Try our new research platform with insights from 80,000+ expert users

CyberArk Privileged Access Manager vs OpenText Identity Manager comparison

 

Comparison Buyer's Guide

Executive Summary

Review summaries and opinions

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
 

Categories and Ranking

CyberArk Privileged Access ...
Average Rating
8.6
Reviews Sentiment
6.8
Number of Reviews
224
Ranking in other categories
User Activity Monitoring (1st), Enterprise Password Managers (2nd), Privileged Access Management (PAM) (1st), Mainframe Security (2nd), Operational Technology (OT) Security (3rd)
OpenText Identity Manager
Average Rating
8.0
Reviews Sentiment
6.9
Number of Reviews
18
Ranking in other categories
User Provisioning Software (9th), Identity Management (IM) (18th)
 

Mindshare comparison

While both are Identity and Access Management solutions, they serve different purposes. CyberArk Privileged Access Manager is designed for Privileged Access Management (PAM) and holds a mindshare of 17.1%, down 22.3% compared to last year.
OpenText Identity Manager, on the other hand, focuses on User Provisioning Software, holds 3.2% mindshare, down 4.0% since last year.
Privileged Access Management (PAM)
User Provisioning Software
 

Featured Reviews

Abdul Durrani - PeerSpot reviewer
Enables granular and secure access with just-in-time access and Zero Trust model
CyberArk provides a good amount of control over access types. However, as a future enhancement, having additional features for cross-platform integration would be beneficial. It would be good to have integrations with other tools and firewalls, such as Zscaler and CrowdStrike. Although I am not fully aware of recent updates, more cross-platform integration would be valuable. A SOC analyst would like to have centralized access in terms of information flowing in even for privileged access management. They would like to have control over everything instead of opening four to five tabs for different sorts of information. Cross-platform integration would help with that. Customers also want CyberArk's pricing to be better so that they can implement it further and have more licenses. Implementing a privileged access management solution can be challenging. It would be great if CyberArk could provide recommendations based on the compliance standards of an organization. It would help system admins ensure that all the required ports are closed and the systems are being managed properly. If any system is not being used anymore, any ports opened for that system need to be closed. Having such recommendations would be helpful.
SYAMSUL SALAM - PeerSpot reviewer
The product is affordable and easy to use, but the technical support must be improved
The solution is used to manage SSO and login for internal applications The product enables detailed user management. The product is easy to use. Our users found it easier than Microsoft Identity Manager. The solution must add more configurations. There are different types of user identity in…

Quotes from Members

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
 

Pros

"CyberArk probably has probably the best vault on the market because of the multiple layered security and each password getting its own encryption."
"It enables us to secure accounts and make sure they are compliant."
"The most valuable feature is that it always provides flexibility, password quality and one-time user check-in and check-out."
"The most valuable aspects of the solution include password management and Rest API retrieval of vaulted credentials."
"PSM (Privilege Session Manager."
"The best feature is vaulting. CyberArk has a separate vault, which is their proprietary vault, which provides multiple encryptions for every password object, as well as tamper-proof recording."
"CyberArk's capabilities and functionality outperform other solutions."
"CyberArk's support is excellent, providing personalized assistance through a dedicated local account manager and sales engineer."
"The main value lies in the simplicity of implementation, as well as its customized look and feel."
"The most valuable feature of NetIQ Identity Manager for identity synchronization is the ability to provide users with all necessary access on day one through automated provisioning, facilitated by approval workflows."
"The most valuable feature of this solution has been the ability for us to integrate a lot of external systems, and the automatic transfer of a lot of identity information. Additionally, the customization is very good."
"It's a very flexible tool, so you can synchronize multiple sources of data and you have multiple connections to various kinds of systems."
"The access request management has improved significantly in terms of its user interface. What sets it apart from competitors like SailPoint is that it's an event-based solution rather than schedule-based. That's a key differentiator."
"I like the eDirectory feature."
"The product is easy to use."
"NetIQ does not have a limit on the number of users."
 

Cons

"I would prefer that this is a fully-managed service, rather than have to manage the software ourselves and keep it up to date."
"We don't often contact technical support, but when we do it, the response could be faster and better."
"It should be easy to use for non-technical people. Its interface can be a bit difficult. Some parts of its interface are not very intuitive. Some of the controls are hidden, and instead of having a screen with all the controls for that account on it, you have to use menus and other similar things."
"CyberArk Privileged Access Manager could improve the integration docking, it should have more layers. For example, integration with OpenShift."
"It needs better documentation with more examples for the configuration files and API/REST integration"
"Report creation could be improved. The policies could be more customized."
"Performance of PIM could be better and intended for usability as well as security."
"it manages creds based on Organizational Units. That is, a "safe" is limited to specific OUs. That makes for very elaborate OU structure, or you risk exposing too many devices by putting most of them in fewer OUs."
"If it could be operated in such a way that anybody could use it, with just the user interface, and there's no need for programming, then that would be a great improvement."
"NetIQ Identity Manager could improve by updating the user portal, it is out of date."
"The integrations must be made easier."
"The vendor must provide an easier console for configuring things for smaller customers."
"We have another system that is using the SAML system, and we also integrate with Active Directory only. If NetIQ Identity Manager can integrate directly, we would not need to use the Active Directory directory."
"Areas for improvement are further enhancing the access granting process to reduce time and improve accuracy."
"The solution architecture is somewhat complex. For some components, the necessary resilience is not inherent."
"The interface is old and outdated, and the design software seems archaic."
 

Pricing and Cost Advice

"Overall, its pricing is really good. The main difference from all the other vendors is that they have one package that covers all the functionality and modules of the basic PAM, except the add-on modules like adware and server protection. It also doesn't include the licenses for domain controller protection or maybe an API call-related feature. For the basic privileged access management, the bundle pricing is really good, but when it comes to an agent-based solution for advanced cyber protection or application identity managers, it is expensive. Services are also very expensive if you hire the services team from CyberArk, but these guys are really good. For a couple of large banking projects, we had an experience with them. The banks wanted to have things quickly and efficiently, so we had to hire them. If we take four weeks, these guys can do everything on a weekend. They charge quite a big sum of money, but they know the system well."
"If you want a Ferrari, it will cost you. The solution is really nice, so it costs the client, but in the long run, it is very good. If you buy a solution that costs a lot to maintain because it is not stable, and you are frequently asking for consultant support, it costs more."
"CyberArk is very expensive and there are additional fees for add-ons."
"The pricing is slightly higher compared to other solutions, but it is reasonable because there are better security features."
"The solution is very expensive and requires a license. We pay for an enterprise license."
"There are no additional costs other than the standard licensing fees."
"Generally, I don't get involved in the licensing or the purchasing side of it, but I do know that the licenses are expensive."
"Pricing and licensing depend on the environment."
"The solution is quite affordable."
"It would easily help them in getting more market and more customers if more consultants knew about their software. If they could keep it free for schools for teaching purposes, it would be good. I had to pay myself to get it and use it for training. Their competitors are giving it for free. I had to pay for it myself. They are losing market to their competitors."
"The price of the solution is a bit high and could be reduced."
"You just need to be aware that the more systems you connect, the more license fees you have to pay."
"I would rate the pricing a two out of ten, with one being low price and ten being high price. It is significantly more cost-effective than the major players in the market."
"Micro Focus is flexible when it comes to price. The cost varies from customer to customer. There are no additional costs, though. Everything is included."
report
Use our free recommendation engine to learn which Privileged Access Management (PAM) solutions are best for your needs.
861,524 professionals have used our research since 2012.
 

Top Industries

By visitors reading reviews
Computer Software Company
14%
Financial Services Firm
14%
Educational Organization
13%
Manufacturing Company
8%
Computer Software Company
18%
Financial Services Firm
10%
Government
8%
Transportation Company
7%
 

Company Size

By reviewers
Large Enterprise
Midsize Enterprise
Small Business
 

Questions from the Community

How does Sailpoint IdentityIQ compare with CyberArk PAM?
We evaluated Sailpoint IdentityIQ before ultimately choosing CyberArk. Sailpoint Identity Platform is a solution to manage risks in cloud enterprise environments. It automates and streamlines the m...
What do you like most about CyberArk Privileged Access Manager?
The most valuable features of the solution are control and analytics.
What do you like most about NetIQ Identity Manager?
The most valuable feature of NetIQ Identity Manager for identity synchronization is the ability to provide users with all necessary access on day one through automated provisioning, facilitated by ...
What is your experience regarding pricing and costs for NetIQ Identity Manager?
The pricing depends on whether we buy the solution as a service or a license. The license is expensive. If we buy it as a service for a large number of users, it is the cheapest tool we can get. Th...
What needs improvement with NetIQ Identity Manager?
The tool is used mostly in big systems to understand what is happening. There are not many technicians who know how to use the product. The vendor must provide an easier console for configuring thi...
 

Also Known As

CyberArk Privileged Access Security, CyberArk Enterprise Password Vault
Novell Identity Manager
 

Overview

 

Sample Customers

Rockwell Automation
Sheetz
Find out what your peers are saying about CyberArk, Delinea, One Identity and others in Privileged Access Management (PAM). Updated: June 2025.
861,524 professionals have used our research since 2012.