secure access management approach."
"Because we now have the ability to grant access to management utilities like DNS Manager, Sequel Studio, and MMC, in a secure fashion, without system admins being required to continually reenter various passwords that are stored who knows where, it has really made the system admin's job much easier. It has made the PSM's job much easier. It has made the auditor's job and the security team's job and the access manager's job significantly easier, because we're able to move much more quickly toward a role-based access management system, and that is really streamlining the whole onboarding/offboarding management process."
"It's a highly flexible solution that can adapt to each customer's needs."
"The technical support is good."
"The regulation of accounts is by far the most needed and valuable part of the application."
"We are utilizing CyberArk to secure applications, credentials, and endpoints."
"Our most valuable features would probably be key rotation, the SKM or SSH key manager, and account discovery."
"The technical support for this solution is very good. If I was to rate it on a scale of one to five, I would give it a five."
 

Cons

"If you take Microsoft hypervisor - which comes with its own interface, its own web layer, etc. - something like that also requires privileged IDs. As per our institution policy now, everything has to come through ARCON. We have demanded that these kind of advanced features also should be there."
"There is often a slow response when logging into routers, switches, or servers compared to direct access."
"The product is browser dependent. As of now, it only works on Internet Explorer from the client side. Admins cannot use any other browsers (Chrome, Edge, Firefox, etc.) to access the client manager online."
"Initially, there were some issues with .NET applications in Windows 10 systems."
"There are no APIs readily available... I'm working on automation for ARCON so that whatever the ARCON administrator is doing will be automated, rather than having to do it manually. For that, I had to spend months to get the API developed myself. Having that handy out of the box, that would really help..."
"I would like for it to be dependent on Windows as opposed to Linux."
"It should support the SQL Always On platform with FQDN name instead of IP."
"They need to support all web browsers. At the moment it only supports Explorer, IE. They have to come up with a solution to support all browsers."
"CyberArk Privileged Access Manager could improve the integration docking, it should have more layers. For example, integration with OpenShift."
"CyberArk's license is too expensive. I rate it seven out of 10 for affordability."
"We require IAM (identify and access management) capability at the administrator level because we need more identification."
"I would like to see improvement in the custom connector for integration with different devices."
"Performance of PIM could be better and intended for usability as well as security."
"It is web-based, but other competitors have apps. We need to get there. It is just smoother to have an app. You don't have all the bugs from having a browser, and people like them better, since you can get to them via mobile."
"When something comes out, it's generally airtight and works as advertised. However, sometimes they are a little bit slow to keep up with what's coming out. In 2017, for example, they released support for Windows Server 2016, which had been out for a year or so."
"Sometimes the infrastructure team is hesitant to provide more resources."
 

Pricing and Cost Advice

"Pricing and licensing are good, very aggressive."
"ARCON is a will give you all the features in a very cost-effective solution. Pricing and licensing is very good compared to other players in the market."
"The product's pricing is a good value. It's appropriately priced. The product has all the required features. It doesn't work in some of the areas but, right now overall, it's pretty good."
"Product pricing is based on users and connections. We did not have to pay more for additional features."
"It is good value for our business. According to me, their competitors are more costly. Therefore, it is quite affordable. I find the ARCON to be much cheaper than the other products in the market."
"ARCON Privileged Access Management's pricing is reasonable."
"The product is available with competitive pricing. Licensing is not complex. We calculated the license requirements by counting the number of admins and the number of devices which were going to integrate with it."
"There are no major concerns with licensing because we can handle multiple servers in our kiosk system."
"Its price is high. I have also worked with Delinea. CyberArk is comparatively expensive compared to other PAM solutions, such as Delinea, especially during renewal."
"The price of the solution is reasonable."
"Generally, I don't get involved in the licensing or the purchasing side of it, but I do know that the licenses are expensive."
"The price of this solution is quite reasonable."
"The solution is cost-effective for the features."
"There are no additional costs other than the standard licensing fees."
"The product’s pricing is feasible for enterprise customers. The pricing is expensive for smaller businesses. You need to pay additional costs for service implementation and local support."
"Licensing fees are paid on a yearly basis."
report
Use our free recommendation engine to learn which Privileged Access Management (PAM) solutions are best for your needs.
824,053 professionals have used our research since 2012.
 

Top Industries

By visitors reading reviews
Educational Organization
64%
Computer Software Company
9%
Financial Services Firm
3%
Retailer
2%
Educational Organization
32%
Financial Services Firm
12%
Computer Software Company
11%
Manufacturing Company
6%
 

Company Size

By reviewers
Large Enterprise
Midsize Enterprise
Small Business
 

Questions from the Community

What needs improvement with ARCON Privileged Access Management?
In terms of improvements, I suggest implementing password rotation for service-based accounts, as that should be included.
How does Sailpoint IdentityIQ compare with CyberArk PAM?
We evaluated Sailpoint IdentityIQ before ultimately choosing CyberArk. Sailpoint Identity Platform is a solution to manage risks in cloud enterprise environments. It automates and streamlines the m...
What do you like most about CyberArk Privileged Access Manager?
The most valuable features of the solution are control and analytics.
What is your experience regarding pricing and costs for CyberArk Privileged Access Manager?
CyberArk Privileged Access Manager comes at a high cost. But the solution is worth its price.
 

Also Known As

ARCON ARCOS, ARCON PAM
CyberArk Privileged Access Security, CyberArk Enterprise Password Vault
 

Learn More

 

Overview

 

Sample Customers

RAK Bank, AXIS Bank, Reliance Capital, Kotak Life Insurance, MTS
Rockwell Automation
Find out what your peers are saying about ARCON Privileged Access Management vs. CyberArk Privileged Access Manager and other solutions. Updated: December 2024.
824,053 professionals have used our research since 2012.