No more typing reviews! Try our Samantha, our new voice AI agent.

CyberArk Privileged Access Manager vs i-Sprint AccessMatrix Universal Access Management comparison

 

Comparison Buyer's Guide

Executive Summary

Review summaries and opinions

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
 

Categories and Ranking

CyberArk Privileged Access ...
Average Rating
8.6
Reviews Sentiment
6.8
Number of Reviews
230
Ranking in other categories
User Activity Monitoring (1st), Enterprise Password Managers (2nd), Privileged Access Management (PAM) (1st), Mainframe Security (1st), Operational Technology (OT) Security (3rd)
i-Sprint AccessMatrix Unive...
Average Rating
8.0
Reviews Sentiment
7.7
Number of Reviews
2
Ranking in other categories
Single Sign-On (SSO) (28th), Authentication Systems (28th), Access Management (25th)
 

Featured Reviews

Atul-Gujar - PeerSpot reviewer
CyberArk manager at a comms service provider with 10,001+ employees
Secures critical infrastructures with essential user session audit records
A potential area for improvement is enhancing support for cluster environments and distributed Vaults. Clients in multiple countries that need central access have different challenges that require better solutions from CyberArk. For financial services, CyberArk can improve incident response by ensuring fast support for critical priority tickets to meet compliance requirements. Providing more documentation on CyberArk is recommended for new team members to enhance their troubleshooting capabilities. I understand it's up to the client, but 99% fail to change the demo key, so it's crucial for CyberArk to emphasize changing the key and documenting it as part of the installation process.
NO
CEO at ABILITY LIMITED
A stable and scalable solution with reasonable pricing
The solution has high support capability.  The tool needs to improve its cloud service capability.  I have been working with the solution for 15 years.  I would rate the solution's stability a ten out of ten.  I would rate the tool's scalability a ten out of ten since it is highly scalable. We…

Quotes from Members

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
 

Pros

"For me, CyberArk Privileged Access Manager's most valuable features are password and session management."
"This product helped our customer manage their privileged accounts; it is easier for them to manage and control the privileged accounts."
"Password Vault's policy configuration is very good - when you receive an attack, you can segment the structure of the project in order to isolate parts or users."
"On the customer accounts side, our account managers are responsive. If you ask them, they will get you whomever you need."
"It is a single tool that isolates possible kinds of malware. You get lateral movement blocking and auditing information, e.g., you know who is doing what. You are getting protections from the service as well as a useful environment. All your admins can easily go in and out of your company while accessing your servers in a secure way, even if they are working abroad."
"The most valuable feature I find in CyberArk Privileged Access Manager is that we can record the sessions. It provides flexible workflows. I can change the workflow to specify if it needs one approval or two approvals, and I can approve my peer."
"The most valuable feature is Special Monitoring."
"It is useful for protecting passwords. If you need to do access security management, you can first use the CyberArk console, and after that, you can connect the firewall interface or firewall command line. Similarly, if you need to do an RDP session, you need to first log in to CyberArk before connecting to the Windows RDP session. This way, the admin doesn't know the password, and that password is changed immediately. To change the password, you first discover the old password in the network, and after that, you can change the password."
"The product is quite good, and from my point of view, it can serve our requirements."
"The feature that I have found the most valuable is that they are open to connecting with any token. For example, a year ago, we were looking for a soft token, and we started to look for alternatives. They are open to connecting with any token that we looking for."
"The solution has high support capability."
 

Cons

"More additional features as far as the REST is concerned, because we have something which was the predecessor to REST."
"Making the reports more editable would be beneficial."
"The solution needs better features for end users to manage their own whitelisting for API retrieval."
"CyberArk Enterprise Password Vault's GUI has certain shortcomings that need improvement."
"One limitation is that we are not able to put this into a decentralized mode."
"When I was a component owner for PAM's Privileged Threat Analytics (PTA) component, what I wanted was a clear mapping to the MITRE ATT&CK framework, a framework which has a comprehensive list of use cases. We reached out to the vendor and asked them how much coverage they have of the uses cases found on MITRE, which would have given us a better view of things while I was the product owner. Unfortunately they did not have the capability of mapping onto MITRE's framework at that time."
"There was a situation when one of our presidents had an issue, but I can't recall the specifics."
"The scalability, sometimes, is lacking. It works really well for more static environments... But for an environment where you're constantly spinning up new infrastructure or new endpoints, sometimes it has a hard time keeping up."
"The user interface is not quite good and easy to use. There are a lot of menus, and the look and feel is not modern like a modern app."
"The user interface is not quite good and easy to use. There are a lot of menus, and the look and feel is not modern like a modern app."
"The tool needs to improve its cloud capability."
 

Pricing and Cost Advice

"It can be an expensive product."
"I would rate the cost of CyberArk Privileged Access Manager seven out of ten with ten being the most expensive."
"Overall, its pricing is really good. The main difference from all the other vendors is that they have one package that covers all the functionality and modules of the basic PAM, except the add-on modules like adware and server protection. It also doesn't include the licenses for domain controller protection or maybe an API call-related feature. For the basic privileged access management, the bundle pricing is really good, but when it comes to an agent-based solution for advanced cyber protection or application identity managers, it is expensive. Services are also very expensive if you hire the services team from CyberArk, but these guys are really good. For a couple of large banking projects, we had an experience with them. The banks wanted to have things quickly and efficiently, so we had to hire them. If we take four weeks, these guys can do everything on a weekend. They charge quite a big sum of money, but they know the system well."
"It's expensive, certainly. But CyberArk is the leader in the market with regards to privileged access management. You pay a lot, but you are paying for the value that is being delivered."
"The solution is available at a high price"
"I would rate the tool’s pricing a six out of ten."
"Payments have to be made on a yearly basis toward the licensing costs of the solution."
"I would rate CyberArk's pricing a nine out of ten, with one being cheap and ten being expensive. It's one of the most expensive solutions in the market, but it's worth it."
"I would rate the solution's pricing a three out of ten. The tool's licensing is monthly."
report
Use our free recommendation engine to learn which Access Management solutions are best for your needs.
890,071 professionals have used our research since 2012.
 

Top Industries

By visitors reading reviews
Financial Services Firm
14%
Manufacturing Company
10%
Computer Software Company
7%
Comms Service Provider
6%
No data available
 

Company Size

By reviewers
Large Enterprise
Midsize Enterprise
Small Business
By reviewers
Company SizeCount
Small Business60
Midsize Enterprise42
Large Enterprise174
No data available
 

Questions from the Community

How does Sailpoint IdentityIQ compare with CyberArk PAM?
We evaluated Sailpoint IdentityIQ before ultimately choosing CyberArk. Sailpoint Identity Platform is a solution to manage risks in cloud enterprise environments. It automates and streamlines the m...
What do you like most about CyberArk Privileged Access Manager?
The most valuable features of the solution are control and analytics.
What is your experience regarding pricing and costs for CyberArk Privileged Access Manager?
My thoughts on the pricing of CyberArk Privileged Access Manager depend entirely on the vendors' requirements. If they want their things to be secure, they have to spend accordingly. We have four t...
Ask a question
Earn 20 points
 

Also Known As

CyberArk Privileged Access Security, CyberArk Enterprise Password Vault
AccessMatrix Universal Access Management
 

Overview

 

Sample Customers

Rockwell Automation
IRAS, Singapore Bank
Find out what your peers are saying about CyberArk Privileged Access Manager vs. i-Sprint AccessMatrix Universal Access Management and other solutions. Updated: April 2026.
890,071 professionals have used our research since 2012.