We performed a comparison between CyberArk Privileged Access Manager, IBM Security Identity Governance and Intelligence, and Keeper based on real PeerSpot user reviews.
Find out what your peers are saying about CyberArk, Delinea, BeyondTrust and others in Privileged Access Management (PAM)."The flexibility of integrating with other technologies is important because of a lot of applications - a lot of COTS products - are not supported when we are bringing the application IDs. The CyberArk platform provides a lot of opportunities to do customization."
"It is very simple to use."
"We are maintaining compliance in PCI, SOX and HIPPA, which is a big thing. Auditors really like it, and it has made us stay compliant."
"Central Password Manager is useful for agentless automated password management through AD integration as well as endpoints for different devices."
"CyberArk is a very stable product and it's a stable product because it has a simple design and a simple architecture that allows you to leverage the economies of scale across the base of your infrastructure that you already have implemented. It doesn't really introduce any new complex pieces of infrastructure that would make it that much more difficult to scale."
"You can easily manage more than 4000 accounts with one PSM."
"The central password manager is the most valuable feature because the password is constantly changing. If an outsider threat came in and gained access to one of those passwords, they would not have access for long."
"I found it valuable that CyberArk Privileged Access Manager can be integrated with PTA (privileged threat analytics), and this means that it will tell you if there's a risk to the logins and signs of risk and if risky behavior is observed. It's a good feature. Another good feature is the CPM (central password manager) because it helps you rotate the passwords automatically without involving the admins. It can go and update the scheduled tasks and the services. At the same time, if there's an application where it cannot do all of these, CPM will trigger an automatic email to the application owners, telling them that they should go ahead and change the password. This allows you to manage the account password that CyberArk cannot manage, which helps mitigate the risk of old passwords, where the password gets compromised, and also allows you to manage the security of the domain."
"I would rate the price eight out of 10, with 10 as the best value for money."
"Lifecycle management, governance and documentation."
More IBM Security Identity Governance and Intelligence Pros →
"Keeper was user-friendly."
"Chrome extension and app."
"It syncs with all devices and supports all platforms."
"Auto login across platforms allows for no copying and pasting."
"Password sharing and SSO. These features almost become a necessity to make sure that company data is safe and reduce the possibility of data breach."
"Possibility to login using the fingerprint sensor on Android/iPhone."
"I like a couple of things about this solution. Being able to share passwords with other people is valuable. You can see if the information is out on the dark web and whether you have weak passwords and the last time they were changed. You could also have the 2FA or MFA codes embedded in the application so that you don't have to use your phone or any other 2FA device, which is something very important."
"Can create folders for specific types of information (i.e., work, personal, and school)."
"Tech support staff can be more proactive."
"I would like to see is the policy export and import. When we expend, we do not want to just hand do a policy."
"Our DevOps team is looking in the direction of cloud, because we are not in it today. We are hoping to build it with Conjur from the ground up."
"I would like to see improvement in the custom connector for integration with different devices."
"This product needs professional consulting services to onboard accounts effectively based user profiles."
"Integration with the ticketing system should allow any number of fields to be used for validation before allowing a user to be evaluated and able to access a server."
"The product documentation has to be more precise in certain aspects with explanations for functionality limitations along with reference material or screenshots."
"The initial setup was a bit complex."
"Self service center is not always easy to understand."
"The solution is a bit pricey for some regions."
More IBM Security Identity Governance and Intelligence Cons →
"The technical support for this solution could be faster support and improved if they had a better understanding of my questions."
"Keeper does not provide password management for mobile apps."
"Maybe a sort of category organizer to help with organizing passwords for different things, such as banking, medical, shopping, and school."
"Needs to improve KeeperFill on iOS."
"They could possibly add a pre-designed contact feature that would work similar to a cell phone contact feature."
"Ability to store 'files' from IOS & Android devices. You can store pics from these devices currently. Most file formats can be uploaded from PC's/Macs"
"It would be nice to see this great tool integrate with other tools out there."
"Ability to set up password profiles that can predefine custom fields and password complexity."
More CyberArk Privileged Access Manager Pricing and Cost Advice →
More IBM Security Identity Governance and Intelligence Pricing and Cost Advice →