Try our new research platform with insights from 80,000+ expert users

CyberArk Privileged Access Manager vs Hitachi ID Privileged Access Manager [EOL] comparison

 

Comparison Buyer's Guide

Executive Summary
 

Categories and Ranking

CyberArk Privileged Access ...
Average Rating
8.6
Number of Reviews
193
Ranking in other categories
User Activity Monitoring (1st), Enterprise Password Managers (2nd), Privileged Access Management (PAM) (1st), Mainframe Security (3rd), Operational Technology (OT) Security (3rd)
Hitachi ID Privileged Acces...
Average Rating
7.0
Number of Reviews
1
Ranking in other categories
No ranking in other categories
 

Featured Reviews

SatishIyer - PeerSpot reviewer
Jun 21, 2022
Lets you ensure relevant, compliant access in good time and with an audit trail, yet lacks clarity on MITRE ATT&CK
When I was a component owner for PAM's Privileged Threat Analytics (PTA) component, what I wanted was a clear mapping to the MITRE ATT&CK framework, a framework which has a comprehensive list of use cases. We reached out to the vendor and asked them how much coverage they have of the uses cases found on MITRE, which would have given us a better view of things while I was the product owner. Unfortunately they did not have the capability of mapping onto MITRE's framework at that time. PTA is essentially the monitoring interface of the broker (e.g. Privileged Access Management, the Vault, CPM, PSM, etc.), and it's where you can capture your broker bypass and perform related actions. For this reason, we thought that this kind of mapping would be required, but CyberArk informed us that they did not have the capability we had in mind with regard to MITRE ATT&CK. I am not sure what the situation is now, but it would definitely help to have that kind of alignment with one of the more well-known frameworks like MITRE. For CyberArk as a vendor, it would also help them to clearly spell out in which areas they have full functionality and in which ares they have partial or none. Of course, it also greatly benefits the customers when they're evaluating the product.
DR
Oct 12, 2021
Responsive support, requires little maintenance, but configuration could be easier
If you using IGA or access controls solutions then this solution is a good addon. Once Hitachi ID Privileged Access Manager is set up it does not require a lot of maintenance or attention Hitachi ID Privileged Access Manager is cumbersome and it does not operate by itself and relies on other…

Quotes from Members

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
 

Pros

"What I found most valuable in CyberArk Privileged Access Manager is the Session Manager as it allows you to split the connection between the administrator site and the target site. I also found the Password Manager valuable as it lets you rotate the passwords of privileged users."
"We can make a policy that affects everybody instantly."
"The most valuable features of CyberArk Enterprise Password Vault are password vaulting and automatic rotation of passwords after use."
"The product is for hardening access and making the organization more secure, therefore reducing chances of a breach."
"Because we now have the ability to grant access to management utilities like DNS Manager, Sequel Studio, and MMC, in a secure fashion, without system admins being required to continually reenter various passwords that are stored who knows where, it has really made the system admin's job much easier. It has made the PSM's job much easier. It has made the auditor's job and the security team's job and the access manager's job significantly easier, because we're able to move much more quickly toward a role-based access management system, and that is really streamlining the whole onboarding/offboarding management process."
"The regulation of accounts is by far the most needed and valuable part of the application."
"The threat analytics is an important feature."
"Enterprise Password Vault, Privilege Session Manager, and Application Identity Management have been very useful for our client environment."
"If you using IGA or access controls solutions then this solution is a good addon. Once Hitachi ID Privileged Access Manager is set up it does not require a lot of maintenance or attention."
 

Cons

"I would prefer that this is a fully-managed service, rather than have to manage the software ourselves and keep it up to date."
"I don't know if "failed authentication" is a glitch or if that was an update... However, since we are the CyberArk support within our organization, we need to know that the password is suspended and we won't know that unless we have the ITA log up. So when a user calls and says, "Hey, I'm locked out of CyberArk, I can't get into CyberArk," we have to go through all of these other troubleshooting steps because the first thing we don't think of right now is, "The account is suspended." It doesn't say that anymore."
"We'd like to see the creation of some kind of memo field for each device account, which could be used, in our network at least, to leave a note about the device for either the security or network engineering team members."
"I'd like it to be a little more granular. I want a little bit more control over exactly what we do. I know if you do that, you add more knobs and dials to deal with, but that's just my personal approach: granular access."
"CyberArk Enterprise Password Vault's GUI has certain shortcomings that need improvement."
"We need a bit more education for our user community because they are not using it to its capabilities."
"One of the main things that could be improved would be filtering accounts on the main page and increasing the functionality of the filters. There are some filters on the side which are very specific, but I feel there could be more."
"The solution needs better features for end users to manage their own whitelisting for API retrieval."
"Hitachi ID Privileged Access Manager is cumbersome and it does not operate by itself and relies on other solutions. Overall the way you configure things is a bit awkward compared to other solutions, such as Cyberark and Thycotic. The interface could be more intuitive, some features I expected to be easily accessible I had to search around for them. There needs to be more centralization."
 

Pricing and Cost Advice

"CyberArk Enterprise Password Vault is a very expensive product."
"If you are looking at implementing this solution, buy the training and go to it."
"The solution is cost-effective for the features."
"Payments have to be made on a yearly basis toward the licensing costs of the solution."
"Cost efficiency is the number one thing that can be improved in my mind. This would change lots of companies minds on purchasing the product."
"With reducing the privileged account access, there has been a huge improvement. They are now bringing more accounts on a little at a time."
"I do not have any opinions to add about the pricing of the product."
"It's per-company, license-based."
"The price of the solution is reasonable."
report
Use our free recommendation engine to learn which Privileged Access Management (PAM) solutions are best for your needs.
814,649 professionals have used our research since 2012.
 

Top Industries

By visitors reading reviews
Educational Organization
30%
Financial Services Firm
13%
Computer Software Company
11%
Manufacturing Company
6%
No data available
 

Company Size

By reviewers
Large Enterprise
Midsize Enterprise
Small Business
No data available
 

Questions from the Community

How does Sailpoint IdentityIQ compare with CyberArk PAM?
We evaluated Sailpoint IdentityIQ before ultimately choosing CyberArk. Sailpoint Identity Platform is a solution to manage risks in cloud enterprise environments. It automates and streamlines the m...
What do you like most about CyberArk Privileged Access Manager?
The most valuable features of the solution are control and analytics.
What is your experience regarding pricing and costs for CyberArk Privileged Access Manager?
CyberArk Privileged Access Manager comes at a high cost. But the solution is worth its price.
Ask a question
Earn 20 points
 

Also Known As

CyberArk Privileged Access Security, CyberArk Enterprise Password Vault
No data available
 

Overview

 

Sample Customers

Rockwell Automation
Information Not Available
Find out what your peers are saying about CyberArk, Delinea, One Identity and others in Privileged Access Management (PAM). Updated: November 2024.
814,649 professionals have used our research since 2012.