Try our new research platform with insights from 80,000+ expert users

CyberArk Identity vs CyberArk Privileged Access Manager comparison

 

Comparison Buyer's Guide

Executive SummaryUpdated on Dec 16, 2024

Review summaries and opinions

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
 

ROI

Sentiment score
7.7
Users report rapid financial returns and effective security with CyberArk Identity, though some lack familiarity to comment on outcomes.
Sentiment score
7.0
Organizations using CyberArk see improved security, compliance, cost savings, and efficiency in credential management and audits.
By the second month, we started seeing the benefits and achieved a return on investment.
The return on investment lies in improved security infrastructure, addressing over-privileged access, and reducing the risk of credential compromise, which is a major source of data breaches.
During our quantitative analysis, we estimated potential savings of one to ten million dollars a year by using a PAM solution.
With other tools such as Okta where you have self-service for resetting your own passwords and things like that, the average savings is 12 minutes, which is six dollars for a password reset, and you can extrapolate that over your organization.
 

Customer Service

Sentiment score
6.2
CyberArk Identity's support is praised for responsiveness, though some users report delays and desire more expert assistance.
Sentiment score
6.4
Customers are generally satisfied with CyberArk's rapid and knowledgeable support, despite some delays in accessing higher-level assistance.
They resolved the problem immediately after I reported it, on the same day, within one hour.
I have had conversations with them twice, and their technical support team was not that good.
There are times when there is a delay in handling my inquiries via email.
CyberArk has been exceptional in coming back to us with immediate responses.
It could be forever until you talk to someone who knows what they are doing.
They are helpful, but complex issues can take a long time to resolve, which can delay solutions for urgent customer issues.
 

Scalability Issues

Sentiment score
7.6
CyberArk Identity is praised for scalability and adaptability, but faces challenges in performance, stability, and support at large scales.
Sentiment score
7.7
CyberArk Privileged Access Manager scales efficiently, handling vast accounts, with flexible growth though requires careful initial deployment planning.
We can use it on different phones and computers, demonstrating its scalability.
By addressing the issues I have highlighted, such as stability and making it bug and lag-free, along with improving customer support, they can enhance its scalability.
The CPM can reportedly handle up to 50,000 accounts independently without issue.
I would rate it a ten out of ten for scalability.
They had 40,000 passwords in this one safe, and it was saving the last ten iterations of each password object. That means they had 400,000 password objects in this safe. They exceeded the limit.
 

Stability Issues

Sentiment score
7.9
CyberArk Identity is highly stable and reliable, though minor glitches and enhanced regional coverage could further improve performance.
Sentiment score
7.8
CyberArk Privileged Access Manager is stable, with few issues due to environment complexity, praised for performance and effective support.
When you have it in the cloud, you have CyberArk every time you need it.
There is a timeout period that I do not like, requiring repeated verification.
With respect to stability, I find that stability is very good.
Proper fine-tuning and expertise ensure the product performs well.
Overall, the stability of the solution is high.
It has a large customer base and positive feedback within my network.
 

Room For Improvement

CyberArk Identity issues include complex setup, weak authentication, poor integration, difficult scalability, and inadequate technical support and customer service.
CyberArk Privileged Access Manager needs a user-friendly design, streamlined integration, and improved support to enhance usability and adoption.
Integration or deployment is extremely difficult for CyberArk Identity.
Something they could improve is the management of multifactor authentication.
To enhance the product, they can consider improving the user interface of the software.
They want everything to be on the cloud, but even in the SaaS version of CyberArk Privileged Access Manager, they need to deploy some servers on-premises.
We cannot generate a plug-in for web-based applications.
If they want clients to move to the cloud, they need to support them in real-time.
 

Setup Cost

CyberArk Identity pricing varies among users but is valued for strong security features by medium and large enterprises.
CyberArk Privileged Access Manager provides strong security and support, justifying its high cost for large enterprises needing advanced features.
I compared it with other products, and it does not require a heavy investment.
Regarding pricing, it can be quite a lot for small companies.
The pricing is acceptable.
CyberArk is expensive compared to other products I know.
CyberArk is comparatively expensive compared to other PAM solutions, such as Delinea, especially during renewal.
CyberArk's SaaS solution is particularly expensive.
 

Valuable Features

CyberArk Identity offers robust security features and integrations at a low cost, enhancing identity management and operational efficiency.
CyberArk Privileged Access Manager offers policy automation, session monitoring, API integration, and advanced analytics for streamlined cybersecurity and compliance.
It impacts zero trust security strategies. It prevents lateral movements in the organization.
It protects our platform, application, network, and infrastructure resources on any device.
It is the most powerful access management system.
CyberArk Privileged Access Manager helps ensure data privacy because we now know who is using which credentials and at what time.
It keeps a record of activities, allowing me to easily fetch screen recordings to detect any misuse and see who did what and what happened.
It can integrate with Splunk, SNMP, and other solutions and technologies.
 

Categories and Ranking

CyberArk Identity
Ranking in Enterprise Password Managers
8th
Average Rating
8.2
Reviews Sentiment
7.0
Number of Reviews
23
Ranking in other categories
Authentication Systems (8th), Identity Management (IM) (11th), Authorization Software (3rd), User Entity Behavior Analytics (UEBA) (9th), Access Management (6th), Active Directory Management (9th), Cloud Resource Access Management (2nd), Customer Identity and Access Management (CIAM) (6th)
CyberArk Privileged Access ...
Ranking in Enterprise Password Managers
2nd
Average Rating
8.6
Reviews Sentiment
6.9
Number of Reviews
217
Ranking in other categories
User Activity Monitoring (1st), Privileged Access Management (PAM) (1st), Mainframe Security (2nd), Operational Technology (OT) Security (3rd)
 

Mindshare comparison

As of April 2025, in the Enterprise Password Managers category, the mindshare of CyberArk Identity is 1.1%, up from 0.7% compared to the previous year. The mindshare of CyberArk Privileged Access Manager is 7.5%, down from 9.4% compared to the previous year. It is calculated based on PeerSpot user engagement data.
Enterprise Password Managers
 

Featured Reviews

Julio Montero - PeerSpot reviewer
Access management system provides strong security and effortless user authentication
The solution can be deployed on cloud or on-premises. CyberArk is more on the cloud than on local hardware. The deployment is initially quite difficult. That said, when you are doing the implementation of CyberArk, there are so many tutorials that make the learning process very easy. The only complaint could be the language barrier. It's difficult if you don't have a very good level of English. Otherwise, it is very easy. You can have it set up within three months without much difficulty. It's hard to get started, however, once you get going, it gets easier. A full deployment takes half a year or less. There is some maintenance necessary. A company is constantly hiring and letting go of employees. The access is always changing, so access must always be adjusted. Or, if we need another law of filter, we would need to add those, or even take them away. That's another aspect of maintenance.
Lasantha Wijesinghe - PeerSpot reviewer
We have visibility and control through real-time user behavior analytics
It took us some time to realize its benefits because there was a learning curve for us. It took us about a year to get our heads around this product and start effectively using it. It is a journey. It takes at least five years for any company to make this product very useful and reach maturity. It is not only the product's fault. The company needs to have a vision, and the company culture needs to go with it. Senior leadership needs to support the vision. You need to have lots of ingredients for success. If everything is in place, you will see success after one year. In the first year, it is a struggle for everybody. My company was bought by a bigger company, and they were very new to privileged access management. Everybody was struggling. The advice I would give is to have a good vision for privileged access management. You need dedicated teams, senior management support, and proper company policies and standards before implementing the solution. Start building knowledge slowly and avoid jumping into the deep end without preparation. I would rate CyberArk Privileged Access Manager a nine out of ten.
report
Use our free recommendation engine to learn which Enterprise Password Managers solutions are best for your needs.
842,767 professionals have used our research since 2012.
 

Top Industries

By visitors reading reviews
Financial Services Firm
17%
Computer Software Company
13%
Manufacturing Company
11%
Healthcare Company
6%
Educational Organization
34%
Financial Services Firm
12%
Computer Software Company
11%
Manufacturing Company
6%
 

Company Size

By reviewers
Large Enterprise
Midsize Enterprise
Small Business
 

Questions from the Community

What do you like most about CyberArk Identity?
The integration capabilities, ability to integrate CyberArk into the overall IBB strategy of our current clients.
What is your experience regarding pricing and costs for CyberArk Identity?
The pricing is acceptable. It is worth considering what we are protecting with the amount charged.
What needs improvement with CyberArk Identity?
To enhance the product, they can consider improving the user interface of the software and possibly the customer support team. Sometimes, there is a delay in handling my inquiries via email, which ...
How does Sailpoint IdentityIQ compare with CyberArk PAM?
We evaluated Sailpoint IdentityIQ before ultimately choosing CyberArk. Sailpoint Identity Platform is a solution to manage risks in cloud enterprise environments. It automates and streamlines the m...
What do you like most about CyberArk Privileged Access Manager?
The most valuable features of the solution are control and analytics.
 

Also Known As

Idaptive
CyberArk Privileged Access Security, CyberArk Enterprise Password Vault
 

Overview

 

Sample Customers

MLB, Citi, Pfizer, SulAmerica, GE Capital, Shiseido
Rockwell Automation
Find out what your peers are saying about CyberArk Identity vs. CyberArk Privileged Access Manager and other solutions. Updated: March 2025.
842,767 professionals have used our research since 2012.