Try our new research platform with insights from 80,000+ expert users

CyberArk Privileged Access Manager vs StrongDM comparison

 

Comparison Buyer's Guide

Executive SummaryUpdated on Dec 28, 2025

Review summaries and opinions

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
 

Categories and Ranking

CyberArk Privileged Access ...
Ranking in Privileged Access Management (PAM)
1st
Average Rating
8.6
Reviews Sentiment
6.8
Number of Reviews
229
Ranking in other categories
User Activity Monitoring (1st), Enterprise Password Managers (2nd), Mainframe Security (1st), Operational Technology (OT) Security (3rd)
StrongDM
Ranking in Privileged Access Management (PAM)
17th
Average Rating
8.4
Reviews Sentiment
5.8
Number of Reviews
3
Ranking in other categories
Access Management (18th)
 

Mindshare comparison

As of March 2026, in the Privileged Access Management (PAM) category, the mindshare of CyberArk Privileged Access Manager is 11.4%, down from 19.6% compared to the previous year. The mindshare of StrongDM is 2.6%, up from 0.8% compared to the previous year. It is calculated based on PeerSpot user engagement data.
Privileged Access Management (PAM) Mindshare Distribution
ProductMindshare (%)
CyberArk Privileged Access Manager11.4%
StrongDM2.6%
Other86.0%
Privileged Access Management (PAM)
 

Featured Reviews

Atul-Gujar - PeerSpot reviewer
CyberArk manager at a comms service provider with 10,001+ employees
Secures critical infrastructures with essential user session audit records
A potential area for improvement is enhancing support for cluster environments and distributed Vaults. Clients in multiple countries that need central access have different challenges that require better solutions from CyberArk. For financial services, CyberArk can improve incident response by ensuring fast support for critical priority tickets to meet compliance requirements. Providing more documentation on CyberArk is recommended for new team members to enhance their troubleshooting capabilities. I understand it's up to the client, but 99% fail to change the demo key, so it's crucial for CyberArk to emphasize changing the key and documenting it as part of the installation process.
reviewer2804475 - PeerSpot reviewer
Iam Engineer at a manufacturing company with 10,001+ employees
Access management has improved privileged logins while still needing fewer crashes and less upkeep
The best features in StrongDM are the password rotation capabilities, which I think are pretty cool, and also how you can literally log in to any of the privileged servers through a single platform. You just copy-paste the IP and the port number and log in over there through RDP, so I think that's pretty cool. I have used CyberArk before, but I think StrongDM as a product has pretty good potential. My impression of the credential-less access control is that it's pretty good because it reduces the attack surface. Basically, if you cannot see the password and everything, even the privileged users cannot see the password. It's a password-less system where you just log in to the servers without knowing your password, and even if you know your password, it's probably going to be rotated after a while. So, I think that's a pretty good use case for reducing the attack surface and maintaining zero trust throughout an identity perimeter. StrongDM helps with runtime features in a twenty-four-seven dynamic environment. Whenever I try to access at maybe two a.m. or three a.m. at night and I have a production issue on a server located in a different continent, I can access it right at that moment. I think the application works pretty much like a charm. It's readily available, and I think the runtime feature is pretty cool, although the application sometimes crashes when it's downloaded locally on your machine. Regarding pricing, I find StrongDM to be definitely cost-efficient. We used to use CyberArk before, but StrongDM is more cost-effective, which is why we are using it. Our director is a board member at StrongDM, allowing us to utilize the product and the flexibility it provides, which tailor-suits our needs based on the organization and is something we do not get from other PAM products.

Quotes from Members

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
 

Pros

"This solution is quite stable."
"I really like the PTA (Privileged Threat Analytics). I find this the best feature."
"The integrations are the most valuable aspect of CyberArk Privileged Access Manager. The software offers pre-built integrations, and our team can also create custom connectors. This flexibility allows us to integrate with systems that we previously didn't consider integrating with, making it a significant advantage for us."
"CyberArk PAM can be easily automated."
"The solution is stable and reliable."
"It is a central repository. Therefore, if someone needs to access a server, then they go through CyberArk PAM. It provides a secure way to do this and CyberArk PAM records everything. For example, if you are connecting to a Linux server, then once you get into the Linux server and if it is integrated with CyberArk, it will automatically start recording everything that is being done. In most banks, seeing the recordings is very useful. If there are any gaps or something has happened which shouldn't have happened, then we can check the logs and videos. So, it gives security, in a robust manner, to the organization."
"CyberArk Privileged Access Manager is cool."
"The most valuable feature is Special Monitoring."
"All of the logging is handled for us, including for auditing purposes. Looking through the audit logs is not a painful experience."
"StrongDM replaced the puzzle of different solutions with one single product, which made managing resources more efficient."
"We primarily used StrongDM for access to resources on private networks like EC2 machines, Kubernetes clusters, and various databases."
"The best features in StrongDM are the password rotation capabilities, which I think are pretty cool, and also how you can literally log in to any of the privileged servers through a single platform."
 

Cons

"This product needs professional consulting services to onboard accounts effectively based user profiles."
"The major pain point that we have is the capacity of CyberArk due to the sheer volume of NPAs that we are managing. We are a large organization and we have hundreds of thousands of non-personal accounts to manage. We have already found out that there are certain capacity limitations within CyberArk that might introduce performance issues. From my perspective, something that would be valuable would be if the vault could hold more passwords and be more scalable."
"Our DevOps team is looking in the direction of cloud, because we are not in it today. We are hoping to build it with Conjur from the ground up."
"As they grow, the technical support is having growing pains. One of the things is just being able to get somebody on the phone sometimes."
"The interface on version 9 looks old."
"The initial setup could be simpler but it may not be as effective."
"There is a lot of room for improvement in the report section. I also work on other tools, such as Thycotic, which allows you to create customized reports for your organization's needs. In CyberArk, there are limited reports, whereas in Thycotic or some of the other PAM tools, because the database is different, you can customize the report based on your needs through SQL queries."
"Transitioning from a traditional on-premises deployment to the privileged cloud has resulted in losing access to many logs and administrative tools typically available on the back end."
"I think the stability of StrongDM is about four to five due to the occasional crashes that I mentioned."
"We've had a few issues with the stability of this product in the past."
"It would be beneficial to have better control and alignment between frequent updates and improved communication regarding possible negative effects on existing customer bases."
"It would be beneficial to have better control and alignment between frequent updates and improved communication regarding possible negative effects on existing customer bases."
 

Pricing and Cost Advice

"I believe that this solution is priced well. It's the market leader and I think that it's the best solution."
"Pricing and licensing depend on the environment."
"I would rate CyberArk's pricing a nine out of ten, with one being cheap and ten being expensive. It's one of the most expensive solutions in the market, but it's worth it."
"The solution is available at a high price"
"If you want a Ferrari, it will cost you. The solution is really nice, so it costs the client, but in the long run, it is very good. If you buy a solution that costs a lot to maintain because it is not stable, and you are frequently asking for consultant support, it costs more."
"I'm a technician so I don't handle the licensing for CyberArk Privileged Access Manager, but I know that the price for the core license is about €140 per year. There's another type of license, the external vendor license, and that's about €600 and you can manage twenty devices. From what I know, the price for one device in a subscription is about €65 per year. You can buy the CyberArk Endpoint Privilege Manager too, or you can buy some other application or application license with CyberArk Privileged Access Manager, but all other features, such as the Analytics Server is included in the basic CyberArk license. With WALLIX, you need to buy separate licenses for the features."
"Pricing is quite high and it could be improved."
"CyberArk has been Gartner's number-one pick for the past ten years, so you can infer that their pricing is higher than everyone else. When you are the best, you will charge appropriately for it."
"The licensing is per user per month."
report
Use our free recommendation engine to learn which Privileged Access Management (PAM) solutions are best for your needs.
884,076 professionals have used our research since 2012.
 

Top Industries

By visitors reading reviews
Financial Services Firm
14%
Manufacturing Company
10%
Computer Software Company
8%
Government
6%
Computer Software Company
19%
Financial Services Firm
16%
Manufacturing Company
8%
Leisure / Travel Company
6%
 

Company Size

By reviewers
Large Enterprise
Midsize Enterprise
Small Business
By reviewers
Company SizeCount
Small Business59
Midsize Enterprise42
Large Enterprise174
No data available
 

Questions from the Community

How does Sailpoint IdentityIQ compare with CyberArk PAM?
We evaluated Sailpoint IdentityIQ before ultimately choosing CyberArk. Sailpoint Identity Platform is a solution to manage risks in cloud enterprise environments. It automates and streamlines the m...
What do you like most about CyberArk Privileged Access Manager?
The most valuable features of the solution are control and analytics.
What is your experience regarding pricing and costs for CyberArk Privileged Access Manager?
My thoughts on the pricing of CyberArk Privileged Access Manager depend entirely on the vendors' requirements. If they want their things to be secure, they have to spend accordingly. We have four t...
What is your experience regarding pricing and costs for StrongDM?
The leadership chose StrongDM after comparative research, which suggests economic benefits. It was mentioned that while the product is rapidly gaining features, it might become cost-prohibitive for...
What needs improvement with StrongDM?
StrongDM regularly requires patches and maintenance, but I think that's a good question for the PAM architects in our organization. If you guys could offer only a cloud-native solution, you would l...
What is your primary use case for StrongDM?
My use case for StrongDM is Privileged Access Management. I have privileged accounts because I am working for the Identity and Access Management team at my company. As an engineer, I have really pr...
 

Also Known As

CyberArk Privileged Access Security, CyberArk Enterprise Password Vault
No data available
 

Overview

 

Sample Customers

Rockwell Automation
Information Not Available
Find out what your peers are saying about CyberArk Privileged Access Manager vs. StrongDM and other solutions. Updated: March 2026.
884,076 professionals have used our research since 2012.