Try our new research platform with insights from 80,000+ expert users

CyberArk Privileged Access Manager vs senhasegura Access Management comparison

 

Comparison Buyer's Guide

Executive Summary

Review summaries and opinions

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
 

Categories and Ranking

CyberArk Privileged Access ...
Ranking in Privileged Access Management (PAM)
1st
Average Rating
8.6
Reviews Sentiment
6.8
Number of Reviews
230
Ranking in other categories
User Activity Monitoring (1st), Enterprise Password Managers (2nd), Mainframe Security (1st), Operational Technology (OT) Security (3rd)
senhasegura Access Management
Ranking in Privileged Access Management (PAM)
28th
Average Rating
10.0
Reviews Sentiment
7.3
Number of Reviews
1
Ranking in other categories
No ranking in other categories
 

Mindshare comparison

As of March 2026, in the Privileged Access Management (PAM) category, the mindshare of CyberArk Privileged Access Manager is 11.4%, down from 19.6% compared to the previous year. The mindshare of senhasegura Access Management is 1.2%, up from 1.0% compared to the previous year. It is calculated based on PeerSpot user engagement data.
Privileged Access Management (PAM) Mindshare Distribution
ProductMindshare (%)
CyberArk Privileged Access Manager11.4%
senhasegura Access Management1.2%
Other87.4%
Privileged Access Management (PAM)
 

Featured Reviews

Atul-Gujar - PeerSpot reviewer
CyberArk manager at a comms service provider with 10,001+ employees
Secures critical infrastructures with essential user session audit records
A potential area for improvement is enhancing support for cluster environments and distributed Vaults. Clients in multiple countries that need central access have different challenges that require better solutions from CyberArk. For financial services, CyberArk can improve incident response by ensuring fast support for critical priority tickets to meet compliance requirements. Providing more documentation on CyberArk is recommended for new team members to enhance their troubleshooting capabilities. I understand it's up to the client, but 99% fail to change the demo key, so it's crucial for CyberArk to emphasize changing the key and documenting it as part of the installation process.
MW
Solution Consultant at Quest Egypt Software
With a great support team and stability, the tool also offers scalability to its users
The initial setup was easy. One just needs to write the initial configuration. Then, in senhasegura's cloud applications, you can use it. I just deploy it in PoC environments or demo environments and not for production. Hence, it takes much less time than I imagine when comparing its deployment in production. I think it can be deployed in two or three days. My company has partnered with senhasegura. We just downloaded the main machine for virtual use. Then, we get the key to install it. Before, you just need to try the general configuration. Then, you will have the web applications ready. Then, you can just discover the accounts or any devices that you want to manage the accounts and manage the credentials.

Quotes from Members

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
 

Pros

"AIM has been a great help in automating password retrieval which removes the need for hard-coded credentials."
"CyberArk has a lot of modules."
"By implementing CyberArk Privileged Access Manager, we wanted to secure the password data and password accounts. We could see the benefits of CyberArk Privileged Access Manager immediately after we deployed it and started using it."
"CyberArk Privileged Access Manager has made our operations more streamlined. There is an approval process, so it helps us keep tabs on who's working on what and for how long."
"CyberArk probably has probably the best vault on the market because of the multiple layered security and each password getting its own encryption."
"The most valuable aspects of the solution include password management and Rest API retrieval of vaulted credentials."
"I love how easily we could operate within Password Vault and get things done. It was almost effortless."
"The ability to develop and deploy applications with no stored secrets is very valuable."
"Stability-wise, I rate the solution a ten out of ten."
 

Cons

"CyberArk PAM is a very broad product as everyone's requirements for implementation are different. In our particular case, the initial implementation was planned and developed by people who didn't know our specific network requirements, so the initial implementation needed to be tweaked over time. While this is normal, at the time all these "major" changes required CyberArk professional services to come in-plant and "assist" with the changes."
"It should be easy to use for non-technical people. Its interface can be a bit difficult. Some parts of its interface are not very intuitive. Some of the controls are hidden, and instead of having a screen with all the controls for that account on it, you have to use menus and other similar things."
"Overall what I would really love to see is the third-party PAS reporter tool pulled more into the overall solution, ideally as its own deployable component service installation package."
"I would like to see an easier way to define delegated roles within the administration of the core product."
"Having a cloud version would be very helpful. You have to invest a lot of money for the infrastructure hardware so the cloud version would help."
"Improvements in CyberArk Privileged Access Manager should focus on simplifying installation and upgrade times, and also consider making professional services training more accessible to implementers and partners."
"Maintaining the product is challenging. Upgrades require a lot of resources, as it impacts the entire organization. For example, upgrading components like the Privileged Session Manager (PSM) and the vault is time-consuming and difficult. In the long term, I would like to see these processes simplified, especially for on-premise installations."
"It is very complex and difficult to set up the solution."
"In Linux credential discovery was a bit hard, but after Senhasegura's latest update, it is much easier."
 

Pricing and Cost Advice

"The main problem for the tool is its licensing. I work for a really big company. When you try to develop this as a service, usually you work with leverage teams who are formed with dozens of members. You might dedicate one FTE, or less, for something, e.g., an antivirus administrator. You might have half an FTE's effort dedicated to administering the antivirus, but then you have a team of about 30 users who might access that ticket. The problem is that CyberArk eliminated the possibility of concurrent users years ago. This is a big problem for companies who work with leverage teams. You need to pay for everyone. 40 licenses are used by 20 or 30 people. This is a big problem because licenses are not precisely cheap."
"With reducing the privileged account access, there has been a huge improvement. They are now bringing more accounts on a little at a time."
"I haven't seen the numbers. I know it is not cheap, but I don't know what it is. I would rate it a six out of ten in terms of pricing. It is definitely more expensive than the other product, but it also provides more functionality, and it is modular too. So, we pay for the functionality we're actually going to use, and that's nice."
"Its price can be reduced."
"The price of the solution is reasonable."
"Pricing and licensing depend on the environment."
"The price of CyberArk support could be a little bit less. Otherwise, pricing is fine."
"CyberArk is very expensive and there are additional fees for add-ons."
Information not available
report
Use our free recommendation engine to learn which Privileged Access Management (PAM) solutions are best for your needs.
884,371 professionals have used our research since 2012.
 

Top Industries

By visitors reading reviews
Financial Services Firm
14%
Manufacturing Company
10%
Computer Software Company
8%
Government
6%
Financial Services Firm
15%
Outsourcing Company
11%
Comms Service Provider
9%
Computer Software Company
6%
 

Company Size

By reviewers
Large Enterprise
Midsize Enterprise
Small Business
By reviewers
Company SizeCount
Small Business59
Midsize Enterprise42
Large Enterprise174
No data available
 

Questions from the Community

How does Sailpoint IdentityIQ compare with CyberArk PAM?
We evaluated Sailpoint IdentityIQ before ultimately choosing CyberArk. Sailpoint Identity Platform is a solution to manage risks in cloud enterprise environments. It automates and streamlines the m...
What do you like most about CyberArk Privileged Access Manager?
The most valuable features of the solution are control and analytics.
What is your experience regarding pricing and costs for CyberArk Privileged Access Manager?
My thoughts on the pricing of CyberArk Privileged Access Manager depend entirely on the vendors' requirements. If they want their things to be secure, they have to spend accordingly. We have four t...
Ask a question
Earn 20 points
 

Also Known As

CyberArk Privileged Access Security, CyberArk Enterprise Password Vault
No data available
 

Overview

 

Sample Customers

Rockwell Automation
Information Not Available
Find out what your peers are saying about CyberArk, One Identity, Okta and others in Privileged Access Management (PAM). Updated: February 2026.
884,371 professionals have used our research since 2012.