Try our new research platform with insights from 80,000+ expert users

CyberArk Identity vs CyberArk Privileged Access Manager comparison

 

Comparison Buyer's Guide

Executive SummaryUpdated on Dec 16, 2024
 

Categories and Ranking

CyberArk Identity
Ranking in Enterprise Password Managers
9th
Average Rating
8.2
Reviews Sentiment
7.0
Number of Reviews
19
Ranking in other categories
Authentication Systems (9th), Identity Management (IM) (13th), Authorization Software (4th), User Entity Behavior Analytics (UEBA) (9th), Access Management (9th), Active Directory Management (11th), Cloud Resource Access Management (2nd), Customer Identity and Access Management (CIAM) (5th)
CyberArk Privileged Access ...
Ranking in Enterprise Password Managers
3rd
Average Rating
8.6
Reviews Sentiment
6.9
Number of Reviews
197
Ranking in other categories
User Activity Monitoring (1st), Privileged Access Management (PAM) (1st), Mainframe Security (2nd), Operational Technology (OT) Security (3rd)
 

Featured Reviews

Avinash Gopu. - PeerSpot reviewer
Allows Linux and Unix administrators to login with single password
The solution helps with auditing, and monitoring, and integrates with Splunk for log analysis. User activity logs are captured in CyberArk Identity and sent to external tools like Splunk for analysis and monitoring. It is integrated with tools like Splunk and Dynatrace for the analysis of risk behavior and user activity. The pushing teams receive automated reports to assess factors such as login times and server activity in the last 60 days. The licensing for IAM and PAM tools is based on headcount and usage. Users who are not actively utilizing the resources may have their access revoked. This approach helps manage budgeting and reduces the risk impact on the organization by implementing protocols to mitigate threats.
SatishIyer - PeerSpot reviewer
Lets you ensure relevant, compliant access in good time and with an audit trail, yet lacks clarity on MITRE ATT&CK
When I was a component owner for PAM's Privileged Threat Analytics (PTA) component, what I wanted was a clear mapping to the MITRE ATT&CK framework, a framework which has a comprehensive list of use cases. We reached out to the vendor and asked them how much coverage they have of the uses cases found on MITRE, which would have given us a better view of things while I was the product owner. Unfortunately they did not have the capability of mapping onto MITRE's framework at that time. PTA is essentially the monitoring interface of the broker (e.g. Privileged Access Management, the Vault, CPM, PSM, etc.), and it's where you can capture your broker bypass and perform related actions. For this reason, we thought that this kind of mapping would be required, but CyberArk informed us that they did not have the capability we had in mind with regard to MITRE ATT&CK. I am not sure what the situation is now, but it would definitely help to have that kind of alignment with one of the more well-known frameworks like MITRE. For CyberArk as a vendor, it would also help them to clearly spell out in which areas they have full functionality and in which ares they have partial or none. Of course, it also greatly benefits the customers when they're evaluating the product.

Quotes from Members

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
 

Pros

"If anyone makes an error, or if an incident occurs by accident, the business will not be harmed as a result of this activity."
"CyberArk Identity is a mature product."
"The integration capabilities, ability to integrate CyberArk into the overall IBB strategy of our current clients."
"The feature that we find most valuable is the ability to integrate multiple IDs for on-premises Active Directory."
"I found the solution to be stable."
"The setup, via cloud, is simple."
"It has machine learning and can help clients to learn the environment and understand what is happening."
"The most valuable features of CyberArk Identity are its ability to control access to administrative staff."
"I really like the PTA (Privileged Threat Analytics). I find this the best feature."
"The most valuable features of CyberArk Enterprise Password Vault are password rotations and password encryptions."
"The solution is highly stable."
"The voice technology is very good."
"It's highly secure and very flexible. It gives us all types of storage options and it gives us a high level of security."
"Right off the bat, the most valuable feature is the DNA scan. It gives us the ability to scan our environment and find the accounts that we're going to need to take under control."
"Technical support has been very responsive in navigating challenges. It is very easy to open a ticket."
"We are maintaining compliance in PCI, SOX and HIPPA, which is a big thing. Auditors really like it, and it has made us stay compliant."
 

Cons

"The tool has issues with the third-party SMS gateway. The solution has its own SMS gateway. Integration support is a challenge when we don’t use their SMS gateway. The tool also needs to improve its scalability."
"There is room for improvement in documentation. The documentation could be more specific about the changes needed to achieve specific goals."
"The user interface could be improved."
"We would like to see an improvement in the ability to manage mobile devices."
"The product is not cheap, especially if you opt for an on-premise deployment requiring a complex server infrastructure. On the other hand, choosing the software as a service version simplifies infrastructure requirements but necessitates being online all the time."
"They can include the Mobile Device Management (MDM) feature."
"The OpenID features could improve in CyberArk Identity."
"I'm not sure what needs improvement. It is a good platform."
"The solution is too complicated to use and should be simplified. It took me a long time to understand how to use it. There is a lot that the solution can improve for the future."
"Some aspects of the administration need improvement, though they have recently made improvements to the API. However, the management with the interface and configuration are not so user-friendly. It has not changed much during all the years that CyberArk has been on the market. The management part, like platform management as well as PSM connectors definition and management, could be improved, even if it has already been done with the API."
"The session monitoring and recording feature is also a good feature feature, but we're currently experiencing an issue with session monitoring not working correctly. We're working with CyberArk to resolve it. We aren't able to view active sessions or historical recordings of sessions."
"The initial setup could be simplified. Right now, in comparison to its nearest competitors, it's quite complex."
"The solution could improve by adding more connectors."
"Stability is a huge concern right now. We are on a version which is very unstable. We have to upgrade to stabilize it. It is fine, but the problem is we have to hire CyberArk to do the upgrade. This costs money, and it is their bug."
"Many of the infrastructure folks who use the product dislike it because it complicates their workflow. They get a little less control, and they have to go through a specific solution. It proactively logs in for them, which obfuscates some of the issues that they may be troubleshooting."
"The solution is too big and complex for any businesses that are small or medium-sized. They should offer a more compact version or make a solution better suited to smaller businesses."
 

Pricing and Cost Advice

"Their pricing is obviously a lot higher than many vendors in the marketplace but their service is also unmatched."
"There is an initial license and then there is a subscription needed."
"There could be some additional costs apart from the licensing costs of the solution when you want to develop connectors in CyberArk Identity."
"In terms of pricing, BeyondTrust and CyberArk tend to be more expensive, with CyberArk receiving an eight out of ten, in this regard."
"We find that the pricing and licensing of this solution is adequate, as compared to the other competitors in the market."
"I would rate the tool’s pricing a seven out of ten. The product’s pricing is expensive and is on a yearly basis. You will need to pay around 10,000 GBP for 500 users."
"The solution is cheap and I rate its pricing an eight out of ten."
"CyberArk Identity is an expensive solution."
"Overall, its pricing is really good. The main difference from all the other vendors is that they have one package that covers all the functionality and modules of the basic PAM, except the add-on modules like adware and server protection. It also doesn't include the licenses for domain controller protection or maybe an API call-related feature. For the basic privileged access management, the bundle pricing is really good, but when it comes to an agent-based solution for advanced cyber protection or application identity managers, it is expensive. Services are also very expensive if you hire the services team from CyberArk, but these guys are really good. For a couple of large banking projects, we had an experience with them. The banks wanted to have things quickly and efficiently, so we had to hire them. If we take four weeks, these guys can do everything on a weekend. They charge quite a big sum of money, but they know the system well."
"This solution is considered to be more expensive than others out there on the market today."
"Quite expensive"
"Pricing is a problem. CyberArk is expensive compared to other products I know. It is similar to buying a German car. It comes with all the bells and whistles, but some companies may find it too expensive."
"Pricing is quite high and it could be improved."
"CyberArk Privileged Access Manager is on the expensive side. It is very expensive."
"There are no additional costs other than the standard licensing fees."
"Before we bought it, they were licensing each function individually, which got complicated and very expensive. When we decided to buy it, it was much more straightforward and still quite expensive, but it brings a lot of value and risk reduction to the organization."
report
Use our free recommendation engine to learn which Enterprise Password Managers solutions are best for your needs.
823,875 professionals have used our research since 2012.
 

Top Industries

By visitors reading reviews
Financial Services Firm
15%
Computer Software Company
13%
Manufacturing Company
11%
Insurance Company
7%
Educational Organization
32%
Financial Services Firm
12%
Computer Software Company
11%
Manufacturing Company
6%
 

Company Size

By reviewers
Large Enterprise
Midsize Enterprise
Small Business
 

Questions from the Community

What do you like most about CyberArk Identity?
The integration capabilities, ability to integrate CyberArk into the overall IBB strategy of our current clients.
What is your experience regarding pricing and costs for CyberArk Identity?
I think it is a fairly priced tool. I rate the tool between six and seven on a scale of one to ten where one is expensive, and ten is cheap.
What needs improvement with CyberArk Identity?
At the moment CyberArk needs to enrich Conjur and it needs to be made more viable so that its adoption can be made much faster.
How does Sailpoint IdentityIQ compare with CyberArk PAM?
We evaluated Sailpoint IdentityIQ before ultimately choosing CyberArk. Sailpoint Identity Platform is a solution to manage risks in cloud enterprise environments. It automates and streamlines the m...
What do you like most about CyberArk Privileged Access Manager?
The most valuable features of the solution are control and analytics.
What is your experience regarding pricing and costs for CyberArk Privileged Access Manager?
CyberArk Privileged Access Manager comes at a high cost. But the solution is worth its price.
 

Also Known As

Idaptive
CyberArk Privileged Access Security, CyberArk Enterprise Password Vault
 

Learn More

 

Overview

 

Sample Customers

MLB, Citi, Pfizer, SulAmerica, GE Capital, Shiseido
Rockwell Automation
Find out what your peers are saying about CyberArk Identity vs. CyberArk Privileged Access Manager and other solutions. Updated: December 2024.
823,875 professionals have used our research since 2012.