<img src="https://ws.zoominfo.com/pixel/6169bf9791429100154fc0a2" width="1" height="1" style="display: none;">
Curious about how StrongDM works? 🤔 Learn more here!
Search
Close icon
Search bar icon

Alternatives to CyberArk

CyberArk Competitors
StrongDM manages and audits access to infrastructure.
  • Role-based, attribute-based, & just-in-time access to infrastructure
  • Connect any person or service to any infrastructure, anywhere
  • Logging like you've never seen

CyberArk’s Privileged Access Manager is a tool that allows organizations to secure access for privileged administrators (typically systems and database administrators) to Windows Servers, Linux servers, and some database management systems via a centralized authentication method. However, if you need to secure access to modern and cloud-native databases, Kubernetes clusters, cloud CLIs, switches, routers, or internal web applications, there are other options to consider. This blog post looks at a few CyberArk alternatives and discusses the pros and cons of each.

CyberArk Overview

Brief product summary

CyberArk was founded in 1999 and is the most notable of companies that do Privileged Access Management (PAM). PAM is designed to provide access to specific resources for specific people in a company. End users are typically comprised of a small subset of the engineering or IT team and tend to be systems administrators (sysadmins) or databases administrators (DBAs). The toolset is designed primarily for legacy server operating systems, like Windows, or older database managements systems, such as Oracle, Sybase, or DB2. It was originally designed to run on Windows workstations and integrate with LDAP and Active Directory. It allows companies to more easily restrict access to systems they care most deeply about. If add-ons are purchased, it can also provide a credential vault and password rotation. Access is typically done through a web interface or locally installed utility. Components of the system include a password vault, central policy manager, and privileged session manager. In most cases, CyberArk is able to provide an audit trail of queries and session replays.

⚠️ Traditional PAM deployments have gaps. Learn how to protect your databases, the cloud, Kubernetes, and more with our legacy PAM augmentation guide.

Use cases

  • Centralized access to Linux and Windows servers, and some legacy databases.

Pluses

  • SSH access available.
  • RDP access available.
  • Authenticates users via LDAP and Active Directory (AD).
  • Integrates with some machine groups.

Minuses

As a legacy system, CyberArk’s competency is for a specific set of highly privileged administrators. It is designed for Windows-based environments and does best with legacy databases and authentication methods (AD, LDAP). It is not designed for any cloud-native environments, newer database management systems (e.g. Kafka, Redis), or modern infrastructure tooling (like Kubernetes, Docker, and ephemeral environments) and often requires the end user to go through CyberArk-specific software. Finally, it does not cover all users within a company, most of whom require access to systems that contain privileged information (for example, financial analysts who might need access to transactional information). Furthermore, CyberArk has a complex pricing model, and it has been reported to be “shelfware” at many companies who have purchased it.

“We did a POC of Cyberark last year. It was like a 2000’s toolset for a 2021 problem” - Anonymous StrongDM customer

1. StrongDM

strongdm-new-homepage-screenshot

Brief product summary

StrongDM is a control plane to manage and monitor access to databases, servers, and Kubernetes. StrongDM's zero trust model means instead of distributing access across a combination of VPN, individual database credentials, and SSH keys, StrongDM unifies user management in your existing SSO (Google, Onelogin, Duo, Okta, SAML, etc...) and keeps the underlying credentials hidden. Neither credentials nor keys are accessible by end users. Because StrongDM deconstructs every protocol, it also logs all database queries, SSH and RDP sessions, and kubectl activity.

Use cases

Pluses

  • Easy deployment - self-healing mesh network of proxies.
  • No change to workflow- use any SQL client, CLI, or desktop BI tool.
  • Standardize logs across any database type, Linux or Windows server, and Kubernetes.
  • Graphical client for Windows and macOS.
  • See and replay all activity with session recordings.
  • Manage via a user-friendly web browser interface.
  • Simple, straightforward pricing.

Minuses

  • Requires continual access to StrongDM API for access to managed resources.

StrongDM’s G2 Reviews

  • 51 reviews (at the time of writing)
  • 4.8 / 5 stars

Read all of StrongDM’s G2 reviews here.

g2-review-screenshot

Pricing Information

StrongDM offers simple per-user pricing, starting at $70/license, including support for all resource types.

Users have the option to sign up for a free 14-day trial.

strongdm-new-pricing

2. Delinea (fka Thycotic Centrify)

Brief product summary

Like CyberArk, Delinea is a tool that allows organizations to secure access for privileged administrators (typically systems and database administrators) to Windows Servers, Linux servers, and some database management systems via a centralized authentication method. And like CyberArk, it does not secure access to modern and cloud-native databases, Kubernetes clusters, cloud CLIs, switches, routers, or internal web applications.

Use cases

  • Centralized access to Linux and Windows servers, and some legacy databases.

Pluses

  • SSH access available.
  • RDP access available.
  • Authenticates users via LDAP and Active Directory (AD).
  • Integrates with some machine groups.
  • Cloud and on-premise deployable.
  • Simpler pricing.

Minuses

Like CyberArk, Delinea is designed for legacy systems and highly privileged administrators. It is designed for Windows-based environments and does best with legacy databases and authentication methods (AD, LDAP). And like CyberArk, it is not designed for any cloud-native environments, newer database management systems, nor modern infrastructure tooling like Kubernetes, Docker, and ephemeral environments). Finally, Delinea it does not cover all users within a company, most of whom require access to systems that contain privileged information (for example, financial analysts who might need access to transactional information).

For a deeper dive, visit CyberArk vs. Delinea (Thycotic Centrify): Which Is Better?

3. Okta ASA (ScaleFT)

Brief product summary

Okta’s Advanced Server Access (ASA) provides privileged access management (PAM) for cloud-native infrastructure. Okta did not build this capability in-house; it came from an acquisition Okta made in July 2018 of a company called ScaleFT. In general, it is an access and authentication proxy for RDP and SSH access. It allows administrators to set up access for users (grouped into teams) to servers, and implements role-based access control (RBAC) to allow differing levels of access per team to different servers. Individual server credentials are not available to users, reducing the administrative impact of rotating and removing credentials.

Use cases

  • Centralized access to SSH and RDP servers.

Pluses

  • SSH access is available.
  • RDP access is available.
  • Single sign-on (SSO) for SSH/RDP and your identities in Okta.
  • Authorized requests leverage single-use client certificate or web token scoped to the user and resource being accessed.

Minuses

  • Okta’s software must be running on every server it manages access to.
  • Complex setup: in addition to the ScaleFT software on each server, a ScaleFT Gateway and ScaleFT local client must also be built and maintained for each cluster.
  • CLI-only client scares off non-engineers.
  • User credentials are assigned ephemerally adding complexity to deployments and uptime.
  • Backend configuration required to export audit logs to any 3rd-party.
  • ScaleFT agent audit logs are only accessible through an early access enablement.
  • Audit logs only cover SSH.
  • No auditing for RDP.
  • Complex pricing model.
  • Pricing based per server, which gets extremely expensive in ephemeral environments or those with high-n servers.

4. HashiCorp Vault

Brief product summary

HashiCorp Vault is a complete secrets management product, allowing end users to interact with a secure vault (server) to store, retrieve, and generate credentials for a wide variety of systems, including databases, various cloud providers, and SSH. It is built on a client-server model and is accessible via a command-line tool, a REST API, and a web interface. Its capability of creating and deleting ephemeral credentials allows users to build secure automation functionality with minimal risk of leaking credentials.

Use Cases

  • Storing sensitive credentials that can be accessed manually, via a CLI, or an API.
  • Generating ephemeral credentials for one-time access to databases, cloud environments, and a variety of other secure environments.
  • Securing automated processes that require secrets to connect to secure environments.

Pluses

  • Because it has a fully functional API, it is well-suited for integrating with automated tools and processes.
  • Ephemeral credentials increase security by existing only long enough to be used and then discarded.
  • Any form of data can be stored via the API, CLI, or web UI, making it a very flexible method of protecting a wide variety of secrets: credentials, API keys, tokens, and even binary data via Base64 encoding.

Minuses

  • API and command-line utility, not user-transparent.
  • Not suitable for end-user credential management.
  • Requires custom integration work to fit into existing workflows.
  • Complex pricing model.

5. Bastion Host

Brief product summary

A bastion host is simply a Linux/UNIX server that mediates access to sensitive servers/database access by requiring the user to first log into the bastion host then ‘jump’ to additional resources in the network controlled by the bastion. Organizations simply need to set up an additional server that is both accessible from external sources and is able to connect to internal resources.

Use cases

  • Mediate access to protected resources on a restricted network segment.
  • Database clients and similar tools can work via bastion host by using port forwarding over the SSH connection.

Pluses

  • Free, or nearly so: the only requirement is the cost for the hardware (or virtual server) underlying the bastion host.
  • Straightforward access for users who are familiar with SSH.

Minuses

  • Because all access to protected resources requires first logging in via command line to the bastion host, the user must have an account on the bastion and a certain level of technical acumen, especially if employing port forwarding for database access.
  • The bastion host represents a single point of failure; if it is unavailable all resources behind it are inaccessible. Setting up multiple bastion hosts to mitigate against this possibility means another set of credentials to manage.
  • In the case of problems, support is limited to whatever support may be available for the underlying OS running on the bastion host.
  • Session logs and database/other protocol activity are not captured.

About the Author

, Technical Evangelist, has had a long 30+ year career in systems engineering and architecture, but has spent the last 13+ years working on the Cloud, and specifically, Cloud Security. He's currently the Technical Evangelist at StrongDM, taking the message of Zero Trust Privileged Access Management (PAM) to the world. As a practitioner, he architected and created cloud automation, DevOps, and security and compliance solutions at Netflix and Adobe. He worked closely with customers at Evident.io, where he was telling the world about how cloud security should be done at conferences, meetups and customer sessions. Before coming to StrongDM, he lead an innovations and solutions team at Palo Alto Networks, working across many of the company's security products.

StrongDM logo
💙 this post?
Then get all that StrongDM goodness, right in your inbox.

You May Also Like

StrongDM vs. AWS SSM Session Manager: Side-by-Side Comparison
StrongDM vs. AWS SSM Session Manager: Side-by-Side Comparison
Both AWS Systems Manager (SSM) Session Manager and StrongDM are solutions for gaining remote access to critical infrastructure. Yet, while they share some of the same capabilities required of an enterprise access management platform, the execution and the ultimate goals they accomplish for security and compliance teams are very different.
StrongDM vs. CyberArk: Side-by-Side Comparison
StrongDM vs. CyberArk: Side-by-Side Comparison
Both StrongDM and CyberArk are privileged access management solutions to provide secure access to backend infrastructure. While there are many similarities between the two solutions, there are also some key differences.
StrongDM vs. Teleport: Which One Is Better
StrongDM vs. Teleport: Side-by-Side Comparison
Both StrongDM and Teleport are access control solutions designed to provide secure access to databases, servers, clusters, and web apps. While there are some similarities between the two solutions, there are also some key differences.
AWS Secrets Manager Alternatives & Competitors
Alternatives to AWS Secrets Manager
AWS Secrets Manager is a popular and highly intuitive secrets management tool that lets organizations automate secrets rotation processes and securely store, manage, and audit IT credentials. However, certain AWS Secrets Manager alternatives are available if you are looking to avoid getting tied down exclusively to AWS products or prioritize efficient user onboarding. In this product comparison guide, we evaluate AWS Secrets Manager competitors that can fill in some of its product gaps.
Azure Key Vault Alternatives & Competitors
Alternatives to Azure Key Vault
Microsoft Azure Key Vault is a cryptographic and secrets management solution for storing encryption keys, certificates, and passwords. While known for its interface simplicity and robust security, users should look to Azure Key Vault alternatives if they prioritize employee onboarding automation or need quick and easy implementation. This article evaluates Azure Key Vault competitors regarding security features, pricing, and usability to identify the best alternative options.