Try our new research platform with insights from 80,000+ expert users

CyberArk Privileged Access Manager vs WSO2 Identity Server comparison

 

Comparison Buyer's Guide

Executive Summary
 

Categories and Ranking

CyberArk Privileged Access ...
Average Rating
8.6
Reviews Sentiment
6.9
Number of Reviews
197
Ranking in other categories
User Activity Monitoring (1st), Enterprise Password Managers (3rd), Privileged Access Management (PAM) (1st), Mainframe Security (2nd), Operational Technology (OT) Security (3rd)
WSO2 Identity Server
Average Rating
8.2
Number of Reviews
10
Ranking in other categories
Customer Identity and Access Management (CIAM) (9th)
 

Mindshare comparison

While both are Identity and Access Management solutions, they serve different purposes. CyberArk Privileged Access Manager is designed for Privileged Access Management (PAM) and holds a mindshare of 20.9%, down 23.8% compared to last year.
WSO2 Identity Server, on the other hand, focuses on Customer Identity and Access Management (CIAM), holds 4.0% mindshare, down 4.4% since last year.
Privileged Access Management (PAM)
Customer Identity and Access Management (CIAM)
 

Featured Reviews

SatishIyer - PeerSpot reviewer
Lets you ensure relevant, compliant access in good time and with an audit trail, yet lacks clarity on MITRE ATT&CK
When I was a component owner for PAM's Privileged Threat Analytics (PTA) component, what I wanted was a clear mapping to the MITRE ATT&CK framework, a framework which has a comprehensive list of use cases. We reached out to the vendor and asked them how much coverage they have of the uses cases found on MITRE, which would have given us a better view of things while I was the product owner. Unfortunately they did not have the capability of mapping onto MITRE's framework at that time. PTA is essentially the monitoring interface of the broker (e.g. Privileged Access Management, the Vault, CPM, PSM, etc.), and it's where you can capture your broker bypass and perform related actions. For this reason, we thought that this kind of mapping would be required, but CyberArk informed us that they did not have the capability we had in mind with regard to MITRE ATT&CK. I am not sure what the situation is now, but it would definitely help to have that kind of alignment with one of the more well-known frameworks like MITRE. For CyberArk as a vendor, it would also help them to clearly spell out in which areas they have full functionality and in which ares they have partial or none. Of course, it also greatly benefits the customers when they're evaluating the product.
Clement Hsieh - PeerSpot reviewer
Supports API integrations with different systems
My company uses multi-factor authentication and we tried using it integrating with FIDO Server. It was done to make sure that the multi-factor authentication feature gets used during the authentication process. AI can be used for better authentication, but right now, our company has not used any such feature. I recommend the product to others. It is easy to install and easy to use. Understanding a feature before you integrate a tool with other tools is important. In my company, there is another team with five to six engineers that takes care of the support part of the tool. The product has helped me to meet my security management requirements as per ISO 7001. I rate the tool a nine out of ten.

Quotes from Members

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
 

Pros

"Rather than multiple tools for maintaining regulatory compliance around passwords and privileged accounts, we have centralized as much as possible with CyberArk. This is now a one stop shop for end users to access their elevated credentials."
"I love how easily we could operate within Password Vault and get things done. It was almost effortless."
"The implementation of the PSM proxy has reduced the specific risk of "insider attacks" on our domain controllers and SLDAP servers by eliminating direct user login by an open secure connection on the user's behalf without ever revealing the privileged credentials."
"Service count rotation is probably one of my favorite features... The ability to automatically rotate any password I need to really helps with the entire enterprise strategy that we're pushing right now."
"It provides an accountability to the individuals who are using it, knowing that it is audited and tracked."
"You can gradually implement CyberArk, starting with more easily attainable goals."
"The product has allowed us to improve both the management and access to privileged credentials, while also creating a full audit trail of all activities happening within isolated sessions of all tasks and activities taking place within the solution."
"The product is an important security measure against credential theft. It ensures session isolation and password rotation including pushing passwords to the endpoints."
"We use the solution for customer identity management, authenticating customers coming in through a web portal."
"I would rate the solution's stability eight or nine out of ten."
"The product provides easy integration between API manager and IT server components."
"It's very easy to implement everything."
"The solution gets the job done, and we don't have to do the main configuration."
"Comprehensive ecosystem."
"The product's initial setup phase is easy."
"The single sign-on procedure itself, as well as the ability to connect to external user sources such as Microsoft Active Directory and LDAP servers, are the solution's most valuable features."
 

Cons

"What needs to be improved in CyberArk Enterprise Password Vault is their customer support, particularly in terms of responsiveness, willingness to help, and being more understanding. The initial setup and upgrade process for the solution is complex and can only be done by CyberArk, so this is another area for improvement."
"Report creation could be improved. The policies could be more customized."
"We need a bit more education for our user community because they are not using it to its capabilities."
"There was a situation when one of our presidents had an issue, but I can't recall the specifics."
"They can do a better job in the PSM space."
"CyberArk Privileged Access Manager could improve the integration docking, it should have more layers. For example, integration with OpenShift."
"The lead product has a slow process. There are some reports and requirements from CyberArk which are not readily available as an applicable solution. We have made consistent management requests in the logs."
"The initial setup could be simpler but it may not be as effective."
"Sometimes working with the code is difficult because I search for documentation about the code and how to work with the code, which is where I believe they should improve, by providing some documentation on how to work with the code."
"This solution requires extensive knowledge to be used effectively as certain areas of its use are not user friendly."
"The price of the product is an area of concern where improvements are required."
"There needs to be a good support model and easy-to-understand documentation."
"The solution's licensing model could be more flexible, and pricing could be improved."
"I found the initial setup to be very complex."
"The high availability architecture has to be improved."
"The solution could improve its development from a user perspective."
 

Pricing and Cost Advice

"If you are looking at implementing this solution, buy the training and go to it."
"The solution is cost-effective for the features."
"This solution is expensive."
"The cost is high compared to other products."
"The price of CyberArk support could be a little bit less. Otherwise, pricing is fine."
"It is in line with its competitors, but all such solutions cost too much money."
"CyberArk is one of the best PAM solutions and one of the most expensive, but it works better than the others, so the pricing is fair."
"The solution is costly but we get what we pay for."
"At this time we are working with the open-source version."
"WSO2 Identity Server is not an expensive solution."
"I have found the solutions license is priced competitively compared to others."
"I rate the product price an eight out of ten. There is a need to pay more for the extra features provided by the solution."
"We have to take their support, but that is a minimal charge if I'm comparing it to other identity managers."
"They should bring in some good pricing models to host the marketplace."
report
Use our free recommendation engine to learn which Privileged Access Management (PAM) solutions are best for your needs.
824,067 professionals have used our research since 2012.
 

Top Industries

By visitors reading reviews
Educational Organization
32%
Financial Services Firm
12%
Computer Software Company
11%
Manufacturing Company
6%
Financial Services Firm
18%
Computer Software Company
13%
Government
7%
Comms Service Provider
6%
 

Company Size

By reviewers
Large Enterprise
Midsize Enterprise
Small Business
 

Questions from the Community

How does Sailpoint IdentityIQ compare with CyberArk PAM?
We evaluated Sailpoint IdentityIQ before ultimately choosing CyberArk. Sailpoint Identity Platform is a solution to manage risks in cloud enterprise environments. It automates and streamlines the m...
What do you like most about CyberArk Privileged Access Manager?
The most valuable features of the solution are control and analytics.
What is your experience regarding pricing and costs for CyberArk Privileged Access Manager?
CyberArk Privileged Access Manager comes at a high cost. But the solution is worth its price.
What do you like most about WSO2 Identity Server?
The product provides easy integration between API manager and IT server components.
What is your experience regarding pricing and costs for WSO2 Identity Server?
I rate the product price an eight out of ten. There is a need to pay more for the extra features provided by the solution.
What needs improvement with WSO2 Identity Server?
The solution's licensing model could be more flexible, and pricing could be improved.
 

Also Known As

CyberArk Privileged Access Security, CyberArk Enterprise Password Vault
No data available
 

Learn More

 

Overview

 

Sample Customers

Rockwell Automation
Nutanix, ELM, AlmavivA, BDigital, StubHub, M-creations, MedVision360
Find out what your peers are saying about CyberArk Privileged Access Manager vs. WSO2 Identity Server and other solutions. Updated: January 2023.
824,067 professionals have used our research since 2012.