Try our new research platform with insights from 80,000+ expert users

CyberArk Privileged Access Manager vs IBM Security Identity Governance and Intelligence comparison

 

Comparison Buyer's Guide

Executive Summary

Review summaries and opinions

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
 

Categories and Ranking

CyberArk Privileged Access ...
Average Rating
8.6
Reviews Sentiment
6.9
Number of Reviews
217
Ranking in other categories
User Activity Monitoring (1st), Enterprise Password Managers (2nd), Privileged Access Management (PAM) (1st), Mainframe Security (2nd), Operational Technology (OT) Security (3rd)
IBM Security Identity Gover...
Average Rating
7.6
Reviews Sentiment
6.7
Number of Reviews
2
Ranking in other categories
User Provisioning Software (13th), Identity Management (IM) (28th)
 

Mindshare comparison

While both are Identity and Access Management solutions, they serve different purposes. CyberArk Privileged Access Manager is designed for Privileged Access Management (PAM) and holds a mindshare of 19.0%, down 23.1% compared to last year.
IBM Security Identity Governance and Intelligence, on the other hand, focuses on User Provisioning Software, holds 1.7% mindshare, down 2.1% since last year.
Privileged Access Management (PAM)
User Provisioning Software
 

Featured Reviews

Lasantha Wijesinghe - PeerSpot reviewer
We have visibility and control through real-time user behavior analytics
It took us some time to realize its benefits because there was a learning curve for us. It took us about a year to get our heads around this product and start effectively using it. It is a journey. It takes at least five years for any company to make this product very useful and reach maturity. It is not only the product's fault. The company needs to have a vision, and the company culture needs to go with it. Senior leadership needs to support the vision. You need to have lots of ingredients for success. If everything is in place, you will see success after one year. In the first year, it is a struggle for everybody. My company was bought by a bigger company, and they were very new to privileged access management. Everybody was struggling. The advice I would give is to have a good vision for privileged access management. You need dedicated teams, senior management support, and proper company policies and standards before implementing the solution. Start building knowledge slowly and avoid jumping into the deep end without preparation. I would rate CyberArk Privileged Access Manager a nine out of ten.
Siraz Shaik - PeerSpot reviewer
Clear evaluation and life cycle management; service center could be more user friendly
Our primary use case is for publishing and our customer has somewhere between 3,000-4,000 users. We're partners with IBM and I work as a security consultant.  This solution has a very good dashboard and the documentation is also very good. Life cycle management and governance are also good…

Quotes from Members

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
 

Pros

"I feel that CyberArk Privileged Access Manager has a very well-stabilized connection, and the user interface is very good. The monitoring and data retrieval services are easy to understand."
"CyberArk has been easy for us to implement and the adoption has been good. We've been able to standardize a bunch of things. We've been able to standardize relatively easily with the use of the platforms and managing the policies."
"Our privileged accounts are now stored in a more secure location and lateral movement within the network have been lessened."
"All the features of CyberArk are useful for me, but the biggest one is that CyberArk has logs for all the features. That is important when there is a problem. You know where to look and you have the information. In cyber security, the most important aspect is information."
"Creating policies and the password rotation feature have been valuable. We don't have to memorize our password for the ADM account."
"I appreciate CyberArk's real-time capabilities. I can secure critical sessions, such as SSH or database sessions."
"The main feature of CyberArk Privileged Access Manager is the ability to manage who has access to what and when, especially with shared accounts."
"I really like the PTA (Privileged Threat Analytics). I find this the best feature."
"Lifecycle management, governance and documentation."
"I would rate the price eight out of 10, with 10 as the best value for money."
 

Cons

"The web access piece needs improvement. We have version 9.5 or 9.9.5, and now we have to upgrade to version 10."
"If there is an area that has room for improvement, it's probably working with their support and getting people on the phone. That is hard to do with most products in general, but that seems to be the difficult area. The product is fantastic, but sometimes we want somebody on the phone."
"The current user interface is a little dated. However, I hear there are changes coming in the next version."
"Some of the additional features that we are looking at are in the Conjur product. I am specifically discussing key management, API Keys, and things for connecting applications in the CI/CD pipelines."
"They are sometimes not flexible with things. For instance, from one day to another, there might be something that had been done years ago by CyberArk, then they say, "We do not support that." You then have to initiate a complaint and start working with them. Things might become complicated and months pass while you are working with them. Usually, they are good and fast, but sometimes they seem to be blocked with problems, e.g., you will suddenly be working with another team instead of the team that you were working with the day before."
"The main challenge was integrating with in-house IT and business applications, which are not standard. We needed to create special updates for that kind of integration."
"When something comes out, it's generally airtight and works as advertised. However, sometimes they are a little bit slow to keep up with what's coming out. In 2017, for example, they released support for Windows Server 2016, which had been out for a year or so."
"The solution's architecture could be improved. It requires installation on four to five different servers."
"The solution is a bit pricey for some regions."
"Self service center is not always easy to understand."
 

Pricing and Cost Advice

"The license CyberArk Privileged Access Manager is on an annual basis."
"It costs us around $200 per user."
"CyberArk Privileged Access Manager is on the expensive side. It is very expensive."
"CyberArk Privileged Access Manager is more expensive than its competitors, such as BeyondTrust, Delinea, and ManageEngine PAM360."
"Compared to other solutions, it is costly."
"CyberArk Enterprise Password Vault's pricing is reasonable."
"No, I do not have any advice on the price of the product."
"Network and security licenses are currently being managed by other outsource vendors, so they are facing some type of problems in the digital aspect."
"I would rate the price eight out of 10, with 10 as the best value for money."
report
Use our free recommendation engine to learn which Privileged Access Management (PAM) solutions are best for your needs.
842,767 professionals have used our research since 2012.
 

Top Industries

By visitors reading reviews
Educational Organization
34%
Financial Services Firm
12%
Computer Software Company
11%
Manufacturing Company
6%
Financial Services Firm
22%
Government
15%
Computer Software Company
14%
Insurance Company
6%
 

Company Size

By reviewers
Large Enterprise
Midsize Enterprise
Small Business
No data available
 

Questions from the Community

How does Sailpoint IdentityIQ compare with CyberArk PAM?
We evaluated Sailpoint IdentityIQ before ultimately choosing CyberArk. Sailpoint Identity Platform is a solution to manage risks in cloud enterprise environments. It automates and streamlines the m...
What do you like most about CyberArk Privileged Access Manager?
The most valuable features of the solution are control and analytics.
Ask a question
Earn 20 points
 

Also Known As

CyberArk Privileged Access Security, CyberArk Enterprise Password Vault
IGI, IBM Security Identity Manager, ISIM
 

Overview

 

Sample Customers

Rockwell Automation
E.ON Global Commodities
Find out what your peers are saying about CyberArk, Delinea, One Identity and others in Privileged Access Management (PAM). Updated: March 2025.
842,767 professionals have used our research since 2012.