Try our new research platform with insights from 80,000+ expert users

Atos DirX Directory vs CyberArk Privileged Access Manager comparison

 

Comparison Buyer's Guide

Executive Summary
 

Categories and Ranking

Atos DirX Directory
Average Rating
6.8
Number of Reviews
4
Ranking in other categories
Application Infrastructure (19th)
CyberArk Privileged Access ...
Average Rating
8.6
Reviews Sentiment
6.9
Number of Reviews
199
Ranking in other categories
User Activity Monitoring (1st), Enterprise Password Managers (3rd), Privileged Access Management (PAM) (1st), Mainframe Security (2nd), Operational Technology (OT) Security (3rd)
 

Mindshare comparison

Atos DirX Directory and CyberArk Privileged Access Manager aren’t in the same category and serve different purposes. Atos DirX Directory is designed for Application Infrastructure and holds a mindshare of 0.5%, up 0.1% compared to last year.
CyberArk Privileged Access Manager, on the other hand, focuses on Privileged Access Management (PAM), holds 20.9% mindshare, down 23.8% since last year.
Application Infrastructure
Privileged Access Management (PAM)
 

Featured Reviews

Kleber Fernandes - PeerSpot reviewer
An identity management system with valuable knowledge
We use Atos DirX Directory for cybersecurity with Managed Detection and Response (MDR) solutions Atos DirX Directory helps take care of attacks and manage responses. It also has artificial intelligence to mitigate any attack. The most valuable feature is its knowledge. The price could be…
SatishIyer - PeerSpot reviewer
Lets you ensure relevant, compliant access in good time and with an audit trail, yet lacks clarity on MITRE ATT&CK
When I was a component owner for PAM's Privileged Threat Analytics (PTA) component, what I wanted was a clear mapping to the MITRE ATT&CK framework, a framework which has a comprehensive list of use cases. We reached out to the vendor and asked them how much coverage they have of the uses cases found on MITRE, which would have given us a better view of things while I was the product owner. Unfortunately they did not have the capability of mapping onto MITRE's framework at that time. PTA is essentially the monitoring interface of the broker (e.g. Privileged Access Management, the Vault, CPM, PSM, etc.), and it's where you can capture your broker bypass and perform related actions. For this reason, we thought that this kind of mapping would be required, but CyberArk informed us that they did not have the capability we had in mind with regard to MITRE ATT&CK. I am not sure what the situation is now, but it would definitely help to have that kind of alignment with one of the more well-known frameworks like MITRE. For CyberArk as a vendor, it would also help them to clearly spell out in which areas they have full functionality and in which ares they have partial or none. Of course, it also greatly benefits the customers when they're evaluating the product.

Quotes from Members

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
 

Pros

"The most valuable feature is its knowledge."
"The role and attribute-based access control has been greatly improved."
"The solution offers high performance."
"DirX Directory is the best feature of the product: a very fast, stable LDAP directory."
"Our most valuable features would probably be key rotation, the SKM or SSH key manager, and account discovery."
"The users have the ability to rotate passwords on a daily basis with a Reconcile Account. Or, if they want to do one-time password checkouts, we can manage those, check in, check out. I like the flexibility of the changing of the password, specifically."
"Rather than multiple tools for maintaining regulatory compliance around passwords and privileged accounts, we have centralized as much as possible with CyberArk. This is now a one stop shop for end users to access their elevated credentials."
"CyberArk has resulted in a massive increase in our security footprint."
"We have accomplished our security goals. We have two-factor authenticated and vaulted our important accounts, so people can't just steal stuff from us."
"The risk of lost password and forbidden access to resources has been drastically reduced which increased the security level for the entire company,"
"CyberArk Privileged Access Management's most valuable features are primarily its password vault functionality, specifically CyberArk's Core Privileged Manager and Privileged Session Manager."
"The biggest feature is the security of the overall solution. It's very secure. The vaulting technology and the number of security layers involved in the vault, where privileged accounts are actually stored, is the heart of the solution."
 

Cons

"The Self-Service Portal is old school and it lacks easy accessibility for users."
"An overall modernization of the product is required in order to keep up with newer products."
"The user interface could be more convenient for people that don't know the tool too intensively."
"The price could be better. It would be better if they developed a better endpoint solution in the next release."
"Needs more available consultants and implementation partners."
"There are upwards of six components you need to set it up. And you might need anywhere from two to five servers. It takes some work to set that up, especially in a larger environment."
"The support services could act faster when people reach out to resolve issues."
"The lead product has a slow process. There are some reports and requirements from CyberArk which are not readily available as an applicable solution. We have made consistent management requests in the logs."
"The interface on version 9 looks old."
"CyberArk Privileged Access Manager could improve the integration with other solutions and ease of use. Additionally, there should be a feature to have remote connections without a VPN."
"Initially, there was a lot of hiccups, because there were a lot of transitions due to manual installations."
"If there is an area that has room for improvement, it's probably working with their support and getting people on the phone. That is hard to do with most products in general, but that seems to be the difficult area. The product is fantastic, but sometimes we want somebody on the phone."
"If you are an administrator or architect, then the solution is kind of complicated, as it is mostly focused on the end user. So, they need to also focus on the people who are implementing it."
 

Pricing and Cost Advice

"The price could be better."
"The price of this solution is quite reasonable."
"Previously, the pricing was very meager. They started publicizing and advertising the solution, growing CyberArk, as an organization. They also changed their pricing with that growth, e.g., the pricier the product, the more people who will purchase it."
"If you are looking at implementing this solution, buy the training and go to it."
"Cost efficiency is the number one thing that can be improved in my mind. This would change lots of companies minds on purchasing the product."
"The solution is available at a high price"
"The main problem for the tool is its licensing. I work for a really big company. When you try to develop this as a service, usually you work with leverage teams who are formed with dozens of members. You might dedicate one FTE, or less, for something, e.g., an antivirus administrator. You might have half an FTE's effort dedicated to administering the antivirus, but then you have a team of about 30 users who might access that ticket. The problem is that CyberArk eliminated the possibility of concurrent users years ago. This is a big problem for companies who work with leverage teams. You need to pay for everyone. 40 licenses are used by 20 or 30 people. This is a big problem because licenses are not precisely cheap."
"I would rate CyberArk's pricing a nine out of ten, with one being cheap and ten being expensive. It's one of the most expensive solutions in the market, but it's worth it."
"The cost is high compared to other products."
report
Use our free recommendation engine to learn which Application Infrastructure solutions are best for your needs.
824,067 professionals have used our research since 2012.
 

Top Industries

By visitors reading reviews
Financial Services Firm
16%
Insurance Company
11%
Manufacturing Company
9%
Government
9%
Educational Organization
32%
Financial Services Firm
12%
Computer Software Company
11%
Manufacturing Company
6%
 

Company Size

By reviewers
Large Enterprise
Midsize Enterprise
Small Business
No data available
 

Questions from the Community

What do you like most about Atos DirX Directory?
The most valuable feature is its knowledge.
What needs improvement with Atos DirX Directory?
The price could be better. It would be better if they developed a better endpoint solution in the next release.
How does Sailpoint IdentityIQ compare with CyberArk PAM?
We evaluated Sailpoint IdentityIQ before ultimately choosing CyberArk. Sailpoint Identity Platform is a solution to manage risks in cloud enterprise environments. It automates and streamlines the m...
What do you like most about CyberArk Privileged Access Manager?
The most valuable features of the solution are control and analytics.
What is your experience regarding pricing and costs for CyberArk Privileged Access Manager?
CyberArk Privileged Access Manager comes at a high cost. But the solution is worth its price.
 

Also Known As

DirX Directory
CyberArk Privileged Access Security, CyberArk Enterprise Password Vault
 

Learn More

 

Overview

 

Sample Customers

National Savings and Investments, Vehicle and Operator Services Agency
Rockwell Automation
Find out what your peers are saying about Microsoft, F5, Apache and others in Application Infrastructure. Updated: December 2024.
824,067 professionals have used our research since 2012.