We performed a comparison between Cloudflare Access and CyberArk Privileged Access Manager based on real PeerSpot user reviews.
Find out in this report how the two Access Management solutions compare in terms of features, pricing, service and support, easy of deployment, and ROI."The tool also offers good scalability, and the dashboard, along with real-time analytics, is very good."
"Cloudflare, in my opinion, was easy to implement."
"Enables me to work from two locations."
"For Cloudflare Access, I am using the free plan...The most valuable feature is their protection."
"It's the endpoint exposition. We don't need to expose our VPN server to the internet and need a zero-test solution. I can apply some conditional access to the endpoint that's connecting to our network to check their security policies or the security condition of their workstation. Once the workstation is trying to connect to my internal network, then I would like to check the discrete condition of these endpoints that are trying to access my internal network. We created some conditional access. We have CrowdStrike, to check if the CrowdStrike is installed, to check if it's updated, and to check for Windows updates. We created some conditional policies to check it."
"The implementation of the PSM proxy has reduced the specific risk of "insider attacks" on our domain controllers and SLDAP servers by eliminating direct user login by an open secure connection on the user's behalf without ever revealing the privileged credentials."
"I find value in notifications from CyberArk when passwords fail verification and have other issues."
"It provides an accountability to the individuals who are using it, knowing that it is audited and tracked."
"The biggest feature is the security of the overall solution. It's very secure. The vaulting technology and the number of security layers involved in the vault, where privileged accounts are actually stored, is the heart of the solution."
"The automatic password management is the most important feature. The second most important feature is the ability to enforce dual control on the release of those passwords. The combination of these two features is the most important thing for us because we can show that we're in control of who uses any non-personal account, and when they do so."
"When we started with RPA, there was a requirement that every credential and the bots themselves be protected through the PAM system. From the get-go, we've had CyberArk in the middle... We've got a pretty robust RPA implementation with our PAM platform. Users, bots, the credentials — everything is managed via our PAM solution."
"This is a complete solution that can detect cyber attacks well."
"There are no issues with scalability. Our clients are very happy to use the product."
"The pricing is an area that can be improved. Pricing, as far as I recall, was the source of our problems."
"When there are any dynamic changes in complex applications, the tool takes a lot of time, making its analytics-related area a major matter of concern where improvements are needed."
"They don't have a person to provide support for customers using the solution under their free plan."
"For the topic of improvement, providing some training material is one of my suggestions."
"Online help needs to be looked into with live agent support."
"There is room for improvement in the pricing model."
"It is easily customized, and that customization makes it very easy to start trying to shoehorn the solution into roles it was never intended to fill."
"It needs better documentation with more examples for the configuration files and API/REST integration"
"Currently, in Secure Connect, an end user is required to enter account information manually, and cannot save any of this information for future use."
"One of our current issues is a publishing issue. If we whitelist Google Chrome, all the events of Google Chrome should be gone. It is not happening."
"I think having a distributed architecture would certainly help this solution."
"When something comes out, it's generally airtight and works as advertised. However, sometimes they are a little bit slow to keep up with what's coming out. In 2017, for example, they released support for Windows Server 2016, which had been out for a year or so."
More CyberArk Privileged Access Manager Pricing and Cost Advice →
Cloudflare Access is ranked 10th in Access Management with 5 reviews while CyberArk Privileged Access Manager is ranked 1st in Privileged Access Management (PAM) with 144 reviews. Cloudflare Access is rated 8.8, while CyberArk Privileged Access Manager is rated 8.8. The top reviewer of Cloudflare Access writes "Replaces traditional VPN and enables endpoint exposition ". On the other hand, the top reviewer of CyberArk Privileged Access Manager writes "Lets you ensure relevant, compliant access in good time and with an audit trail, yet lacks clarity on MITRE ATT&CK". Cloudflare Access is most compared with Twingate, Prisma Access by Palo Alto Networks, Zscaler Zero Trust Exchange, Auth0 and Netskope , whereas CyberArk Privileged Access Manager is most compared with Cisco ISE (Identity Services Engine), Microsoft Entra ID, Delinea Secret Server, WALLIX Bastion and One Identity Safeguard. See our Cloudflare Access vs. CyberArk Privileged Access Manager report.
See our list of best Access Management vendors.
We monitor all Access Management reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.