We performed a comparison between CyberArk Privileged Access Manager and Symantec Identity Governance and Administration based on real PeerSpot user reviews.
Find out what your peers are saying about CyberArk, Delinea, BeyondTrust and others in Privileged Access Management (PAM)."We also use CyberArk’s Secrets Manager. Because AWS is the biggest area for us, we have accounts in AWS that are being rotated by CyberArk. We also have a manual process for the most sensitive of our AWS accounts, like root accounts. We've used Secrets Manager on those and that has resulted in a significant risk reduction, as well."
"The most valuable feature of CyberArk Privileged Access Manager is privileged threat analytics."
"AIM has been a great help in automating password retrieval which removes the need for hard-coded credentials."
"We have demoted a lot of domain admins and taken a lot of that away from people, giving it a shared account structure."
"The product is an important security measure against credential theft. It ensures session isolation and password rotation including pushing passwords to the endpoints."
"It enables us to secure accounts and make sure they are compliant."
"The solution helps our developers access internal systems. It also helps us in Privilege Access Management."
"With CyberArk, you can be fully confident that your existing accounts are secure. You will be 100 percent"
"The product is relatively easier to use than other identity management products."
"I like that it is easy to diagnose. It has a version of a virtual appliance so we can download it, run it, configure it, and it would take about 10 to 15 minutes to configure the cluster or so."
"Self-registration and self-service password management are valuable features. The role modeling feature is also very useful. It allows you to model your enterprise role."
"Automated provisioning removes manual labor and manual provisioning."
"Streamlines user access, consolidates applications."
"It offers a nice price. It's mid-range."
"The most valuable features are role-based access and identity provisioning, which allow a single point of user access to multiple places."
"The scalability potential is there if a company needs to expand."
"If you are an administrator or architect, then the solution is kind of complicated, as it is mostly focused on the end user. So, they need to also focus on the people who are implementing it."
"We would, of course, always prefer it if the pricing was cheaper."
"The support services could act faster when people reach out to resolve issues."
"Areas the product could be improved are in some of the reporting capabilities and how the reports are configured."
"Its pricing is a big challenge here. When it started, the product came in at a very low cost. Now, they are the leaders in the market, so the cost has grown and is quite huge."
"One of the main things that could be improved would be filtering accounts on the main page and increasing the functionality of the filters. There are some filters on the side which are very specific, but I feel there could be more."
"We found a lot of errors during the initial setup. They should work to improve the implementation experience and to remove errors from the process."
"If we could have some kind of out-of-the box feature that you can simply say "no" so they don't have to go into a development mode, that would a really helpful feature."
"It has a large footprint which you'd expect to be much, much smaller. Just to run basic services, we have 10 different servers. Also, if it were easier to manage, that'd be useful."
"Provisioning has a dependency on Windows."
"The directory has room for improvement. Also, the dashboards and, in particular, the KPI dashboard that shows the current user’s information needs reworking."
"The support from Symantec Identity Governance and Administration could improve."
"Reporting could be improved."
"Identity Manager has a lack of entitlement support, unlike other products that I have worked with."
"They provide a framework to develop your own connectors. A connector is a piece of software that integrates with the solutions that are not a part of the support matrix. Currently, it is difficult to create these connectors in this solution. Other solutions, such as NetIQ Identity, provide a better way to create your own connector. Currently, there is no cloud version. It should have a cloud version."
"The drawback with the CA Identity Manager is they don't have a connector to HR systems like SAP, or PeopleSoft, or Workday. That's a major drawback with the CA Identity Manager. For that we have to do lots of custom quoting to get data from HR systems. And if they could connect it to GRC systems, that's good to have in an identity product."
More CyberArk Privileged Access Manager Pricing and Cost Advice →
More Symantec Identity Governance and Administration Pricing and Cost Advice →
CyberArk Privileged Access Manager is ranked 1st in Privileged Access Management (PAM) with 142 reviews while Symantec Identity Governance and Administration is ranked 19th in Identity Management (IM) with 65 reviews. CyberArk Privileged Access Manager is rated 8.8, while Symantec Identity Governance and Administration is rated 7.6. The top reviewer of CyberArk Privileged Access Manager writes "Lets you ensure relevant, compliant access in good time and with an audit trail, yet lacks clarity on MITRE ATT&CK". On the other hand, the top reviewer of Symantec Identity Governance and Administration writes "Works well on-premises and has partial capabilities but lacks many feaures". CyberArk Privileged Access Manager is most compared with Cisco ISE (Identity Services Engine), Microsoft Entra ID, Delinea Secret Server, WALLIX Bastion and One Identity Safeguard, whereas Symantec Identity Governance and Administration is most compared with SailPoint IdentityIQ, AlertEnterprise Enterprise Guardian, Microsoft Identity Manager, SAP Identity Management and BeyondTrust Endpoint Privilege Management.
We monitor all Privileged Access Management (PAM) reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.