Need advice about which tool to choose?Ask the StackShare community!


+ 1

+ 1
Add tool
Get Advice from developers at your company using StackShare Enterprise. Sign up for StackShare Enterprise.
Learn More
Pros of CyberArk
Pros of Vault
    Be the first to leave a pro
    • 16
    • 12
      Variety of Secret Backends
    • 11
      Very easy to set up and use
    • 8
      Dynamic secret generation
    • 5
    • 3
      Leasing and Renewal
    • 3
      Privilege Access Management
    • 2
      Variety of Auth Backends
    • 2
      Easy to integrate with
    • 2
      Open Source
    • 2
      Consol integration
    • 2
      Handles secret sprawl
    • 1

    Sign up to add or upvote prosMake informed product decisions

    - No public GitHub repository available -

    What is CyberArk?

    It is the only security software company focused on eliminating cyber threats using insider privileges to attack the heart of the enterprise.

    What is Vault?

    Vault is a tool for securely accessing secrets. A secret is anything that you want to tightly control access to, such as API keys, passwords, certificates, and more. Vault provides a unified interface to any secret, while providing tight access control and recording a detailed audit log.

    Need advice about which tool to choose?Ask the StackShare community!

    What companies use CyberArk?
    What companies use Vault?
    See which teams inside your own company are using CyberArk or Vault.
    Sign up for StackShare EnterpriseLearn More

    Sign up to get full access to all the companiesMake informed product decisions

    What tools integrate with CyberArk?
    What tools integrate with Vault?

    Sign up to get full access to all the tool integrationsMake informed product decisions

    Blog Posts

    What are some alternatives to CyberArk and Vault?
    It supports a family of privileged identity management, privileged remote access, and vulnerability management products for UNIX, Linux, Windows and Mac OS operating systems.
    Connect all your apps in days, not months, with instant access to thousands of pre-built integrations - even add apps to the network yourself. Integrations are easy to set up, constantly monitored, proactively repaired and handle authentication and provisioning.
    It provides enterprise identity governance solutions with on-premises and cloud-based identity management software for the most complex challenges.
    It is privileged identity management and identity as a service solutions stop the breach by securing access to hybrid enterprises through the power of identity services.
    It is a robust, commercial-grade, and full-featured toolkit for the Transport Layer Security (TLS) and Secure Sockets Layer (SSL) protocols. It is also a general-purpose cryptography library.
    See all alternatives