Try our new research platform with insights from 80,000+ expert users

CyberArk Privileged Access Manager vs Fudo PAM comparison

 

Comparison Buyer's Guide

Executive SummaryUpdated on Oct 6, 2024
 

Categories and Ranking

CyberArk Privileged Access ...
Ranking in Privileged Access Management (PAM)
1st
Average Rating
8.6
Reviews Sentiment
6.9
Number of Reviews
197
Ranking in other categories
User Activity Monitoring (1st), Enterprise Password Managers (3rd), Mainframe Security (2nd), Operational Technology (OT) Security (3rd)
Fudo PAM
Ranking in Privileged Access Management (PAM)
25th
Average Rating
8.0
Reviews Sentiment
7.0
Number of Reviews
5
Ranking in other categories
No ranking in other categories
 

Mindshare comparison

As of December 2024, in the Privileged Access Management (PAM) category, the mindshare of CyberArk Privileged Access Manager is 20.9%, down from 23.8% compared to the previous year. The mindshare of Fudo PAM is 2.7%, up from 2.2% compared to the previous year. It is calculated based on PeerSpot user engagement data.
Privileged Access Management (PAM)
 

Featured Reviews

SatishIyer - PeerSpot reviewer
Lets you ensure relevant, compliant access in good time and with an audit trail, yet lacks clarity on MITRE ATT&CK
When I was a component owner for PAM's Privileged Threat Analytics (PTA) component, what I wanted was a clear mapping to the MITRE ATT&CK framework, a framework which has a comprehensive list of use cases. We reached out to the vendor and asked them how much coverage they have of the uses cases found on MITRE, which would have given us a better view of things while I was the product owner. Unfortunately they did not have the capability of mapping onto MITRE's framework at that time. PTA is essentially the monitoring interface of the broker (e.g. Privileged Access Management, the Vault, CPM, PSM, etc.), and it's where you can capture your broker bypass and perform related actions. For this reason, we thought that this kind of mapping would be required, but CyberArk informed us that they did not have the capability we had in mind with regard to MITRE ATT&CK. I am not sure what the situation is now, but it would definitely help to have that kind of alignment with one of the more well-known frameworks like MITRE. For CyberArk as a vendor, it would also help them to clearly spell out in which areas they have full functionality and in which ares they have partial or none. Of course, it also greatly benefits the customers when they're evaluating the product.
Oleksiy-Zaionchkovskyy - PeerSpot reviewer
Easy to install but needs to provide better server management and organization
I would like to see better server management. You have to know exactly what you're looking for to get the right server. Working with 100 or 200 server installations is comfortable, but not thousands. The scalability isn't very good because it's complicated. I would like more organization. For instance, they could add a table that matches an account to many servers at once. There could also be better education services. They don't have any certification program, at least in Ukraine, so the training is complicated and divided into different pieces. Cisco, for example, has a great education program that starts from the basics and progresses to advanced features.

Quotes from Members

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
 

Pros

"CyberArk is a good and adaptive solution. It is easy to adopt and install. It is easy for every use case."
"For a while, there were individual IDs having privileged access. We wanted to restrict that. We implemented the solution so that it can be more of internal control. We can have session recordings happening and reduce our attacks."
"The automatic rotation of credentials is probably the most useful feature."
"With PAM in place, we've experienced a significant reduction in potential security breaches."
"The most valuable feature is Special Monitoring."
"CyberArk's GUI is user friendly."
"I'm no longer the product owner for PAM, but I can say that the most useful feature is the vault functionality, which keeps all your passwords secure in a digital vault."
"PSM (Privilege Session Manager."
"We are convinced that Fudo PAM is better than competing products like WALLIX."
"it's perfect to control and administer computers in our company."
"Fudo PAM was the most flexible and intuitive interface out of all of the products in the PAM sector."
"The main benefit of the solution is that it's very easy to set up. It only takes a couple of hours to install everything."
"Session recording and password management are the two main aspects."
 

Cons

"In the beginning, CyberArk Privileged Access Manager didn't have a multifactor authentication feature, so that was an area for improvement, but now it's part of the solution. Having just one console for two CyberArk products would be good, particularly for the CyberArk Privileged Access Manager and the CyberArk Endpoint Privilege Manager, with the latter being a product for endpoint management that supports the workstations and allows you to manage workstations. In the next update of CyberArk Privileged Access Manager, it would be good to have a local agent where you can manage all users and processes, and have an agent on the servers such as Linux and Windows."
"One of our current issues is a publishing issue. If we whitelist Google Chrome, all the events of Google Chrome should be gone. It is not happening."
"It's a big program. To scale excessively, locally, on an on-prem application, takes a lot of servers."
"CyberArk Privileged Access Manager could improve the integration with other solutions and ease of use. Additionally, there should be a feature to have remote connections without a VPN."
"If we could have some kind of out-of-the box feature that you can simply say "no" so they don't have to go into a development mode, that would a really helpful feature."
"I would like to see better usability for non-technical people."
"The only problem involves granting access to people who are authorized to view it."
"CyberArk PAM is a very broad product as everyone's requirements for implementation are different. In our particular case, the initial implementation was planned and developed by people who didn't know our specific network requirements, so the initial implementation needed to be tweaked over time. While this is normal, at the time all these "major" changes required CyberArk professional services to come in-plant and "assist" with the changes."
"Professional training and certification would be great."
"Fudo PAM’s scalability is not very strong."
"I would like to see better server management. You have to know exactly what you're looking for to get the right server."
"The configuration is difficult."
"The stability is not very good."
 

Pricing and Cost Advice

"No, I do not have any advice on the price of the product."
"Before we bought it, they were licensing each function individually, which got complicated and very expensive. When we decided to buy it, it was much more straightforward and still quite expensive, but it brings a lot of value and risk reduction to the organization."
"Overall, its pricing is really good. The main difference from all the other vendors is that they have one package that covers all the functionality and modules of the basic PAM, except the add-on modules like adware and server protection. It also doesn't include the licenses for domain controller protection or maybe an API call-related feature. For the basic privileged access management, the bundle pricing is really good, but when it comes to an agent-based solution for advanced cyber protection or application identity managers, it is expensive. Services are also very expensive if you hire the services team from CyberArk, but these guys are really good. For a couple of large banking projects, we had an experience with them. The banks wanted to have things quickly and efficiently, so we had to hire them. If we take four weeks, these guys can do everything on a weekend. They charge quite a big sum of money, but they know the system well."
"Network and security licenses are currently being managed by other outsource vendors, so they are facing some type of problems in the digital aspect."
"Its price is high. I have also worked with Delinea. CyberArk is comparatively expensive compared to other PAM solutions, such as Delinea, especially during renewal."
"The price of CyberArk support could be a little bit less. Otherwise, pricing is fine."
"This solution is expensive."
"Pricing and licensing depend on the environment."
"The pricing is great. We've been given discounts that make it cheaper than using any other solution."
report
Use our free recommendation engine to learn which Privileged Access Management (PAM) solutions are best for your needs.
823,875 professionals have used our research since 2012.
 

Top Industries

By visitors reading reviews
Educational Organization
32%
Financial Services Firm
12%
Computer Software Company
11%
Manufacturing Company
6%
Financial Services Firm
20%
Computer Software Company
12%
Energy/Utilities Company
8%
Manufacturing Company
7%
 

Company Size

By reviewers
Large Enterprise
Midsize Enterprise
Small Business
No data available
 

Questions from the Community

How does Sailpoint IdentityIQ compare with CyberArk PAM?
We evaluated Sailpoint IdentityIQ before ultimately choosing CyberArk. Sailpoint Identity Platform is a solution to manage risks in cloud enterprise environments. It automates and streamlines the m...
What do you like most about CyberArk Privileged Access Manager?
The most valuable features of the solution are control and analytics.
What is your experience regarding pricing and costs for CyberArk Privileged Access Manager?
CyberArk Privileged Access Manager comes at a high cost. But the solution is worth its price.
What do you like most about Fudo PAM?
Session recording and password management are the two main aspects.
What needs improvement with Fudo PAM?
There are some areas for improvement in the Fudo PAM cake that we want to improve in terms of scaling. Scaling is an optional feature because we closed some big projects with enterprise customers f...
What is your primary use case for Fudo PAM?
The main use case is for protecting privileged user access, such as securing remote access services. Another important use case is when we work with third-party users and need to provide password m...
 

Also Known As

CyberArk Privileged Access Security, CyberArk Enterprise Password Vault
Fudo Privileged Access Management
 

Overview

 

Sample Customers

Rockwell Automation
KFC, BP, Santander, Burger King, ING, Starbucks, Yahoo, DHL
Find out what your peers are saying about CyberArk Privileged Access Manager vs. Fudo PAM and other solutions. Updated: December 2024.
823,875 professionals have used our research since 2012.