We performed a comparison between CyberArk Privileged Access Manager, One Identity Safeguard, and PingID based on real PeerSpot user reviews.
Find out what your peers are saying about CyberArk, Delinea, BeyondTrust and others in Privileged Access Management (PAM)."The technical support for this solution is very good. If I was to rate it on a scale of one to five, I would give it a five."
"There are no issues with scalability. Our clients are very happy to use the product."
"It helps our customers in their software requirement imports."
"Increased our insight into how privileged accounts are being used and distributed within our footprint."
"If any intruder gets inside, they would not be able to move around nor do lateral movements. It minimize any attack problems within our network."
"CyberArk has the ability to change the credentials on every platform."
"The ability to develop and deploy applications with no stored secrets is very valuable."
"It allows users to self-provision access to the accounts that they need."
"The solution transparently integrates into the infrastructure and users do not notice it. I would give this feature the highest rating."
"It offers high availability and enables end users to deploy the solution with 99.999 percent uptime, which is crucial in an enterprise environment with a large number of endpoints."
"Safeguard can define and update processes and procedures into the security framework of a company, including mobile. It allows us to change the policies and configurations on a mass scale in regards to security."
"It's one of the best products we've seen. When you start looking at the functionality and use cases and usability of the product, it's straightforward. They designed this product with the end-user in mind, and they also had the sysadmin who is supporting the product in mind. They really did a nice job. Overall, it's a nice product to work with."
"The transparent mode for privileged sessions is a very good solution."
"I like the discovery functionality and the change password feature through the check-in. I also like the bulk import with the help of templates that come with it out of the box. With the help of these few features, my tasks are made easier."
"The first feature I like about One Identity Safeguard is the live contact point for the VPNs. This has been working very well for us, as it's both highly available and reliable."
"The transparent mode for privileged sessions is one of the best things for customers, because they don't see the system in-between."
"The solution has a smooth and configurable user interface for single sign-on capabilities."
"It gets a mobility portal in place in conjunction with Office 365. It provides very good possibilities and it's much better than other technology that we have used before which was unstable and slower."
"The solution is stable. We haven't experienced any bugs or glitches."
"It provides ease of connecting all our devices."
"I find the auto-discovery feature the most valuable. It helps us automate a lot of things using a single password across applications."
"It's pretty stable as a product."
"The mobile biometric authentication option improved user experience. It's always about security because, with two-factor authentication, it's always a separate device verifying the actual user logging in."
"It is a scalable solution...It is a stable solution."
"We found a lot of errors during the initial setup. They should work to improve the implementation experience and to remove errors from the process."
"There is a bit of a learning curve, but it's a pretty complex solution."
"We'd like to see the creation of some kind of memo field for each device account, which could be used, in our network at least, to leave a note about the device for either the security or network engineering team members."
"The product is very vaulting-focused. I'd love to see it expanding its capabilities a bit further into areas like just-in-time elevation, and access with non-vaulted credentials."
"There was a functionality of the solution that was missing. I had noticed it in Beyond Trust, but not in this solution. But, recently they have incorporated something similar."
"CyberArk has a lot on the privileged access side but they have to concentrate more on the application side as well."
"PAM could be more user-friendly and CyberArk could update the documentation to include more real-world examples. You have to learn it yourself through trial and error. In particular, the online documentation should have more information about troubleshooting."
"The documentation is rather basic and it is missing many use cases."
"The deployment affects our privileged users because it takes a long time for them to request privileges, which impacts the SLA."
"We would like to be able to generate certificate signing requests (CSRs) from the interface for certificates."
"We currently have a problem with the Active Directory integrations on Windows. Some of our users need to be logged with Active Directory, but we are having communication issues between One Identity and Active Directory. It seems that Active Directory is not well-integrated."
"The main thing that needs improvement is the slowness. Apart from that, the change password check-in feature also needs improvement because it is not working perfectly accurately."
"Some of our users find the functionality a bit complex, and it could be made more user-friendly."
"The GUI has room for improvement because it is confusing and cumbersome."
"The automated change of the passwords, which is now integrated, could be improved to be more flexible regarding different systems."
"The multilanguage functionality does not support the Arabic language, even though this solution is deployed in an Arabic region."
"PingID's device management portal should be more easily accessible via a link. They provide no link to the portal like they do for the service. The passwordless functionality could be more comprehensive. You can't filter based on hardware devices. Having that filtering option would be great. Device authentication would be a great feature."
"If the solution is going to compete with Microsoft, they need to offer more unique functionality to keep their current user base."
"The solution should allow for better integration with other platforms and the UBT."
"The product is not customizable."
"I think that the connection with like Microsoft Word, especially for Office 365, is a weak point that could be improved."
"PingID classifies the type of environment into internal and external, which is an area for improvement because you need to take additional steps to trust internal and external users."
"PingID would benefit from a better user interface for integration."
"The timing of the token validity, if it could be extended, would be great. I'm not sure if there is even an option to configure these types of settings."
More CyberArk Privileged Access Manager Pricing and Cost Advice →