No more typing reviews! Try our Samantha, our new voice AI agent.

CyberArk Privileged Access Manager vs i-Sprint AccessMatrix Universal Access Management comparison

 

Comparison Buyer's Guide

Executive Summary

Review summaries and opinions

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
 

Categories and Ranking

CyberArk Privileged Access ...
Average Rating
8.6
Reviews Sentiment
6.8
Number of Reviews
230
Ranking in other categories
User Activity Monitoring (1st), Enterprise Password Managers (2nd), Privileged Access Management (PAM) (1st), Mainframe Security (1st), Operational Technology (OT) Security (3rd)
i-Sprint AccessMatrix Unive...
Average Rating
8.0
Reviews Sentiment
7.7
Number of Reviews
2
Ranking in other categories
Single Sign-On (SSO) (28th), Authentication Systems (28th), Access Management (25th)
 

Featured Reviews

Atul-Gujar - PeerSpot reviewer
CyberArk manager at a comms service provider with 10,001+ employees
Secures critical infrastructures with essential user session audit records
A potential area for improvement is enhancing support for cluster environments and distributed Vaults. Clients in multiple countries that need central access have different challenges that require better solutions from CyberArk. For financial services, CyberArk can improve incident response by ensuring fast support for critical priority tickets to meet compliance requirements. Providing more documentation on CyberArk is recommended for new team members to enhance their troubleshooting capabilities. I understand it's up to the client, but 99% fail to change the demo key, so it's crucial for CyberArk to emphasize changing the key and documenting it as part of the installation process.
NO
CEO at ABILITY LIMITED
A stable and scalable solution with reasonable pricing
The solution has high support capability.  The tool needs to improve its cloud service capability.  I have been working with the solution for 15 years.  I would rate the solution's stability a ten out of ten.  I would rate the tool's scalability a ten out of ten since it is highly scalable. We…

Quotes from Members

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
 

Pros

"It's been a big win for us as we're now able to start managing service accounts with AIM."
"The most valuable feature is the special management. It records the activity and the actions that we use for auditing."
"The benefit of it is it's stable, it's old-school, it just works."
"I help implement and train others on how to use it in a highly secure environment."
"DNA tool is amazing, far better than imaginable in previous years."
"I find the threat analytics is an important feature, as CyberArk can look at the log details and analyze who is using the applications, which are their locations, and which are the IP locations from which they are accessing, enabling the solution to find the exact location the threat is emanating from, which we really value."
"The logs and reporting features are impressive."
"Cost-wise, it is not a cheap product, but it does a ton of things, and it does them well."
"The feature that I have found the most valuable is that they are open to connecting with any token. For example, a year ago, we were looking for a soft token, and we started to look for alternatives. They are open to connecting with any token that we looking for."
"The solution has high support capability."
"The product is quite good, and from my point of view, it can serve our requirements."
 

Cons

"CyberArk's license is too expensive. I rate it seven out of 10 for affordability."
"I would love them to improve their UI customizing features."
"We have had some performance and stability issues. We have had instances where things weren't as they should be, however, we worked closely with the development support teams once the issues were escalated and managed to find either a resolution or a workaround to stabilize the solution."
"When I was a component owner for PAM's Privileged Threat Analytics (PTA) component, what I wanted was a clear mapping to the MITRE ATT&CK framework, a framework which has a comprehensive list of use cases. We reached out to the vendor and asked them how much coverage they have of the uses cases found on MITRE, which would have given us a better view of things while I was the product owner. Unfortunately they did not have the capability of mapping onto MITRE's framework at that time."
"CyberArk has two disadvantages; the first is that it's insanely expensive and the other is it's very complex."
"CyberArk has to continue to evolve with that threat landscape to make sure that they're still protecting those credentials that are owned by those that have privileged accounts in the firms."
"The solution that they proposed was not straightforward because of the backend processes of CyberArk."
"Transitioning from a traditional on-premises deployment to the privileged cloud has resulted in losing access to many logs and administrative tools typically available on the back end."
"The tool needs to improve its cloud capability."
"The user interface is not quite good and easy to use. There are a lot of menus, and the look and feel is not modern like a modern app."
"The user interface is not quite good and easy to use. There are a lot of menus, and the look and feel is not modern like a modern app."
 

Pricing and Cost Advice

"This product is very expensive."
"I rate the tool's pricing an eight out of ten."
"The price of the solution is reasonable."
"There are no additional costs other than the standard licensing fees."
"The cost is high compared to other products."
"Although CyberArk Privileged Access Management is expensive, its protection capabilities outweigh the cost."
"The solution is available at a high price"
"The price of CyberArk Privileged Access Manager could be less expensive."
"I would rate the solution's pricing a three out of ten. The tool's licensing is monthly."
report
Use our free recommendation engine to learn which Access Management solutions are best for your needs.
886,426 professionals have used our research since 2012.
 

Top Industries

By visitors reading reviews
Financial Services Firm
14%
Manufacturing Company
10%
Computer Software Company
7%
Government
5%
No data available
 

Company Size

By reviewers
Large Enterprise
Midsize Enterprise
Small Business
By reviewers
Company SizeCount
Small Business59
Midsize Enterprise42
Large Enterprise174
No data available
 

Questions from the Community

How does Sailpoint IdentityIQ compare with CyberArk PAM?
We evaluated Sailpoint IdentityIQ before ultimately choosing CyberArk. Sailpoint Identity Platform is a solution to manage risks in cloud enterprise environments. It automates and streamlines the m...
What do you like most about CyberArk Privileged Access Manager?
The most valuable features of the solution are control and analytics.
What is your experience regarding pricing and costs for CyberArk Privileged Access Manager?
My thoughts on the pricing of CyberArk Privileged Access Manager depend entirely on the vendors' requirements. If they want their things to be secure, they have to spend accordingly. We have four t...
Ask a question
Earn 20 points
 

Also Known As

CyberArk Privileged Access Security, CyberArk Enterprise Password Vault
AccessMatrix Universal Access Management
 

Overview

 

Sample Customers

Rockwell Automation
IRAS, Singapore Bank
Find out what your peers are saying about CyberArk Privileged Access Manager vs. i-Sprint AccessMatrix Universal Access Management and other solutions. Updated: March 2026.
886,426 professionals have used our research since 2012.