Compare CA Identity Manager (CA IDM) vs. CyberArk PAS

CA Identity Manager (CA IDM) is ranked 5th in Identity Management (IM) with 8 reviews while CyberArk PAS is ranked 1st in Privileged Access Management with 53 reviews. CA Identity Manager (CA IDM) is rated 7.4, while CyberArk PAS is rated 9.0. The top reviewer of CA Identity Manager (CA IDM) writes "We can tune, add, and build where we need to with this product". On the other hand, the top reviewer of CyberArk PAS writes "Gives us the security of all credentials in one place and lightens our administrative load". CA Identity Manager (CA IDM) is most compared with SailPoint IdentityIQ, ForgeRock and Oracle Identity Governance, whereas CyberArk PAS is most compared with BeyondTrust Endpoint Privilege Management, SailPoint IdentityIQ and Cisco ISE (Identity Services Engine).
Cancel
You must select at least 2 products to compare!
Most Helpful Review
Anonymous User
Find out what your peers are saying about One Identity, SailPoint, Microsoft and others in Identity Management (IM). Updated: November 2019.
379,241 professionals have used our research since 2012.
Quotes From Members

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:

Pros
Word mining and risk campaigns are the most valuable features of this solution.When comparing it to other products, you can set up CA IAM in a PoC very quickly to demonstrate its provisioning capabilities.It is easy to use, and does not requires an extensive programming or development background.We can tune, add, and build where we need to.The most valuable feature that we have is our almost real-time feed from our HR systems into CA Identity Manager, which then feeds down to all of our directories or applications that an employee could potentially need to access.​It has improved our user management. It is definitely streamlined​.Streamlines user access, consolidates applications.It has good endpoint support and endpoint connectivity to different versioning endpoints.

Read more »

The Password Upload Utility tool makes it easier when setting up a Safe that contains multiple accounts and has cut down the amount of time that it takes to complete the task.For a while, there were individual IDs having privileged access. We wanted to restrict that. We implemented the solution so that it can be more of internal control. We can have session recordings happening and reduce our attacks.There are no issues with scalability. Our clients are very happy to use the product.We are maintaining compliance in PCI, SOX and HIPPA, which is a big thing. Auditors really like it, and it has made us stay compliant.We are able to know who is accessing what and when; having accountability.This solution is quite stable.The most valuable feature is that it always provides flexibility, password quality and one-time user check-in and check-out.I really like the PTA (Privileged Threat Analytics). I find this the best feature.

Read more »

Cons
In the next release, there should be provisioning of your certifications.The product has a lot of need for improvement. Our issues are being raised back to the vendor as enhancements.The drawback with the CA Identity Manager is they don't have a connector to HR systems like SAP, or PeopleSoft, or Workday. That's a major drawback with the CA Identity Manager. For that we have to do lots of custom quoting to get data from HR systems. And if they could connect it to GRC systems, that's good to have in an identity product.Needs more cloud integration, which hopefully will be coming soon.Provisioning has a dependency on Windows.​The Identity tool needs to do more kinds of reporting for audit purposes. It doesn't really track any of the metrics that are useful to us, at this point.Identity Manager has a lack of entitlement support, unlike other products that I have worked with.We would like to see integration with analytics. Also, for them to be more efficient regarding discovering and implementing new rules.

Read more »

Currently, in Secure Connect, an end user is required to enter account information manually, and cannot save any of this information for future use.Integration with the ticketing system should allow any number of fields to be used for validation before allowing a user to be evaluated and able to access a server.The initial setup of CyberArk is a challenge if you do not have prior experience with it.Make it easier to deploy.I think having a distributed architecture would certainly help this solution.There was a functionality of the solution that was missing. I had noticed it in Beyond Trust, but not in this solution. But, recently they have incorporated something similar.If we could have some kind of out-of-the box feature that you can simply say "no" so they don't have to go into a development mode, that would a really helpful feature.Tech support staff can be more proactive.

Read more »

Pricing and Cost Advice
The connector is free, and bundled with the product.

Read more »

In comparison to other products on the market, CyberArk is a more costly product.This solution is considered to be more expensive than others out there on the market today.I do not have any opinions to add about the pricing of the product.No, I do not have any advice on the price of the product.Network and security licenses are currently being managed by other outsource vendors, so they are facing some type of problems in the digital aspect.With reducing the privileged account access, there has been a huge improvement. They are now bringing more accounts on a little at a time.If you are looking at implementing this solution, buy the training and go to it.Our risk is definitely significantly lower. Also, our resources are low.

Read more »

report
Use our free recommendation engine to learn which Identity Management (IM) solutions are best for your needs.
379,241 professionals have used our research since 2012.
Ranking
5th
Views
4,184
Comparisons
2,228
Reviews
8
Average Words per Review
355
Avg. Rating
7.4
Views
30,826
Comparisons
15,855
Reviews
51
Average Words per Review
571
Avg. Rating
9.0
Top Comparisons
Also Known As
CA Identity Minder, CA IAMCyberArk Privileged Access Security, CyberArk Privileged Account Security, SSH Key Manager, Privileged Session Manager, Privileged Threat Analytics, Application Identity Manager, On-Demand Privileges Manager, Endpoint Privilege Manager
Learn
CA (A Broadcom Company)
CyberArk
Overview

The CA Identity Suite provides comprehensive identity management and governance capabilities with a simple, intuitive user experience. This can dramatically simplify processes such as user access requests and access certifications, resulting in improved productivity and user satisfaction. The CA Identity Suite provides organizations with deep functionality, high scalability, and most importantly, and an outstanding user experience.

CyberArk is the trusted expert in privileged account security. Designed from the ground up with a focus on security, CyberArk has developed a powerful, modular technology platform that provides the industry's most comprehensive Privileged Account Security Solution.

Offer
Learn more about CA Identity Manager (CA IDM)
Learn more about CyberArk PAS
Sample Customers
Acciona, Core Blox, DBSRockwell Automation
Top Industries
REVIEWERS
Financial Services Firm32%
Healthcare Company18%
Insurance Company9%
Hospitality Company6%
VISITORS READING REVIEWS
Comms Service Provider26%
Software R&D Company22%
Financial Services Firm17%
Retailer9%
REVIEWERS
Financial Services Firm29%
Insurance Company14%
Energy/Utilities Company10%
Healthcare Company10%
VISITORS READING REVIEWS
Software R&D Company28%
Financial Services Firm15%
Comms Service Provider11%
Retailer7%
Company Size
REVIEWERS
Small Business20%
Midsize Enterprise7%
Large Enterprise73%
REVIEWERS
Small Business16%
Midsize Enterprise11%
Large Enterprise73%
VISITORS READING REVIEWS
Small Business6%
Midsize Enterprise10%
Large Enterprise83%
Find out what your peers are saying about One Identity, SailPoint, Microsoft and others in Identity Management (IM). Updated: November 2019.
379,241 professionals have used our research since 2012.
We monitor all Identity Management (IM) reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.
Sign Up with Email