Try our new research platform with insights from 80,000+ expert users

CyberArk vs Teleport comparison

 

Comparison Buyer's Guide

Executive SummaryUpdated on Nov 24, 2024

Review summaries and opinions

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
 

Categories and Ranking

CyberArk Privileged Access ...
Ranking in Privileged Access Management (PAM)
1st
Average Rating
8.6
Reviews Sentiment
6.9
Number of Reviews
210
Ranking in other categories
User Activity Monitoring (1st), Enterprise Password Managers (3rd), Mainframe Security (2nd), Operational Technology (OT) Security (3rd)
Teleport
Ranking in Privileged Access Management (PAM)
17th
Average Rating
9.0
Reviews Sentiment
6.4
Number of Reviews
1
Ranking in other categories
Identity and Access Management as a Service (IDaaS) (IAMaaS) (21st)
 

Mindshare comparison

As of February 2025, in the Privileged Access Management (PAM) category, the mindshare of CyberArk Privileged Access Manager is 19.7%, down from 23.7% compared to the previous year. The mindshare of Teleport is 3.1%, up from 0.7% compared to the previous year. It is calculated based on PeerSpot user engagement data.
Privileged Access Management (PAM)
 

Featured Reviews

Lasantha Wijesinghe - PeerSpot reviewer
We have visibility and control through real-time user behavior analytics
It took us some time to realize its benefits because there was a learning curve for us. It took us about a year to get our heads around this product and start effectively using it. It is a journey. It takes at least five years for any company to make this product very useful and reach maturity. It is not only the product's fault. The company needs to have a vision, and the company culture needs to go with it. Senior leadership needs to support the vision. You need to have lots of ingredients for success. If everything is in place, you will see success after one year. In the first year, it is a struggle for everybody. My company was bought by a bigger company, and they were very new to privileged access management. Everybody was struggling. The advice I would give is to have a good vision for privileged access management. You need dedicated teams, senior management support, and proper company policies and standards before implementing the solution. Start building knowledge slowly and avoid jumping into the deep end without preparation. I would rate CyberArk Privileged Access Manager a nine out of ten.
Jyothikumar C - PeerSpot reviewer
Streamlined access management through integration and simplified setup
Teleport has replaced earlier methods like a bastion server or a jump server, which required connecting to physical servers. It integrates well with single sign-on (SSO) and Ansible Playbooks, allowing me to manage inventories easily. Teleport provides a straightforward setup process with a single command line, making it easier to manage the onboarding and offboarding of team members.

Quotes from Members

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
 

Pros

"All of the features of CyberArk Privileged Access Manager are valuable."
"The threat analytics is an important feature."
"CyberArk has helped us to identify, store, protect, and monitor the usage of privileged accounts."
"It is a scalable product."
"The tool has safe vaults. We keep our passwords in the Vault. The tool’s recording feature is also valuable for us."
"We have been able to manage application credentials in CyberArk, whether they come as a custom plugin or straight out-of-the-box."
"The key aspects of privileged access management are being able rotate passwords, make sure someone is accountable, and tie it back to a user (when the system is being used)."
"The solution is scalable."
"Teleport has replaced earlier methods like a bastion server or a jump server, which required connecting to physical servers."
"I recommend it for its straightforward setup and strong security features."
 

Cons

"I'd like to see a more expansive SSH tunneling situation through PSMP. Right now you have an account that exists in the vault and you say, "I want to create a tunnel using this account." I'd like to see something that is not account-based where I could say, "I want to create a tunnel to this machine over here," and then authenticate through the PSMP and then your tunnel is set up. You wouldn't need to then authenticate to a machine."
"What needs to be improved in CyberArk Enterprise Password Vault is their customer support, particularly in terms of responsiveness, willingness to help, and being more understanding. The initial setup and upgrade process for the solution is complex and can only be done by CyberArk, so this is another area for improvement."
"We need a bit more education for our user community because they are not using it to its capabilities."
"As they grow, the technical support is having growing pains. One of the things is just being able to get somebody on the phone sometimes."
"The technical support is very poor."
"I would like to see better usability for non-technical people."
"The solution should be able to mitigate internal threats"
"It could be more user-friendly. Sometimes I encounter issues, and I do not know what the issue is. It takes a lot of time to find the error and fix it. Sometimes it gives an error, but I do not know what the error is. I have to find the documents, but it does not provide all the details needed to fix the error. This is one of the day-to-day issues with CyberArk."
"I cannot download or share session recordings directly with others, which would be useful for documentation or reviews."
"I cannot download or share session recordings directly with others, which would be useful for documentation or reviews."
 

Pricing and Cost Advice

"The product’s pricing is feasible for enterprise customers. The pricing is expensive for smaller businesses. You need to pay additional costs for service implementation and local support."
"It is not a cheap solution. It is expensive as compared with other solutions. However, it is one of the best solutions in their domain."
"CyberArk provides all the features bundled. This is compared to other vendors who provide them as a different license for each functionality."
"I would rate CyberArk's pricing a nine out of ten, with one being cheap and ten being expensive. It's one of the most expensive solutions in the market, but it's worth it."
"This product is very expensive."
"This solution is expensive."
"The solution is cost-effective for the features."
"CyberArk Privileged Access Manager is more expensive than its competitors, such as BeyondTrust, Delinea, and ManageEngine PAM360."
Information not available
report
Use our free recommendation engine to learn which Privileged Access Management (PAM) solutions are best for your needs.
838,713 professionals have used our research since 2012.
 

Top Industries

By visitors reading reviews
Educational Organization
34%
Financial Services Firm
12%
Computer Software Company
11%
Manufacturing Company
6%
Computer Software Company
18%
Financial Services Firm
14%
Comms Service Provider
10%
Legal Firm
8%
 

Company Size

By reviewers
Large Enterprise
Midsize Enterprise
Small Business
No data available
 

Questions from the Community

How does Sailpoint IdentityIQ compare with CyberArk PAM?
We evaluated Sailpoint IdentityIQ before ultimately choosing CyberArk. Sailpoint Identity Platform is a solution to manage risks in cloud enterprise environments. It automates and streamlines the m...
What do you like most about CyberArk Privileged Access Manager?
The most valuable features of the solution are control and analytics.
What is your experience regarding pricing and costs for CyberArk Privileged Access Manager?
I focus more on the technical side, but I hear customers say that if CyberArk was more affordable, they might have acquired more licenses. Some clients consider alternative solutions due to pricing...
What needs improvement with Teleport?
I cannot download or share session recordings directly with others, which would be useful for documentation or reviews. Additionally, while the backend worker can be upgraded, there is a limitation...
What is your primary use case for Teleport?
I use Teleport to replace the normal authentication mechanism as part of a zero-trust architecture. It is particularly useful because, in a remote environment, I cannot trust any devices. I can sha...
What advice do you have for others considering Teleport?
I rate Teleport nine out of ten. Security-wise, it is very secure and easy to use for remote access. I recommend it for its straightforward setup and strong security features.
 

Also Known As

CyberArk Privileged Access Security, CyberArk Enterprise Password Vault
No data available
 

Overview

 

Sample Customers

Rockwell Automation
Information Not Available
Find out what your peers are saying about CyberArk, Delinea, One Identity and others in Privileged Access Management (PAM). Updated: January 2025.
838,713 professionals have used our research since 2012.