Compare CyberArk Identity vs. IBM Security Access Manager

Cancel
You must select at least 2 products to compare!
Most Helpful Review
Find out what your peers are saying about CyberArk Identity vs. IBM Security Access Manager and other solutions. Updated: May 2021.
509,820 professionals have used our research since 2012.
Quotes From Members

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:

Pros
"The feature that we find most valuable is the ability to integrate multiple IDs for on-premises Active Directory.""The user self-service program and the Office 365 provisioning service feature are the most valuable. It is a very easy and feature-rich solution that gives priority to the users and security."

More CyberArk Identity Pros »

"The solution has powerful authentification and authorization. It offers a good way to increase security.""It's a good solution for identification and access management.""I have found this solution to be really practical and when a user wants to log in, it is effortless and runs smooth."

More IBM Security Access Manager Pros »

Cons
"We would like to see an improvement in the ability to manage mobile devices.""They can include the Mobile Device Management (MDM) feature."

More CyberArk Identity Cons »

"Configuration could be simplified for the end-user.""The user interface needs to be simplified, it's complex and not user-friendly.""The solution could be classified as a hilt system. There are a lot of resources being used and it is suitable for very large enterprises or the public sector."

More IBM Security Access Manager Cons »

Pricing and Cost Advice
"We find that the pricing and licensing of this solution is adequate, as compared to the other competitors in the market."

More CyberArk Identity Pricing and Cost Advice »

"The license and costs depend on the amount range of users you have. For just approximately 2,000 users, the price is practical and fair. However, when you have 20,000 users, it starts to become really expensive, and the discount per user is not attractive enough to go ahead and purchase."

More IBM Security Access Manager Pricing and Cost Advice »

report
Use our free recommendation engine to learn which Access Management solutions are best for your needs.
509,820 professionals have used our research since 2012.
Questions from the Community
Top Answer: The user self-service program and the Office 365 provisioning service feature are the most valuable. It is a very easy and feature-rich solution that gives priority to the users and security.
Top Answer: They can include the Mobile Device Management (MDM) feature.
Top Answer: We sell as well as use this solution for our IT operations. We are using it for single sign-on. We are a small company, and we have a few users of this solution.
Top Answer: I have found this solution to be really practical and when a user wants to log in, it is effortless and runs smooth.
Top Answer: The solution could be classified as a hilt system. There are a lot of resources being used and it is suitable for very large enterprises or the public sector. In the future, there could be better… more »
Top Answer: I am a provider of mobile authentication and my customers want to upgrade the Single Sign-On platform solution. We then provide them our mobile authentication to plugin with the new version of IBM's… more »
Ranking
10th
out of 28 in Access Management
Views
1,370
Comparisons
1,023
Reviews
2
Average Words per Review
298
Rating
9.0
12th
out of 28 in Access Management
Views
1,565
Comparisons
1,291
Reviews
3
Average Words per Review
283
Rating
7.7
Popular Comparisons
Also Known As
Idaptive
ISAM
Learn More
Overview

GRANT ACCESS TO YOUR WORKFORCE. GIVE NOTHING TO ATTACKERS.
Your users need quick access to a variety of business resources. You need confidence it’s them knocking – not an attacker. With CyberArk Workforce Identity, you can empower your workforce while keeping threats out.

Frictionless Sign On
Keep workers working, not logging in and out.

Adaptive Authentication
Make intelligent access decisions based on AI-powered analytics.

Secure Everywhere
Enable access across any device, anywhere at just the right time.

IBM Security Access Manager helps you simplify your users' access while more securely adopting web, mobile, IoT and cloud technologies. It can be deployed on-premises, in a virtual or hardware appliance or containerized with Docker. ISAM helps you strike a balance between usability and security through the use of risk-based access, single sign-on, integrated access management control, identity federation and mobile multi-factor authentication. Take back control of your access management with IBM Security Access Manager.

Offer
Learn more about CyberArk Identity
Learn more about IBM Security Access Manager
Sample Customers
MLB, Citi, Pfizer, SulAmerica, GE Capital, Shiseido
POST Luxembourg
Top Industries
VISITORS READING REVIEWS
Computer Software Company40%
Energy/Utilities Company9%
Comms Service Provider8%
Government8%
VISITORS READING REVIEWS
Computer Software Company30%
Comms Service Provider14%
Insurance Company13%
Financial Services Firm12%
Find out what your peers are saying about CyberArk Identity vs. IBM Security Access Manager and other solutions. Updated: May 2021.
509,820 professionals have used our research since 2012.

CyberArk Identity is ranked 10th in Access Management with 2 reviews while IBM Security Access Manager is ranked 12th in Access Management with 3 reviews. CyberArk Identity is rated 9.0, while IBM Security Access Manager is rated 7.6. The top reviewer of CyberArk Identity writes "A stable solution for accessing on-premises active directory". On the other hand, the top reviewer of IBM Security Access Manager writes "Effortless user sign in, highly scalable, and reliable". CyberArk Identity is most compared with Azure Active Directory, Okta Workforce Identity, Microsoft Intune, SailPoint IdentityNow and LastPass Enterprise, whereas IBM Security Access Manager is most compared with Azure Active Directory, Okta Workforce Identity, ForgeRock, Oracle Access Manager and F5 Access Policy Manager. See our CyberArk Identity vs. IBM Security Access Manager report.

See our list of best Access Management vendors.

We monitor all Access Management reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.