We performed a comparison between CyberArk Identity and IBM Cloud Identity Service based on real PeerSpot user reviews.
Find out in this report how the two Identity and Access Management as a Service (IDaaS) (IAMaaS) solutions compare in terms of features, pricing, service and support, easy of deployment, and ROI."The feature that we find most valuable is the ability to integrate multiple IDs for on-premises Active Directory."
"The most valuable feature of CyberArk Identity is the adaptive interface."
"It has machine learning and can help clients to learn the environment and understand what is happening."
"If anyone makes an error, or if an incident occurs by accident, the business will not be harmed as a result of this activity."
"The most valuable features of CyberArk Identity are its ability to control access to administrative staff."
"The user self-service program and the Office 365 provisioning service feature are the most valuable. It is a very easy and feature-rich solution that gives priority to the users and security."
"CyberArk Identity is a mature product."
"The tool helps with authentication. It acts as an MFA for any kind of privileged access that occurs in our organization."
"It is multiple identity and access management, so all of the applications are valuable. It's also part of the automated process."
"It is stable. We can automate many of our daily operations with it, and we don't have to manage many things manually."
"One of the most valuable features of IBM Cloud Identity Service is that it delivers integrations with the commercial SaaS software that's available."
"More integrations would be better."
"In terms of general user feedback, the more security you put in front of a user, the more they complain. So usability and the user experience are always a challenge. So there's always room for improvement."
"The solution's difficulty in gaining skill sets should be improved because it's a vertical product."
"The product is not cheap, especially if you opt for an on-premise deployment requiring a complex server infrastructure. On the other hand, choosing the software as a service version simplifies infrastructure requirements but necessitates being online all the time."
"The solution could be easier to use and I found it to be very complex involving many steps."
"There is room for improvement in documentation. The documentation could be more specific about the changes needed to achieve specific goals."
"CyberArk Identity could improve by having the ability to better manage the network, such as Cisco. There seem to be some issues in this area."
"CyberArk Identity's GUI is an area with certain shortcomings that need improvement."
"The initial setup is complex, it's not straightforward. It takes months because it's not straightforward."
"IBM Cloud Identity Service is going in the right direction with the product. They need to keep building out the integrations and having the library is very critical."
"Everything can be more stable and secure. There could also be more account features. I would like to be able to do more things through it to manage users' accounts."
Earn 20 points
CyberArk Identity is ranked 7th in Identity and Access Management as a Service (IDaaS) (IAMaaS) with 18 reviews while IBM Cloud Identity Service is ranked 26th in Identity and Access Management as a Service (IDaaS) (IAMaaS). CyberArk Identity is rated 8.2, while IBM Cloud Identity Service is rated 8.0. The top reviewer of CyberArk Identity writes "Allows Linux and Unix administrators to login with single password ". On the other hand, the top reviewer of IBM Cloud Identity Service writes "Excellent support, beneficial integration, and low maintenance". CyberArk Identity is most compared with Microsoft Intune, CyberArk Privileged Access Manager, Microsoft Entra ID, Ping Identity Platform and SailPoint Identity Security Cloud, whereas IBM Cloud Identity Service is most compared with Microsoft Entra ID. See our CyberArk Identity vs. IBM Cloud Identity Service report.
See our list of best Identity and Access Management as a Service (IDaaS) (IAMaaS) vendors.
We monitor all Identity and Access Management as a Service (IDaaS) (IAMaaS) reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.