Try our new research platform with insights from 80,000+ expert users

CyberArk Privileged Access Manager vs RSA Identity Governance and Lifecycle comparison

 

Comparison Buyer's Guide

Executive Summary
 

Categories and Ranking

CyberArk Privileged Access ...
Average Rating
8.6
Number of Reviews
193
Ranking in other categories
User Activity Monitoring (1st), Enterprise Password Managers (2nd), Privileged Access Management (PAM) (1st), Mainframe Security (3rd), Operational Technology (OT) Security (3rd)
RSA Identity Governance and...
Average Rating
6.8
Number of Reviews
9
Ranking in other categories
Identity Management (IM) (23rd)
 

Mindshare comparison

While both are Identity and Access Management solutions, they serve different purposes. CyberArk Privileged Access Manager is designed for Privileged Access Management (PAM) and holds a mindshare of 21.2%, down 24.0% compared to last year.
RSA Identity Governance and Lifecycle, on the other hand, focuses on Identity Management (IM), holds 1.5% mindshare, down 1.5% since last year.
Privileged Access Management (PAM)
Identity Management (IM)
 

Featured Reviews

SatishIyer - PeerSpot reviewer
Jun 21, 2022
Lets you ensure relevant, compliant access in good time and with an audit trail, yet lacks clarity on MITRE ATT&CK
When I was a component owner for PAM's Privileged Threat Analytics (PTA) component, what I wanted was a clear mapping to the MITRE ATT&CK framework, a framework which has a comprehensive list of use cases. We reached out to the vendor and asked them how much coverage they have of the uses cases found on MITRE, which would have given us a better view of things while I was the product owner. Unfortunately they did not have the capability of mapping onto MITRE's framework at that time. PTA is essentially the monitoring interface of the broker (e.g. Privileged Access Management, the Vault, CPM, PSM, etc.), and it's where you can capture your broker bypass and perform related actions. For this reason, we thought that this kind of mapping would be required, but CyberArk informed us that they did not have the capability we had in mind with regard to MITRE ATT&CK. I am not sure what the situation is now, but it would definitely help to have that kind of alignment with one of the more well-known frameworks like MITRE. For CyberArk as a vendor, it would also help them to clearly spell out in which areas they have full functionality and in which ares they have partial or none. Of course, it also greatly benefits the customers when they're evaluating the product.
Harshul Nayak - PeerSpot reviewer
Jun 29, 2022
Lacking customization, poor support, but useful auditing
RSA Identity Governance and Lifecycle can be deployed on the cloud or on-premise. We have our own proprietary cloud solution created along with RSA Identity Governance and Lifecycle and it's deployed on the AWS platform. We use RSA Identity Governance and Lifecycle for a broad level use case for…

Quotes from Members

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
 

Pros

"The password vault and session monitoring are useful."
"Password rotation is the most valuable feature"
"We have demoted a lot of domain admins and taken a lot of that away from people, giving it a shared account structure."
"Enterprise Password Vault, Privilege Session Manager, and Application Identity Management have been very useful for our client environment."
"It's a highly flexible solution that can adapt to each customer's needs."
"Ensures accounts are managed according to corporate policies."
"The PSM is excellent and the ability to write your own connectors and plugins is invaluable as far as flexibility goes."
"It enables companies to automate password management on target systems gaining a more secure access management approach."
"Roles, connectors for provisioning and re-accreditation or reviews help greatly to govern user access."
"With the tool in place, you need to hire fewer people to provide access, and you have control over your processes."
"RSA Identity Governance and lifecycles are good for the access certification and auditing sections."
"The data collection is excellent and easy to do. It does not require a lot of configuration nor does it require rules to be written like other competitors do."
"The most valuable feature is the security, in particular, the One Time Password support."
 

Cons

"There is room for improvement in the availability of custom connectors on the marketplace for this solution. Additionally, their services for the CICD pipeline and ease of integration could be improved."
"Overall what I would really love to see is the third-party PAS reporter tool pulled more into the overall solution, ideally as its own deployable component service installation package."
"To get it to a ten it should give other possibilities to select if you could follow the keystrokes. It should have a flexibility with things where people can use it a lot faster."
"There was a functionality of the solution that was missing. I had noticed it in Beyond Trust, but not in this solution. But, recently they have incorporated something similar."
"The continuous scanning of the assets is limited to Windows and Unix. We like to have the solution scan any databases, network devices, and security devices for privileged accounts. That would be very helpful."
"The solution is too big and complex for any businesses that are small or medium-sized. They should offer a more compact version or make a solution better suited to smaller businesses."
"We need a bit more education for our user community because they are not using it to its capabilities."
"One of our current issues is a publishing issue. If we whitelist Google Chrome, all the events of Google Chrome should be gone. It is not happening."
"Every connector that you have in the product needs to be custom-built, so there are not a lot of standard connectors available in the product, because of which there are a lot of hidden consultancy costs."
"This product is missing a lot of features which other competitors are providing. One of the key features that are missing right now is risk scoring. Additionally, there is not much scope for customization - everything is hard-coded and predefined, so it does not allow the developers to make many modifications."
"If you use the appliance version then it won't handle a huge database volume."
"Technical support in Pakistan can be improved."
"RSA Identity Governance and Lifecycle could improve out-of-the-box customization."
"The user interface and workflow need improvement, and more connectors would help."
"There are scalability issues. This product does not scale very well. It is not a good product for load balancing / active–active architecture."
 

Pricing and Cost Advice

"They have two types of licensing: purchase and subscription. You have to pay for each admin user, such as Microsoft admin, mail admin, database admin, etc."
"This solution is considered to be more expensive than others out there on the market today."
"I would rate the tool’s pricing a six out of ten."
"The price of the solution is reasonable."
"It's expensive, certainly. But CyberArk is the leader in the market with regards to privileged access management. You pay a lot, but you are paying for the value that is being delivered."
"The product’s pricing is feasible for enterprise customers. The pricing is expensive for smaller businesses. You need to pay additional costs for service implementation and local support."
"I would rate CyberArk's pricing a nine out of ten, with one being cheap and ten being expensive. It's one of the most expensive solutions in the market, but it's worth it."
"Generally, I don't get involved in the licensing or the purchasing side of it, but I do know that the licenses are expensive."
"Pricing varies based on user count/number of modules you need."
"I rate the product's price a five on a scale of one to ten, where one is cheap, and ten is expensive."
"We are using the cloud platform, but we don't find it compatible to be served as a multi-tenant platform. This is a large drawback. It becomes expensive because it is then an all-dedicated solution. You have to have a separate tenant for each client, which increases the cost. The overall unit pricing can be less expensive than how it is right now."
report
Use our free recommendation engine to learn which Privileged Access Management (PAM) solutions are best for your needs.
814,763 professionals have used our research since 2012.
 

Top Industries

By visitors reading reviews
Educational Organization
30%
Financial Services Firm
13%
Computer Software Company
11%
Manufacturing Company
6%
Financial Services Firm
28%
Comms Service Provider
10%
Educational Organization
8%
Manufacturing Company
8%
 

Company Size

By reviewers
Large Enterprise
Midsize Enterprise
Small Business
 

Questions from the Community

How does Sailpoint IdentityIQ compare with CyberArk PAM?
We evaluated Sailpoint IdentityIQ before ultimately choosing CyberArk. Sailpoint Identity Platform is a solution to manage risks in cloud enterprise environments. It automates and streamlines the m...
What do you like most about CyberArk Privileged Access Manager?
The most valuable features of the solution are control and analytics.
What is your experience regarding pricing and costs for CyberArk Privileged Access Manager?
CyberArk Privileged Access Manager comes at a high cost. But the solution is worth its price.
What do you like most about RSA Identity Governance and Lifecycle?
With the tool in place, you need to hire fewer people to provide access, and you have control over your processes.
What needs improvement with RSA Identity Governance and Lifecycle?
Every connector that you have in the product needs to be custom-built, so there are not a lot of standard connectors available in the product, because of which there are a lot of hidden consultancy...
What advice do you have for others considering RSA Identity Governance and Lifecycle?
Two of the members of our company's in-house team and a consultant for support were required to take care of the maintenance phase of the product. I rate the overall tool a seven out of ten.
 

Also Known As

CyberArk Privileged Access Security, CyberArk Enterprise Password Vault
SecurID
 

Learn More

 

Overview

 

Sample Customers

Rockwell Automation
NTT Com Asia, Virgin Blue, Bank of Uganda, EMEA Telecommunications Company, LAit (Lazio Innovazione Tecnologica), NyNet, OTP Bank, Red Bull Racing, Rupert House School, Signify, UK Local Authority, Bancolombia, Banco Popular de Puerto Rico (BPPR), TIVIT, Array Services, International Computerware, KPMG LLP, Moffitt Cancer Center
Find out what your peers are saying about CyberArk, Delinea, One Identity and others in Privileged Access Management (PAM). Updated: November 2024.
814,763 professionals have used our research since 2012.