Try our new research platform with insights from 80,000+ expert users

CyberArk Privileged Access Manager vs StrongDM comparison

 

Comparison Buyer's Guide

Executive SummaryUpdated on Dec 28, 2025

Review summaries and opinions

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
 

Categories and Ranking

CyberArk Privileged Access ...
Ranking in Privileged Access Management (PAM)
1st
Average Rating
8.6
Reviews Sentiment
6.8
Number of Reviews
229
Ranking in other categories
User Activity Monitoring (1st), Enterprise Password Managers (2nd), Mainframe Security (2nd), Operational Technology (OT) Security (3rd)
StrongDM
Ranking in Privileged Access Management (PAM)
15th
Average Rating
9.0
Reviews Sentiment
7.3
Number of Reviews
2
Ranking in other categories
Access Management (17th)
 

Mindshare comparison

As of February 2026, in the Privileged Access Management (PAM) category, the mindshare of CyberArk Privileged Access Manager is 11.2%, down from 19.7% compared to the previous year. The mindshare of StrongDM is 2.3%, up from 0.9% compared to the previous year. It is calculated based on PeerSpot user engagement data.
Privileged Access Management (PAM) Market Share Distribution
ProductMarket Share (%)
CyberArk Privileged Access Manager11.2%
StrongDM2.3%
Other86.5%
Privileged Access Management (PAM)
 

Featured Reviews

Atul-Gujar - PeerSpot reviewer
CyberArk manager at a comms service provider with 10,001+ employees
Secures critical infrastructures with essential user session audit records
A potential area for improvement is enhancing support for cluster environments and distributed Vaults. Clients in multiple countries that need central access have different challenges that require better solutions from CyberArk. For financial services, CyberArk can improve incident response by ensuring fast support for critical priority tickets to meet compliance requirements. Providing more documentation on CyberArk is recommended for new team members to enhance their troubleshooting capabilities. I understand it's up to the client, but 99% fail to change the demo key, so it's crucial for CyberArk to emphasize changing the key and documenting it as part of the installation process.
reviewer2589615 - PeerSpot reviewer
Senior Data Engineer at a non-profit with 1,001-5,000 employees
Seamlessly manage cloud access with enhanced security features
I was part of the team managing the infrastructure for a small startup company. We used StrongDM to provide access to cloud private networks, control user access to databases, hosts through SSH, and Kubernetes resources StrongDM was able to replace the combination of different products we…

Quotes from Members

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
 

Pros

"AIM has been a great help in automating password retrieval which removes the need for hard-coded credentials."
"The most valuable feature of the solution is session recording."
"I haven't really thought about anything that I want to use it for, that I couldn't use it for."
"I appreciate CyberArk's real-time capabilities. I can secure critical sessions, such as SSH or database sessions."
"CyberArk has a lot of modules."
"What I appreciate about CyberArk Privileged Access Manager is that it is not only for password security; we can also manage their applications and platforms, and whenever a user logs in, end-to-end protection is handled, including monitoring user activity through PSM servers and reacting to threats with Privileged Threat Analysis."
"CyberArk Privileged Access Manager's abilities to safeguard the infrastructure are important, as protecting credentials provides us with security and visibility."
"I appreciate CyberArk's real-time capabilities. I can secure critical sessions, such as SSH or database sessions. As a security professional, I have real-time visibility into ongoing sessions. If anything suspicious occurs, I can terminate or freeze the session, which is part of user behavior analytics."
"StrongDM replaced the puzzle of different solutions with one single product, which made managing resources more efficient."
"We primarily used StrongDM for access to resources on private networks like EC2 machines, Kubernetes clusters, and various databases."
"All of the logging is handled for us, including for auditing purposes. Looking through the audit logs is not a painful experience."
 

Cons

"If you are an administrator or architect, then the solution is kind of complicated, as it is mostly focused on the end user. So, they need to also focus on the people who are implementing it."
"Integration with the ticketing system should allow any number of fields to be used for validation before allowing a user to be evaluated and able to access a server."
"We would, of course, always prefer it if the pricing was cheaper."
"I'd like it to be a little more granular. I want a little bit more control over exactly what we do. I know if you do that, you add more knobs and dials to deal with, but that's just my personal approach: granular access."
"CyberArk Privileged Access Manager is more expensive than its competitors, such as BeyondTrust, Delinea, and ManageEngine PAM360."
"The license is expensive."
"It's expensive and you're not getting anything new. It's just a control, but in terms of risk, you are covering a big impact on the company."
"My company always complains about the cost of CyberArk Privileged Access Manager because it's too high."
"It would be beneficial to have better control and alignment between frequent updates and improved communication regarding possible negative effects on existing customer bases."
"It would be beneficial to have better control and alignment between frequent updates and improved communication regarding possible negative effects on existing customer bases."
"We've had a few issues with the stability of this product in the past."
 

Pricing and Cost Advice

"The price of the solution is reasonable."
"In comparison to other products on the market, CyberArk is a more costly product."
"Its price can be reduced."
"I hope to learn how the pricing works so that I can understand it better, but I am certain it is not inexpensive."
"The price of this solution is expensive."
"I would rate the tool’s pricing a six out of ten."
"The product's licensing is yearly. I would rate the solution's pricing a six out of ten."
"My company always complains about the cost of CyberArk Privileged Access Manager because it's too high."
"The licensing is per user per month."
report
Use our free recommendation engine to learn which Privileged Access Management (PAM) solutions are best for your needs.
882,032 professionals have used our research since 2012.
 

Top Industries

By visitors reading reviews
Financial Services Firm
15%
Manufacturing Company
10%
Computer Software Company
9%
Government
6%
Computer Software Company
23%
Financial Services Firm
18%
Manufacturing Company
9%
Leisure / Travel Company
6%
 

Company Size

By reviewers
Large Enterprise
Midsize Enterprise
Small Business
By reviewers
Company SizeCount
Small Business59
Midsize Enterprise40
Large Enterprise173
No data available
 

Questions from the Community

How does Sailpoint IdentityIQ compare with CyberArk PAM?
We evaluated Sailpoint IdentityIQ before ultimately choosing CyberArk. Sailpoint Identity Platform is a solution to manage risks in cloud enterprise environments. It automates and streamlines the m...
What do you like most about CyberArk Privileged Access Manager?
The most valuable features of the solution are control and analytics.
What is your experience regarding pricing and costs for CyberArk Privileged Access Manager?
My thoughts on the pricing of CyberArk Privileged Access Manager depend entirely on the vendors' requirements. If they want their things to be secure, they have to spend accordingly. We have four t...
What is your experience regarding pricing and costs for StrongDM?
The leadership chose StrongDM after comparative research, which suggests economic benefits. It was mentioned that while the product is rapidly gaining features, it might become cost-prohibitive for...
What needs improvement with StrongDM?
It would be beneficial to have better control and alignment between frequent updates and improved communication regarding possible negative effects on existing customer bases. Also, documentation s...
What is your primary use case for StrongDM?
I was part of the team managing the infrastructure for a small startup company. We used StrongDM to provide access to cloud private networks, control user access to databases, hosts through SSH, an...
 

Also Known As

CyberArk Privileged Access Security, CyberArk Enterprise Password Vault
No data available
 

Overview

 

Sample Customers

Rockwell Automation
Information Not Available
Find out what your peers are saying about CyberArk Privileged Access Manager vs. StrongDM and other solutions. Updated: January 2026.
882,032 professionals have used our research since 2012.