We performed a comparison between CyberArk Privileged Access Manager and ObserveIT based on real PeerSpot user reviews.
Find out what your peers are saying about CyberArk, Proofpoint, Amazon Web Services (AWS) and others in User Activity Monitoring."Creating policies and the password rotation feature have been valuable. We don't have to memorize our password for the ADM account."
"Allows secure, logged access to highly sensitive servers and services."
"The biggest feature is the security of the overall solution. It's very secure. The vaulting technology and the number of security layers involved in the vault, where privileged accounts are actually stored, is the heart of the solution."
"The central password manager is the most valuable feature because the password is constantly changing. If an outsider threat came in and gained access to one of those passwords, they would not have access for long."
"CyberArk is a very stable product and it's a stable product because it has a simple design and a simple architecture that allows you to leverage the economies of scale across the base of your infrastructure that you already have implemented. It doesn't really introduce any new complex pieces of infrastructure that would make it that much more difficult to scale."
"Password rotation, session recording & isolation and on-demand privileges."
"The technical support for this solution is very good. If I was to rate it on a scale of one to five, I would give it a five."
"The credentials management capability is key to ensuring that the credentials are kept secure and that access to them is done on a temporary and event-driven basis."
"ObserveIT is small, easy to use, easy to deploy, and is not complicated, so it's more generally suited for only SMBs. It's a good value with a cheaper price."
"It should be easy to use for non-technical people. Its interface can be a bit difficult. Some parts of its interface are not very intuitive. Some of the controls are hidden, and instead of having a screen with all the controls for that account on it, you have to use menus and other similar things."
"The greatest area of improvement is with the user interface of the Password Vault Web Access component."
"CyberArk PAM could greatly benefit from an under-the-hood update; integrating machine learning algorithms could provide predictive insights."
"It is very complex and difficult to set up the solution."
"More additional features as far as the REST is concerned, because we have something which was the predecessor to REST. A lot of the features which were in the predecessor have not necessarily been ported over to REST yet."
"This product needs professional consulting services to onboard accounts effectively based user profiles."
"As they grow, the technical support is having growing pains. One of the things is just being able to get somebody on the phone sometimes."
"We would, of course, always prefer it if the pricing was cheaper."
"ObserveIT is not scalable and it's not for the medium to large corporations. It's for the smaller environments. For the larger corporations, we have other scalable solutions."
More CyberArk Privileged Access Manager Pricing and Cost Advice →
CyberArk Privileged Access Manager is ranked 1st in User Activity Monitoring with 144 reviews while ObserveIT is ranked 2nd in User Activity Monitoring. CyberArk Privileged Access Manager is rated 8.8, while ObserveIT is rated 8.4. The top reviewer of CyberArk Privileged Access Manager writes "Lets you ensure relevant, compliant access in good time and with an audit trail, yet lacks clarity on MITRE ATT&CK". On the other hand, the top reviewer of ObserveIT writes "Easy to implement and configure. Ticketing and incident workflow can be improved. ". CyberArk Privileged Access Manager is most compared with Cisco ISE (Identity Services Engine), Microsoft Entra ID, Delinea Secret Server, WALLIX Bastion and One Identity Safeguard, whereas ObserveIT is most compared with Teramind, Ekran System, Splunk User Behavior Analytics, One Identity Safeguard and Dtex Systems.
See our list of best User Activity Monitoring vendors.
We monitor all User Activity Monitoring reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.