Try our new research platform with insights from 80,000+ expert users

CyberArk Privileged Access Manager vs Thales SafeNet Trusted Access comparison

 

Comparison Buyer's Guide

Executive Summary
 

Categories and Ranking

CyberArk Privileged Access ...
Average Rating
8.6
Reviews Sentiment
6.9
Number of Reviews
197
Ranking in other categories
User Activity Monitoring (1st), Enterprise Password Managers (3rd), Privileged Access Management (PAM) (1st), Mainframe Security (2nd), Operational Technology (OT) Security (3rd)
Thales SafeNet Trusted Access
Average Rating
8.4
Reviews Sentiment
6.8
Number of Reviews
3
Ranking in other categories
Single Sign-On (SSO) (20th), Identity and Access Management as a Service (IDaaS) (IAMaaS) (25th), Access Management (20th)
 

Featured Reviews

SatishIyer - PeerSpot reviewer
Lets you ensure relevant, compliant access in good time and with an audit trail, yet lacks clarity on MITRE ATT&CK
When I was a component owner for PAM's Privileged Threat Analytics (PTA) component, what I wanted was a clear mapping to the MITRE ATT&CK framework, a framework which has a comprehensive list of use cases. We reached out to the vendor and asked them how much coverage they have of the uses cases found on MITRE, which would have given us a better view of things while I was the product owner. Unfortunately they did not have the capability of mapping onto MITRE's framework at that time. PTA is essentially the monitoring interface of the broker (e.g. Privileged Access Management, the Vault, CPM, PSM, etc.), and it's where you can capture your broker bypass and perform related actions. For this reason, we thought that this kind of mapping would be required, but CyberArk informed us that they did not have the capability we had in mind with regard to MITRE ATT&CK. I am not sure what the situation is now, but it would definitely help to have that kind of alignment with one of the more well-known frameworks like MITRE. For CyberArk as a vendor, it would also help them to clearly spell out in which areas they have full functionality and in which ares they have partial or none. Of course, it also greatly benefits the customers when they're evaluating the product.
GauravMathur - PeerSpot reviewer
Simple to use, easy to set up, and performs well
I'm not saying that we want to switch the product, however, since the requirement has increased, we are looking at other options that may be better suited. The scalability may not there. We have a few specific use cases where we have to avoid the cloud. Especially in Europe, we're not allowed to carry their phone in factories. We need some sort of secure access solution. There's a dependency on Microsoft Azure. I am paying to SafeNet and in parallel, I also need to pay Microsoft to use the same service. That makes no sense, to pay double. If they could do something about it, that would be very good.

Quotes from Members

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
 

Pros

"CyberArk is not just an IT security or cybersecurity tool. It's also an administrator tool. I had a fair number of systems where the passwords were not fully managed by CyberArk yet, and they were expiring every 30 or 45 days. I was able to get management turned on for those accounts. From an administrator perspective, I didn't have to go back into those systems and manually change those passwords anymore. CyberArk... lightened the load on our administrative work."
"When we started with RPA, there was a requirement that every credential and the bots themselves be protected through the PAM system. From the get-go, we've had CyberArk in the middle... We've got a pretty robust RPA implementation with our PAM platform. Users, bots, the credentials — everything is managed via our PAM solution."
"The password protection itself is the most important feature. It's something we didn't have before."
"We are maintaining compliance in PCI, SOX and HIPPA, which is a big thing. Auditors really like it, and it has made us stay compliant."
"The threat analytics is an important feature."
"I haven't really thought about anything that I want to use it for, that I couldn't use it for."
"It is one of the best solutions in the market. Ever since I started using this solution, there has not been any compromise when it comes to our lab."
"CyberArk PAM can be easily automated."
"The interface is easy to use."
"The solution is simple to use."
"The validation and integrity features of the endpoint are great."
 

Cons

"Report creation could be improved. The policies could be more customized."
"The initial setup could be simpler but it may not be as effective."
"We had an issue with the Copy feature... Apparently, in version 10, that Copy feature does not work. You actually have to click Show and then copy the password from within Show and then paste it. We've had a million tickets and we had to figure out a workaround to it."
"There are upwards of six components you need to set it up. And you might need anywhere from two to five servers. It takes some work to set that up, especially in a larger environment."
"it manages creds based on Organizational Units. That is, a "safe" is limited to specific OUs. That makes for very elaborate OU structure, or you risk exposing too many devices by putting most of them in fewer OUs."
"Over the past seven years, I have seen a lot of ups and downs with the product."
"The one place where we found that this product really needs to improve is the cloud. Simple integrations don't exist, even today. We don't have anything specific on CyberArk for managing, SaaS products, SaaS vendors, SaaS credentials. I understand it's a vendor-based thing and that they have to coordinate with the other vendors to be able to do that, and there are integrations coming. But these are the major places where CyberArk definitely needs to invest some more time."
"In the next release, they could simplify the setup and I would like some tasks added like file sharing. When a client connects to CyberArk and wants to put a file on the server, they cannot."
"SafeNet's reporting and monitoring features could be improved."
"There's a dependency on Microsoft Azure."
"Lacks the ability to integrate network monitoring solutions and authenticate the app users."
 

Pricing and Cost Advice

"I would rate the tool’s pricing a six out of ten."
"The solution is costly but we get what we pay for."
"In comparison to other products on the market, CyberArk is a more costly product."
"The price of CyberArk Privileged Access Manager could be less expensive."
"The product’s pricing is feasible for enterprise customers. The pricing is expensive for smaller businesses. You need to pay additional costs for service implementation and local support."
"CyberArk DNA is free if you purchase the CyberArk solution. There is no additional charge for CyberArk DNA, which is great."
"It can be an expensive product."
"I'm aware that the organization had purchased licensing for almost all of CyberArk's solutions including licensing for PTA, EPM, and the Application Identity Manager. But when it comes to PSM, this is one of the components where there's an additional charge for any extra PSMs that you want to deploy. I believe that there's some rider where the vendor has a bit of leeway to, at times, charge a premium on whatever additional services you may require above the board."
Information not available
report
Use our free recommendation engine to learn which Access Management solutions are best for your needs.
824,053 professionals have used our research since 2012.
 

Top Industries

By visitors reading reviews
Educational Organization
32%
Financial Services Firm
12%
Computer Software Company
11%
Manufacturing Company
6%
Educational Organization
51%
Computer Software Company
8%
Government
6%
Retailer
3%
 

Company Size

By reviewers
Large Enterprise
Midsize Enterprise
Small Business
No data available
 

Questions from the Community

How does Sailpoint IdentityIQ compare with CyberArk PAM?
We evaluated Sailpoint IdentityIQ before ultimately choosing CyberArk. Sailpoint Identity Platform is a solution to manage risks in cloud enterprise environments. It automates and streamlines the m...
What do you like most about CyberArk Privileged Access Manager?
The most valuable features of the solution are control and analytics.
What is your experience regarding pricing and costs for CyberArk Privileged Access Manager?
CyberArk Privileged Access Manager comes at a high cost. But the solution is worth its price.
Ask a question
Earn 20 points
 

Also Known As

CyberArk Privileged Access Security, CyberArk Enterprise Password Vault
SafeNet Trusted Access, Gemalto SafeNet Trusted Access
 

Overview

 

Sample Customers

Rockwell Automation
IBM, Western Union, Vanderbilt University Medical Centre, Novartis, and AT&T.
Find out what your peers are saying about CyberArk Privileged Access Manager vs. Thales SafeNet Trusted Access and other solutions. Updated: December 2024.
824,053 professionals have used our research since 2012.