No more typing reviews! Try our Samantha, our new voice AI agent.

CyberArk Privileged Access Manager vs senhasegura Access Management comparison

 

Comparison Buyer's Guide

Executive Summary

Review summaries and opinions

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
 

Categories and Ranking

CyberArk Privileged Access ...
Ranking in Privileged Access Management (PAM)
1st
Average Rating
8.6
Reviews Sentiment
6.8
Number of Reviews
230
Ranking in other categories
User Activity Monitoring (1st), Enterprise Password Managers (2nd), Mainframe Security (1st), Operational Technology (OT) Security (3rd)
senhasegura Access Management
Ranking in Privileged Access Management (PAM)
28th
Average Rating
10.0
Reviews Sentiment
7.3
Number of Reviews
1
Ranking in other categories
No ranking in other categories
 

Mindshare comparison

As of April 2026, in the Privileged Access Management (PAM) category, the mindshare of CyberArk Privileged Access Manager is 10.5%, down from 19.2% compared to the previous year. The mindshare of senhasegura Access Management is 1.2%, up from 1.0% compared to the previous year. It is calculated based on PeerSpot user engagement data.
Privileged Access Management (PAM) Mindshare Distribution
ProductMindshare (%)
CyberArk Privileged Access Manager10.5%
senhasegura Access Management1.2%
Other88.3%
Privileged Access Management (PAM)
 

Featured Reviews

Atul-Gujar - PeerSpot reviewer
CyberArk manager at a comms service provider with 10,001+ employees
Secures critical infrastructures with essential user session audit records
A potential area for improvement is enhancing support for cluster environments and distributed Vaults. Clients in multiple countries that need central access have different challenges that require better solutions from CyberArk. For financial services, CyberArk can improve incident response by ensuring fast support for critical priority tickets to meet compliance requirements. Providing more documentation on CyberArk is recommended for new team members to enhance their troubleshooting capabilities. I understand it's up to the client, but 99% fail to change the demo key, so it's crucial for CyberArk to emphasize changing the key and documenting it as part of the installation process.
MW
Solution Consultant at Quest Egypt Software
With a great support team and stability, the tool also offers scalability to its users
The initial setup was easy. One just needs to write the initial configuration. Then, in senhasegura's cloud applications, you can use it. I just deploy it in PoC environments or demo environments and not for production. Hence, it takes much less time than I imagine when comparing its deployment in production. I think it can be deployed in two or three days. My company has partnered with senhasegura. We just downloaded the main machine for virtual use. Then, we get the key to install it. Before, you just need to try the general configuration. Then, you will have the web applications ready. Then, you can just discover the accounts or any devices that you want to manage the accounts and manage the credentials.

Quotes from Members

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
 

Pros

"AIM has been a great help in automating password retrieval which removes the need for hard-coded credentials."
"The implementation of the PSM proxy has reduced the specific risk of "insider attacks" on our domain controllers and SLDAP servers by eliminating direct user login by an open secure connection on the user's behalf without ever revealing the privileged credentials."
"Before CyberArk, our developers would connect from the VPN directly to the jump servers to get all of their access; we have removed the jump servers to connect to CyberArk, security has improved, we know who is accessing and what they are doing, the access is secure, and CyberArk has increased our security."
"For me, CyberArk Privileged Access Manager is the best product, and even Gartner says the same."
"We are able to know who is accessing what and when; having accountability."
"Thus far I can say technical support is excellent. We haven't had any issues or difficulties."
"CyberArk does its job very well, all the components are very useful and the benefits are all evident."
"I help implement and train others on how to use it in a highly secure environment."
"Stability-wise, I rate the solution a ten out of ten."
 

Cons

"PAM could be more user-friendly and CyberArk could update the documentation to include more real-world examples. You have to learn it yourself through trial and error. In particular, the online documentation should have more information about troubleshooting."
"The solution is too complicated to use and should be simplified. It took me a long time to understand how to use it."
"We should be able to join small components."
"I don't know if "failed authentication" is a glitch or if that was an update... However, since we are the CyberArk support within our organization, we need to know that the password is suspended and we won't know that unless we have the ITA log up. So when a user calls and says, "Hey, I'm locked out of CyberArk, I can't get into CyberArk," we have to go through all of these other troubleshooting steps because the first thing we don't think of right now is, "The account is suspended." It doesn't say that anymore."
"The initial setup was very complex."
"The usual workload is sometimes delayed by the solution."
"The turnaround time for technical support is lengthy."
"In terms of mean time to respond, I acknowledge variable response time. The L1 team is proactive, yet the vendor often pushes to close incidents swiftly, even when issues remain unresolved."
"In Linux credential discovery was a bit hard, but after Senhasegura's latest update, it is much easier."
 

Pricing and Cost Advice

"It can be an expensive product."
"The main problem for the tool is its licensing. I work for a really big company. When you try to develop this as a service, usually you work with leverage teams who are formed with dozens of members. You might dedicate one FTE, or less, for something, e.g., an antivirus administrator. You might have half an FTE's effort dedicated to administering the antivirus, but then you have a team of about 30 users who might access that ticket. The problem is that CyberArk eliminated the possibility of concurrent users years ago. This is a big problem for companies who work with leverage teams. You need to pay for everyone. 40 licenses are used by 20 or 30 people. This is a big problem because licenses are not precisely cheap."
"Pricing and licensing depend on the environment."
"This product is very expensive."
"It is not a cheap solution. It is expensive as compared with other solutions. However, it is one of the best solutions in their domain."
"No, I do not have any advice on the price of the product."
"The product’s pricing is feasible for enterprise customers. The pricing is expensive for smaller businesses. You need to pay additional costs for service implementation and local support."
"They have two types of licensing: purchase and subscription. You have to pay for each admin user, such as Microsoft admin, mail admin, database admin, etc."
Information not available
report
Use our free recommendation engine to learn which Privileged Access Management (PAM) solutions are best for your needs.
886,349 professionals have used our research since 2012.
 

Top Industries

By visitors reading reviews
Financial Services Firm
14%
Manufacturing Company
10%
Computer Software Company
7%
Government
5%
Financial Services Firm
15%
Construction Company
15%
Comms Service Provider
10%
Outsourcing Company
10%
 

Company Size

By reviewers
Large Enterprise
Midsize Enterprise
Small Business
By reviewers
Company SizeCount
Small Business59
Midsize Enterprise42
Large Enterprise174
No data available
 

Questions from the Community

How does Sailpoint IdentityIQ compare with CyberArk PAM?
We evaluated Sailpoint IdentityIQ before ultimately choosing CyberArk. Sailpoint Identity Platform is a solution to manage risks in cloud enterprise environments. It automates and streamlines the m...
What do you like most about CyberArk Privileged Access Manager?
The most valuable features of the solution are control and analytics.
What is your experience regarding pricing and costs for CyberArk Privileged Access Manager?
My thoughts on the pricing of CyberArk Privileged Access Manager depend entirely on the vendors' requirements. If they want their things to be secure, they have to spend accordingly. We have four t...
Ask a question
Earn 20 points
 

Also Known As

CyberArk Privileged Access Security, CyberArk Enterprise Password Vault
No data available
 

Overview

 

Sample Customers

Rockwell Automation
Information Not Available
Find out what your peers are saying about CyberArk, One Identity, Okta and others in Privileged Access Management (PAM). Updated: March 2026.
886,349 professionals have used our research since 2012.