We performed a comparison between CyberArk Privileged Access Manager and Symantec Privileged Access Manager based on real PeerSpot user reviews.
Find out in this report how the two Privileged Access Management (PAM) solutions compare in terms of features, pricing, service and support, easy of deployment, and ROI."We are utilizing CyberArk to secure applications, credentials, and endpoints."
"It is a central repository. Therefore, if someone needs to access a server, then they go through CyberArk PAM. It provides a secure way to do this and CyberArk PAM records everything. For example, if you are connecting to a Linux server, then once you get into the Linux server and if it is integrated with CyberArk, it will automatically start recording everything that is being done. In most banks, seeing the recordings is very useful. If there are any gaps or something has happened which shouldn't have happened, then we can check the logs and videos. So, it gives security, in a robust manner, to the organization."
"It gives us the capability to rotate passwords."
"The established sessions on the target systems are fully isolated and the privileged account credentials are never exposed to the end-users or their client applications and devices."
"We have been able to manage application credentials in CyberArk, whether they come as a custom plugin or straight out-of-the-box."
"The product is an important security measure against credential theft. It ensures session isolation and password rotation including pushing passwords to the endpoints."
"The regulation of accounts is by far the most needed and valuable part of the application."
"CyberArk has allowed us to get the credentials and passwords out of hard-coded property files."
"It reduces the viral attacks on my website. It also allows certain users access to see what happens daily."
"Transparent login for users of privileged IDs (Linux, Windows). This prevents sharing of the password because it is never seen."
"We can check the activities in the server for fragile files and documents in case of any issues."
"Comprehensive coverage of the required features for the PAM solution."
"You can do A2A integration. You can have your own script, which can then run outside of PA to retrieve the password and perform other tasks."
"The interface is very friendly, colorful, and bold."
"Whoever built it from the ground up, they understand how an organization is laid out."
"One of the key things for us about the product is around its simplicity. Being able to put in the technology that allows the business to remove complexity and also allow the security improvements."
"The tool’s pricing and scalability can be better."
"In the beginning, CyberArk Privileged Access Manager didn't have a multifactor authentication feature, so that was an area for improvement, but now it's part of the solution. Having just one console for two CyberArk products would be good, particularly for the CyberArk Privileged Access Manager and the CyberArk Endpoint Privilege Manager, with the latter being a product for endpoint management that supports the workstations and allows you to manage workstations. In the next update of CyberArk Privileged Access Manager, it would be good to have a local agent where you can manage all users and processes, and have an agent on the servers such as Linux and Windows."
"The PTA could be improved. Currently, companies often have multiple domains and sometimes it's difficult to implement CyberArk in this kind of infrastructure. For example, you can add CPM (Central Policy Manager) and PSM (Privileged Session Manager and PVWA (Password Vault Web Access) for access, but if you want to add PTA (Privileged Threat Analysis) to scan Vault logs, it is difficult because this component may be adding multiple domain environments."
"The interface on version 9 looks old."
"The current interface is not very intuitive."
"I would like to see better usability for non-technical people."
"The lead product has a slow process. There are some reports and requirements from CyberArk which are not readily available as an applicable solution. We have made consistent management requests in the logs."
"When something comes out, it's generally airtight and works as advertised. However, sometimes they are a little bit slow to keep up with what's coming out. In 2017, for example, they released support for Windows Server 2016, which had been out for a year or so."
"Instead of just giving passwords to the user based on job function, from auditing perspective, turn that cycle around. That would really help from an auditing standpoint."
"They should include some assignments in the test environment to explore the product's features."
"They need to have zero tier and active-active setup with zero minimum downtime, which they are working on it. "
"The support for other remote assistance tools would be excellent. Free included tools in Windows (Remote Assist) and Microsoft SCCM Configuration Manager (ConMgr Remote Control) allow companies to reduce the amount of RDP connections and expand the usage of the tools are frequently used by companies to provide technical support for remote assistance."
"We experience stability issues after every patch upgrade. This is a place where CA needs to improve drastically."
"I’m no fan of Java as an application front-end, as it tends to have issues depending on what browser one’s using."
"It's difficult to locate the reports, there are limits on what reports can be run from the GUI, and the report formats are lacking."
"They need to do a little bit more on the mainframe side."
More CyberArk Privileged Access Manager Pricing and Cost Advice →
More Symantec Privileged Access Manager Pricing and Cost Advice →
CyberArk Privileged Access Manager is ranked 1st in Privileged Access Management (PAM) with 144 reviews while Symantec Privileged Access Manager is ranked 18th in Privileged Access Management (PAM) with 50 reviews. CyberArk Privileged Access Manager is rated 8.8, while Symantec Privileged Access Manager is rated 7.8. The top reviewer of CyberArk Privileged Access Manager writes "Lets you ensure relevant, compliant access in good time and with an audit trail, yet lacks clarity on MITRE ATT&CK". On the other hand, the top reviewer of Symantec Privileged Access Manager writes "Allows IT and consultants to access the infrastructure environment but needs more security and better support". CyberArk Privileged Access Manager is most compared with Cisco ISE (Identity Services Engine), Microsoft Entra ID, Delinea Secret Server, WALLIX Bastion and One Identity Safeguard, whereas Symantec Privileged Access Manager is most compared with Cisco ISE (Identity Services Engine), BeyondTrust Endpoint Privilege Management, Delinea Secret Server, ARCON Privileged Access Management and VMware Identity Manager. See our CyberArk Privileged Access Manager vs. Symantec Privileged Access Manager report.
See our list of best Privileged Access Management (PAM) vendors.
We monitor all Privileged Access Management (PAM) reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.