BeyondTrust Password Safe vs. Cyberark Secrets Manager

Overview
ProductRatingMost Used ByProduct SummaryStarting Price
BeyondTrust Password Safe
Score 8.4 out of 10
N/A
BeyondTrust offers Password Safe, powered by Power broker, an enterprise ready password management and privileged session application.N/A
Cyberark Secrets Manager
Score 8.5 out of 10
N/A
Cyberark Secrets Manager (formerly Conjur) is used to securely authenticate, control and audit non-human access across tools, applications, containers and cloud environments via a secrets management software solution.N/A
Pricing
BeyondTrust Password SafeCyberark Secrets Manager
Editions & Modules
No answers on this topic
No answers on this topic
Offerings
Pricing Offerings
BeyondTrust Password SafeCyberark Secrets Manager
Free Trial
NoNo
Free/Freemium Version
NoNo
Premium Consulting/Integration Services
NoNo
Entry-level Setup FeeNo setup feeNo setup fee
Additional Details
More Pricing Information
Community Pulse
BeyondTrust Password SafeCyberark Secrets Manager
Best Alternatives
BeyondTrust Password SafeCyberark Secrets Manager
Small Businesses
RoboForm
RoboForm
Score 9.3 out of 10
GitLab
GitLab
Score 8.6 out of 10
Medium-sized Companies
Dashlane Password Manager
Dashlane Password Manager
Score 9.0 out of 10
Veracode
Veracode
Score 9.2 out of 10
Enterprises
KeePass
KeePass
Score 8.9 out of 10
Veracode
Veracode
Score 9.2 out of 10
All AlternativesView all alternativesView all alternatives
User Ratings
BeyondTrust Password SafeCyberark Secrets Manager
Likelihood to Recommend
7.3
(1 ratings)
9.9
(2 ratings)
Support Rating
8.2
(1 ratings)
-
(0 ratings)
User Testimonials
BeyondTrust Password SafeCyberark Secrets Manager
Likelihood to Recommend
BeyondTrust
BeyondTrust works really well while looking to manage the privileged accounts distributed on various assets utilized in the organization. It is really good at scanning and fetching the asset details, which provides the descriptive details of all possible threat vectors and allowing the administrators to manage and mitigate the risks. Moreover, BeyondTrust's dependency on Flash is a major demerit which awfully affects the functionality and user experience for BeyondInsight.
Read full review
Cyberark
Cyberark Conjur is well-suited and includes the following: > Securing access to sensitive data in multi-cloud environments. > Providing secure access to secrets and credentials for 3rd party services and applications
Read full review
Pros
BeyondTrust
  • Privileged Account Management.
  • Vulnerability Management.
  • Session Management.
  • Handling API requests.
  • Identifying and Managing various assets throughout the organization.
Read full review
Cyberark
  • Provide allow-list
  • verifying authority
  • validate access
Read full review
Cons
BeyondTrust
  • Dependency on Flash.
  • Securing Files.
  • Managing Service Accounts.
  • Stability of updates.
Read full review
Cyberark
  • Searching containers can be difficult if you're not sure which you're looking for.
  • Initial authorization can be slow, specifically if the first instance failed.
Read full review
Support Rating
BeyondTrust
BeyondTrust Support is available with maximum priority. The user is not required to provide an explanation and is not charged for the case raised. If required, BeyondTrust support is available for every possible requirement, which may differ from a requirement of some document or a hotfix availability. Also, BeyondTrust support takes every request with max priority.
Read full review
Cyberark
No answers on this topic
Alternatives Considered
BeyondTrust
CyberArk is following the bottom-up approach for the development of the Privileged Access Management solution, which provides a stable and more featured security solution. But everything for CyberArk comes with a cost. Meanwhile, everything for BeyondTrust is included in a single product, and Password safe comes up with vast options under a single utility with cost-effective implementation.
Read full review
Cyberark
Cyberark Conjur has been a great asset to our company as it is a one stop shop that holds individuals, teams, departments, and the entire company accountable for the safety network. Not only do you have to be authorized to access Cyberark Conjuryou have to reauthorize to open, copy, or see individual passwords or accounts leaving a cyber trace of all your actions. There's no way to accidently get into something you're not supposed to be in.
Read full review
Return on Investment
BeyondTrust
  • Positive: Easier User Interface.
  • Positive: Descriptive management of access policies.
  • Negative: Issues in functionality due to random bugs in functioning.
Read full review
Cyberark
  • Before Cyberark we put passwords in a spread sheet - leaving exposure to theft.
  • Gives security compliance to our company
  • Keeps company and teams secure and safe.
Read full review
ScreenShots

Cyberark Secrets Manager Screenshots

Screenshot of CyberArk Conjur UIScreenshot of CyberArk Conjur UIScreenshot of CyberArk Conjur UI