Try our new research platform with insights from 80,000+ expert users

CyberArk Privileged Access Manager vs Microsoft Defender for IoT comparison

 

Comparison Buyer's Guide

Executive Summary

Review summaries and opinions

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
 

Categories and Ranking

CyberArk Privileged Access ...
Ranking in Operational Technology (OT) Security
3rd
Average Rating
8.6
Reviews Sentiment
6.9
Number of Reviews
217
Ranking in other categories
User Activity Monitoring (1st), Enterprise Password Managers (2nd), Privileged Access Management (PAM) (1st), Mainframe Security (2nd)
Microsoft Defender for IoT
Ranking in Operational Technology (OT) Security
6th
Average Rating
8.6
Reviews Sentiment
7.4
Number of Reviews
2
Ranking in other categories
IoT Security (5th), Microsoft Security Suite (28th)
 

Mindshare comparison

As of April 2025, in the Operational Technology (OT) Security category, the mindshare of CyberArk Privileged Access Manager is 0.2%. The mindshare of Microsoft Defender for IoT is 5.5%, up from 3.7% compared to the previous year. It is calculated based on PeerSpot user engagement data.
Operational Technology (OT) Security
 

Featured Reviews

Lasantha Wijesinghe - PeerSpot reviewer
We have visibility and control through real-time user behavior analytics
It took us some time to realize its benefits because there was a learning curve for us. It took us about a year to get our heads around this product and start effectively using it. It is a journey. It takes at least five years for any company to make this product very useful and reach maturity. It is not only the product's fault. The company needs to have a vision, and the company culture needs to go with it. Senior leadership needs to support the vision. You need to have lots of ingredients for success. If everything is in place, you will see success after one year. In the first year, it is a struggle for everybody. My company was bought by a bigger company, and they were very new to privileged access management. Everybody was struggling. The advice I would give is to have a good vision for privileged access management. You need dedicated teams, senior management support, and proper company policies and standards before implementing the solution. Start building knowledge slowly and avoid jumping into the deep end without preparation. I would rate CyberArk Privileged Access Manager a nine out of ten.
William Tuleja - PeerSpot reviewer
Integration with existing tools boosts management efficiency
The only improvement I see is that some detection explanations are vaguely provided by Microsoft, resulting in generic IoT detections that alert me to an issue yet don't specify what's wrong. Often, it just links back to a generic KB article without additional information. When it happens, it requires extra detective work. This issue doesn't occur often but can be annoying.

Quotes from Members

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
 

Pros

"Its' quite stable."
"The solution is scalable."
"Technical support has been very responsive in navigating challenges. It is very easy to open a ticket."
"The solution is very good for protecting full levels of data privacy."
"It allows users to self-provision access to the accounts that they need."
"This solution is quite stable."
"The established sessions on the target systems are fully isolated and the privileged account credentials are never exposed to the end-users or their client applications and devices."
"The Vault offers great capabilities for structuring and accessing data."
"Mainly, it is manageable and integrates with other Microsoft products, which is crucial for me."
"I find Microsoft Defender very effective in vulnerability management and it provides good attack reduction, making it a next-generation protection solution."
"It is manageable and integrates with other Microsoft products, which is crucial for me."
"I believe it is best suited for cloud services and is unmatched by other cloud security solutions."
 

Cons

"The solution could improve by adding more connectors."
"I'd like to see a more expansive SSH tunneling situation through PSMP. Right now you have an account that exists in the vault and you say, "I want to create a tunnel using this account." I'd like to see something that is not account-based where I could say, "I want to create a tunnel to this machine over here," and then authenticate through the PSMP and then your tunnel is set up. You wouldn't need to then authenticate to a machine."
"CyberArk definitely needs to improve user experience and reduce complexity."
"The tool needs to improve its usage and interface. They need to have a modern and useful interface. I want the product to improve its integration capabilities as well since some of the integration features do not work always."
"The initial setup could be simplified. Right now, in comparison to its nearest competitors, it's quite complex."
"The reporting should be improved. There should be more customization. The report should show how we are going to mitigate the risk because we cannot show the system environment to each and every auditor."
"Transitioning from a traditional on-premises deployment to the privileged cloud has resulted in losing access to many logs and administrative tools typically available on the back end."
"CyberArk has to continue to evolve with that threat landscape to make sure that they're still protecting those credentials that are owned by those that have privileged accounts in the firms."
"Customer service and support from Microsoft are costly. The execution by engineers is expensive, and the service is neither free nor toll-free, making it less accessible for customers."
"The only improvement I see is that some detection explanations are vaguely provided by Microsoft, resulting in generic IoT detections that alert me to an issue yet don't specify what's wrong."
"The only improvement I see is that some detection explanations are vaguely provided by Microsoft, resulting in generic IoT detections that alert me to an issue yet don't specify what's wrong."
"The primary area that needs improvement is compatibility with the latest IoT technologies."
 

Pricing and Cost Advice

"The license CyberArk Privileged Access Manager is on an annual basis."
"CyberArk Enterprise Password Vault is a very expensive product."
"The product's licensing is yearly. I would rate the solution's pricing a six out of ten."
"CyberArk Privileged Access Manager is perceived to be somewhat overpriced compared to similar market products. It is a little bit overvalued. It could come down a little bit for my liking. However, the industry-leading reputation and the quality of service justify the high price point to some extent."
"Network and security licenses are currently being managed by other outsource vendors, so they are facing some type of problems in the digital aspect."
"The main problem for the tool is its licensing. I work for a really big company. When you try to develop this as a service, usually you work with leverage teams who are formed with dozens of members. You might dedicate one FTE, or less, for something, e.g., an antivirus administrator. You might have half an FTE's effort dedicated to administering the antivirus, but then you have a team of about 30 users who might access that ticket. The problem is that CyberArk eliminated the possibility of concurrent users years ago. This is a big problem for companies who work with leverage teams. You need to pay for everyone. 40 licenses are used by 20 or 30 people. This is a big problem because licenses are not precisely cheap."
"CyberArk has been Gartner's number-one pick for the past ten years, so you can infer that their pricing is higher than everyone else. When you are the best, you will charge appropriately for it."
"If you are looking at implementing this solution, buy the training and go to it."
Information not available
report
Use our free recommendation engine to learn which Operational Technology (OT) Security solutions are best for your needs.
845,406 professionals have used our research since 2012.
 

Top Industries

By visitors reading reviews
Educational Organization
34%
Financial Services Firm
12%
Computer Software Company
11%
Manufacturing Company
6%
Computer Software Company
18%
Manufacturing Company
15%
Energy/Utilities Company
9%
Government
5%
 

Company Size

By reviewers
Large Enterprise
Midsize Enterprise
Small Business
No data available
 

Questions from the Community

How does Sailpoint IdentityIQ compare with CyberArk PAM?
We evaluated Sailpoint IdentityIQ before ultimately choosing CyberArk. Sailpoint Identity Platform is a solution to manage risks in cloud enterprise environments. It automates and streamlines the m...
What do you like most about CyberArk Privileged Access Manager?
The most valuable features of the solution are control and analytics.
What is your experience regarding pricing and costs for Microsoft Defender for IoT?
The solution is relatively expensive with licensing being based on each device. The cost per license might not be affordable for every organization, and I would rate it around six out of ten on a s...
What needs improvement with Microsoft Defender for IoT?
The primary area that needs improvement is compatibility with the latest IoT technologies. Microsoft needs flexibility to ensure good compatibility with new IoT solutions, which frequently introduc...
What is your primary use case for Microsoft Defender for IoT?
My primary use case for Microsoft Defender for IoT is security. It helps with vulnerability management and provides significant attack reduction. It functions as a next-generation protection soluti...
 

Also Known As

CyberArk Privileged Access Security, CyberArk Enterprise Password Vault
Azure Defender for IoT
 

Overview

 

Sample Customers

Rockwell Automation
Information Not Available
Find out what your peers are saying about CyberArk Privileged Access Manager vs. Microsoft Defender for IoT and other solutions. Updated: March 2025.
845,406 professionals have used our research since 2012.