Try our new research platform with insights from 80,000+ expert users

CyberArk Privileged Access Manager vs Hitachi ID Privileged Access Manager [EOL] comparison

 

Comparison Buyer's Guide

Executive Summary
 

Categories and Ranking

CyberArk Privileged Access ...
Average Rating
8.6
Reviews Sentiment
6.9
Number of Reviews
199
Ranking in other categories
User Activity Monitoring (1st), Enterprise Password Managers (3rd), Privileged Access Management (PAM) (1st), Mainframe Security (2nd), Operational Technology (OT) Security (3rd)
Hitachi ID Privileged Acces...
Average Rating
7.0
Number of Reviews
1
Ranking in other categories
No ranking in other categories
 

Featured Reviews

SatishIyer - PeerSpot reviewer
Lets you ensure relevant, compliant access in good time and with an audit trail, yet lacks clarity on MITRE ATT&CK
When I was a component owner for PAM's Privileged Threat Analytics (PTA) component, what I wanted was a clear mapping to the MITRE ATT&CK framework, a framework which has a comprehensive list of use cases. We reached out to the vendor and asked them how much coverage they have of the uses cases found on MITRE, which would have given us a better view of things while I was the product owner. Unfortunately they did not have the capability of mapping onto MITRE's framework at that time. PTA is essentially the monitoring interface of the broker (e.g. Privileged Access Management, the Vault, CPM, PSM, etc.), and it's where you can capture your broker bypass and perform related actions. For this reason, we thought that this kind of mapping would be required, but CyberArk informed us that they did not have the capability we had in mind with regard to MITRE ATT&CK. I am not sure what the situation is now, but it would definitely help to have that kind of alignment with one of the more well-known frameworks like MITRE. For CyberArk as a vendor, it would also help them to clearly spell out in which areas they have full functionality and in which ares they have partial or none. Of course, it also greatly benefits the customers when they're evaluating the product.
DR
Responsive support, requires little maintenance, but configuration could be easier
Hitachi ID Privileged Access Manager is cumbersome and it does not operate by itself and relies on other solutions. Overall the way you configure things is a bit awkward compared to other solutions, such as Cyberark and Thycotic. The interface could be more intuitive, some features I expected to be easily accessible I had to search around for them. There needs to be more centralization.

Quotes from Members

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
 

Pros

"It has helped from an auditing perspective identify who has access to privileged accounts."
"CyberArk probably has probably the best vault on the market because of the multiple layered security and each password getting its own encryption."
"If properly set up, CyberArk Enterprise Password Vault has good stability, and is a very solid tool. It can run by itself. Its most valuable features are auto password recycling and PSM."
"We use the solution for password vaulting, password rotation, session management, and secret management."
"Password Vault's main advantage is its scalability. We constantly see huge enterprises implementing something like this, and the privileged session management is an excellent piece. You can kind of watch videos of whatever an admin has done."
"I love how easily we could operate within Password Vault and get things done. It was almost effortless."
"The established sessions on the target systems are fully isolated and the privileged account credentials are never exposed to the end-users or their client applications and devices."
"The logs and reporting features are impressive."
"If you using IGA or access controls solutions then this solution is a good addon. Once Hitachi ID Privileged Access Manager is set up it does not require a lot of maintenance or attention."
 

Cons

"The interface on version 9 looks old."
"I think having a distributed architecture would certainly help this solution."
"There is some stuff that we still have not fully integrated, which is our AIM solution. We are having all types of issues with it. I have been working with Level 3 support on it, but otherwise, from a functionality perspective, everything has been working except for the AIM solution."
"CyberArk Privileged Access Manager could improve the integration docking, it should have more layers. For example, integration with OpenShift."
"Transitioning from a traditional on-premises deployment to the privileged cloud has resulted in losing access to many logs and administrative tools typically available on the back end."
"More additional features as far as the REST is concerned, because we have something which was the predecessor to REST. A lot of the features which were in the predecessor have not necessarily been ported over to REST yet."
"The product could be easier to use. More work needs to be done on this aspect; it is not good enough yet. It also takes up a lot of server space. Sometimes we need to use up to seven servers."
"CyberArk Enterprise Password Vault must incorporate connectors for password and session managers in the marketplace."
"Hitachi ID Privileged Access Manager is cumbersome and it does not operate by itself and relies on other solutions. Overall the way you configure things is a bit awkward compared to other solutions, such as Cyberark and Thycotic. The interface could be more intuitive, some features I expected to be easily accessible I had to search around for them. There needs to be more centralization."
 

Pricing and Cost Advice

"CyberArk provides all the features bundled. This is compared to other vendors who provide them as a different license for each functionality."
"I do not have any opinions to add about the pricing of the product."
"The price of the solution is reasonable."
"It's an affordable platform."
"CyberArk Enterprise Password Vault's pricing is reasonable."
"CyberArk Enterprise Password Vault is a very expensive product."
"I haven't seen the numbers. I know it is not cheap, but I don't know what it is. I would rate it a six out of ten in terms of pricing. It is definitely more expensive than the other product, but it also provides more functionality, and it is modular too. So, we pay for the functionality we're actually going to use, and that's nice."
"The price of this solution is quite reasonable."
"The price of the solution is reasonable."
report
Use our free recommendation engine to learn which Privileged Access Management (PAM) solutions are best for your needs.
824,067 professionals have used our research since 2012.
 

Top Industries

By visitors reading reviews
Educational Organization
32%
Financial Services Firm
12%
Computer Software Company
11%
Manufacturing Company
6%
No data available
 

Company Size

By reviewers
Large Enterprise
Midsize Enterprise
Small Business
No data available
 

Questions from the Community

How does Sailpoint IdentityIQ compare with CyberArk PAM?
We evaluated Sailpoint IdentityIQ before ultimately choosing CyberArk. Sailpoint Identity Platform is a solution to manage risks in cloud enterprise environments. It automates and streamlines the m...
What do you like most about CyberArk Privileged Access Manager?
The most valuable features of the solution are control and analytics.
What is your experience regarding pricing and costs for CyberArk Privileged Access Manager?
CyberArk Privileged Access Manager comes at a high cost. But the solution is worth its price.
Ask a question
Earn 20 points
 

Also Known As

CyberArk Privileged Access Security, CyberArk Enterprise Password Vault
No data available
 

Overview

 

Sample Customers

Rockwell Automation
Information Not Available
Find out what your peers are saying about CyberArk, Delinea, One Identity and others in Privileged Access Management (PAM). Updated: December 2024.
824,067 professionals have used our research since 2012.