CyberArk Privileged Access Manager and Azure Key Vault compete in the realm of privileged account and key management solutions. CyberArk appears to have the upper hand in terms of comprehensive privileged session management features, while Azure Key Vault excels at seamless integration within the Azure ecosystem.
Features: CyberArk offers centralized policy management, automated password rotation, auditing, session recording, and compliance tools like Enterprise Password Vault and Privileged Session Manager. Azure Key Vault focuses on secure key and secret storage with easy integration in Azure, supporting cryptographic key management.
Room for Improvement: CyberArk users seek enhancements in user interface, platform integration, session recording search, plugin connectors, and reporting features. Azure Key Vault users desire improved key rotation, integration with third-party services, and a streamlined setup process, particularly for non-Microsoft services.
Ease of Deployment and Customer Service: CyberArk is primarily deployed in on-premises and hybrid cloud environments, requiring detailed configuration and strong technical support but with noted delays. Azure Key Vault's cloud-native deployment ensures easy setup, proficient support, and seamless Azure service integration, despite some service delays and feature request challenges.
Pricing and ROI: CyberArk is costly, targeting larger enterprises, but delivers significant ROI by enhancing security and compliance. Azure Key Vault offers a more affordable pay-as-you-go model within the Azure ecosystem, although costs can rise with the volume of managed keys.
During our quantitative analysis, we estimated potential savings of one to ten million dollars a year by using a PAM solution.
With other tools such as Okta where you have self-service for resetting your own passwords and things like that, the average savings is 12 minutes, which is six dollars for a password reset, and you can extrapolate that over your organization.
A strong identity and access management solution aids in navigating significant incident responses or breach situations.
I have a strong relationship with Microsoft since we are one of their best clients in Spain.
The skill level of the support staff is also questionable.
CyberArk has been exceptional in coming back to us with immediate responses.
It could be forever until you talk to someone who knows what they are doing.
They are helpful, but complex issues can take a long time to resolve, which can delay solutions for urgent customer issues.
The CPM can reportedly handle up to 50,000 accounts independently without issue.
I would rate it a ten out of ten for scalability.
They had 40,000 passwords in this one safe, and it was saving the last ten iterations of each password object. That means they had 400,000 password objects in this safe. They exceeded the limit.
Proper fine-tuning and expertise ensure the product performs well.
Overall, the stability of the solution is high.
It has a large customer base and positive feedback within my network.
My security area wants to rotate passwords every day, every week, or every month, depending on the services.
One of our certificates was not getting deployed, and during that time, the support team was unsure and had to connect with the back-end team for assistance.
The skill level of the support staff is also questionable.
They want everything to be on the cloud, but even in the SaaS version of CyberArk Privileged Access Manager, they need to deploy some servers on-premises.
We cannot generate a plug-in for web-based applications.
If they want clients to move to the cloud, they need to support them in real-time.
I would classify it as low priced.
We are planning to buy protection for Entra.
CyberArk is expensive compared to other products I know.
CyberArk is comparatively expensive compared to other PAM solutions, such as Delinea, especially during renewal.
CyberArk's SaaS solution is particularly expensive.
All secrets are in the Key Vault, and access is managed by the integrated management in ITT, which Azure provides to the services.
It also helps me increase my security posture and assists with regulatory and compliance requirements.
Primarily, I use the Key Vault for storing multiple SSL certificates and handling other related tasks.
CyberArk Privileged Access Manager helps ensure data privacy because we now know who is using which credentials and at what time.
It keeps a record of activities, allowing me to easily fetch screen recordings to detect any misuse and see who did what and what happened.
As a security professional, I have real-time visibility into ongoing sessions.
Microsoft Azure Key Vault is a cloud-based data security and storage service that allows users to keep their secrets safe from bad actors.
Benefits of Microsoft Azure Key Vault
Some of the benefits of using Microsoft Azure Key Vault include:
Reviews from Real Users
Microsoft Azure Key Vault stands out among their competitors for a number of reasons. Two major ones are the overall robustness of the solution and its ability to protect and manage many different digital asset types. The many features that the solution offers allows users to tailor their experience to meet their specific needs. Its flexibility enables users to accomplish a wide variety of security and identity management related tasks. It empowers users to secure a wide array of assets. Users can keep many different types of secrets away from bad actors.
A cloud architect at a marketing services firm writes, “All its features are really valuable. It's really well thought-out. It's a complete turnkey solution that has all the concerns taken care of, such as access control and management. You can use it in infrastructure as code to create key vaults, APIs, PowerShells, CLIs, even Terraform. You can also use it in different services across the board. If you have app services, or virtual machines, Kubernetes, or Databricks, they can all use Key Vault effectively. In my opinion, in a DevSecOps, DevOps, or even in a modern Azure implementation, you have to use Azure Key Vault to make sure you're addressing security and identity management concerns. By "identity" I mean usernames, passwords, cryptography, etcetera. It's a full-blown solution and it supports most breeds of key management: how you store keys and certify.”
Roger L., the managing director of Cybersecurity Architecture at Peloton Systems, says, “The most valuable aspect of the product is its ability to keep our admin password accounts for keys and a lot of our high-value assets. It can manage those types of assets. So far, the product does a great job of managing keys.”
CyberArk Privileged Access Manager is a next-generation solution that allows users to secure both their applications and their confidential corporate information. It is extremely flexible and can be implemented across a variety of environments. This program runs with equal efficiency in a fully cloud-based, hybrid, or on-premises environment. Users can now protect their critical infrastructure and access it in any way that best meets their needs.
CyberArk Privileged Access Manager possesses a simplified and unified user interface. Users are able to manage the solution from one place. The UI allows users to view and manage all of the information and controls that administrators need to be able to easily access. Very often, management UIs do not have all of the controls and information streamlined in a single location. This platform provides a level of visibility that ensures users will be able to view all of their system’s most critical information at any time that they wish.
Benefits of CyberArk Privileged Access Manager
Some of CyberArk Privileged Access Manager’s benefits include:
Reviews from Real Users
CyberArk Privileged Access Manager’s software stands out among its competitors for one very fundamental reason. CyberArk Privileged Access Manager is an all-in-one solution. Users are given the ability to accomplish with a single platform what might usually only be accomplished with multiple solutions.
PeerSpot users note the truly all-in-one nature of this solution. Mateusz K., IT Manager at a financial services firm, wrote, "It improves security in our company. We have more than 10,000 accounts that we manage in CyberArk. We use these accounts for SQLs, Windows Server, and Unix. Therefore, keeping these passwords up-to-date in another solution or software would be impossible. Now, we have some sort of a platform to manage passwords, distribute the inflow, and manage IT teams as well as making regular changes to it according to the internal security policies in our bank."
Hichem T.-B., CDO & Co-Founder at ELYTIK, noted that “This is a complete solution that can detect cyber attacks well. I have found the proxy features most valuable for fast password web access.”
We monitor all Enterprise Password Managers reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.