Try our new research platform with insights from 80,000+ expert users

CyberArk Privileged Access Manager vs senhasegura Access Management comparison

 

Comparison Buyer's Guide

Executive Summary

Review summaries and opinions

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
 

Categories and Ranking

CyberArk Privileged Access ...
Ranking in Privileged Access Management (PAM)
1st
Average Rating
8.6
Reviews Sentiment
6.8
Number of Reviews
229
Ranking in other categories
User Activity Monitoring (1st), Enterprise Password Managers (3rd), Mainframe Security (2nd), Operational Technology (OT) Security (3rd)
senhasegura Access Management
Ranking in Privileged Access Management (PAM)
27th
Average Rating
10.0
Reviews Sentiment
7.3
Number of Reviews
1
Ranking in other categories
No ranking in other categories
 

Mindshare comparison

As of January 2026, in the Privileged Access Management (PAM) category, the mindshare of CyberArk Privileged Access Manager is 11.6%, down from 20.0% compared to the previous year. The mindshare of senhasegura Access Management is 1.2%, up from 1.0% compared to the previous year. It is calculated based on PeerSpot user engagement data.
Privileged Access Management (PAM) Market Share Distribution
ProductMarket Share (%)
CyberArk Privileged Access Manager11.6%
senhasegura Access Management1.2%
Other87.2%
Privileged Access Management (PAM)
 

Featured Reviews

SI
Senior PAM Consultant at iC Consult GmbH
Makes privileged access management easy with automation and granular control
Many people underestimate the value of these tools because they treat them as simple automated password management. Once you realize the volume of passwords in your organization and factor in nonhuman passwords, you realize its value. Last year, CyberArk Impact cited 45 nonhuman passwords for every human password. If you have 10,000 employees, you can imagine the number of passwords. There are also many other operations. For example, you have a Qualys scanner that needs to reach out and touch all your endpoints and scan them for vulnerabilities. They use an API call to CyberArk to pull out a Privileged credential that allows them to log in to that target. This is an automated machine call. It is tapping into CyberArk to get that credential. There can be hundreds of thousands of those operations a day. You do not want to manage those passwords by hand. Some people marginalize the significance of such a solution by saying that it is just a fancy password changer. It goes well beyond that, especially with API calls and automation. Its importance extends beyond merely changing passwords; it involves automation, API calls, and process integration, crucial in agile environments for standing up new Amazon servers or other processes needing privileged credentials. CyberArk can automate these tasks into their build processes. Another critical feature is the proxy service via Privileged Session Manager (PSM), providing not only a proxy between your user and the target servers, protecting against malware but also offering session recording. Many companies I have worked with implemented a PAM product as a knee-jerk reaction to SOX audit requirements. They discovered they needed session recording and retention for regulatory compliance. This has become a major factor for clients instituting CyberArk, so PSM is a big deal in addition to regular password rotation.
MW
Solution Consultant at Quest Egypt Software
With a great support team and stability, the tool also offers scalability to its users
The initial setup was easy. One just needs to write the initial configuration. Then, in senhasegura's cloud applications, you can use it. I just deploy it in PoC environments or demo environments and not for production. Hence, it takes much less time than I imagine when comparing its deployment in production. I think it can be deployed in two or three days. My company has partnered with senhasegura. We just downloaded the main machine for virtual use. Then, we get the key to install it. Before, you just need to try the general configuration. Then, you will have the web applications ready. Then, you can just discover the accounts or any devices that you want to manage the accounts and manage the credentials.

Quotes from Members

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
 

Pros

"The risk of lost password and forbidden access to resources has been drastically reduced which increased the security level for the entire company,"
"The password management feature is valuable."
"Securely protects our TAP/NUID and privileged access accounts within the company."
"We are able to rotate privileged user passwords to eliminate fraudulent use."
"CyberArk Privileged Access Management's most valuable features are primarily its password vault functionality, specifically CyberArk's Core Privileged Manager and Privileged Session Manager."
"When we started with RPA, there was a requirement that every credential and the bots themselves be protected through the PAM system. From the get-go, we've had CyberArk in the middle... We've got a pretty robust RPA implementation with our PAM platform. Users, bots, the credentials — everything is managed via our PAM solution."
"This solution is quite stable."
"Allows secure, logged access to highly sensitive servers and services."
"Stability-wise, I rate the solution a ten out of ten."
 

Cons

"Online help needs to be looked into with live agent support."
"The current interface is not very intuitive."
"Updates have been somewhat difficult, resulting in challenges when moving from one version to another. The current version includes automatic updates."
"I don't know if "failed authentication" is a glitch or if that was an update... However, since we are the CyberArk support within our organization, we need to know that the password is suspended and we won't know that unless we have the ITA log up. So when a user calls and says, "Hey, I'm locked out of CyberArk, I can't get into CyberArk," we have to go through all of these other troubleshooting steps because the first thing we don't think of right now is, "The account is suspended." It doesn't say that anymore."
"If there is an area that has room for improvement, it's probably working with their support and getting people on the phone. That is hard to do with most products in general, but that seems to be the difficult area. The product is fantastic, but sometimes we want somebody on the phone."
"We have had some performance and stability issues. We have had instances where things weren't as they should be, however, we worked closely with the development support teams once the issues were escalated and managed to find either a resolution or a workaround to stabilize the solution."
"Enhanced PSM support for Java based applications."
"The tool needs to improve its usage and interface. They need to have a modern and useful interface. I want the product to improve its integration capabilities as well since some of the integration features do not work always."
"In Linux credential discovery was a bit hard, but after Senhasegura's latest update, it is much easier."
 

Pricing and Cost Advice

"CyberArk DNA is free if you purchase the CyberArk solution. There is no additional charge for CyberArk DNA, which is great."
"The price of CyberArk Privileged Access Manager is expensive. There are no other fees other than the standard licensing fees."
"I focus more on the technical side, but I hear customers say that if CyberArk was more affordable, they might have acquired more licenses. Some clients consider alternative solutions due to pricing concerns."
"It costs us around $200 per user."
"The license CyberArk Privileged Access Manager is on an annual basis."
"They have two types of licensing: purchase and subscription. You have to pay for each admin user, such as Microsoft admin, mail admin, database admin, etc."
"The solution is cost-effective for the features."
"Although CyberArk Privileged Access Management is expensive, its protection capabilities outweigh the cost."
Information not available
report
Use our free recommendation engine to learn which Privileged Access Management (PAM) solutions are best for your needs.
881,227 professionals have used our research since 2012.
 

Top Industries

By visitors reading reviews
Financial Services Firm
15%
Manufacturing Company
10%
Computer Software Company
9%
Government
6%
Financial Services Firm
15%
Outsourcing Company
11%
Government
9%
Performing Arts
8%
 

Company Size

By reviewers
Large Enterprise
Midsize Enterprise
Small Business
By reviewers
Company SizeCount
Small Business59
Midsize Enterprise40
Large Enterprise173
No data available
 

Questions from the Community

How does Sailpoint IdentityIQ compare with CyberArk PAM?
We evaluated Sailpoint IdentityIQ before ultimately choosing CyberArk. Sailpoint Identity Platform is a solution to manage risks in cloud enterprise environments. It automates and streamlines the m...
What do you like most about CyberArk Privileged Access Manager?
The most valuable features of the solution are control and analytics.
What is your experience regarding pricing and costs for CyberArk Privileged Access Manager?
My thoughts on the pricing of CyberArk Privileged Access Manager depend entirely on the vendors' requirements. If they want their things to be secure, they have to spend accordingly. We have four t...
Ask a question
Earn 20 points
 

Also Known As

CyberArk Privileged Access Security, CyberArk Enterprise Password Vault
No data available
 

Overview

 

Sample Customers

Rockwell Automation
Information Not Available
Find out what your peers are saying about CyberArk, One Identity, Delinea and others in Privileged Access Management (PAM). Updated: January 2026.
881,227 professionals have used our research since 2012.