CyberArk Privileged Access Manager and StrongDM compete in the field of privileged access management. CyberArk holds the upper hand in security measures, while StrongDM is favored for flexibility and integration.
Features: CyberArk is praised for its comprehensive security controls, compliance features, and robust security measures. StrongDM is valued for its ease of integration with existing infrastructures, support for hybrid environments, and advanced features for seamless integration and cloud migration.
Room for Improvement: For CyberArk, users suggest the need for more intuitive management, quicker implementation times, and user-friendly interface improvements. For StrongDM, suggestions include enhancing reporting features, better documentation, and more comprehensive training resources.
Ease of Deployment and Customer Service: CyberArk deployment is considered complex and time-consuming, but its customer service is highly rated. StrongDM is noted for its straightforward deployment process but has mixed reviews regarding customer service responsiveness.
Pricing and ROI: CyberArk's initial setup costs are high but justified by its long-term security benefits. StrongDM's pricing is premium, yet users highlight its high ROI due to efficient operations and lower integration costs.
The technical support is responsive and knowledgeable.
It would be beneficial to have better control and alignment between frequent updates and improved communication regarding possible negative effects on existing customer bases.
I believe it can scale both vertically and horizontally if needed.
It was mentioned that while the product is rapidly gaining features, it might become cost-prohibitive for wider usage.
StrongDM facilitated secure access to these, helped with managing access securely via AWS Secrets Manager, and ensured no passwords were circulated within systems or documentation.
CyberArk Privileged Access Manager is a next-generation solution that allows users to secure both their applications and their confidential corporate information. It is extremely flexible and can be implemented across a variety of environments. This program runs with equal efficiency in a fully cloud-based, hybrid, or on-premises environment. Users can now protect their critical infrastructure and access it in any way that best meets their needs.
CyberArk Privileged Access Manager possesses a simplified and unified user interface. Users are able to manage the solution from one place. The UI allows users to view and manage all of the information and controls that administrators need to be able to easily access. Very often, management UIs do not have all of the controls and information streamlined in a single location. This platform provides a level of visibility that ensures users will be able to view all of their system’s most critical information at any time that they wish.
Benefits of CyberArk Privileged Access Manager
Some of CyberArk Privileged Access Manager’s benefits include:
Reviews from Real Users
CyberArk Privileged Access Manager’s software stands out among its competitors for one very fundamental reason. CyberArk Privileged Access Manager is an all-in-one solution. Users are given the ability to accomplish with a single platform what might usually only be accomplished with multiple solutions.
PeerSpot users note the truly all-in-one nature of this solution. Mateusz K., IT Manager at a financial services firm, wrote, "It improves security in our company. We have more than 10,000 accounts that we manage in CyberArk. We use these accounts for SQLs, Windows Server, and Unix. Therefore, keeping these passwords up-to-date in another solution or software would be impossible. Now, we have some sort of a platform to manage passwords, distribute the inflow, and manage IT teams as well as making regular changes to it according to the internal security policies in our bank."
Hichem T.-B., CDO & Co-Founder at ELYTIK, noted that “This is a complete solution that can detect cyber attacks well. I have found the proxy features most valuable for fast password web access.”
StrongDM is a centralized access management solution designed to streamline and secure your organizational infrastructure, offering robust features for data protection and operational efficiency.
StrongDM addresses the critical need for secure and efficient access management within an organization's infrastructure. It offers a comprehensive suite of features that ensures both security and seamless connectivity for users. From controlling access to databases and cloud environments to auditing and managing user activity, StrongDM meets the demands of modern, tech-savvy organizations. Its integration capabilities and detailed logging features make it an essential tool for those looking to maintain rigorous security standards.
What are the key features of StrongDM?
What benefits should users look for in reviews?
StrongDM is implemented across various industries such as finance, healthcare, and technology, where security and compliance are critical. In finance, for instance, it aids in maintaining rigorous compliance requirements by providing detailed audit trails. In healthcare, StrongDM ensures that sensitive patient data is securely accessed and managed. Technology companies leverage StrongDM to simplify the management of their diverse and complex IT environments, ensuring secure and efficient operations.
We monitor all Privileged Access Management (PAM) reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.