We performed a comparison between CyberArk Privileged Access Manager and Symantec Identity Governance and Administration based on real PeerSpot user reviews.
Find out what your peers are saying about CyberArk, Delinea, BeyondTrust and others in Privileged Access Management (PAM)."The most valuable features of the solution are control and analytics."
"All access to our servers by both staff and vendors is monitored and recorded."
"AIM has been a great help in automating password retrieval which removes the need for hard-coded credentials."
"It provides an accountability to the individuals who are using it, knowing that it is audited and tracked."
"We are able to rotate credentials and have privileged account access."
"It is an extremely scalable solution."
"The threat analytics is an important feature."
"It is a central repository. Therefore, if someone needs to access a server, then they go through CyberArk PAM. It provides a secure way to do this and CyberArk PAM records everything. For example, if you are connecting to a Linux server, then once you get into the Linux server and if it is integrated with CyberArk, it will automatically start recording everything that is being done. In most banks, seeing the recordings is very useful. If there are any gaps or something has happened which shouldn't have happened, then we can check the logs and videos. So, it gives security, in a robust manner, to the organization."
"I like that it is easy to diagnose. It has a version of a virtual appliance so we can download it, run it, configure it, and it would take about 10 to 15 minutes to configure the cluster or so."
"There are many valuable features within the solution. The product is easy to customize. It’s also highly secure."
"The most valuable aspects of Symantec Identity Governance and Administration are all the features, it is the most complete solution on the market. It has features, such as scanners and portals, it has everything."
"Self-registration and self-service password management are valuable features. The role modeling feature is also very useful. It allows you to model your enterprise role."
"It has improved our user management. It is definitely streamlined."
"Word mining and risk campaigns are the most valuable features of this solution."
"The product’s most valuable feature is flexibility. It can be customized as per the customer’s requirements."
"It's a very useful tool that has improved our client's security, from day one."
"It needs better documentation with more examples for the configuration files and API/REST integration"
"The turnaround time for technical support is lengthy."
"The authentication port is available in CyberArk Alero but not Fortinet products."
"it manages creds based on Organizational Units. That is, a "safe" is limited to specific OUs. That makes for very elaborate OU structure, or you risk exposing too many devices by putting most of them in fewer OUs."
"I would like easier integrations for creating an online dashboard that executives would look at or are able to run reports from the tool."
"I'm not a fan of technical support with CyberArk. It's like jumping through red tape and hoops. Quite frankly, it's almost like when you call CyberArk you get the Help Desk or the level-one. I'm a level-one. I got the CCD, I know how to do the initial troubleshooting. When I call CyberArk it's because I can't figure the problem out. So I need a level-two, three, four. I don't need you to tell me, "Hey, open a ticket and then give me logs.""
"CyberArk Privileged Access Manager could improve the integration with other solutions and ease of use. Additionally, there should be a feature to have remote connections without a VPN."
"The initial setup was somewhat complex."
"The product has a lot of need for improvement. Our issues are being raised back to the vendor as enhancements."
"I find the API boring. I also faced issues while integrating with CA SSO."
"A better information display for the approvals within the workflow would give them more information and the ability to comment back on a request as to why they're rejecting it. We've been telling them we'd like this improvement, and we hope to see it."
"Although the capabilities are there, the user interface needs to be redesigned and the opportunities for integration should be improved."
"In the next release, there should be provisioning of your certifications."
"The development process to create this connector is not as easy as I would like."
"Integration capabilities with other solutions and formats, including JSON, could be improved."
"The drawback with the CA Identity Manager is they don't have a connector to HR systems like SAP, or PeopleSoft, or Workday. That's a major drawback with the CA Identity Manager. For that we have to do lots of custom quoting to get data from HR systems. And if they could connect it to GRC systems, that's good to have in an identity product."
More CyberArk Privileged Access Manager Pricing and Cost Advice →
More Symantec Identity Governance and Administration Pricing and Cost Advice →
CyberArk Privileged Access Manager is ranked 1st in Privileged Access Management (PAM) with 144 reviews while Symantec Identity Governance and Administration is ranked 20th in Identity Management (IM) with 65 reviews. CyberArk Privileged Access Manager is rated 8.8, while Symantec Identity Governance and Administration is rated 7.6. The top reviewer of CyberArk Privileged Access Manager writes "Lets you ensure relevant, compliant access in good time and with an audit trail, yet lacks clarity on MITRE ATT&CK". On the other hand, the top reviewer of Symantec Identity Governance and Administration writes "Works well on-premises and has partial capabilities but lacks many feaures". CyberArk Privileged Access Manager is most compared with Cisco ISE (Identity Services Engine), Microsoft Entra ID, Delinea Secret Server, WALLIX Bastion and One Identity Safeguard, whereas Symantec Identity Governance and Administration is most compared with SailPoint Identity Security Cloud, AlertEnterprise Enterprise Guardian, SAP Identity Management, Cisco ISE (Identity Services Engine) and Microsoft Identity Manager.
We monitor all Privileged Access Management (PAM) reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.