Try our new research platform with insights from 80,000+ expert users

CyberArk Privileged Access Manager vs Fudo PAM comparison

 

Comparison Buyer's Guide

Executive SummaryUpdated on Oct 6, 2024
 

Categories and Ranking

CyberArk Privileged Access ...
Ranking in Privileged Access Management (PAM)
1st
Average Rating
8.6
Number of Reviews
193
Ranking in other categories
User Activity Monitoring (1st), Enterprise Password Managers (2nd), Mainframe Security (3rd), Operational Technology (OT) Security (3rd)
Fudo PAM
Ranking in Privileged Access Management (PAM)
25th
Average Rating
8.0
Number of Reviews
5
Ranking in other categories
No ranking in other categories
 

Mindshare comparison

As of November 2024, in the Privileged Access Management (PAM) category, the mindshare of CyberArk Privileged Access Manager is 21.2%, down from 24.0% compared to the previous year. The mindshare of Fudo PAM is 2.6%, up from 2.1% compared to the previous year. It is calculated based on PeerSpot user engagement data.
Privileged Access Management (PAM)
 

Featured Reviews

SatishIyer - PeerSpot reviewer
Jun 21, 2022
Lets you ensure relevant, compliant access in good time and with an audit trail, yet lacks clarity on MITRE ATT&CK
When I was a component owner for PAM's Privileged Threat Analytics (PTA) component, what I wanted was a clear mapping to the MITRE ATT&CK framework, a framework which has a comprehensive list of use cases. We reached out to the vendor and asked them how much coverage they have of the uses cases found on MITRE, which would have given us a better view of things while I was the product owner. Unfortunately they did not have the capability of mapping onto MITRE's framework at that time. PTA is essentially the monitoring interface of the broker (e.g. Privileged Access Management, the Vault, CPM, PSM, etc.), and it's where you can capture your broker bypass and perform related actions. For this reason, we thought that this kind of mapping would be required, but CyberArk informed us that they did not have the capability we had in mind with regard to MITRE ATT&CK. I am not sure what the situation is now, but it would definitely help to have that kind of alignment with one of the more well-known frameworks like MITRE. For CyberArk as a vendor, it would also help them to clearly spell out in which areas they have full functionality and in which ares they have partial or none. Of course, it also greatly benefits the customers when they're evaluating the product.
Oleksiy-Zaionchkovskyy - PeerSpot reviewer
May 27, 2024
Easy to install but needs to provide better server management and organization
I would like to see better server management. You have to know exactly what you're looking for to get the right server. Working with 100 or 200 server installations is comfortable, but not thousands. The scalability isn't very good because it's complicated. I would like more organization. For instance, they could add a table that matches an account to many servers at once. There could also be better education services. They don't have any certification program, at least in Ukraine, so the training is complicated and divided into different pieces. Cisco, for example, has a great education program that starts from the basics and progresses to advanced features.

Quotes from Members

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
 

Pros

"It is an extremely scalable solution."
"Increased our insight into how privileged accounts are being used and distributed within our footprint."
"For a while, there were individual IDs having privileged access. We wanted to restrict that. We implemented the solution so that it can be more of internal control. We can have session recordings happening and reduce our attacks."
"It has helped us with our adoption with other teams, and it has also helped us to integrate it at the ground level."
"All access to our servers by both staff and vendors is monitored and recorded."
"We are maintaining compliance in PCI, SOX and HIPPA, which is a big thing. Auditors really like it, and it has made us stay compliant."
"It helps our customers in their software requirement imports."
"We are utilizing CyberArk to secure applications, credentials, and endpoints."
"We are convinced that Fudo PAM is better than competing products like WALLIX."
"Fudo PAM was the most flexible and intuitive interface out of all of the products in the PAM sector."
"Session recording and password management are the two main aspects."
"it's perfect to control and administer computers in our company."
"The main benefit of the solution is that it's very easy to set up. It only takes a couple of hours to install everything."
 

Cons

"I think they can improve account onboarding. For instance, you have to use the Password Vault utility, whereas in Thycotic I think there is a feature in the user interface that allows you to upload your account with an Excel file. So I'd like to have a similar thing in CyberArk."
"If there is an area that has room for improvement, it's probably working with their support and getting people on the phone. That is hard to do with most products in general, but that seems to be the difficult area. The product is fantastic, but sometimes we want somebody on the phone."
"The initial setup has room for improvement to be more straightforward."
"CyberArk has to continue to evolve with that threat landscape to make sure that they're still protecting those credentials that are owned by those that have privileged accounts in the firms."
"When I was a component owner for PAM's Privileged Threat Analytics (PTA) component, what I wanted was a clear mapping to the MITRE ATT&CK framework, a framework which has a comprehensive list of use cases. We reached out to the vendor and asked them how much coverage they have of the uses cases found on MITRE, which would have given us a better view of things while I was the product owner. Unfortunately they did not have the capability of mapping onto MITRE's framework at that time."
"The product is very vaulting-focused. I'd love to see it expanding its capabilities a bit further into areas like just-in-time elevation, and access with non-vaulted credentials."
"The turnaround time for technical support is lengthy."
"The scalability, sometimes, is lacking. It works really well for more static environments... But for an environment where you're constantly spinning up new infrastructure or new endpoints, sometimes it has a hard time keeping up."
"The stability is not very good."
"The configuration is difficult."
"Professional training and certification would be great."
"I would like to see better server management. You have to know exactly what you're looking for to get the right server."
"Fudo PAM’s scalability is not very strong."
 

Pricing and Cost Advice

"The product's licensing is yearly. I would rate the solution's pricing a six out of ten."
"If you are looking at implementing this solution, buy the training and go to it."
"Compared to other solutions, it is costly."
"It is not a cheap solution. It is expensive as compared with other solutions. However, it is one of the best solutions in their domain."
"The SaaS version of CyberArk Enterprise Password Vault is very expensive, but the on-premises version is relative, e.g. depending on the size of the environment, it can be a bit pricey, but it's relatively okay compared to the others."
"With reducing the privileged account access, there has been a huge improvement. They are now bringing more accounts on a little at a time."
"The price of CyberArk support could be a little bit less. Otherwise, pricing is fine."
"The price of CyberArk Privileged Access Manager could be less expensive."
"The pricing is great. We've been given discounts that make it cheaper than using any other solution."
report
Use our free recommendation engine to learn which Privileged Access Management (PAM) solutions are best for your needs.
815,854 professionals have used our research since 2012.
 

Top Industries

By visitors reading reviews
Educational Organization
31%
Financial Services Firm
13%
Computer Software Company
11%
Manufacturing Company
6%
Financial Services Firm
20%
Computer Software Company
13%
Energy/Utilities Company
7%
Manufacturing Company
7%
 

Company Size

By reviewers
Large Enterprise
Midsize Enterprise
Small Business
No data available
 

Questions from the Community

How does Sailpoint IdentityIQ compare with CyberArk PAM?
We evaluated Sailpoint IdentityIQ before ultimately choosing CyberArk. Sailpoint Identity Platform is a solution to manage risks in cloud enterprise environments. It automates and streamlines the m...
What do you like most about CyberArk Privileged Access Manager?
The most valuable features of the solution are control and analytics.
What is your experience regarding pricing and costs for CyberArk Privileged Access Manager?
CyberArk Privileged Access Manager comes at a high cost. But the solution is worth its price.
What do you like most about Fudo PAM?
Session recording and password management are the two main aspects.
What needs improvement with Fudo PAM?
There are some areas for improvement in the Fudo PAM cake that we want to improve in terms of scaling. Scaling is an optional feature because we closed some big projects with enterprise customers f...
What is your primary use case for Fudo PAM?
The main use case is for protecting privileged user access, such as securing remote access services. Another important use case is when we work with third-party users and need to provide password m...
 

Also Known As

CyberArk Privileged Access Security, CyberArk Enterprise Password Vault
Fudo Privileged Access Management
 

Overview

 

Sample Customers

Rockwell Automation
KFC, BP, Santander, Burger King, ING, Starbucks, Yahoo, DHL
Find out what your peers are saying about CyberArk Privileged Access Manager vs. Fudo PAM and other solutions. Updated: October 2024.
815,854 professionals have used our research since 2012.