We performed a comparison between CyberArk Identity and CyberArk Privileged Access Manager based on real PeerSpot user reviews.
Find out in this report how the two Access Management solutions compare in terms of features, pricing, service and support, easy of deployment, and ROI."The most valuable feature of CyberArk Identity is the adaptive interface."
"The solution helps with auditing, and monitoring, and integrates with Splunk for log analysis. User activity logs are captured in CyberArk Identity and sent to external tools like Splunk for analysis and monitoring."
"The feature that we find most valuable is the ability to integrate multiple IDs for on-premises Active Directory."
"The initial setup is straightforward. It takes me up to an hour and a half."
"It has machine learning and can help clients to learn the environment and understand what is happening."
"I like the RBAC (Role-Based Access Control). It basically involves defining various roles, and then simply assigning those roles to users."
"The user identification is simplified, and managing user privileges, whether adding or revoking them, is also quite straightforward when utilizing CyberArk SaaS."
"I found the solution to be stable."
"It has the ability to scale out. We have scaled out quite a bit with our product and use of it to get to multiple locations and businesses, so it has the breadth to do that."
"The voice technology is very good."
"With PAM in place, we've experienced a significant reduction in potential security breaches."
"The most important feature is managing the credentials and implementing those policies which rotate the credentials. Session Manager is also key in not letting the users have access to those credentials. Instead, CyberArk actually manages everything by itself."
"I find value in notifications from CyberArk when passwords fail verification and have other issues."
"The central password manager is the most valuable feature because the password is constantly changing. If an outsider threat came in and gained access to one of those passwords, they would not have access for long."
"Technical support is very helpful whenever we have any questions."
"CyberArk has allowed us to get the credentials and passwords out of hard-coded property files."
"We would like to see an improvement in the ability to manage mobile devices."
"CyberArk Identity could improve by having the ability to better manage the network, such as Cisco. There seem to be some issues in this area."
"The solution's difficulty in gaining skill sets should be improved because it's a vertical product."
"The product needs to leverage the cloud more, especially in the financial sector, where cloud adoption might be limited. Proper reporting within the cloud is essential. The tool should be more user-friendly to expedite access for users. The current agent-based system poses challenges if a user loses access to the server, making tasks difficult to perform. It should also improve technical support."
"The tool has issues with the third-party SMS gateway. The solution has its own SMS gateway. Integration support is a challenge when we don’t use their SMS gateway. The tool also needs to improve its scalability."
"More integrations would be better."
"The solution could be easier to use and I found it to be very complex involving many steps."
"The user interface could be improved."
"We had an issue with the Copy feature... Apparently, in version 10, that Copy feature does not work. You actually have to click Show and then copy the password from within Show and then paste it. We've had a million tickets and we had to figure out a workaround to it."
"This is probably a common thing, but they do ask for a lot of log files, a lot of information. They ask you to provide a lot of information to them before they're willing to give you anything at all upfront. It would be better if they were a little more give-and-take upfront: "Why don't you try these couple of things while we take your log files and stuff and go research them?" A little bit of that might be more helpful."
"We would, of course, always prefer it if the pricing was cheaper."
"Tech support staff can be more proactive."
"If we could have some kind of out-of-the box feature that you can simply say "no" so they don't have to go into a development mode, that would a really helpful feature."
"The solution could improve by adding more connectors."
"There were a lot of manual steps in the initial setup which could have been automated. I read the 10.4 release that was sent out about a month or two ago, and I saw the steps required for upgrade have been reduced by about 90%. That was a big thing for me, but I still haven't seen that yet because we have not upgrade past 9.9.5."
"The admin interface of the Password Vault Web Access (PVWA) is moving from an old style (the classic interface) to a new style (the v10 interface) and unfortunately, this process is quite slow."
More CyberArk Privileged Access Manager Pricing and Cost Advice →
CyberArk Identity is ranked 8th in Access Management with 17 reviews while CyberArk Privileged Access Manager is ranked 1st in Privileged Access Management (PAM) with 142 reviews. CyberArk Identity is rated 8.2, while CyberArk Privileged Access Manager is rated 8.8. The top reviewer of CyberArk Identity writes "Allows Linux and Unix administrators to login with single password ". On the other hand, the top reviewer of CyberArk Privileged Access Manager writes "Lets you ensure relevant, compliant access in good time and with an audit trail, yet lacks clarity on MITRE ATT&CK". CyberArk Identity is most compared with Microsoft Intune, Microsoft Entra ID, SailPoint IdentityIQ, PingFederate and VMware Workspace ONE, whereas CyberArk Privileged Access Manager is most compared with Cisco ISE (Identity Services Engine), Microsoft Entra ID, Delinea Secret Server, WALLIX Bastion and F5 BIG-IP Access Policy Manager (APM). See our CyberArk Identity vs. CyberArk Privileged Access Manager report.
See our list of best Access Management vendors.
We monitor all Access Management reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.