Try our new research platform with insights from 80,000+ expert users

CyberArk Privileged Access Manager vs Ekran System comparison

 

Comparison Buyer's Guide

Executive Summary

Review summaries and opinions

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
 

Categories and Ranking

CyberArk Privileged Access ...
Ranking in User Activity Monitoring
1st
Ranking in Privileged Access Management (PAM)
1st
Average Rating
8.6
Reviews Sentiment
6.8
Number of Reviews
229
Ranking in other categories
Enterprise Password Managers (3rd), Mainframe Security (2nd), Operational Technology (OT) Security (3rd)
Ekran System
Ranking in User Activity Monitoring
4th
Ranking in Privileged Access Management (PAM)
22nd
Average Rating
8.0
Reviews Sentiment
7.5
Number of Reviews
1
Ranking in other categories
No ranking in other categories
 

Mindshare comparison

As of September 2025, in the User Activity Monitoring category, the mindshare of CyberArk Privileged Access Manager is 13.0%, down from 24.6% compared to the previous year. The mindshare of Ekran System is 19.8%, up from 14.3% compared to the previous year. It is calculated based on PeerSpot user engagement data.
User Activity Monitoring Market Share Distribution
ProductMarket Share (%)
CyberArk Privileged Access Manager13.0%
Ekran System19.8%
Other67.2%
User Activity Monitoring
 

Featured Reviews

Atul-Gujar - PeerSpot reviewer
Secures critical infrastructures with essential user session audit records
A potential area for improvement is enhancing support for cluster environments and distributed Vaults. Clients in multiple countries that need central access have different challenges that require better solutions from CyberArk. For financial services, CyberArk can improve incident response by ensuring fast support for critical priority tickets to meet compliance requirements. Providing more documentation on CyberArk is recommended for new team members to enhance their troubleshooting capabilities. I understand it's up to the client, but 99% fail to change the demo key, so it's crucial for CyberArk to emphasize changing the key and documenting it as part of the installation process.
Andreas Lalos - PeerSpot reviewer
Early threat detection and diverse OS support with enhanced security
Ekran System offers a lightweight solution that does not impact the systems where it is implemented. It provides rich metadata for monitored activities and includes threat analysis capabilities for early alerting and investigation of unauthorized actions. Additionally, it supports diverse operating systems and allows for monitoring and enforcement policies, like blocking actions for policy violations, and provides a retention of historical data in a lightweight format.

Quotes from Members

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
 

Pros

"For me, CyberArk Privileged Access Manager's most valuable features are password and session management."
"CyberArk's GUI is user friendly."
"The product has allowed us to improve both the management and access to privileged credentials, while also creating a full audit trail of all activities happening within isolated sessions of all tasks and activities taking place within the solution."
"The best feature is vaulting. CyberArk has a separate vault, which is their proprietary vault, which provides multiple encryptions for every password object, as well as tamper-proof recording."
"CyberArk has helped us to identify, store, protect, and monitor the usage of privileged accounts."
"The granularity of the controls in the CyberArk Privileged Access Manager is good; they have provided compliance which is required, helping us in auditing and reducing the risk of insider misuse of credential theft while also saving time for the IT guys with automating password rotations."
"Super stable and easy to scale"
"The feature that I like the most is the Privileged Session Manager. It offers session recordings, logging, and tracking of user workstreams."
"It supports diverse operating systems and allows for monitoring and enforcement policies, like blocking actions for policy violations, and provides a retention of historical data in a lightweight format."
 

Cons

"CyberArk Enterprise Password Vault must incorporate connectors for password and session managers in the marketplace."
"The graphical user interface could be simplified and harmonized for better usability. It should be consistent. Its GUI is very confusing."
"CyberArk has to continue to evolve with that threat landscape to make sure that they're still protecting those credentials that are owned by those that have privileged accounts in the firms."
"The PTA could be improved. Currently, companies often have multiple domains and sometimes it's difficult to implement CyberArk in this kind of infrastructure. For example, you can add CPM (Central Policy Manager) and PSM (Privileged Session Manager and PVWA (Password Vault Web Access) for access, but if you want to add PTA (Privileged Threat Analysis) to scan Vault logs, it is difficult because this component may be adding multiple domain environments."
"This product needs professional consulting services to onboard accounts effectively based user profiles."
"If there is an area that has room for improvement, it's probably working with their support and getting people on the phone. That is hard to do with most products in general, but that seems to be the difficult area. The product is fantastic, but sometimes we want somebody on the phone."
"I would like to see an easier way to define delegated roles within the administration of the core product."
"It's expensive and you're not getting anything new. It's just a control, but in terms of risk, you are covering a big impact on the company."
"Ekran System could improve in terms of communication to the market, particularly after their rebranding as Shiteka."
 

Pricing and Cost Advice

"If you want a Ferrari, it will cost you. The solution is really nice, so it costs the client, but in the long run, it is very good. If you buy a solution that costs a lot to maintain because it is not stable, and you are frequently asking for consultant support, it costs more."
"It costs us around $200 per user."
"It can be an expensive product."
"I rate the tool's pricing an eight out of ten."
"CyberArk DNA is free if you purchase the CyberArk solution. There is no additional charge for CyberArk DNA, which is great."
"The solution is available at a high price"
"The price of the solution is reasonable."
"CyberArk provides all the features bundled. This is compared to other vendors who provide them as a different license for each functionality."
Information not available
report
Use our free recommendation engine to learn which User Activity Monitoring solutions are best for your needs.
867,497 professionals have used our research since 2012.
 

Top Industries

By visitors reading reviews
Financial Services Firm
15%
Computer Software Company
15%
Manufacturing Company
9%
Government
6%
No data available
 

Company Size

By reviewers
Large Enterprise
Midsize Enterprise
Small Business
By reviewers
Company SizeCount
Small Business60
Midsize Enterprise41
Large Enterprise171
No data available
 

Questions from the Community

How does Sailpoint IdentityIQ compare with CyberArk PAM?
We evaluated Sailpoint IdentityIQ before ultimately choosing CyberArk. Sailpoint Identity Platform is a solution to manage risks in cloud enterprise environments. It automates and streamlines the m...
What do you like most about CyberArk Privileged Access Manager?
The most valuable features of the solution are control and analytics.
What is your experience regarding pricing and costs for CyberArk Privileged Access Manager?
There has been no reduced cost associated with CyberArk Privileged Access Manager, as when it is required, you must pay for their licensing and prepare the full environment. While there are costs f...
What is your experience regarding pricing and costs for Ekran System?
The business model has become more complex with changes in feature licensing, yet they provide affordable options, particularly with the standard edition, which doesn't charge for the management co...
What needs improvement with Ekran System?
Ekran System could improve in terms of communication to the market, particularly after their rebranding as Shiteka. The solution does not support other protocols beyond traditional monitoring chann...
What is your primary use case for Ekran System?
The primary use case for Ekran System is third-party vendor monitoring and privileged access management monitoring. It is also used for privilege access management solutions.
 

Also Known As

CyberArk Privileged Access Security, CyberArk Enterprise Password Vault
No data available
 

Overview

 

Sample Customers

Rockwell Automation
Deloitte, UPS, Seoul National University, KDN, Finat, Constitutional Court of Korea, Ukrsibbank
Find out what your peers are saying about CyberArk, Amazon Web Services (AWS), Proofpoint and others in User Activity Monitoring. Updated: August 2025.
867,497 professionals have used our research since 2012.