Compare CyberArk PAS vs. Omada Identity

Cancel
You must select at least 2 products to compare!
CyberArk PAS Logo
38,409 views|18,275 comparisons
Omada Identity Logo
1,418 views|775 comparisons
Most Helpful Review
Anonymous User
Use Omada Identity? Share your opinion.
Find out what your peers are saying about CyberArk, One Identity, Thycotic and others in Privileged Access Management. Updated: November 2020.
448,775 professionals have used our research since 2012.
Quotes From Members

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:

Pros
"This solution is quite stable.""We are maintaining compliance in PCI, SOX and HIPPA, which is a big thing. Auditors really like it, and it has made us stay compliant.""We are able to know who is accessing what and when; having accountability.""There are no issues with scalability. Our clients are very happy to use the product.""For a while, there were individual IDs having privileged access. We wanted to restrict that. We implemented the solution so that it can be more of internal control. We can have session recordings happening and reduce our attacks.""The Password Upload Utility tool makes it easier when setting up a Safe that contains multiple accounts and has cut down the amount of time that it takes to complete the task.""When we started with RPA, there was a requirement that every credential and the bots themselves be protected through the PAM system. From the get-go, we've had CyberArk in the middle... We've got a pretty robust RPA implementation with our PAM platform. Users, bots, the credentials — everything is managed via our PAM solution.""Right off the bat, the most valuable feature is the DNA scan. It gives us the ability to scan our environment and find the accounts that we're going to need to take under control."

More CyberArk PAS Pros »

"The most valuable feature is the automatic provisioning and reconciliation of things like the Active Directory groups and memberships.""The most valuable aspect of the product is that it is Microsoft-based and it supports all Microsoft technology."

More Omada Identity Pros »

Cons
"I think having a distributed architecture would certainly help this solution.""Make it easier to deploy.""The initial setup of CyberArk is a challenge if you do not have prior experience with it.""Integration with the ticketing system should allow any number of fields to be used for validation before allowing a user to be evaluated and able to access a server.""Currently, in Secure Connect, an end user is required to enter account information manually, and cannot save any of this information for future use.""The one place where we found that this product really needs to improve is the cloud. Simple integrations don't exist, even today. We don't have anything specific on CyberArk for managing, SaaS products, SaaS vendors, SaaS credentials. I understand it's a vendor-based thing and that they have to coordinate with the other vendors to be able to do that, and there are integrations coming. But these are the major places where CyberArk definitely needs to invest some more time.""It's a big program. To scale excessively, locally, on an on-prem application, takes a lot of servers.""CyberArk has to continue to evolve with that threat landscape to make sure that they're still protecting those credentials that are owned by those that have privileged accounts in the firms."

More CyberArk PAS Cons »

"The user interface should have a more flexible design, where you can change it to your requirement.""When the re-certification process is launched that makes Omada very slow. There are performance issues in the current version."

More Omada Identity Cons »

Pricing and Cost Advice
"In comparison to other products on the market, CyberArk is a more costly product."

More CyberArk PAS Pricing and Cost Advice »

Information Not Available
report
Use our free recommendation engine to learn which Privileged Access Management solutions are best for your needs.
448,775 professionals have used our research since 2012.
Questions from the Community
Top Answer: Right off the bat, the most valuable feature is the DNA scan. It gives us the ability to scan our environment and find the accounts that we're going to need to take under control.
Top Answer: Privileged Access Management is a business transformation program. It forces business to look at their overall operating model for system administrative and application based access, and develop a… more »
Top Answer: We're pretty excited about Alero, the third-party access management. As a small company we lean on vendors quite a bit and we do that in multiple areas. That's going to be a big one for us. It's just… more »
Top Answer: The most valuable aspect of the product is that it is Microsoft-based and it supports all Microsoft technology.
Top Answer: Licenses are only for installations and support problems. They are definitely additional costs.
Top Answer: In terms of improvement, there are not so many out of the box connectors available in the current version. So what they have improved in the latest version is more out of the box connectors for… more »
Ranking
Views
38,409
Comparisons
18,275
Reviews
22
Average Words per Review
533
Avg. Rating
9.1
Views
1,418
Comparisons
775
Reviews
2
Average Words per Review
500
Avg. Rating
7.5
Popular Comparisons
Compared 14% of the time.
Also Known As
CyberArk Privileged Access Security, CyberArk Privileged Account Security, SSH Key Manager, Privileged Session Manager, Privileged Threat Analytics, Application Identity Manager, On-Demand Privileges Manager, Endpoint Privilege ManagerOmada Identity Suite
Learn
CyberArk
Omada
Overview

CyberArk is the trusted expert in privileged account security. Designed from the ground up with a focus on security, CyberArk has developed a powerful, modular technology platform that provides the industry's most comprehensive Privileged Account Security Solution.

Omada Identity Suite Core identity management and access governance functionality in one integrated solution. High-Level Identity Management and Access Governance Functionality Omada's Identity Suite delivers a fully featured process framework for core identity management and access governance functionalities, that improves IT security, ensures compliance control, and enables business efficiency.

Offer
Learn more about CyberArk PAS
Learn more about Omada Identity
Sample Customers
Rockwell AutomationECCO Shoes, Vattenfall, Krka, Bayer, NuStar Energy, DuPont
Top Industries
REVIEWERS
Financial Services Firm25%
Insurance Company15%
Energy/Utilities Company10%
Comms Service Provider8%
VISITORS READING REVIEWS
Computer Software Company33%
Comms Service Provider19%
Financial Services Firm7%
Government5%
VISITORS READING REVIEWS
Computer Software Company38%
Comms Service Provider16%
Financial Services Firm8%
Government5%
Company Size
REVIEWERS
Small Business18%
Midsize Enterprise10%
Large Enterprise72%
VISITORS READING REVIEWS
Small Business16%
Midsize Enterprise9%
Large Enterprise76%
No Data Available
Find out what your peers are saying about CyberArk, One Identity, Thycotic and others in Privileged Access Management. Updated: November 2020.
448,775 professionals have used our research since 2012.

CyberArk PAS is ranked 1st in Privileged Access Management with 22 reviews while Omada Identity is ranked 9th in User Provisioning Software with 2 reviews. CyberArk PAS is rated 9.0, while Omada Identity is rated 7.6. The top reviewer of CyberArk PAS writes "Provides simplicity and ease of implementation for the right level of security controls". On the other hand, the top reviewer of Omada Identity writes "Microsoft-based and it supports all Microsoft technology but there have been performance issues". CyberArk PAS is most compared with BeyondTrust Endpoint Privilege Management, Thycotic Secret Server, Microsoft Azure Active Directory Premium, Cisco ISE (Identity Services Engine) and SailPoint IdentityIQ, whereas Omada Identity is most compared with SailPoint IdentityIQ, One Identity Manager, Saviynt and Symantec Identity Governance and Administration.

See our list of .

We monitor all Privileged Access Management reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.