Predict | Protect | Prevent
ARCON | PAM vs CyberArk
Comparison
www.arconnet.com
Comparison Matrix Predict | Protect | Prevent
Areas Limitations of CyberArk ARCONaddressestheselimitations
Software Based but works well only on certain
dedicated Hardware for all components especially the Software Based and can be installed on VM or Physical
Solution Architecture
PSM Server Server
Network Distributed Architecture with load of session on
Jump Server Based Architecture wherein the Load of
User Desktop which results in high performance and
the sessionisonJumpServerbecause ofARMY of Jump
higher scalability with minimal hardware requirement and
Technology Server i.e. PSM Servers are required for managing the
third party software requirement.
Architecture enterprise environment. This results in additional 3rd
ARCON PAM also supports terminal servers based access
Party License Cost and also the IT Resource to manage
approach anditprovidesbrowserbasedsecure connections
the ARMY of infrastructure
for various technologies.
EndtoEndfromUserMachinetoGatewaytoTarget
Security Need separate module license DevicesSSH Encrypted
ARCON | PAM is multi-Domain Architecture and
Separate Licensing is required for Cloud
Authentication support multi-domain including AD, LDAP, Local
Authentication Support
Account and Cloud Account
www.arconnet.com | 2
Comparison Matrix Predict | Protect | Prevent
Areas Limitations of CyberArk ARCONaddressestheselimitations
No such provision. Users/administrators have to Quick File transfer option provided via connected Linux\Unix
Inbuilt file transfer for
manuallytransfer the files/logs.Need toinstall third part sessions through ARCON PAM. Audit logs provided for same.
Linux\Unix devices tool for file transfer. Using this feature user can simply transfer large/small files
through onboarded Linux\Unix devices.
HA not supported for
High Availability for the Vault is not supported. High Availability for the Vault is supported.
VAULT
ShadowprofilegetscreatedonPAMserverfortheuser
forfirst timeaccess.Allexe,puttyetc are launchedby a
users on the PSM box and itwillbe launched under the
ARCON PAM does not create any profile on terminal\jump
Shadow Profiles shadow profile of user. Once the shadow profile is
server or target device.
createdonserveritstaysonPSMservereveniftheuser
leaves the organization. If someone would get access to
this profile then this can be misused.
ARCON PAM Support Multi tab feature, it allow users to open
multiple session in same window and allow them to switch
Multi-Tab No provision between sessions as required. It also lets users to customize
the view of the devices according to their needs ensuring
greater ease of use.
www.arconnet.com | 3
Comparison Matrix Predict | Protect | Prevent
ARCON | PAM allows customers to consolidating identity,
authentication and access management for Linux and UNIX
AD Bridging No within Microsoft Active Directory without this the
administrator users have to manually go to the individual
Linux and UNIX servers and manage users.
ARCON | PAM comes with in-built dual factor
In-built Dual Factor
authentication tool over Mobile App as well as
Authentication No In-built Dual Factor Authentication Tool integrate with all leading Dual / Multi-Factortooli.e.
capability Bio-Metrics, Access Cards, Retina, Hardware &
Software Tokens, Mobile & SMS OTP
Limitedscalability.Asitrequiresinvestmentfrom ARCON | PAM is most scalable and robust solution
Scalability infrastructureperspectiveconsideringthejump consideringtheNDAArchitecturewithjustaddingthe
serverbasedarchitectureandhaverestrictionon resources to the infrastructure solution is highly
limited number of sessions scalable even managing the double sized infrastructure
Additional Licensing Yes(NodeBased/UserBasedLicensingbasedon Yes, Being Software Based and easy licensing it is
which it is being sold) highly scalablesolution
This has been pain for most of the CyberArk
Total Cost of Being a Software Basedsolution ARCON | PAM TCO can
customers as TCO cannot be derived as it is the
Ownership
resource hungry solution and during disaster time it beeasilyderivedwithconsideringthegrowthof the
has become challenge considering the limitation of infrastructure
session and handling of numberof session
www.arconnet.com | 4
Comparison Matrix Predict | Protect | Prevent
Areas Limitations of CyberArk ARCONaddressestheselimitations
CyberArk Distributor / Sales Partner always sub
contract the implementation to their Enterprise Implementation is done by ARCON
Implementation Implementation Partner which results in multiparty Professional Team
engagement
Limited. Require to procure separate model for 24*7
Support Timing 24*7 support
Connectors Limited Connectors ARCON| PAM provides out-of-the-box connector framework
with more 300 connectors. ARCON | PAM also has its own
connector framework module which helps to create
custom connectors.
Patches & Update Once in a Year ARCON | PAM releases patch every quarterly which comes
Release with Bug Fixes, Enhancement, Features &
Functionalities
www.arconnet.com | 5
Comparison Matrix Predict | Protect | Prevent
Areas Limitations of CyberArk ARCONaddressestheselimitations
Upgrade and Update has to be done by Customers
Upgrade Approach and would need additional services from Partner / ARCON Support Team supports the customers for
Vendor for applying the update and upgrade upgrade and update without any additional cost
High Availability and HA & DR process is very complex and requires a lot ARCON | PAM brings in seamless HA & DR
Disaster Recovery of Manual process & Enterprise Edition Licensing Configuration
for DB
Doesn’t Support
Centralized and De ARCON | PAM supports Centralized and De
Centralized Centralized installation to bring in multi-instance
Implementation support
No search-based capabilities for GUI based video
Keyword based search logs. Text based search for all CLI\GUI session video logs.
in Video logs
Further, CyberArk has struggled to meet customers’ expectations in many areas. Some of the aspects
that customers are not satisfied with CyberArk are mentioned below. (Source: Gartner Peer Insights)
www.arconnet.com | 6
Comparison Matrix Predict | Protect | Prevent
Areas Limitations of CyberArk ARCONaddressestheselimitations
“Too complex to make simple things Loss of time for IT "We could establish visibility and strong review mechanism
users Where is the ROI ?” after implementation Arcos. Major benefit and ROI are the a)
ROI https://www.gartner.com/reviews/market/privileged- Regulatory compliance. b) Customer data privacy. c) Strong
access- review mechanism. d) Visibility e.g - who is doing what etc...."
management/vendor/cyberark/product/privileged- https://www.gartner.com/reviews/market/privileged-access-
access-security-solution/review/view/654718 management/vendor/arcon/product/arcon-privileged-access-
management-suite/review/view/1073443
“It is a little difficult to implement” "A User Friendly And Easy To Implement Tool."
https://www.gartner.com/reviews/market/privileged-
Implementation access- https://www.gartner.com/reviews/market/privileged-access-
management/vendor/cyberark/product/privileged- management/vendor/arcon/product/arcon-privileged-access-
access-security-solution/review/view/923133 management-suite/review/view/1007559
“Lack of documentation on how to extend/customise the “It is a easy to use tool with the proper documentation of
product” admin/client guide which has helped to better understand
Documentation https://www.gartner.com/reviews/market/privileged- tool.Whenever support is required whether regarding any
access- issues or requirement of additional features , team is
management/vendor/cyberark/product/privileged- supportive in providing a fix for the same.”
access-security-solution/review/view/849586 https://www.gartner.com/reviews/market/privileged-access-
management/vendor/arcon/product/arcon-privileged-access-
management-suite/review/view/1014184
www.arconnet.com | 7
Comparison Matrix Predict | Protect | Prevent
ARCON Support
ARCON | PAM has a world class support center which provides global support to its customers with all necessary support,
instructions, tutorials and demonstration to help them learn the solution and and use it seamlessly. Our highly trained support team
is a part of overall Customer Relationship Management (CRM Strategy), who swiftly route customer queries to those points of
contacts who can best serve their queries.
ARCON DNA
Having emerged from the Data Centre and working closely with the grassroot users, ARCON understands the requirements of
both ADMINs and CIOs. The Company’s highly experienced management team has a comprehensive understanding of
Information Security. Having served as CIO, CISO, CTO, Engagement Partner in large multinational corporations, consulting
companies and Defence sector prior to joining ARCON, our team of technology futurists believe that IT risks are dynamic, data
focussed and contextual. Hence, our R&D team is always in a quest of designing contextual Information Security solutions along
with making the product easily deployable.
About ARCON
ARCON | PAM is a leading Information Risk Management solutions provider specializing in Privileged Access Management and Continuous Risk Assessment solutions.
ARCON Privileged Access Management (PAM) is a leading global product and a robust solution that mitigates risks arising out
of privilege identity and access management.
Connect with us
www.arconnet.com | 8