Try our new research platform with insights from 80,000+ expert users

CyberArk Privileged Access Manager vs Microsoft Purview Privileged Access Management comparison

 

Comparison Buyer's Guide

Executive Summary
 

Categories and Ranking

CyberArk Privileged Access ...
Ranking in Privileged Access Management (PAM)
1st
Average Rating
8.6
Reviews Sentiment
6.9
Number of Reviews
197
Ranking in other categories
User Activity Monitoring (1st), Enterprise Password Managers (3rd), Mainframe Security (2nd), Operational Technology (OT) Security (3rd)
Microsoft Purview Privilege...
Ranking in Privileged Access Management (PAM)
13th
Average Rating
9.0
Reviews Sentiment
7.7
Number of Reviews
2
Ranking in other categories
No ranking in other categories
 

Mindshare comparison

As of December 2024, in the Privileged Access Management (PAM) category, the mindshare of CyberArk Privileged Access Manager is 20.9%, down from 23.8% compared to the previous year. The mindshare of Microsoft Purview Privileged Access Management is 1.7%, up from 1.7% compared to the previous year. It is calculated based on PeerSpot user engagement data.
Privileged Access Management (PAM)
 

Featured Reviews

SatishIyer - PeerSpot reviewer
Lets you ensure relevant, compliant access in good time and with an audit trail, yet lacks clarity on MITRE ATT&CK
When I was a component owner for PAM's Privileged Threat Analytics (PTA) component, what I wanted was a clear mapping to the MITRE ATT&CK framework, a framework which has a comprehensive list of use cases. We reached out to the vendor and asked them how much coverage they have of the uses cases found on MITRE, which would have given us a better view of things while I was the product owner. Unfortunately they did not have the capability of mapping onto MITRE's framework at that time. PTA is essentially the monitoring interface of the broker (e.g. Privileged Access Management, the Vault, CPM, PSM, etc.), and it's where you can capture your broker bypass and perform related actions. For this reason, we thought that this kind of mapping would be required, but CyberArk informed us that they did not have the capability we had in mind with regard to MITRE ATT&CK. I am not sure what the situation is now, but it would definitely help to have that kind of alignment with one of the more well-known frameworks like MITRE. For CyberArk as a vendor, it would also help them to clearly spell out in which areas they have full functionality and in which ares they have partial or none. Of course, it also greatly benefits the customers when they're evaluating the product.
AO
Seamless access control with enhanced and robust security features
I use Microsoft Purview Privileged Access Management to control access as a system administrator. It involves providing elevated privileged accounts on demand rather than having constant access, which can be risky if compromised With Microsoft Purview Privileged Access Management, we customize…

Quotes from Members

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
 

Pros

"It has helped from an auditing perspective identify who has access to privileged accounts."
"The regulation of accounts is by far the most needed and valuable part of the application."
"I appreciate CyberArk's real-time capabilities. I can secure critical sessions, such as SSH or database sessions. As a security professional, I have real-time visibility into ongoing sessions. If anything suspicious occurs, I can terminate or freeze the session, which is part of user behavior analytics."
"The most valuable feature is privileged session management."
"The most valuable aspects of the solution include password management and Rest API retrieval of vaulted credentials."
"The automatic change of the password and Privileged Session Manager (PSM) are the most valuable features. With Privileged Session Manager, you can control the password management in a centralized way. You can activate these features in a session; the session isolation and recording. You apply the full intermediation principle. So, you must pass through CyberArk PAM to get access to the target system. You don't need to know the password, and everything that you do is registered and auditable. In this case, no one gets to touch the password directly. Also, you can implement detection and response behavior in case of a breach."
"We like it for the ability to automatically change passwords. At least for my group, that's the best thing."
"The most valuable features of CyberArk Privileged Access Manager are its robust functionality and reliability."
"The integration with Azure Identity is a significant advantage, as it allows for seamless automation and power app integration."
"The integration with Azure Identity is a significant advantage, as it allows for seamless automation and power app integration."
"The ability to provide just-in-time privileged access and set specific parameters for access duration is highly beneficial."
 

Cons

"CyberArk has two disadvantages; the first is that it's insanely expensive and the other is it's very complex."
"If there is an area that has room for improvement, it's probably working with their support and getting people on the phone. That is hard to do with most products in general, but that seems to be the difficult area. The product is fantastic, but sometimes we want somebody on the phone."
"If you are an administrator or architect, then the solution is kind of complicated, as it is mostly focused on the end user. So, they need to also focus on the people who are implementing it."
"Over the past seven years, I have seen a lot of ups and downs with the product."
"There is a learning curve when it comes to planning out the deployment strategy, but once it is defined, it runs itself."
"The initial setup can get complex."
"The tool’s pricing and scalability can be better."
"In the next release, they could simplify the setup and I would like some tasks added like file sharing. When a client connects to CyberArk and wants to put a file on the server, they cannot."
"Microsoft Purview Privileged Access Management could improve integration with multiple cloud environments."
"Microsoft Purview Privileged Access Management could improve integration with multiple cloud environments."
"There's room for improvement in Microsoft's documentation, as it often lacks clarity."
 

Pricing and Cost Advice

"It's per-company, license-based."
"It is not a cheap solution. It is expensive as compared with other solutions. However, it is one of the best solutions in their domain."
"The SaaS version of CyberArk Enterprise Password Vault is very expensive, but the on-premises version is relative, e.g. depending on the size of the environment, it can be a bit pricey, but it's relatively okay compared to the others."
"I'm aware that the organization had purchased licensing for almost all of CyberArk's solutions including licensing for PTA, EPM, and the Application Identity Manager. But when it comes to PSM, this is one of the components where there's an additional charge for any extra PSMs that you want to deploy. I believe that there's some rider where the vendor has a bit of leeway to, at times, charge a premium on whatever additional services you may require above the board."
"The price of this solution is expensive."
"No, I do not have any advice on the price of the product."
"I believe that this solution is priced well. It's the market leader and I think that it's the best solution."
"It's expensive, certainly. But CyberArk is the leader in the market with regards to privileged access management. You pay a lot, but you are paying for the value that is being delivered."
Information not available
report
Use our free recommendation engine to learn which Privileged Access Management (PAM) solutions are best for your needs.
824,053 professionals have used our research since 2012.
 

Top Industries

By visitors reading reviews
Educational Organization
32%
Financial Services Firm
12%
Computer Software Company
11%
Manufacturing Company
6%
Computer Software Company
15%
Manufacturing Company
10%
Financial Services Firm
9%
Healthcare Company
7%
 

Company Size

By reviewers
Large Enterprise
Midsize Enterprise
Small Business
No data available
 

Questions from the Community

How does Sailpoint IdentityIQ compare with CyberArk PAM?
We evaluated Sailpoint IdentityIQ before ultimately choosing CyberArk. Sailpoint Identity Platform is a solution to manage risks in cloud enterprise environments. It automates and streamlines the m...
What do you like most about CyberArk Privileged Access Manager?
The most valuable features of the solution are control and analytics.
What is your experience regarding pricing and costs for CyberArk Privileged Access Manager?
CyberArk Privileged Access Manager comes at a high cost. But the solution is worth its price.
What do you like most about Microsoft Purview Privileged Access Management?
The ability to provide just-in-time privileged access and set specific parameters for access duration is highly beneficial.
What needs improvement with Microsoft Purview Privileged Access Management?
Microsoft Purview Privileged Access Management could improve integration with multiple cloud environments. Many clients work across different cloud platforms such as Google Cloud Platform and AWS. ...
What is your primary use case for Microsoft Purview Privileged Access Management?
I use Microsoft Purview Privileged Access Management to control access as a system administrator. It involves providing elevated privileged accounts on demand rather than having constant access, wh...
 

Also Known As

CyberArk Privileged Access Security, CyberArk Enterprise Password Vault
Microsoft Privileged Access Management (PAM)
 

Overview

 

Sample Customers

Rockwell Automation
Information Not Available
Find out what your peers are saying about CyberArk Privileged Access Manager vs. Microsoft Purview Privileged Access Management and other solutions. Updated: November 2024.
824,053 professionals have used our research since 2012.