We performed a comparison between CyberArk Identity and CyberArk Privileged Access Manager based on real PeerSpot user reviews.
Find out in this report how the two Access Management solutions compare in terms of features, pricing, service and support, easy of deployment, and ROI."It has machine learning and can help clients to learn the environment and understand what is happening."
"The user self-service program and the Office 365 provisioning service feature are the most valuable. It is a very easy and feature-rich solution that gives priority to the users and security."
"The setup, via cloud, is simple."
"CyberArk Identity is a mature product."
"The tool helps with authentication. It acts as an MFA for any kind of privileged access that occurs in our organization."
"The integration capabilities, ability to integrate CyberArk into the overall IBB strategy of our current clients."
"The most valuable feature of CyberArk Identity is the adaptive interface."
"I found the solution to be stable."
"This solution is quite stable."
"It provides an accountability to the individuals who are using it, knowing that it is audited and tracked."
"The most important feature is managing the credentials and implementing those policies which rotate the credentials. Session Manager is also key in not letting the users have access to those credentials. Instead, CyberArk actually manages everything by itself."
"PSM (Privilege Session Manager."
"The threat analytics is an important feature."
"When we started with RPA, there was a requirement that every credential and the bots themselves be protected through the PAM system. From the get-go, we've had CyberArk in the middle... We've got a pretty robust RPA implementation with our PAM platform. Users, bots, the credentials — everything is managed via our PAM solution."
"We have accomplished our security goals. We have two-factor authenticated and vaulted our important accounts, so people can't just steal stuff from us."
"What I found most valuable in CyberArk Privileged Access Manager is the Session Manager as it allows you to split the connection between the administrator site and the target site. I also found the Password Manager valuable as it lets you rotate the passwords of privileged users."
"The solution's difficulty in gaining skill sets should be improved because it's a vertical product."
"I'm not sure what needs improvement. It is a good platform."
"More integrations would be better."
"We would like to see an improvement in the ability to manage mobile devices."
"In terms of general user feedback, the more security you put in front of a user, the more they complain. So usability and the user experience are always a challenge. So there's always room for improvement."
"They can include the Mobile Device Management (MDM) feature."
"The user interface could be improved."
"The OpenID features could improve in CyberArk Identity."
"One of our current issues is a publishing issue. If we whitelist Google Chrome, all the events of Google Chrome should be gone. It is not happening."
"The initial setup of CyberArk Privileged Access Manager difficulty depends on the environment that you are implementing it into. However, it typically is simple."
"The continuous scanning of the assets is limited to Windows and Unix. We like to have the solution scan any databases, network devices, and security devices for privileged accounts. That would be very helpful."
"I would like easier integrations for creating an online dashboard that executives would look at or are able to run reports from the tool."
"The documentation is rather basic and it is missing many use cases."
"There is a learning curve when it comes to planning out the deployment strategy, but once it is defined, it runs itself."
"Online help needs to be looked into with live agent support."
"The major pain point that we have is the capacity of CyberArk due to the sheer volume of NPAs that we are managing. We are a large organization and we have hundreds of thousands of non-personal accounts to manage. We have already found out that there are certain capacity limitations within CyberArk that might introduce performance issues. From my perspective, something that would be valuable would be if the vault could hold more passwords and be more scalable."
More CyberArk Privileged Access Manager Pricing and Cost Advice →
CyberArk Identity is ranked 7th in Access Management with 17 reviews while CyberArk Privileged Access Manager is ranked 1st in Privileged Access Management (PAM) with 142 reviews. CyberArk Identity is rated 8.2, while CyberArk Privileged Access Manager is rated 8.8. The top reviewer of CyberArk Identity writes "Allows Linux and Unix administrators to login with single password ". On the other hand, the top reviewer of CyberArk Privileged Access Manager writes "Lets you ensure relevant, compliant access in good time and with an audit trail, yet lacks clarity on MITRE ATT&CK". CyberArk Identity is most compared with Microsoft Intune, Microsoft Entra ID, SailPoint IdentityIQ, PingFederate and VMware Workspace ONE, whereas CyberArk Privileged Access Manager is most compared with Cisco ISE (Identity Services Engine), Microsoft Entra ID, Delinea Secret Server, WALLIX Bastion and One Identity Safeguard. See our CyberArk Identity vs. CyberArk Privileged Access Manager report.
See our list of best Access Management vendors.
We monitor all Access Management reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.