Cloudflare Zero Trust Services vs. CyberArk Privileged Access Management

Overview
ProductRatingMost Used ByProduct SummaryStarting Price
Cloudflare Zero Trust Services
Score 8.9 out of 10
N/A
Cloudflare's Zero Trust Network Access (ZTNA) technologies create secure boundaries around applications. When resources are protected with ZTNA, users are only allowed to access resources after verifying the identity, context, and policy adherence of each specific request. Cloudflare's Zero-Trust-as-a-Service model enables users to deploy access controls on the company's instant-on cloud platform, backed by Cloudflare's global network.N/A
CyberArk Privileged Access Management
Score 8.8 out of 10
N/A
CyberArk is a privileged account and access security suite issued by the company of the same name in Massachusetts . The Core Privileged Access Security Solution unifies Enterprise Password Vault, Privileged Session Manager and Privileged Threat Analytics to protect an organization’s most critical assets.N/A
Pricing
Cloudflare Zero Trust ServicesCyberArk Privileged Access Management
Editions & Modules
No answers on this topic
No answers on this topic
Offerings
Pricing Offerings
Cloudflare Zero Trust ServicesCyberArk Privileged Access Management
Free Trial
NoYes
Free/Freemium Version
NoNo
Premium Consulting/Integration Services
NoNo
Entry-level Setup FeeNo setup feeNo setup fee
Additional DetailsCyberArk offers a variety of Identity Security packages for different user types within an organization.
More Pricing Information
Features
Cloudflare Zero Trust ServicesCyberArk Privileged Access Management
Identity Management
Comparison of Identity Management features of Product A and Product B
Cloudflare Zero Trust Services
10.0
1 Ratings
12% above category average
CyberArk Privileged Access Management
-
Ratings
Multi-Factor Authentication10.01 Ratings00 Ratings
Endpoint Security
Comparison of Endpoint Security features of Product A and Product B
Cloudflare Zero Trust Services
10.0
1 Ratings
6% above category average
CyberArk Privileged Access Management
-
Ratings
Endpoint Detection and Response (EDR)10.01 Ratings00 Ratings
Threat Intelligence
Comparison of Threat Intelligence features of Product A and Product B
Cloudflare Zero Trust Services
10.0
1 Ratings
13% above category average
CyberArk Privileged Access Management
-
Ratings
Network Analytics10.01 Ratings00 Ratings
Threat Recognition10.01 Ratings00 Ratings
Vulnerability Classification10.01 Ratings00 Ratings
Automated Alerts and Reporting10.01 Ratings00 Ratings
Threat Analysis10.01 Ratings00 Ratings
Threat Intelligence Reporting10.01 Ratings00 Ratings
Automated Threat Identification10.01 Ratings00 Ratings
Zero Trust Security
Comparison of Zero Trust Security features of Product A and Product B
Cloudflare Zero Trust Services
10.0
1 Ratings
8% above category average
CyberArk Privileged Access Management
-
Ratings
Continuous Verification10.01 Ratings00 Ratings
Secure Web Gateways10.01 Ratings00 Ratings
Network Flow Control10.01 Ratings00 Ratings
Network Traffic Analysis10.01 Ratings00 Ratings
Segmentation Leveraging10.01 Ratings00 Ratings
Admin Access Control10.01 Ratings00 Ratings
Network Data Encryption10.01 Ratings00 Ratings
Network Topology Mapping10.01 Ratings00 Ratings
Best Alternatives
Cloudflare Zero Trust ServicesCyberArk Privileged Access Management
Small Businesses
ThreatLocker
ThreatLocker
Score 9.3 out of 10

No answers on this topic

Medium-sized Companies
Palo Alto Networks Prisma Access
Palo Alto Networks Prisma Access
Score 8.3 out of 10
ManageEngine ADManager Plus
ManageEngine ADManager Plus
Score 9.5 out of 10
Enterprises
Palo Alto Networks Prisma Access
Palo Alto Networks Prisma Access
Score 8.3 out of 10
ManageEngine ADManager Plus
ManageEngine ADManager Plus
Score 9.5 out of 10
All AlternativesView all alternativesView all alternatives
User Ratings
Cloudflare Zero Trust ServicesCyberArk Privileged Access Management
Likelihood to Recommend
10.0
(5 ratings)
8.0
(9 ratings)
Usability
10.0
(1 ratings)
-
(0 ratings)
Support Rating
9.1
(3 ratings)
7.2
(4 ratings)
User Testimonials
Cloudflare Zero Trust ServicesCyberArk Privileged Access Management
Likelihood to Recommend
Cloudflare
I wanted to securely connect to my servers without getting tracked by malicious attackers, even though I was on public Wi-Fi. Security was my top priority, and I also wanted a setup that was easy and quick to start and provided great network performance. Cloudflare's Zero trust matches my criteria for becoming my first choice.
Read full review
Cyberark
The system is great for enterprise or larger IT departments or teams where temporary or full access may be given using privileged IDs. Requirements for needing local admin access is also eliminated which can help with specific Windows workstation related tasks. It can be very useful when working with remote teams or contractors who may need temporary access to a system when required.
Read full review
Pros
Cloudflare
  • Granular Restrictions
  • Bot Management
  • DNS protection
Read full review
Cyberark
  • Automatically discover new servers on the network and take control of the local admin password by vaulting it and ensuring nobody knows the password. A different password on every server.
  • Automatically roll the password in a configurable manner - after each use, after a certain period of time, etc.
  • Track and govern sensitive account usage by ensuring only properly authorized users can access the vault and obtain the credentials and then monitor usage.
Read full review
Cons
Cloudflare
  • Good to see content re-categorization with different list for organizations.
  • URL and headers rewrite.
  • Events forwarding to on-premise SIEM.
Read full review
Cyberark
  • GUI - right now everything is on one page/dashboard. Some level of folder/Safe type view would be great
  • More options when storing passwords - especially for network based passwords
  • Better integrations with vendors like Cisco so that admins dont need to really get the password from the vault (think Last Pass type add on)
Read full review
Usability
Cloudflare
Overall, Cloudflare Zero Trust Services is very usable. We just need to do a one-time setup on Cloudflare Zero Trust Service's website, download their app on the device, and connect it with secure authentication. That's it. The apps are available for almost all kinds of devices that we use, and hence, we can secure all of our required devices. The app interface is very user-friendly and has logging capability to debug in case something goes wrong.
Read full review
Cyberark
No answers on this topic
Support Rating
Cloudflare
Good chat support from the portal for basic questions and minor issues. The enterprise support line is provided as well.
Read full review
Cyberark
Customer support and technical support have always been great when we require assistance. Especially when we come across issues that we're not familiar with.
Read full review
Alternatives Considered
Cloudflare
Cloudflare was both the most feature-rich and cost-effective of comparisons. Presales engagement understood our challenges and was keen to solve them.
Read full review
Cyberark
It is known as one of the safest products in the market. It has good support and is also available as on-premise. You can run it virtually on VMWare (and probably on other hypervisors as well). You can have a second instance on bare metal and that makes it a very safe system.
Read full review
Return on Investment
Cloudflare
  • Cloudflare as a multipurpose vendor and solution helped us to replace many overlapped imperfect solutions.
  • Cloudflare gives the company administrator a single pane of glass view which makes his work more effective.
  • Cloudflare makes cloud transformation easier and more effective.
Read full review
Cyberark
  • Decreased the probability of an external cyber attack to privileged accounts..
  • Management can control privileged account life cycle management more effectively
  • Recording privileged sessions allows our organization to play back exactly the point of a breach or malicious behavior
  • Automated system to manage and verify passwords, as privileged accounts are constantly created and deleted
  • Automatic PWD change functionality will substantially decrease probability of PWD theft or misuse.
Read full review
ScreenShots

CyberArk Privileged Access Management Screenshots

Screenshot of ISPSSScreenshot of Privilege CloudScreenshot of Identity Security IntelligenceScreenshot of Identity Security Intelligence