We performed a comparison between CyberArk Privileged Access Manager and NetIQ Identity Governance based on real PeerSpot user reviews.
Find out what your peers are saying about CyberArk, Delinea, BeyondTrust and others in Privileged Access Management (PAM)."CyberArk has resulted in a massive increase in our security footprint."
"The combination of CPM and PSM resolves a lot of use cases."
"Ensures accounts are managed according to corporate policies."
"The product is an important security measure against credential theft. It ensures session isolation and password rotation including pushing passwords to the endpoints."
"CyberArk Privileged Access Manager's main benefit is it provides secure access to our servers. There are features to capture the user activity, it provides video recording processing. If the users are logged in to the server, we can see what activities they are performing. It's a very nice tool for Privileged Access Management. They have plenty of useful services and the solution has fulfilled our needs."
"It has helped from an auditing perspective identify who has access to privileged accounts."
"Increased our insight into how privileged accounts are being used and distributed within our footprint."
"The Vault offers great capabilities for structuring and accessing data."
"When doing a review you can either make manual or automatic fulfillment to immediately apply the manager's decision to the system, like removing or adding new permissions to the user account."
"I really like the separation of the duties. It is the most ambitious model in the server because you have to create all the different rules, especially business rules. You have to check with the client and set different policies and rules, and then, you to have refine them. You will notice what is bad in the company and where the real problem is."
"NetIQ Identity Governance has improved the security of my company."
"This solution has been around for a long time. It has had lots of successful deployments and releases."
"I like the queries and find the catalog to be comparatively powerful."
"We’re very satisfied with technical support. Usually we get people with the right knowledge who understand the solution very well."
"You can run reports and verify the access each user has. There is a process that runs automatically for access review. It sends an email to the manager and provides a task for the manager to review the users and access. The manager can approve or reject, and then it goes to the application owner for further review. This feature is especially important in large customer environments, as manual review can be challenging."
"All three functionalities, access certification, the configuration of duties, and role mining - especially role mining - are very advanced compared with the competition."
"The interface on version 9 looks old."
"Many of the infrastructure folks who use the product dislike it because it complicates their workflow. They get a little less control, and they have to go through a specific solution. It proactively logs in for them, which obfuscates some of the issues that they may be troubleshooting."
"It is web-based, but other competitors have apps. We need to get there. It is just smoother to have an app. You don't have all the bugs from having a browser, and people like them better, since you can get to them via mobile."
"Integration with the ticketing system should allow any number of fields to be used for validation before allowing a user to be evaluated and able to access a server."
"The web interface has come a long way, but the PrivateArk client seems clunky and not intuitive. It could use an update to be brought up to speed with the usability of PVWA."
"One of the main things that could be improved would be filtering accounts on the main page and increasing the functionality of the filters. There are some filters on the side which are very specific, but I feel there could be more."
"We don't often contact technical support, but when we do it, the response could be faster and better."
"The documentation is rather basic and it is missing many use cases."
"We need more connectors to cloud applications like AWS."
"The product could use more advanced features related to Identity Intelligence."
"NetIQ Identity Governance is not flexible. Sometimes, filtering information to provide users with options, such as selecting the application to which they want to request access, can be challenging. It needs to improve application integration as well."
"They haven't really evolved the product to the cloud, so they don't have a cloud solution."
"The solution should provide more connectors in future releases. The solution also should offer more monitoring."
"The initial setup has room for improvement."
"Technical support is horrible."
"With NetIQ, you have to install two or more products. It would be better if we could install one product and have one server and one dashboard."
More CyberArk Privileged Access Manager Pricing and Cost Advice →
CyberArk Privileged Access Manager is ranked 1st in Privileged Access Management (PAM) with 142 reviews while NetIQ Identity Governance is ranked 21st in Identity Management (IM) with 9 reviews. CyberArk Privileged Access Manager is rated 8.8, while NetIQ Identity Governance is rated 8.0. The top reviewer of CyberArk Privileged Access Manager writes "Lets you ensure relevant, compliant access in good time and with an audit trail, yet lacks clarity on MITRE ATT&CK". On the other hand, the top reviewer of NetIQ Identity Governance writes "Helps to run reports and verify user access but improvement is needed in integration ". CyberArk Privileged Access Manager is most compared with Cisco ISE (Identity Services Engine), Microsoft Entra ID, Delinea Secret Server, WALLIX Bastion and One Identity Safeguard, whereas NetIQ Identity Governance is most compared with SailPoint IdentityIQ, OpenText Identity and Access Management and One Identity Manager.
We monitor all Privileged Access Management (PAM) reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.