We performed a comparison between CyberArk Privileged Access Manager and OneLogin by One Identity based on real PeerSpot user reviews.
Find out in this report how the two Access Management solutions compare in terms of features, pricing, service and support, easy of deployment, and ROI."CyberArk has allowed us to get the credentials and passwords out of hard-coded property files."
"We have been able to manage application credentials in CyberArk, whether they come as a custom plugin or straight out-of-the-box."
"AIM has been a great help in automating password retrieval which removes the need for hard-coded credentials."
"You can write different types of policies for custom business needs or any developer needs. If they need certain functions allocated, they can be customized easily."
"Technical support is very helpful whenever we have any questions."
"It is one of the best solutions in the market. Ever since I started using this solution, there has not been any compromise when it comes to our lab."
"We are able to centrally manage credentials, touch applications, and rotate passwords."
"The most valuable features of the solution are control and analytics."
"The solution's ability to save and manage of all my passwords is great."
"The single sign-on and the fact that we can integrate everything in one place and control from there were valuable features of this solution."
"Once I made the OneLogin ID, it would essentially make user names and passwords for every application that we had."
"In my role, the most valuable features are two-factor authentication and self-service password reset. The most helpful feature for the institution as a whole is probably the single sign-on. As an IT director, I care about security and ease of use."
"It's super useful to have a single pane of glass when it comes to access management."
"Ease of integration with AD."
"When it comes to access management, the solution's single pane of glass is extremely important. The single pane of glass for access management enables collaborative work between IT and security. We have access to certain applications that require device trust. Based on the role, we can access those applications through OneLogin Desktop."
"Documentation."
"The turnaround time for technical support is lengthy."
"There is a learning curve when it comes to planning out the deployment strategy, but once it is defined, it runs itself."
"Currently, in Secure Connect, an end user is required to enter account information manually, and cannot save any of this information for future use."
"it manages creds based on Organizational Units. That is, a "safe" is limited to specific OUs. That makes for very elaborate OU structure, or you risk exposing too many devices by putting most of them in fewer OUs."
"The web interface has come a long way, but the PrivateArk client seems clunky and not intuitive. It could use an update to be brought up to speed with the usability of PVWA."
"More than the product itself, there is room for improvement in the documentation. The documentation should be very detailed and very structured. It has a lot of good information, on one level, but I feel that it could be more elaborate and more structured."
"We found a lot of errors during the initial setup. They should work to improve the implementation experience and to remove errors from the process."
"This is probably a common thing, but they do ask for a lot of log files, a lot of information. They ask you to provide a lot of information to them before they're willing to give you anything at all upfront. It would be better if they were a little more give-and-take upfront: "Why don't you try these couple of things while we take your log files and stuff and go research them?" A little bit of that might be more helpful."
"having a RESTful implementation instead of RPC would have been more desirable."
"OneLogin offers a Virtual LDAP feature that we utilize, although it differs slightly from traditional LDAP servers."
"This product doesn't necessarily provide us with all of the functionality that we need, such as being able to share passwords with external users."
"We've been experiencing some pain points since the acquisition. For example, there have been some outages we didn't see previously, which are a big topic with my executive team. You have hundreds of applications relying on this service for login. If the service is unavailable, nobody can log into these applications."
"The tool must be made more robust."
"To offboard, you have to manually click on this checklist, each of the checkmarks. It would actually be really nice if, for offboarding someone, you just click "offboard" and it automatically runs a script to do that."
"While I initially used OneLogin's desktop feature to extend SSO, I discontinued it two years ago due to limitations."
"I'd like OneLogin to have a customization section that displays the company's offerings, categorized by different topics."
More CyberArk Privileged Access Manager Pricing and Cost Advice →
CyberArk Privileged Access Manager is ranked 1st in Privileged Access Management (PAM) with 143 reviews while OneLogin by One Identity is ranked 7th in Access Management with 16 reviews. CyberArk Privileged Access Manager is rated 8.8, while OneLogin by One Identity is rated 8.6. The top reviewer of CyberArk Privileged Access Manager writes "Lets you ensure relevant, compliant access in good time and with an audit trail, yet lacks clarity on MITRE ATT&CK". On the other hand, the top reviewer of OneLogin by One Identity writes "Integrated well and had a single pane of glass, but downtime and pricing were issues for us". CyberArk Privileged Access Manager is most compared with Cisco ISE (Identity Services Engine), Microsoft Entra ID, Delinea Secret Server, WALLIX Bastion and One Identity Safeguard, whereas OneLogin by One Identity is most compared with Auth0, Microsoft Entra ID, Okta Workforce Identity, LastPass and One Identity Manager. See our CyberArk Privileged Access Manager vs. OneLogin by One Identity report.
See our list of best Access Management vendors.
We monitor all Access Management reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.