Try our new research platform with insights from 80,000+ expert users

CyberArk Privileged Access Manager vs WSO2 Identity Server comparison

 

Comparison Buyer's Guide

Executive Summary

Review summaries and opinions

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
 

Categories and Ranking

CyberArk Privileged Access ...
Average Rating
8.6
Reviews Sentiment
6.9
Number of Reviews
217
Ranking in other categories
User Activity Monitoring (1st), Enterprise Password Managers (2nd), Privileged Access Management (PAM) (1st), Mainframe Security (2nd), Operational Technology (OT) Security (3rd)
WSO2 Identity Server
Average Rating
8.2
Reviews Sentiment
7.1
Number of Reviews
11
Ranking in other categories
Customer Identity and Access Management (CIAM) (11th)
 

Mindshare comparison

While both are Identity and Access Management solutions, they serve different purposes. CyberArk Privileged Access Manager is designed for Privileged Access Management (PAM) and holds a mindshare of 19.0%, down 23.1% compared to last year.
WSO2 Identity Server, on the other hand, focuses on Customer Identity and Access Management (CIAM), holds 2.5% mindshare, down 2.9% since last year.
Privileged Access Management (PAM)
Customer Identity and Access Management (CIAM)
 

Featured Reviews

Lasantha Wijesinghe - PeerSpot reviewer
We have visibility and control through real-time user behavior analytics
It took us some time to realize its benefits because there was a learning curve for us. It took us about a year to get our heads around this product and start effectively using it. It is a journey. It takes at least five years for any company to make this product very useful and reach maturity. It is not only the product's fault. The company needs to have a vision, and the company culture needs to go with it. Senior leadership needs to support the vision. You need to have lots of ingredients for success. If everything is in place, you will see success after one year. In the first year, it is a struggle for everybody. My company was bought by a bigger company, and they were very new to privileged access management. Everybody was struggling. The advice I would give is to have a good vision for privileged access management. You need dedicated teams, senior management support, and proper company policies and standards before implementing the solution. Start building knowledge slowly and avoid jumping into the deep end without preparation. I would rate CyberArk Privileged Access Manager a nine out of ten.
Ritesh_Shah - PeerSpot reviewer
Utilizing key management and seamless single sign-on integration for enhanced user profile management
WSO2 Identity Server's key management feature stands out as a particularly impactful feature for enhancing security. Additionally, from a user perspective, the self-user portal and user profile management capabilities are highly valuable. It allows users to manage their profiles, change passwords, and offers a self-care portal type of functionality. The single sign-on capability integrates seamlessly with various platforms, including Google, Facebook, LDAP, and Active Directory, which supports rapid product launches.

Quotes from Members

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
 

Pros

"The best feature of CyberArk Privileged Access Manager is its core function: automatically managing and securing credentials."
"It is a robust product."
"It gives us the capability to rotate passwords."
"The most important feature is managing the credentials and implementing those policies which rotate the credentials. Session Manager is also key in not letting the users have access to those credentials. Instead, CyberArk actually manages everything by itself."
"It has helped us with our adoption with other teams, and it has also helped us to integrate it at the ground level."
"CyberArk probably has probably the best vault on the market because of the multiple layered security and each password getting its own encryption."
"It is useful for protecting passwords. If you need to do access security management, you can first use the CyberArk console, and after that, you can connect the firewall interface or firewall command line. Similarly, if you need to do an RDP session, you need to first log in to CyberArk before connecting to the Windows RDP session. This way, the admin doesn't know the password, and that password is changed immediately. To change the password, you first discover the old password in the network, and after that, you can change the password."
"We also use CyberArk’s Secrets Manager. Because AWS is the biggest area for us, we have accounts in AWS that are being rotated by CyberArk. We also have a manual process for the most sensitive of our AWS accounts, like root accounts. We've used Secrets Manager on those and that has resulted in a significant risk reduction, as well."
"We use the solution for customer identity management, authenticating customers coming in through a web portal."
"I am completely satisfied with WSO2 Identity Server and would definitely recommend it to other companies."
"The single sign-on procedure itself, as well as the ability to connect to external user sources such as Microsoft Active Directory and LDAP servers, are the solution's most valuable features."
"It's very easy to implement everything."
"Comprehensive ecosystem."
"The solution gets the job done, and we don't have to do the main configuration."
"Some of the valuable features of the solution are the easy integration with processes, such as Single Sign-On. Overall WSO2 is straightforward and does not need customization."
"The product provides easy integration between API manager and IT server components."
 

Cons

"The reporting should be improved. There should be more customization."
"Initially, there was a lot of hiccups, because there were a lot of transitions due to manual installations."
"I would like to see better automation in granting access, better tools, more efficient tools, to be able to customize the solution that CyberArk provides."
"The solution's architecture could be improved. It requires installation on four to five different servers. Each server has a purpose, but when you need to troubleshoot, it can be difficult because you need to access each of them. Reducing the number of servers would be helpful."
"I would like to see an easier way to define delegated roles within the administration of the core product."
"The product documentation has to be more precise in certain aspects with explanations for functionality limitations along with reference material or screenshots."
"I'd like to see a more expansive SSH tunneling situation through PSMP. Right now you have an account that exists in the vault and you say, "I want to create a tunnel using this account." I'd like to see something that is not account-based where I could say, "I want to create a tunnel to this machine over here," and then authenticate through the PSMP and then your tunnel is set up. You wouldn't need to then authenticate to a machine."
"CyberArk Privileged Access Manager could improve the integration docking, it should have more layers. For example, integration with OpenShift."
"The high availability architecture has to be improved."
"There needs to be a good support model and easy-to-understand documentation."
"This solution does not have BPM workflows already integrated, we had to integrate the BPM module externally. They do not provide full-featured auditing and certification modules out of the box."
"This solution requires extensive knowledge to be used effectively as certain areas of its use are not user friendly."
"The solution seems to be pretty outdated."
"The solution's licensing model could be more flexible, and pricing could be improved."
"The solution could improve its development from a user perspective."
"I found the initial setup to be very complex."
 

Pricing and Cost Advice

"CyberArk Enterprise Password Vault is a very expensive product."
"Cost efficiency is the number one thing that can be improved in my mind. This would change lots of companies minds on purchasing the product."
"Quite expensive"
"There are no additional costs other than the standard licensing fees."
"It's per-company, license-based."
"I would rate the cost of CyberArk Privileged Access Manager seven out of ten with ten being the most expensive."
"CyberArk has been Gartner's number-one pick for the past ten years, so you can infer that their pricing is higher than everyone else. When you are the best, you will charge appropriately for it."
"The price of this solution is quite reasonable."
"WSO2 Identity Server is not an expensive solution."
"I have found the solutions license is priced competitively compared to others."
"They should bring in some good pricing models to host the marketplace."
"I rate the product price an eight out of ten. There is a need to pay more for the extra features provided by the solution."
"We have to take their support, but that is a minimal charge if I'm comparing it to other identity managers."
"At this time we are working with the open-source version."
report
Use our free recommendation engine to learn which Privileged Access Management (PAM) solutions are best for your needs.
846,617 professionals have used our research since 2012.
 

Top Industries

By visitors reading reviews
Educational Organization
34%
Financial Services Firm
12%
Computer Software Company
11%
Manufacturing Company
6%
Financial Services Firm
19%
Computer Software Company
14%
Comms Service Provider
7%
Manufacturing Company
6%
 

Company Size

By reviewers
Large Enterprise
Midsize Enterprise
Small Business
 

Questions from the Community

How does Sailpoint IdentityIQ compare with CyberArk PAM?
We evaluated Sailpoint IdentityIQ before ultimately choosing CyberArk. Sailpoint Identity Platform is a solution to manage risks in cloud enterprise environments. It automates and streamlines the m...
What do you like most about CyberArk Privileged Access Manager?
The most valuable features of the solution are control and analytics.
What do you like most about WSO2 Identity Server?
The product provides easy integration between API manager and IT server components.
What is your experience regarding pricing and costs for WSO2 Identity Server?
The pricing is currently the same as the API Manager, so it's not surprising. Since we used it primarily for SSO and the self portal, there were no additional pricing concerns.
What needs improvement with WSO2 Identity Server?
Currently, all required features are supported. If new use cases for artificial intelligence arise, it could be beneficial to incorporate those. However, for our current projects, WSO2 Identity Ser...
 

Also Known As

CyberArk Privileged Access Security, CyberArk Enterprise Password Vault
No data available
 

Overview

 

Sample Customers

Rockwell Automation
Nutanix, ELM, AlmavivA, BDigital, StubHub, M-creations, MedVision360
Find out what your peers are saying about CyberArk Privileged Access Manager vs. WSO2 Identity Server and other solutions. Updated: January 2023.
846,617 professionals have used our research since 2012.