Try our new research platform with insights from 80,000+ expert users

CyberArk Privileged Access Manager vs One Identity Manager comparison

 

Comparison Buyer's Guide

Executive Summary

Review summaries and opinions

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
 

ROI

Sentiment score
7.0
Organizations using CyberArk see improved security, compliance, cost savings, and efficiency in credential management and audits.
Sentiment score
7.7
One Identity Manager boosts productivity and ROI by automating processes, reducing costs, and enhancing security and compliance.
The return on investment lies in improved security infrastructure, addressing over-privileged access, and reducing the risk of credential compromise, which is a major source of data breaches.
During our quantitative analysis, we estimated potential savings of one to ten million dollars a year by using a PAM solution.
With other tools such as Okta where you have self-service for resetting your own passwords and things like that, the average savings is 12 minutes, which is six dollars for a password reset, and you can extrapolate that over your organization.
The return on investment in compliance is clear because inadequate identity management can result in substantial financial penalties for data breaches.
 

Customer Service

Sentiment score
6.4
Customers are generally satisfied with CyberArk's rapid and knowledgeable support, despite some delays in accessing higher-level assistance.
Sentiment score
7.1
One Identity Manager customer service is generally good with variation in expertise and response times based on support levels.
CyberArk has been exceptional in coming back to us with immediate responses.
It could be forever until you talk to someone who knows what they are doing.
They are helpful, but complex issues can take a long time to resolve, which can delay solutions for urgent customer issues.
If I raised a request while they were active, I received responses within an hour.
Their support, in general, is useless most of the time.
It could take a day or some hours depending on the case or the customer.
 

Scalability Issues

Sentiment score
7.7
CyberArk Privileged Access Manager scales efficiently, handling vast accounts, with flexible growth though requires careful initial deployment planning.
Sentiment score
7.4
One Identity Manager excels in scalability and adaptability but faces performance challenges with large datasets and specific environments.
The CPM can reportedly handle up to 50,000 accounts independently without issue.
I would rate it a ten out of ten for scalability.
They had 40,000 passwords in this one safe, and it was saving the last ten iterations of each password object. That means they had 400,000 password objects in this safe. They exceeded the limit.
We could handle about 1,00,000 records for different users.
We are hosting it centrally in Switzerland.
 

Stability Issues

Sentiment score
7.8
CyberArk Privileged Access Manager is stable, with few issues due to environment complexity, praised for performance and effective support.
Sentiment score
7.3
One Identity Manager is stable and efficient but requires proper implementation to avoid issues, especially with customizations.
Proper fine-tuning and expertise ensure the product performs well.
Overall, the stability of the solution is high.
It has a large customer base and positive feedback within my network.
I would rate it a nine out of ten for stability.
Specifically affecting the test and development environments, not the production environment.
 

Room For Improvement

CyberArk Privileged Access Manager needs a user-friendly design, streamlined integration, and improved support to enhance usability and adoption.
One Identity Manager requires UI enhancements, better documentation, improved performance, and streamlined processes for an intuitive user experience.
They want everything to be on the cloud, but even in the SaaS version of CyberArk Privileged Access Manager, they need to deploy some servers on-premises.
We cannot generate a plug-in for web-based applications.
If they want clients to move to the cloud, they need to support them in real-time.
This lack of 24-hour support is problematic from a testing and development standpoint.
In terms of providing a single platform for enterprise-level administration and governance of users, data, and privileged accounts, One Identity is not yet there.
One Identity Manager needs better documentation and more examples, especially for beginners, as it has a steep learning curve.
 

Setup Cost

CyberArk Privileged Access Manager provides strong security and support, justifying its high cost for large enterprises needing advanced features.
One Identity Manager offers competitive pricing for enterprises, being cost-effective compared to SailPoint and IBM, with customizable options.
CyberArk is expensive compared to other products I know.
CyberArk is comparatively expensive compared to other PAM solutions, such as Delinea, especially during renewal.
CyberArk's SaaS solution is particularly expensive.
On-premises might incur higher costs.
On-premises, it is cheap.
The pricing is reasonable compared to other solutions.
 

Valuable Features

CyberArk Privileged Access Manager offers policy automation, session monitoring, API integration, and advanced analytics for streamlined cybersecurity and compliance.
One Identity Manager simplifies configuration and customization, supporting seamless integration, robust security, role-based access, and efficient automation.
CyberArk Privileged Access Manager helps ensure data privacy because we now know who is using which credentials and at what time.
It keeps a record of activities, allowing me to easily fetch screen recordings to detect any misuse and see who did what and what happened.
It can integrate with Splunk, SNMP, and other solutions and technologies.
It ensures high security through multiple approval processes, preventing unauthorized access and enhancing compliance by providing time-based access for privileged accounts with proper audit trails.
It continuously monitors user behavior in real-time, triggering automated responses, and manages secure access for both on-premises and cloud applications using protocols such as SAML.
The best feature of this solution is its flexibility to be customized.
 

Categories and Ranking

CyberArk Privileged Access ...
Average Rating
8.6
Reviews Sentiment
6.9
Number of Reviews
217
Ranking in other categories
User Activity Monitoring (1st), Enterprise Password Managers (2nd), Privileged Access Management (PAM) (1st), Mainframe Security (2nd), Operational Technology (OT) Security (3rd)
One Identity Manager
Average Rating
8.0
Reviews Sentiment
7.0
Number of Reviews
111
Ranking in other categories
User Provisioning Software (2nd), Identity Management (IM) (3rd)
 

Mindshare comparison

While both are Identity and Access Management solutions, they serve different purposes. CyberArk Privileged Access Manager is designed for Privileged Access Management (PAM) and holds a mindshare of 19.4%, down 23.3% compared to last year.
One Identity Manager, on the other hand, focuses on Identity Management (IM), holds 6.5% mindshare, up 6.0% since last year.
Privileged Access Management (PAM)
Identity Management (IM)
 

Featured Reviews

Lasantha Wijesinghe - PeerSpot reviewer
We have visibility and control through real-time user behavior analytics
It took us some time to realize its benefits because there was a learning curve for us. It took us about a year to get our heads around this product and start effectively using it. It is a journey. It takes at least five years for any company to make this product very useful and reach maturity. It is not only the product's fault. The company needs to have a vision, and the company culture needs to go with it. Senior leadership needs to support the vision. You need to have lots of ingredients for success. If everything is in place, you will see success after one year. In the first year, it is a struggle for everybody. My company was bought by a bigger company, and they were very new to privileged access management. Everybody was struggling. The advice I would give is to have a good vision for privileged access management. You need dedicated teams, senior management support, and proper company policies and standards before implementing the solution. Start building knowledge slowly and avoid jumping into the deep end without preparation. I would rate CyberArk Privileged Access Manager a nine out of ten.
Dnyandev Garad - PeerSpot reviewer
Offers a user-friendly experience with an intuitive interface and makes customization a breeze
With centralized user management, data is effortlessly pulled from various systems like SOAR and HR, simplifying user creation and data maintenance. This allows for easy user editing, role assignment based on HR attributes or department affiliation, and streamlined account allocation based on review levels, departments, or the entire organizational structure. Our Access Control in One Identity Manager is 99 percent automated saving us nearly 100 percent of our time. One Identity Manager simplifies SAP administration by providing a centralized view of even logically disconnected SAP accounts. It offers a flexible helpdesk approach. We can either leverage its built-in model or create our own UI accessible to specific teams based on their applications. This ensures each team sees only relevant tickets for their area, streamlining access management for disconnected applications. One Identity Manager can connect SAP accounts to employee identities under governance. One Identity Manager simplifies Identity Governance and Administration for SAP, a complex system to manage in this regard. It empowers us to effectively manage SAP profiles, roles, and groups, ensuring their proper assignment to corresponding SAP accounts. The solution delivers SAP-specialized workflows and business logic. One Identity Manager integrates with its Privilege Access Management solution to provide more granular control. This means we can define different account types within One Identity Manager, such as normal, admin, and privileged accounts. By assigning privileged access only to designated accounts, we can restrict access and permissions and enhance overall security control. One Identity Manager offers a user-friendly experience with an intuitive interface. It even provides a webshop for end users, allowing them to easily request new roles or accounts in various systems with a simple two-click process. Having the right resources makes customization a breeze. While understanding customer needs and translating them into technical specifications requires some processing upfront, One Identity's suite of tools simplifies the actual back-end work. From drag-and-drop interfaces for workflows and reports to scripting and C# coding supported by existing SDKs, customization options cater to all users. This dynamic application provisioning solution uses business roles to map our company's organizational structure. In other words, access to applications is determined solely by our assigned role within the company hierarchy. This role-based approach ensures users only receive the permissions they need based on their specific function, preventing unnecessary access. One Identity Manager streamlines our cloud governance by providing a centralized platform to manage user access permissions across all connected cloud applications. This eliminates the need for individual provisioning for each app, ensuring efficient authorization control. We have significantly improved our compliance posture with One Identity Manager. Previously, auditors identified numerous findings during manual audits, requiring extensive time and resources to address. With One Identity Manager, we've automated the onboarding, offboarding, and joiner processes, achieving a 95 percent closure rate on audit points. This centralized solution streamlines the auditor experience, allowing them to efficiently obtain information from the IAM team, saving both the organization and auditors valuable time. We have minimized inconsistencies in how our governance policies are applied across test, development, and production environments. One Identity Manager helps us create a privileged governance stance to close the security gap between privileged users and standard users by managing those accounts separately. This segregation prevents unauthorized access, as standard accounts cannot hold privileged rights and vice versa. This clear separation helps to close the security gap between these user types. One Identity Manager streamlines our procurement and licensing processes, allowing our initially large operations team to focus on more strategic tasks. By automating license management for connected applications like SAP and Azure Active Directory, the solution eliminates the risk of human error – forgotten access removals for unused licenses are a thing of the past. Now, licenses are automatically assigned and reclaimed based on user activity, ensuring efficient resource allocation. This means new hires receive immediate access, and vacated licenses become readily available, freeing the operations team from manual license management headaches. One Identity Manager streamlines application access decisions by automating the provisioning and de-provisioning of user access based on HR data. This eliminates manual intervention and delays for both HR and department personnel. When an employee changes departments, their access permissions are automatically updated in the identity management system, granting them the necessary tools to perform their new duties immediately. It also streamlines the automation of identity and access controls, making it easier to implement a zero-trust security model where every user and device is verified before granting access. While our audit processes were once cumbersome, requiring auditors to chase down reports from individual SAP administrators, everything is now centralized. One Identity Manager stores all application and database information in a single location, streamlining reconciliation efforts.
report
Use our free recommendation engine to learn which Privileged Access Management (PAM) solutions are best for your needs.
842,672 professionals have used our research since 2012.
 

Top Industries

By visitors reading reviews
Educational Organization
34%
Financial Services Firm
12%
Computer Software Company
11%
Manufacturing Company
6%
Computer Software Company
17%
Financial Services Firm
15%
Government
7%
Manufacturing Company
7%
 

Company Size

By reviewers
Large Enterprise
Midsize Enterprise
Small Business
 

Questions from the Community

How does Sailpoint IdentityIQ compare with CyberArk PAM?
We evaluated Sailpoint IdentityIQ before ultimately choosing CyberArk. Sailpoint Identity Platform is a solution to manage risks in cloud enterprise environments. It automates and streamlines the m...
What do you like most about CyberArk Privileged Access Manager?
The most valuable features of the solution are control and analytics.
What do you like most about One Identity Manager?
The One Identity birthright process has helped generate user accounts more accurately and quickly.
What is your experience regarding pricing and costs for One Identity Manager?
Pricing depends on licensing models, such as per-user licensing and feature-based pricing. Additional models like governance, provisioning, and reporting increase costs. Cloud or on-premises models...
What needs improvement with One Identity Manager?
It can have a clearer navigation map of the user interface and user provisioning. The documentation lacks step-by-step details on common tasks like creating roles, running action reviews, and versi...
 

Also Known As

CyberArk Privileged Access Security, CyberArk Enterprise Password Vault
Quest One Identity Manager
 

Overview

 

Sample Customers

Rockwell Automation
Texas A&M, Sky Media, BHF Bank, Swiss Post, Union Investment, Wayne State University. More at OneIdentity.com/casestudies
Find out what your peers are saying about CyberArk, Delinea, One Identity and others in Privileged Access Management (PAM). Updated: March 2025.
842,672 professionals have used our research since 2012.