Try our new research platform with insights from 80,000+ expert users

ARCON Privileged Access Management vs CyberArk Privileged Access Manager comparison

 

Comparison Buyer's Guide

Executive SummaryUpdated on Oct 6, 2024

Review summaries and opinions

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
 

Categories and Ranking

ARCON Privileged Access Man...
Ranking in Privileged Access Management (PAM)
5th
Average Rating
7.8
Reviews Sentiment
7.5
Number of Reviews
35
Ranking in other categories
No ranking in other categories
CyberArk Privileged Access ...
Ranking in Privileged Access Management (PAM)
1st
Average Rating
8.6
Reviews Sentiment
6.9
Number of Reviews
217
Ranking in other categories
User Activity Monitoring (1st), Enterprise Password Managers (2nd), Mainframe Security (2nd), Operational Technology (OT) Security (3rd)
 

Mindshare comparison

As of April 2025, in the Privileged Access Management (PAM) category, the mindshare of ARCON Privileged Access Management is 3.6%, down from 4.5% compared to the previous year. The mindshare of CyberArk Privileged Access Manager is 19.0%, down from 23.1% compared to the previous year. It is calculated based on PeerSpot user engagement data.
Privileged Access Management (PAM)
 

Featured Reviews

PRAVINKHISMATRAO - PeerSpot reviewer
Enhanced compliance and security through detailed action recordings
We have used ARCON Privileged Access Management for recording videos of user actions taken after logging into systems. Around thirty people, including network engineers, server engineers, and application engineers, use it in the company There hasn't been a notable financial benefit for our…
Lasantha Wijesinghe - PeerSpot reviewer
We have visibility and control through real-time user behavior analytics
It took us some time to realize its benefits because there was a learning curve for us. It took us about a year to get our heads around this product and start effectively using it. It is a journey. It takes at least five years for any company to make this product very useful and reach maturity. It is not only the product's fault. The company needs to have a vision, and the company culture needs to go with it. Senior leadership needs to support the vision. You need to have lots of ingredients for success. If everything is in place, you will see success after one year. In the first year, it is a struggle for everybody. My company was bought by a bigger company, and they were very new to privileged access management. Everybody was struggling. The advice I would give is to have a good vision for privileged access management. You need dedicated teams, senior management support, and proper company policies and standards before implementing the solution. Start building knowledge slowly and avoid jumping into the deep end without preparation. I would rate CyberArk Privileged Access Manager a nine out of ten.

Quotes from Members

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
 

Pros

"The notification alert feature where the network admin gets notified of probable malicious activity is the most valuable feature."
"Logging, particularly screen recording for Windows RDP sessions. Also, command-logging for SSH sessions. This really helps us to see what commands/changes have been executed in a particular service at a given point of time, and by whom."
"The entire conversation that is happening between the servers and the client is recorded. It is a good feature if you want to do some analysis, and for investigation."
"One important feature is the administrator access, mainly for Windows machines as well as Linux machines. It is important for us because there is accountability associated with each user ID. And the recordings are also helpful."
"With this log available, we can drill down to the activities performed by the people within our kiosk. There is a great feature where in the case of Unix servers, we have our own text-based logs. In the case of Window's server, we cannot create a text-based log, so our kiosk takes the screenshot or picture of the screen when I am working. It does this every three seconds."
"The technical support is excellent."
"The most valuable feature is it is easy to use and the interface is intuitive."
"One of the main benefits we've experienced is that Arcon helps us manage all our team's tasks and provides recording capabilities."
"If any intruder gets inside, they would not be able to move around nor do lateral movements. It minimize any attack problems within our network."
"Identity and access management are fundamental in cybersecurity."
"Ensures accounts are managed according to corporate policies."
"It is a central repository. Therefore, if someone needs to access a server, then they go through CyberArk PAM. It provides a secure way to do this and CyberArk PAM records everything. For example, if you are connecting to a Linux server, then once you get into the Linux server and if it is integrated with CyberArk, it will automatically start recording everything that is being done. In most banks, seeing the recordings is very useful. If there are any gaps or something has happened which shouldn't have happened, then we can check the logs and videos. So, it gives security, in a robust manner, to the organization."
"Technical support is very helpful whenever we have any questions."
"I found it valuable that CyberArk Privileged Access Manager can be integrated with PTA (privileged threat analytics), and this means that it will tell you if there's a risk to the logins and signs of risk and if risky behavior is observed. It's a good feature. Another good feature is the CPM (central password manager) because it helps you rotate the passwords automatically without involving the admins. It can go and update the scheduled tasks and the services. At the same time, if there's an application where it cannot do all of these, CPM will trigger an automatic email to the application owners, telling them that they should go ahead and change the password. This allows you to manage the account password that CyberArk cannot manage, which helps mitigate the risk of old passwords, where the password gets compromised, and also allows you to manage the security of the domain."
"The best feature of CyberArk Privileged Access Manager is its core function: automatically managing and securing credentials."
"We found the initial setup to be easy."
 

Cons

"Scalability could be improved."
"Initially, there were some issues with .NET applications in Windows 10 systems."
"A few areas for improvement in ARCON would be performance optimization, ensuring smoother management."
"I'll provide feedback on additional features after the project is completed. I think it would be better to comment on that after the implementation is finished."
"I'd also suggest adding a browser isolation feature to prevent cache storage on endpoints and mitigate cache-based attacks."
"The usability should be expanded to other browsers like Chrome and Firefox."
"The product is browser dependent. As of now, it only works on Internet Explorer from the client side. Admins cannot use any other browsers (Chrome, Edge, Firefox, etc.) to access the client manager online."
"There is often a slow response when logging into routers, switches, or servers compared to direct access."
"CyberArk Enterprise Password Vault can improve the distributive vault feature. Distributing the vault in multiple areas and multiple data centers should improve."
"CyberArk reporting is notoriously poor, offering about 5 reports out of the box. I am certified in Delinea, which includes 60 reports plus a custom report generator out of the box. Improved reporting would be beneficial."
"The reporting should be improved. There should be more customization. The report should show how we are going to mitigate the risk because we cannot show the system environment to each and every auditor."
"Their support can be better. Their SLA timings are higher than others."
"The admin interface of the Password Vault Web Access (PVWA) is moving from an old style (the classic interface) to a new style (the v10 interface) and unfortunately, this process is quite slow."
"The current process for accessing RDP through the CyberArk or administrative portal involves downloading an RDP file. This is inconvenient for users and problematic due to security restrictions that prevent accessing servers via downloaded RDP files."
"The interface on version 9 looks old."
"I would like to see improvement in the custom connector for integration with different devices."
 

Pricing and Cost Advice

"ARCON Privileged Access Management's pricing is reasonable."
"The pricing and licensing model is very economical."
"The product's pricing is good value. Go for user-based licensing, without any limit on the target servers."
"Product pricing is based on users and connections. We did not have to pay more for additional features."
"Their licensing model is very simple, as it is based on the number of endpoints which you want to manage along with the number of users and administrators which you want to use."
"The product is available with competitive pricing. Licensing is not complex. We calculated the license requirements by counting the number of admins and the number of devices which were going to integrate with it."
"The licensing is simple, and there are only two types licensing: device licensing and user-based licensing."
"There are no major concerns with licensing because we can handle multiple servers in our kiosk system."
"In comparison to other products on the market, CyberArk is a more costly product."
"I believe that this solution is priced well. It's the market leader and I think that it's the best solution."
"CyberArk is very expensive and there are additional fees for add-ons."
"It is in line with its competitors, but all such solutions cost too much money."
"CyberArk Privileged Access Manager is more expensive than its competitors, such as BeyondTrust, Delinea, and ManageEngine PAM360."
"Network and security licenses are currently being managed by other outsource vendors, so they are facing some type of problems in the digital aspect."
"Previously, the pricing was very meager. They started publicizing and advertising the solution, growing CyberArk, as an organization. They also changed their pricing with that growth, e.g., the pricier the product, the more people who will purchase it."
"The price of this solution is expensive."
report
Use our free recommendation engine to learn which Privileged Access Management (PAM) solutions are best for your needs.
842,767 professionals have used our research since 2012.
 

Top Industries

By visitors reading reviews
Educational Organization
62%
Computer Software Company
9%
Financial Services Firm
3%
Real Estate/Law Firm
2%
Educational Organization
34%
Financial Services Firm
12%
Computer Software Company
11%
Manufacturing Company
6%
 

Company Size

By reviewers
Large Enterprise
Midsize Enterprise
Small Business
 

Questions from the Community

What needs improvement with ARCON Privileged Access Management?
In terms of improvements, I suggest implementing password rotation for service-based accounts, as that should be included.
How does Sailpoint IdentityIQ compare with CyberArk PAM?
We evaluated Sailpoint IdentityIQ before ultimately choosing CyberArk. Sailpoint Identity Platform is a solution to manage risks in cloud enterprise environments. It automates and streamlines the m...
What do you like most about CyberArk Privileged Access Manager?
The most valuable features of the solution are control and analytics.
 

Also Known As

ARCON ARCOS, ARCON PAM
CyberArk Privileged Access Security, CyberArk Enterprise Password Vault
 

Overview

 

Sample Customers

RAK Bank, AXIS Bank, Reliance Capital, Kotak Life Insurance, MTS
Rockwell Automation
Find out what your peers are saying about ARCON Privileged Access Management vs. CyberArk Privileged Access Manager and other solutions. Updated: March 2025.
842,767 professionals have used our research since 2012.