Try our new research platform with insights from 80,000+ expert users

CyberArk Privileged Access Manager vs WSO2 Identity Server comparison

 

Comparison Buyer's Guide

Executive Summary

Review summaries and opinions

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
 

Categories and Ranking

CyberArk Privileged Access ...
Average Rating
8.6
Reviews Sentiment
6.9
Number of Reviews
208
Ranking in other categories
User Activity Monitoring (1st), Enterprise Password Managers (3rd), Privileged Access Management (PAM) (1st), Mainframe Security (2nd), Operational Technology (OT) Security (3rd)
WSO2 Identity Server
Average Rating
8.2
Reviews Sentiment
6.9
Number of Reviews
10
Ranking in other categories
Customer Identity and Access Management (CIAM) (11th)
 

Mindshare comparison

While both are Identity and Access Management solutions, they serve different purposes. CyberArk Privileged Access Manager is designed for Privileged Access Management (PAM) and holds a mindshare of 19.7%, down 23.7% compared to last year.
WSO2 Identity Server, on the other hand, focuses on Customer Identity and Access Management (CIAM), holds 2.9% mindshare, down 3.3% since last year.
Privileged Access Management (PAM)
Customer Identity and Access Management (CIAM)
 

Featured Reviews

Lasantha Wijesinghe - PeerSpot reviewer
We have visibility and control through real-time user behavior analytics
It took us some time to realize its benefits because there was a learning curve for us. It took us about a year to get our heads around this product and start effectively using it. It is a journey. It takes at least five years for any company to make this product very useful and reach maturity. It is not only the product's fault. The company needs to have a vision, and the company culture needs to go with it. Senior leadership needs to support the vision. You need to have lots of ingredients for success. If everything is in place, you will see success after one year. In the first year, it is a struggle for everybody. My company was bought by a bigger company, and they were very new to privileged access management. Everybody was struggling. The advice I would give is to have a good vision for privileged access management. You need dedicated teams, senior management support, and proper company policies and standards before implementing the solution. Start building knowledge slowly and avoid jumping into the deep end without preparation. I would rate CyberArk Privileged Access Manager a nine out of ten.
Clement Hsieh - PeerSpot reviewer
Supports API integrations with different systems
My company uses multi-factor authentication and we tried using it integrating with FIDO Server. It was done to make sure that the multi-factor authentication feature gets used during the authentication process. AI can be used for better authentication, but right now, our company has not used any such feature. I recommend the product to others. It is easy to install and easy to use. Understanding a feature before you integrate a tool with other tools is important. In my company, there is another team with five to six engineers that takes care of the support part of the tool. The product has helped me to meet my security management requirements as per ISO 7001. I rate the tool a nine out of ten.

Quotes from Members

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
 

Pros

"It provides an accountability to the individuals who are using it, knowing that it is audited and tracked."
"Securely protects our TAP/NUID and privileged access accounts within the company."
"The automatic change of the password and Privileged Session Manager (PSM) are the most valuable features. With Privileged Session Manager, you can control the password management in a centralized way. You can activate these features in a session; the session isolation and recording. You apply the full intermediation principle. So, you must pass through CyberArk PAM to get access to the target system. You don't need to know the password, and everything that you do is registered and auditable. In this case, no one gets to touch the password directly. Also, you can implement detection and response behavior in case of a breach."
"The ability to monitor privileged accounts throughout the enterprises."
"If any intruder gets inside, they would not be able to move around nor do lateral movements. It minimize any attack problems within our network."
"Its' quite stable."
"The credentials management capability is key to ensuring that the credentials are kept secure and that access to them is done on a temporary and event-driven basis."
"I find value in notifications from CyberArk when passwords fail verification and have other issues."
"The product provides easy integration between API manager and IT server components."
"The solution gets the job done, and we don't have to do the main configuration."
"It's very easy to implement everything."
"Some of the valuable features of the solution are the easy integration with processes, such as Single Sign-On. Overall WSO2 is straightforward and does not need customization."
"The keystore feature has been most valuable for us."
"The product's initial setup phase is easy."
"Comprehensive ecosystem."
"The single sign-on procedure itself, as well as the ability to connect to external user sources such as Microsoft Active Directory and LDAP servers, are the solution's most valuable features."
 

Cons

"Some of the additional features that we are looking at are in the Conjur product. I am specifically discussing key management, API Keys, and things for connecting applications in the CI/CD pipelines."
"There is some stuff that we still have not fully integrated, which is our AIM solution. We are having all types of issues with it. I have been working with Level 3 support on it, but otherwise, from a functionality perspective, everything has been working except for the AIM solution."
"When something comes out, it's generally airtight and works as advertised. However, sometimes they are a little bit slow to keep up with what's coming out. In 2017, for example, they released support for Windows Server 2016, which had been out for a year or so."
"The product is complex and requires extensive configuration."
"The product could be easier to use. More work needs to be done on this aspect; it is not good enough yet. It also takes up a lot of server space. Sometimes we need to use up to seven servers."
"The main challenge was integrating with in-house IT and business applications, which are not standard. We needed to create special updates for that kind of integration."
"The session monitoring and recording feature is also a good feature feature, but we're currently experiencing an issue with session monitoring not working correctly. We're working with CyberArk to resolve it. We aren't able to view active sessions or historical recordings of sessions."
"The solution needs better features for end users to manage their own whitelisting for API retrieval."
"This solution does not have BPM workflows already integrated, we had to integrate the BPM module externally. They do not provide full-featured auditing and certification modules out of the box."
"The solution could improve its development from a user perspective."
"This solution requires extensive knowledge to be used effectively as certain areas of its use are not user friendly."
"I found the initial setup to be very complex."
"Sometimes working with the code is difficult because I search for documentation about the code and how to work with the code, which is where I believe they should improve, by providing some documentation on how to work with the code."
"The price of the product is an area of concern where improvements are required."
"The solution seems to be pretty outdated."
"The solution's licensing model could be more flexible, and pricing could be improved."
 

Pricing and Cost Advice

"The price of CyberArk Privileged Access Manager could be less expensive."
"I would rate the tool’s pricing a six out of ten."
"The main problem for the tool is its licensing. I work for a really big company. When you try to develop this as a service, usually you work with leverage teams who are formed with dozens of members. You might dedicate one FTE, or less, for something, e.g., an antivirus administrator. You might have half an FTE's effort dedicated to administering the antivirus, but then you have a team of about 30 users who might access that ticket. The problem is that CyberArk eliminated the possibility of concurrent users years ago. This is a big problem for companies who work with leverage teams. You need to pay for everyone. 40 licenses are used by 20 or 30 people. This is a big problem because licenses are not precisely cheap."
"I have heard from my leaders that CyberArk is costlier in terms of licensing. The support and maintenance are also costly. We use their premium support, but for the price we pay, we do not get the value."
"Generally, I don't get involved in the licensing or the purchasing side of it, but I do know that the licenses are expensive."
"I do not have any opinions to add about the pricing of the product."
"It's expensive, certainly. But CyberArk is the leader in the market with regards to privileged access management. You pay a lot, but you are paying for the value that is being delivered."
"The license CyberArk Privileged Access Manager is on an annual basis."
"I rate the product price an eight out of ten. There is a need to pay more for the extra features provided by the solution."
"WSO2 Identity Server is not an expensive solution."
"At this time we are working with the open-source version."
"We have to take their support, but that is a minimal charge if I'm comparing it to other identity managers."
"They should bring in some good pricing models to host the marketplace."
"I have found the solutions license is priced competitively compared to others."
report
Use our free recommendation engine to learn which Privileged Access Management (PAM) solutions are best for your needs.
832,138 professionals have used our research since 2012.
 

Top Industries

By visitors reading reviews
Educational Organization
34%
Financial Services Firm
12%
Computer Software Company
11%
Manufacturing Company
6%
Financial Services Firm
18%
Computer Software Company
14%
Comms Service Provider
6%
Government
6%
 

Company Size

By reviewers
Large Enterprise
Midsize Enterprise
Small Business
 

Questions from the Community

How does Sailpoint IdentityIQ compare with CyberArk PAM?
We evaluated Sailpoint IdentityIQ before ultimately choosing CyberArk. Sailpoint Identity Platform is a solution to manage risks in cloud enterprise environments. It automates and streamlines the m...
What do you like most about CyberArk Privileged Access Manager?
The most valuable features of the solution are control and analytics.
What is your experience regarding pricing and costs for CyberArk Privileged Access Manager?
CyberArk Privileged Access Manager is more expensive than its competitors, such as BeyondTrust, Delinea, and ManageEngine PAM360. While ManageEngine PAM360 offers similar flexibility and support at...
What do you like most about WSO2 Identity Server?
The product provides easy integration between API manager and IT server components.
What is your experience regarding pricing and costs for WSO2 Identity Server?
I rate the product price an eight out of ten. There is a need to pay more for the extra features provided by the solution.
What needs improvement with WSO2 Identity Server?
The solution's licensing model could be more flexible, and pricing could be improved.
 

Also Known As

CyberArk Privileged Access Security, CyberArk Enterprise Password Vault
No data available
 

Overview

 

Sample Customers

Rockwell Automation
Nutanix, ELM, AlmavivA, BDigital, StubHub, M-creations, MedVision360
Find out what your peers are saying about CyberArk Privileged Access Manager vs. WSO2 Identity Server and other solutions. Updated: January 2023.
832,138 professionals have used our research since 2012.