We performed a comparison between CyberArk Privileged Access Manager and ManageEngine PAM360 based on real PeerSpot user reviews.
Find out in this report how the two Privileged Access Management (PAM) solutions compare in terms of features, pricing, service and support, easy of deployment, and ROI."CyberArk has the ability to change the credentials on every platform."
"DVR like video recording and text-based recording for easier audits."
"We are able to rotate privileged user passwords to eliminate fraudulent use."
"CyberArk PAM can be easily automated."
"All access to our servers by both staff and vendors is monitored and recorded."
"The most valuable aspects of the solution include password management and Rest API retrieval of vaulted credentials."
"Its' quite stable."
"It provides an accountability to the individuals who are using it, knowing that it is audited and tracked."
"We can use it remotely as well."
"Deployment is very quick, and only a one-time installation process is required for ManageEngine PAM360."
"They are sometimes not flexible with things. For instance, from one day to another, there might be something that had been done years ago by CyberArk, then they say, "We do not support that." You then have to initiate a complaint and start working with them. Things might become complicated and months pass while you are working with them. Usually, they are good and fast, but sometimes they seem to be blocked with problems, e.g., you will suddenly be working with another team instead of the team that you were working with the day before."
"As they grow, the technical support is having growing pains. One of the things is just being able to get somebody on the phone sometimes."
"Initially, there was a lot of hiccups, because there were a lot of transitions due to manual installations."
"If we could have some kind of out-of-the box feature that you can simply say "no" so they don't have to go into a development mode, that would a really helpful feature."
"The turnaround time for technical support is lengthy."
"Over the past seven years, I have seen a lot of ups and downs with the product."
"The admin interface of the Password Vault Web Access (PVWA) is moving from an old style (the classic interface) to a new style (the v10 interface) and unfortunately, this process is quite slow."
"They can do a better job in the PSM space."
"If you want a cost effective solution and very competitive pricing, you should go with this product."
"There could be improvement in latency and accessing resources for the product."
"I would rate the scalability at five out of ten. It's average."
"I don't see any features associated with multi-factor authentication in ManageEngine PAM360."
More CyberArk Privileged Access Manager Pricing and Cost Advice →
CyberArk Privileged Access Manager is ranked 1st in Privileged Access Management (PAM) with 144 reviews while ManageEngine PAM360 is ranked 16th in Privileged Access Management (PAM) with 3 reviews. CyberArk Privileged Access Manager is rated 8.8, while ManageEngine PAM360 is rated 6.0. The top reviewer of CyberArk Privileged Access Manager writes "Lets you ensure relevant, compliant access in good time and with an audit trail, yet lacks clarity on MITRE ATT&CK". On the other hand, the top reviewer of ManageEngine PAM360 writes " An easy-to-deploy and affordable tool for access control monitoring". CyberArk Privileged Access Manager is most compared with Cisco ISE (Identity Services Engine), Microsoft Entra ID, Delinea Secret Server, WALLIX Bastion and Zscaler Internet Access, whereas ManageEngine PAM360 is most compared with Delinea Secret Server, ARCON Privileged Access Management, WALLIX Bastion, Fudo PAM and Delinea Privileged Access Service. See our CyberArk Privileged Access Manager vs. ManageEngine PAM360 report.
See our list of best Privileged Access Management (PAM) vendors.
We monitor all Privileged Access Management (PAM) reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.