Try our new research platform with insights from 80,000+ expert users

CyberArk Endpoint Privilege Manager vs Delinea Secret Server comparison

 

Comparison Buyer's Guide

Executive SummaryUpdated on Oct 6, 2024

Review summaries and opinions

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
 

Categories and Ranking

CyberArk Endpoint Privilege...
Ranking in Privileged Access Management (PAM)
5th
Average Rating
8.2
Reviews Sentiment
6.7
Number of Reviews
31
Ranking in other categories
Endpoint Compliance (4th), Anti-Malware Tools (5th), Application Control (6th), Ransomware Protection (7th)
Delinea Secret Server
Ranking in Privileged Access Management (PAM)
2nd
Average Rating
8.0
Reviews Sentiment
7.0
Number of Reviews
51
Ranking in other categories
Enterprise Password Managers (5th)
 

Mindshare comparison

As of January 2025, in the Privileged Access Management (PAM) category, the mindshare of CyberArk Endpoint Privilege Manager is 4.0%, up from 3.9% compared to the previous year. The mindshare of Delinea Secret Server is 11.2%, down from 13.1% compared to the previous year. It is calculated based on PeerSpot user engagement data.
Privileged Access Management (PAM)
 

Featured Reviews

Anish R - PeerSpot reviewer
Foolproof and good for controlling access but can be expensive
I've worked in BeyondTrust, also. They have Asian-based solutions, and it's not as heavy as CyberArk. Since I have been working with CyberArk for some time, I feel a little bit more comfortable with CyberArk. BeyondTrust is also not that bad. However, they did not have all the capabilities that CyberArk was offering at that time. That said, this was maybe four or five years ago. I haven't explored anything after that. I'm sure a lot of things have changed. There used to be IBM Privilege Identity Manager as well, but it's not there anymore. Saviynt has its own solution as well. Basically, there are multiple solutions there, however, CyberArk was definitely been our choice for Privilege Identity Manager.
Avinash Gopu. - PeerSpot reviewer
Effective for password rotation policies triggered by audit requirements, it helps maintain compliance standards and seamless integration with third-party tools
The "App to App" feature has been most impactful. It allows secure communication between applications without requiring direct user access, which is crucial for several applications. Additionally, working in the finance department, we are heavily focused on enhancing audit reporting and compliance. So, the GRC (Governance, Risk & Compliance) capabilities of Delinea Secret Server have also been crucial for us. We implemented a custom reporting system that can automatically send reports to auditors daily, weekly, or according to your organization's needs. We also upgraded the audit role within Secret Server, allowing auditors to access and analyze the reports directly. Additionally, Secret Server provides comprehensive logging capabilities. Auditors can see what data users access, their access levels, and their activities, including check-in and check-out times. Furthermore, Secret Server helped us manage privileged, elevated access, which we call "K2K." As the lead for this project, I could identify users with the highest access levels and implement specific policies to monitor their activity on servers.

Quotes from Members

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
 

Pros

"The tool is an endpoint management system. It monitors everything a standard user does and helps elevate privileges when necessary for advanced users. It keeps an auditable trail of all activities. Practically, it stops and blocks potentially hazardous user behavior, whether intentional or unintentional. Certain companies must use endpoint management software because of national or international rules or ISO norms."
"CyberArk Endpoint Privilege Manager is very easy to manage, which I like. The solution also has a dashboard where you can see which software is suspicious, which I find valuable."
"I have always found that CyberArk is a very tight, foolproof product compared to most other products available."
"The solution allows me to give access and privileges to each user individually"
"The biggest benefit of CyberArk EPM for our customers is control over privileged access for endpoints. Endpoints are often the starting point for attackers to enter and move within a network. CyberArk EPM bridges the gap between security and operations teams. Operations teams are happy because work isn't stopped due to admin rights issues, while security teams are satisfied that full admin rights aren't given to all users."
"The product is very flexible"
"Users can scale the solution."
"The most valuable feature is that their database is completely encrypted and protected with multiple layers."
"One valuable feature is that it will support a dedicated database. Delinea provides multiple features, like reporting and remote password changes."
"Delinea Secret Server is a cost-effective solution."
"Support is helpful."
"The ease of granting access to a secret without having to share the actual password and the password rotation were the main features I found effective for password management."
"I like that it is Windows-based. It is good that primarily, it is not an appliance. Some of the other applications in the space, such as a Quest Software CPAM or a Safeguard, are appliances, so you can't deploy the ends of them. With Thycotic, you can either install your Temporal Protection module physically in the VM host, or you can use BouncyCastle for high-security module capabilities."
"Technical support is pretty good."
"I have found most valuable the automatic scheduled password rotation and remote desktop monitoring. Additionally, the documentation is readily available and easy to find and the dashboard is straightforward."
"Delinea Secret Server offers features similar to CyberArk and BeyondTrust, such as maintaining and securing privileged passwords and session monitoring."
 

Cons

"It cannot be on-prem. It is only cloud-based. Sometimes, that's a restriction in terms of usage."
"It's an old product and has many areas that can be improved."
"CyberArk has some performance issues. For example, servers could not handle the solution when we first took CyberArk Endpoint Privilege Manager."
"CyberArk Endpoint Privilege Manager is not suitable for the current situation because when you compare it to OTP, OTP is the strongest password solution. You can use it as a one-time password, but you have to log into the password manager itself and if you don't change your password, it will be the weakest link in the security. In OTP, you don't have that weakest link."
"Technical support is slow to respond when we run into issues."
"For an experienced system implementer it will take approximately one day. However, for somebody who is inexperienced it may take up to five days."
"The product needs a streamlined user interface; improvements to the user interface can enhance user experience and make the solution more intuitive to navigate."
"CyberArk Endpoint Privilege Manager could be improved by simplifying the administration process, specifically when setting up policies and applications."
"We find the documentation hard to understand."
"We could definitely use some help with API tokenization. If we had a way to store tokens that would be fabulous."
"What needs improvement? The product can be improved by reducing the number of updates provided."
"One of the things that we want is to be able to do some of the management of it using APIs."
"Delinea Secret Server can improve in areas like statistics and notifications, and risk scoring, especially for highly privileged accounts where financial transactions occur."
"The solution could be more user-friendly."
"We faced some upgrade issues, especially during the management and administration parts. I found it less straightforward than on many other platforms, even outside password managers."
"One thing that I wish they would do is to have a Kubernetes or container-based deployment supported, but they're not quite there yet. Containerization or support for containerization would be fantastic."
 

Pricing and Cost Advice

"The tool's pricing is reasonable for customers."
"It's not at the lower end of the market. I think the price is reasonable considering the quality it delivers. It is a top-notch solution at a fair price point."
"The price of CyberArk Endpoint Privilege Manager is expensive. The solution is priced based on the number of accounts onboarded and the number of concurrent sessions. Everyone else is included in the price, such as support."
"The solution requires an annual license to use it. There can be some extra costs in some cases."
"I rate the solution's pricing an eight out of ten since the price can be too high for smaller businesses."
"The professional services for one eight-hour day would be $1,800."
"The product's license is easy to procure."
"The cost for CyberArk is very high."
"The tool's pricing is expensive."
"It would be beneficial if it were reduced."
"Its price is okay. We don't compete on pricing. We seldom use price to win over our competitors. We prefer it this way because if we can sustain the price, we make more margin as well. We don't want the price to go down to the bottom where despite the win, there's no margin at all."
"I would give the price a four on a scale from one to ten, with one being the cheapest and ten being the most expensive. We pay for the license on a yearly basis, and we paid for three years. It costs around 5000 a year."
"When comparing the price of Thycotic Secret Server with other solutions it is reasonable."
"The pricing is standard in this business and we have no complaints about it."
"Secret Server is expensive when compared to the cost to some alternatives."
"In the Nigerian market, the adoption of Delinea depends largely on an organization's budget. If they have the financial capacity, they might consider Delinea as a viable option."
report
Use our free recommendation engine to learn which Privileged Access Management (PAM) solutions are best for your needs.
831,158 professionals have used our research since 2012.
 

Top Industries

By visitors reading reviews
Financial Services Firm
15%
Computer Software Company
14%
Manufacturing Company
11%
Government
8%
Educational Organization
39%
Computer Software Company
11%
Financial Services Firm
7%
Government
6%
 

Company Size

By reviewers
Large Enterprise
Midsize Enterprise
Small Business
 

Questions from the Community

Looking for recommendations and a pros/cons template for software to detect insider threats
This is an inside-out --- outside-in --- inside-in question, as an insider can be an outsider as well. There is no short answer other than a blend of a PAM tool with Behavioral Analytics and Endpo...
What do you like most about CyberArk Endpoint Privilege Manager?
The most valuable feature of the solution is its performance.
What do you like most about Delinea Secret Server?
The privileged access management module is the most reliable feature.
What is your experience regarding pricing and costs for Delinea Secret Server?
If you're requesting licenses or pricing, then you have to fill out a questionnaire that they try to gain insight into what your environment is like, what you're trying to discover, and what you're...
What needs improvement with Delinea Secret Server?
The integration with the ticketing system ServiceNow is complex. That can be enabled with an API-based out-of-the-box consumption. We have customized it, and the features cannot be used without cus...
 

Also Known As

Viewfinity
Thycotic Secret Server, Delinea Password Reset Server
 

Learn More

 

Overview

 

Sample Customers

Information Not Available
Secure-24, University of San Diego, International Rescue Committee, San Francisco Ballet, Perkins Coie, University of San Diego, D.S.S. Limited, Turbo's Hoet, Eclipse Computing, Cathay Bank, Stellarise, J&R Consulting
Find out what your peers are saying about CyberArk Endpoint Privilege Manager vs. Delinea Secret Server and other solutions. Updated: January 2025.
831,158 professionals have used our research since 2012.