We performed a comparison between CyberArk Identity and Omada Identity based on real PeerSpot user reviews.
Find out what your peers are saying about Microsoft, Cisco, Ping Identity and others in Single Sign-On (SSO)."The setup, via cloud, is simple."
"The integration capabilities, ability to integrate CyberArk into the overall IBB strategy of our current clients."
"The initial setup is straightforward. It takes me up to an hour and a half."
"The most valuable features of CyberArk Identity are its ability to control access to administrative staff."
"The tool is a very strong and valuable enterprise solution, particularly in ensuring the continuity of service."
"The tool helps with authentication. It acts as an MFA for any kind of privileged access that occurs in our organization."
"It has machine learning and can help clients to learn the environment and understand what is happening."
"The initial setup of CyberArk Identity was straightforward."
"The teams we work with at Omada provide great insights and support. Overall, it has been a pleasure working with them. That's the part we value the most."
"The most valuable feature is the automatic provisioning and reconciliation of things like the Active Directory groups and memberships."
"The most valuable feature in Omada is the governance. We work with other products and other product vendors, but the sweet spot in the market for Omada is where things are heavy on governance."
"It scales in terms of numbers and types of identities. It can govern the on-premise applications as well as the cloud applications. So, it can manage hybrid environments with all types of identities and various load amounts."
"We are able to onboard new user accounts much faster by automating the process and standardizing our operations globally. Previously, there were many individual processes and manual admin interactions. We also see a lot of cost savings and benefits because through automation and standardization."
"The most valuable feature for us is the ability to set up connectors to various IT systems and offer a wide range of supported connectors."
"Two valuable features of Omada Identity are the ability to discover accounts and link them to identities, and the automatic disabling of inactive accounts or identities."
"We don't have to go in and do a lot of the work that we did before. It may have saved us somewhere in the range of 10 to 30 percent of the time we spent on provisioning access."
"In terms of a governance platform, it's worth noting that CyberArk doesn't offer a particularly strong one."
"They can include the Mobile Device Management (MDM) feature."
"CyberArk Identity could improve by having the ability to better manage the network, such as Cisco. There seem to be some issues in this area."
"The product is not cheap, especially if you opt for an on-premise deployment requiring a complex server infrastructure. On the other hand, choosing the software as a service version simplifies infrastructure requirements but necessitates being online all the time."
"The solution's difficulty in gaining skill sets should be improved because it's a vertical product."
"CyberArk Identity's GUI is an area with certain shortcomings that need improvement."
"There is room for improvement in documentation. The documentation could be more specific about the changes needed to achieve specific goals."
"We would like to see an improvement in the ability to manage mobile devices."
"There's a challenge with handling large amounts of data in this system."
"One thing that we are not so happy about is the user interface. It is a bit dated. I know that they are working on that, but the user interface is quite dated. Currently, it is a little bit difficult to customize the user interface to the need of the business, which is a little bit disappointing. It needs it to be a little bit easier to operate, and it should have a better user interface."
"If you find an error and you need it fixed, you have to upgrade. It's not like they say, "Okay, we'll fix this problem for you." You have to upgrade. The last time we upgraded, because there was an error in a previous version, we had to pay 150,000 Danish Krone (about $24,000 at the time of this review) to upgrade our systems... That means that we have to pay to get errors fixed that Omada has made in programming the system. I hope they change this way of looking at things."
"The user interface could be improved. The interface between Omada and the user is mainly text-based."
"The architecture of the entire system should also be less complex. The way they process the data is complex."
"When making a process, you should be able to use some coding to do some advanced calculations. The calculations you can currently do are too basic. I would also like some additional script features."
"Functionality and usability could be improved."
"If you're running Omada on a cloud service, you may have some issues deploying the newest release. Sometimes, the latest release doesn't adapt to the processes we have already installed. Identity Access Management is a critical system for our organization, and we need to ensure that everyone has the same access as they did before the release."
CyberArk Identity is ranked 10th in Single Sign-On (SSO) with 18 reviews while Omada Identity is ranked 4th in Identity Management (IM) with 46 reviews. CyberArk Identity is rated 8.2, while Omada Identity is rated 8.2. The top reviewer of CyberArk Identity writes "Allows Linux and Unix administrators to login with single password ". On the other hand, the top reviewer of Omada Identity writes "The solution has sped up employee onboarding while reducing manual work". CyberArk Identity is most compared with Microsoft Intune, CyberArk Privileged Access Manager, Microsoft Entra ID, Ping Identity Platform and SailPoint Identity Security Cloud, whereas Omada Identity is most compared with SailPoint Identity Security Cloud, Microsoft Entra ID, Saviynt, One Identity Manager and SAP Identity Management.
We monitor all Single Sign-On (SSO) reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.