Try our new research platform with insights from 80,000+ expert users

CyberArk Privileged Access Manager vs SAP Customer Data Cloud comparison

 

Comparison Buyer's Guide

Executive Summary
 

Categories and Ranking

CyberArk Privileged Access ...
Average Rating
8.6
Number of Reviews
193
Ranking in other categories
User Activity Monitoring (1st), Enterprise Password Managers (2nd), Privileged Access Management (PAM) (1st), Mainframe Security (3rd), Operational Technology (OT) Security (3rd)
SAP Customer Data Cloud
Average Rating
8.0
Number of Reviews
2
Ranking in other categories
Social Login (2nd)
 

Featured Reviews

SatishIyer - PeerSpot reviewer
Jun 21, 2022
Lets you ensure relevant, compliant access in good time and with an audit trail, yet lacks clarity on MITRE ATT&CK
When I was a component owner for PAM's Privileged Threat Analytics (PTA) component, what I wanted was a clear mapping to the MITRE ATT&CK framework, a framework which has a comprehensive list of use cases. We reached out to the vendor and asked them how much coverage they have of the uses cases found on MITRE, which would have given us a better view of things while I was the product owner. Unfortunately they did not have the capability of mapping onto MITRE's framework at that time. PTA is essentially the monitoring interface of the broker (e.g. Privileged Access Management, the Vault, CPM, PSM, etc.), and it's where you can capture your broker bypass and perform related actions. For this reason, we thought that this kind of mapping would be required, but CyberArk informed us that they did not have the capability we had in mind with regard to MITRE ATT&CK. I am not sure what the situation is now, but it would definitely help to have that kind of alignment with one of the more well-known frameworks like MITRE. For CyberArk as a vendor, it would also help them to clearly spell out in which areas they have full functionality and in which ares they have partial or none. Of course, it also greatly benefits the customers when they're evaluating the product.
it_user188688 - PeerSpot reviewer
Jan 31, 2015
Enables us to sell products which creates significant revenue but their disaster recovery needs improvement
The Registration/Login Management and Single Sign On tools are extremely valuable for us. They have allowed us to migrate a very complex portion of our architecture to a SaaS service that requires minimal maintenance We can now invest more of our resources into our core business instead of into…

Quotes from Members

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
 

Pros

"CyberArk PAM can be easily automated."
"It is a single tool that isolates possible kinds of malware. You get lateral movement blocking and auditing information, e.g., you know who is doing what. You are getting protections from the service as well as a useful environment. All your admins can easily go in and out of your company while accessing your servers in a secure way, even if they are working abroad."
"Creating policies and the password rotation feature have been valuable. We don't have to memorize our password for the ADM account."
"The Password Upload Utility tool makes it easier when setting up a Safe that contains multiple accounts and has cut down the amount of time that it takes to complete the task."
"We have demoted a lot of domain admins and taken a lot of that away from people, giving it a shared account structure."
"Thus far I can say technical support is excellent. We haven't had any issues or difficulties."
"If properly set up, CyberArk Enterprise Password Vault has good stability, and is a very solid tool. It can run by itself. Its most valuable features are auto password recycling and PSM."
"CyberArk's GUI is user friendly."
"SAP CDC is very easy to use and the best part about this tool is its documentation."
 

Cons

"The authentication port is available in CyberArk Alero but not Fortinet products."
"The price is high compared to Azure Key Vault. It's the most expensive solution."
"CyberArk Enterprise Password Vault's GUI has certain shortcomings that need improvement."
"The lead product has a slow process. There are some reports and requirements from CyberArk which are not readily available as an applicable solution. We have made consistent management requests in the logs."
"The continuous scanning of the assets is limited to Windows and Unix. We like to have the solution scan any databases, network devices, and security devices for privileged accounts. That would be very helpful."
"PAM could be more user-friendly and CyberArk could update the documentation to include more real-world examples. You have to learn it yourself through trial and error. In particular, the online documentation should have more information about troubleshooting."
"It needs better documentation with more examples for the configuration files and API/REST integration"
"I think having a distributed architecture would certainly help this solution."
"I have struggled to give different access to different users in the same application."
 

Pricing and Cost Advice

"The product's licensing is yearly. I would rate the solution's pricing a six out of ten."
"I would rate the tool’s pricing a six out of ten."
"CyberArk Enterprise Password Vault's pricing is reasonable."
"The SaaS version of CyberArk Enterprise Password Vault is very expensive, but the on-premises version is relative, e.g. depending on the size of the environment, it can be a bit pricey, but it's relatively okay compared to the others."
"Network and security licenses are currently being managed by other outsource vendors, so they are facing some type of problems in the digital aspect."
"There are additional features added to our CyberArk Privileged Access Manager license. For example, features that allow us to integrate into various kinds of platforms."
"It is in line with its competitors, but all such solutions cost too much money."
"CyberArk DNA is free if you purchase the CyberArk solution. There is no additional charge for CyberArk DNA, which is great."
Information not available
report
Use our free recommendation engine to learn which Privileged Access Management (PAM) solutions are best for your needs.
814,649 professionals have used our research since 2012.
 

Top Industries

By visitors reading reviews
Educational Organization
30%
Financial Services Firm
13%
Computer Software Company
11%
Manufacturing Company
6%
Manufacturing Company
19%
Computer Software Company
17%
Construction Company
6%
Retailer
6%
 

Company Size

By reviewers
Large Enterprise
Midsize Enterprise
Small Business
No data available
 

Questions from the Community

How does Sailpoint IdentityIQ compare with CyberArk PAM?
We evaluated Sailpoint IdentityIQ before ultimately choosing CyberArk. Sailpoint Identity Platform is a solution to manage risks in cloud enterprise environments. It automates and streamlines the m...
What do you like most about CyberArk Privileged Access Manager?
The most valuable features of the solution are control and analytics.
What is your experience regarding pricing and costs for CyberArk Privileged Access Manager?
CyberArk Privileged Access Manager comes at a high cost. But the solution is worth its price.
Ask a question
Earn 20 points
 

Also Known As

CyberArk Privileged Access Security, CyberArk Enterprise Password Vault
Gigya Customer Identity Management
 

Learn More

 

Overview

 

Sample Customers

Rockwell Automation
Nutricia-Danone, ESI, Frontier Communications, Medialaan, Verizon Wireless, Talpa Media
Find out what your peers are saying about CyberArk, Delinea, One Identity and others in Privileged Access Management (PAM). Updated: November 2024.
814,649 professionals have used our research since 2012.