Try our new research platform with insights from 80,000+ expert users

CyberArk Privileged Access Manager vs Thales SafeNet Trusted Access comparison

 

Comparison Buyer's Guide

Executive Summary
 

Categories and Ranking

CyberArk Privileged Access ...
Average Rating
8.6
Number of Reviews
193
Ranking in other categories
User Activity Monitoring (1st), Enterprise Password Managers (2nd), Privileged Access Management (PAM) (1st), Mainframe Security (3rd), Operational Technology (OT) Security (3rd)
Thales SafeNet Trusted Access
Average Rating
8.4
Number of Reviews
3
Ranking in other categories
Single Sign-On (SSO) (20th), Identity and Access Management as a Service (IDaaS) (IAMaaS) (24th), Access Management (20th)
 

Featured Reviews

SatishIyer - PeerSpot reviewer
Jun 21, 2022
Lets you ensure relevant, compliant access in good time and with an audit trail, yet lacks clarity on MITRE ATT&CK
When I was a component owner for PAM's Privileged Threat Analytics (PTA) component, what I wanted was a clear mapping to the MITRE ATT&CK framework, a framework which has a comprehensive list of use cases. We reached out to the vendor and asked them how much coverage they have of the uses cases found on MITRE, which would have given us a better view of things while I was the product owner. Unfortunately they did not have the capability of mapping onto MITRE's framework at that time. PTA is essentially the monitoring interface of the broker (e.g. Privileged Access Management, the Vault, CPM, PSM, etc.), and it's where you can capture your broker bypass and perform related actions. For this reason, we thought that this kind of mapping would be required, but CyberArk informed us that they did not have the capability we had in mind with regard to MITRE ATT&CK. I am not sure what the situation is now, but it would definitely help to have that kind of alignment with one of the more well-known frameworks like MITRE. For CyberArk as a vendor, it would also help them to clearly spell out in which areas they have full functionality and in which ares they have partial or none. Of course, it also greatly benefits the customers when they're evaluating the product.
GauravMathur - PeerSpot reviewer
Aug 11, 2021
Simple to use, easy to set up, and performs well
I'm not saying that we want to switch the product, however, since the requirement has increased, we are looking at other options that may be better suited. The scalability may not there. We have a few specific use cases where we have to avoid the cloud. Especially in Europe, we're not allowed to carry their phone in factories. We need some sort of secure access solution. There's a dependency on Microsoft Azure. I am paying to SafeNet and in parallel, I also need to pay Microsoft to use the same service. That makes no sense, to pay double. If they could do something about it, that would be very good.

Quotes from Members

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
 

Pros

"It's a good solution, it works, and the bank is happy with it."
"If properly set up, CyberArk Enterprise Password Vault has good stability, and is a very solid tool. It can run by itself. Its most valuable features are auto password recycling and PSM."
"It has helped us with our adoption with other teams, and it has also helped us to integrate it at the ground level."
"The product is for hardening access and making the organization more secure, therefore reducing chances of a breach."
"CyberArk's GUI is user friendly."
"We know when passwords will be expiring so we can force users to change their passwords, as well as requiring specific password requirements for length, complexity, etc."
"The most valuable features of CyberArk Enterprise Password Vault are password rotations and password encryptions."
"The implementation of the PSM proxy has reduced the specific risk of "insider attacks" on our domain controllers and SLDAP servers by eliminating direct user login by an open secure connection on the user's behalf without ever revealing the privileged credentials."
"The interface is easy to use."
"The validation and integrity features of the endpoint are great."
"The solution is simple to use."
 

Cons

"There was a functionality of the solution that was missing. I had noticed it in Beyond Trust, but not in this solution. But, recently they have incorporated something similar."
"What needs to be improved in CyberArk Enterprise Password Vault is their customer support, particularly in terms of responsiveness, willingness to help, and being more understanding. The initial setup and upgrade process for the solution is complex and can only be done by CyberArk, so this is another area for improvement."
"The solution should be able to mitigate internal threats"
"There is room for improvement in the pricing model."
"There are upwards of six components you need to set it up. And you might need anywhere from two to five servers. It takes some work to set that up, especially in a larger environment."
"Performance of PIM could be better and intended for usability as well as security."
"The challenge with the product is pricing since it's expensive. It also needs to improve the customization. We encountered some stability issues as well."
"The tool’s pricing and scalability can be better."
"There's a dependency on Microsoft Azure."
"SafeNet's reporting and monitoring features could be improved."
"Lacks the ability to integrate network monitoring solutions and authenticate the app users."
 

Pricing and Cost Advice

"Payments have to be made on a yearly basis toward the licensing costs of the solution."
"There are additional features added to our CyberArk Privileged Access Manager license. For example, features that allow us to integrate into various kinds of platforms."
"They have two types of licensing: purchase and subscription. You have to pay for each admin user, such as Microsoft admin, mail admin, database admin, etc."
"CyberArk DNA is free if you purchase the CyberArk solution. There is no additional charge for CyberArk DNA, which is great."
"CyberArk Enterprise Password Vault's pricing is reasonable."
"Pricing is quite high and it could be improved."
"This product is very expensive."
"Quite expensive"
Information not available
report
Use our free recommendation engine to learn which Access Management solutions are best for your needs.
814,649 professionals have used our research since 2012.
 

Top Industries

By visitors reading reviews
Educational Organization
30%
Financial Services Firm
13%
Computer Software Company
11%
Manufacturing Company
6%
Educational Organization
51%
Computer Software Company
9%
Government
6%
Healthcare Company
4%
 

Company Size

By reviewers
Large Enterprise
Midsize Enterprise
Small Business
No data available
 

Questions from the Community

How does Sailpoint IdentityIQ compare with CyberArk PAM?
We evaluated Sailpoint IdentityIQ before ultimately choosing CyberArk. Sailpoint Identity Platform is a solution to manage risks in cloud enterprise environments. It automates and streamlines the m...
What do you like most about CyberArk Privileged Access Manager?
The most valuable features of the solution are control and analytics.
What is your experience regarding pricing and costs for CyberArk Privileged Access Manager?
CyberArk Privileged Access Manager comes at a high cost. But the solution is worth its price.
Ask a question
Earn 20 points
 

Also Known As

CyberArk Privileged Access Security, CyberArk Enterprise Password Vault
SafeNet Trusted Access, Gemalto SafeNet Trusted Access
 

Overview

 

Sample Customers

Rockwell Automation
IBM, Western Union, Vanderbilt University Medical Centre, Novartis, and AT&T.
Find out what your peers are saying about CyberArk Privileged Access Manager vs. Thales SafeNet Trusted Access and other solutions. Updated: October 2024.
814,649 professionals have used our research since 2012.