Try our new research platform with insights from 80,000+ expert users

CyberArk Privileged Access Manager vs WSO2 Identity Server comparison

 

Comparison Buyer's Guide

Executive Summary

Review summaries and opinions

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
 

Categories and Ranking

CyberArk Privileged Access ...
Average Rating
8.6
Reviews Sentiment
6.9
Number of Reviews
214
Ranking in other categories
User Activity Monitoring (1st), Enterprise Password Managers (2nd), Privileged Access Management (PAM) (1st), Mainframe Security (2nd), Operational Technology (OT) Security (3rd)
WSO2 Identity Server
Average Rating
8.2
Reviews Sentiment
6.9
Number of Reviews
10
Ranking in other categories
Customer Identity and Access Management (CIAM) (11th)
 

Mindshare comparison

While both are Identity and Access Management solutions, they serve different purposes. CyberArk Privileged Access Manager is designed for Privileged Access Management (PAM) and holds a mindshare of 19.4%, down 23.3% compared to last year.
WSO2 Identity Server, on the other hand, focuses on Customer Identity and Access Management (CIAM), holds 2.7% mindshare, down 3.1% since last year.
Privileged Access Management (PAM)
Customer Identity and Access Management (CIAM)
 

Featured Reviews

Lasantha Wijesinghe - PeerSpot reviewer
We have visibility and control through real-time user behavior analytics
It took us some time to realize its benefits because there was a learning curve for us. It took us about a year to get our heads around this product and start effectively using it. It is a journey. It takes at least five years for any company to make this product very useful and reach maturity. It is not only the product's fault. The company needs to have a vision, and the company culture needs to go with it. Senior leadership needs to support the vision. You need to have lots of ingredients for success. If everything is in place, you will see success after one year. In the first year, it is a struggle for everybody. My company was bought by a bigger company, and they were very new to privileged access management. Everybody was struggling. The advice I would give is to have a good vision for privileged access management. You need dedicated teams, senior management support, and proper company policies and standards before implementing the solution. Start building knowledge slowly and avoid jumping into the deep end without preparation. I would rate CyberArk Privileged Access Manager a nine out of ten.
Clement Hsieh - PeerSpot reviewer
Supports API integrations with different systems
My company uses multi-factor authentication and we tried using it integrating with FIDO Server. It was done to make sure that the multi-factor authentication feature gets used during the authentication process. AI can be used for better authentication, but right now, our company has not used any such feature. I recommend the product to others. It is easy to install and easy to use. Understanding a feature before you integrate a tool with other tools is important. In my company, there is another team with five to six engineers that takes care of the support part of the tool. The product has helped me to meet my security management requirements as per ISO 7001. I rate the tool a nine out of ten.

Quotes from Members

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
 

Pros

"We also use CyberArk’s Secrets Manager. Because AWS is the biggest area for us, we have accounts in AWS that are being rotated by CyberArk. We also have a manual process for the most sensitive of our AWS accounts, like root accounts. We've used Secrets Manager on those and that has resulted in a significant risk reduction, as well."
"The most valuable feature of the solution is session recording."
"The solution is highly stable."
"The combination of CPM and PSM resolves a lot of use cases."
"I found it valuable that CyberArk Privileged Access Manager can be integrated with PTA (privileged threat analytics), and this means that it will tell you if there's a risk to the logins and signs of risk and if risky behavior is observed. It's a good feature. Another good feature is the CPM (central password manager) because it helps you rotate the passwords automatically without involving the admins. It can go and update the scheduled tasks and the services. At the same time, if there's an application where it cannot do all of these, CPM will trigger an automatic email to the application owners, telling them that they should go ahead and change the password. This allows you to manage the account password that CyberArk cannot manage, which helps mitigate the risk of old passwords, where the password gets compromised, and also allows you to manage the security of the domain."
"The solution is very good for protecting full levels of data privacy."
"We like it for the ability to automatically change passwords. At least for my group, that's the best thing."
"The established sessions on the target systems are fully isolated and the privileged account credentials are never exposed to the end-users or their client applications and devices."
"The solution gets the job done, and we don't have to do the main configuration."
"We use the solution for customer identity management, authenticating customers coming in through a web portal."
"Some of the valuable features of the solution are the easy integration with processes, such as Single Sign-On. Overall WSO2 is straightforward and does not need customization."
"I would rate the solution's stability eight or nine out of ten."
"The product provides easy integration between API manager and IT server components."
"The single sign-on procedure itself, as well as the ability to connect to external user sources such as Microsoft Active Directory and LDAP servers, are the solution's most valuable features."
"Comprehensive ecosystem."
"It's very easy to implement everything."
 

Cons

"It should be easier to install. It is a comprehensive product, which makes it difficult to install. You need to have their consulting services in order to get it all installed and set up correctly because there is so much going on. It would be nice if there were an easier way to do the installation without professional services. I suspect they get a fair amount of their money from professional services. So, there is not a huge incentive."
"Some of the additional features that we are looking at are in the Conjur product. I am specifically discussing key management, API Keys, and things for connecting applications in the CI/CD pipelines."
"The product is complex and requires extensive configuration."
"The authentication port is available in CyberArk Alero but not Fortinet products."
"The current interface doesn't scale that well, and has some screens still in the old layout."
"The architecture needs to be improved."
"We need a bit more education for our user community because they are not using it to its capabilities."
"There is room for improvement in the pricing model."
"The solution could improve its development from a user perspective."
"Sometimes working with the code is difficult because I search for documentation about the code and how to work with the code, which is where I believe they should improve, by providing some documentation on how to work with the code."
"The solution's licensing model could be more flexible, and pricing could be improved."
"I found the initial setup to be very complex."
"The price of the product is an area of concern where improvements are required."
"The solution seems to be pretty outdated."
"This solution requires extensive knowledge to be used effectively as certain areas of its use are not user friendly."
"The high availability architecture has to be improved."
 

Pricing and Cost Advice

"Although CyberArk Privileged Access Management is expensive, its protection capabilities outweigh the cost."
"From a client perspective, CyberArk's pricing is fair but there is a significant increase each year. They should limit the price increase because this could potentially drive customers to other partners. Price changes should be at defined intervals. There should not be sudden jumps."
"CyberArk Privileged Access Manager is on the expensive side. It is very expensive."
"It is not a cheap solution. It is expensive as compared with other solutions. However, it is one of the best solutions in their domain."
"There are no additional costs other than the standard licensing fees."
"I would rate CyberArk's pricing a nine out of ten, with one being cheap and ten being expensive. It's one of the most expensive solutions in the market, but it's worth it."
"I haven't seen the numbers. I know it is not cheap, but I don't know what it is. I would rate it a six out of ten in terms of pricing. It is definitely more expensive than the other product, but it also provides more functionality, and it is modular too. So, we pay for the functionality we're actually going to use, and that's nice."
"Overall, its pricing is really good. The main difference from all the other vendors is that they have one package that covers all the functionality and modules of the basic PAM, except the add-on modules like adware and server protection. It also doesn't include the licenses for domain controller protection or maybe an API call-related feature. For the basic privileged access management, the bundle pricing is really good, but when it comes to an agent-based solution for advanced cyber protection or application identity managers, it is expensive. Services are also very expensive if you hire the services team from CyberArk, but these guys are really good. For a couple of large banking projects, we had an experience with them. The banks wanted to have things quickly and efficiently, so we had to hire them. If we take four weeks, these guys can do everything on a weekend. They charge quite a big sum of money, but they know the system well."
"I rate the product price an eight out of ten. There is a need to pay more for the extra features provided by the solution."
"At this time we are working with the open-source version."
"I have found the solutions license is priced competitively compared to others."
"We have to take their support, but that is a minimal charge if I'm comparing it to other identity managers."
"WSO2 Identity Server is not an expensive solution."
"They should bring in some good pricing models to host the marketplace."
report
Use our free recommendation engine to learn which Privileged Access Management (PAM) solutions are best for your needs.
841,302 professionals have used our research since 2012.
 

Top Industries

By visitors reading reviews
Educational Organization
34%
Financial Services Firm
12%
Computer Software Company
11%
Manufacturing Company
5%
Financial Services Firm
19%
Computer Software Company
15%
Comms Service Provider
6%
University
5%
 

Company Size

By reviewers
Large Enterprise
Midsize Enterprise
Small Business
 

Questions from the Community

How does Sailpoint IdentityIQ compare with CyberArk PAM?
We evaluated Sailpoint IdentityIQ before ultimately choosing CyberArk. Sailpoint Identity Platform is a solution to manage risks in cloud enterprise environments. It automates and streamlines the m...
What do you like most about CyberArk Privileged Access Manager?
The most valuable features of the solution are control and analytics.
What is your experience regarding pricing and costs for CyberArk Privileged Access Manager?
I focus more on the technical side, but I hear customers say that if CyberArk was more affordable, they might have acquired more licenses. Some clients consider alternative solutions due to pricing...
What do you like most about WSO2 Identity Server?
The product provides easy integration between API manager and IT server components.
What is your experience regarding pricing and costs for WSO2 Identity Server?
I rate the product price an eight out of ten. There is a need to pay more for the extra features provided by the solution.
What needs improvement with WSO2 Identity Server?
The solution's licensing model could be more flexible, and pricing could be improved.
 

Also Known As

CyberArk Privileged Access Security, CyberArk Enterprise Password Vault
No data available
 

Overview

 

Sample Customers

Rockwell Automation
Nutanix, ELM, AlmavivA, BDigital, StubHub, M-creations, MedVision360
Find out what your peers are saying about CyberArk Privileged Access Manager vs. WSO2 Identity Server and other solutions. Updated: January 2023.
841,302 professionals have used our research since 2012.