We performed a comparison between CyberArk Privileged Access Manager and SAP Identity Management based on real PeerSpot user reviews.
Find out what your peers are saying about CyberArk, Delinea, BeyondTrust and others in Privileged Access Management (PAM)."You can write different types of policies for custom business needs or any developer needs. If they need certain functions allocated, they can be customized easily."
"CyberArk PAM can be easily automated."
"With CyberArk, you can be fully confident that your existing accounts are secure. You will be 100 percent"
"We have demoted a lot of domain admins and taken a lot of that away from people, giving it a shared account structure."
"Right off the bat, the most valuable feature is the DNA scan. It gives us the ability to scan our environment and find the accounts that we're going to need to take under control."
"All access to our servers by both staff and vendors is monitored and recorded."
"CyberArk has been easy for us to implement and the adoption has been good. We've been able to standardize a bunch of things. We've been able to standardize relatively easily with the use of the platforms and managing the policies."
"For a while, there were individual IDs having privileged access. We wanted to restrict that. We implemented the solution so that it can be more of internal control. We can have session recordings happening and reduce our attacks."
"The most valuable features of SAP Identity Management are business roles and automated user provisioning."
"What's most valuable in SAP Identity Management is that it's easily an out-of-the-box solution for connectivity with SAP applications. We do not have to do any customizations, and this makes the solution very compatible with most SAP applications. SAP Identity Management is also very user-friendly."
"The setup process is straightforward."
"It provides basic automatic user administration and role provisioning to save time."
"Rather than implement a basic SSO, this solution assisted us with setting up two-factor authentication."
"The tool's most valuable features are its access control and approval of access requests. The self-service password reset feature is efficient. Role management capabilities streamline user access by assigning and revoking roles."
"What I like about SAP Identity Management is that it's stable for experienced users and suitable for access management, not just for SAP accounts, but for Active Directory, including file sharing and process sharing."
"What I found most valuable in SAP Identity Management is process automation. The solution also gives transparency about what is happening and why which I find beneficial. Another feature I found valuable in SAP Identity Management is integration. It has very good integration."
"It can be made user-friendly, in the sense of the console is pretty outdated."
"CyberArk Privileged Access Manager could improve the integration docking, it should have more layers. For example, integration with OpenShift."
"Initial setup is complex. Lots of architecture, lots of planning, and lots of education and training are needed."
"Sometimes the infrastructure team is hesitant to provide more resources."
"There was a functionality of the solution that was missing. I had noticed it in Beyond Trust, but not in this solution. But, recently they have incorporated something similar."
"Currently, in Secure Connect, an end user is required to enter account information manually, and cannot save any of this information for future use."
"It needs better documentation with more examples for the configuration files and API/REST integration"
"One of the main things that could be improved would be filtering accounts on the main page and increasing the functionality of the filters. There are some filters on the side which are very specific, but I feel there could be more."
"It needs to have the SSO for the HANA modules that SAP is releasing."
"I have encountered issues with the host authentication feature."
"One of the areas for improvement in the solution is its user interface which needs to be up-to-date and fancier, in particular, have better visualization in terms of the tabs and buttons. The user interface of SAP Identity Management should be improved based on the latest trends."
"The pricing could be better."
"SAP Identity Management can improve risk analysis and authority checks."
"Research and marketing need to be improved."
"What needs improvement in SAP Identity Management is its compatibility with third-party applications. We'd like to get connectors or plugin settings to make it easier to manage other applications, whether SAP or non SAP applications. As SAP Identity Management is not compatible with non SAP applications, some of the clients are looking for other IDM applications such as SalePoint and Saviynt, so this is an issue we've observed in the solution."
"I find SAP Identity Management complicated to use. Maintaining it is also complex."
More CyberArk Privileged Access Manager Pricing and Cost Advice →
CyberArk Privileged Access Manager is ranked 1st in Privileged Access Management (PAM) with 144 reviews while SAP Identity Management is ranked 12th in Identity Management (IM) with 13 reviews. CyberArk Privileged Access Manager is rated 8.8, while SAP Identity Management is rated 7.8. The top reviewer of CyberArk Privileged Access Manager writes "Lets you ensure relevant, compliant access in good time and with an audit trail, yet lacks clarity on MITRE ATT&CK". On the other hand, the top reviewer of SAP Identity Management writes "Allows for seamless integration and provides a unified login experience ". CyberArk Privileged Access Manager is most compared with Cisco ISE (Identity Services Engine), Microsoft Entra ID, Delinea Secret Server, WALLIX Bastion and One Identity Safeguard, whereas SAP Identity Management is most compared with SailPoint Identity Security Cloud, SAP Customer Data Cloud, Microsoft Identity Manager, Saviynt and One Identity Manager.
We monitor all Privileged Access Management (PAM) reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.