We performed a comparison between CyberArk Privileged Access Manager and One Identity Manager based on real PeerSpot user reviews.
Find out what your peers are saying about CyberArk, Delinea, BeyondTrust and others in Privileged Access Management (PAM)."It is an extremely scalable solution."
"It enables us to secure accounts and make sure they are compliant."
"Automates password management to remove the human chain weakness."
"CyberArk has allowed us to get the credentials and passwords out of hard-coded property files."
"It improves security in our company. We have more than 10,000 accounts that we manage in CyberArk. We use these accounts for SQLs, Windows Server, and Unix. Therefore, keeping these passwords up-to-date in another solution or software would be impossible. Now, we have some sort of a platform to manage passwords, distribute the inflow, and manage IT teams as well as making regular changes to it according to the internal security policies in our bank."
"We've written over a hundred custom connectors ourselves that allow us to do all types of privileged session management for various applications. On top of that, the rest of the API-based central credential providers allow us to get away from credentials that may be hard-coded in the script or some application."
"This is a complete solution that can detect cyber attacks well."
"It is a robust product."
"There are a lot of valuable features, including connectors, attestations, and workflow."
"The portfolio view simplifies this process, eliminating the need to check through Tableau or other tools."
"It gives the best user experience, enabling us an overview of all user entitlements."
"The most valuable feature of One Identity Manager is its object-oriented architecture."
"It has many features which can be combined and configured in a great way, then put together in projects and ways that developers didn't think were possible, which has been great."
"The solution does help us efficiently manage lots of authorizations automatically."
"The best feature is that it's customizable. For example, we can create any kind of product or custom service within an IT shop and customize it the way our customers need it. For the customers, it's the best. They are happy with it."
"It's very flexible. You can customize it to the fullest extent. You can use it for almost every situation for every customer."
"I'm not a fan of technical support with CyberArk. It's like jumping through red tape and hoops. Quite frankly, it's almost like when you call CyberArk you get the Help Desk or the level-one. I'm a level-one. I got the CCD, I know how to do the initial troubleshooting. When I call CyberArk it's because I can't figure the problem out. So I need a level-two, three, four. I don't need you to tell me, "Hey, open a ticket and then give me logs.""
"This product needs professional consulting services to onboard accounts effectively based user profiles."
"Report creation could be improved. The policies could be more customized."
"We found a lot of errors during the initial setup. They should work to improve the implementation experience and to remove errors from the process."
"Initial setup is complex. Lots of architecture, lots of planning, and lots of education and training are needed."
"Their post-sale support area requires a big improvement. Customers cannot automate tickets directly with CyberArk. They have to come through the distributor or bring in partners who have access to the support portal. Basically, the support for post-sales implementation is there, but the role of CyberArk is very minimal. Customers have to rely on partners, which sometimes creates issues. Some of the vendors help you during the implementation process, but the CyberArk support team does not do that. They have 24/7 support for our region, but they help only if there is an emergency or there is a problem with their system. If the password vault is down or the system is down, they provide immediate attention. For almost everything else, they take more time to respond. They give low priority to service-related or migration-related questions."
"Currently, in Secure Connect, an end user is required to enter account information manually, and cannot save any of this information for future use."
"The initial setup has room for improvement to be more straightforward."
"The initial setup was complex. We have a lot of different systems. The journey from implementing to joining all the systems was difficult."
"I would like them to enhance the search functionality to enable faster processing when looking for objects."
"The support for DevOps could be improved with quick delivery cycles and multiple delivery streams."
"It’s not something you get from the beginning. It’s not like Windows. It is more complicated. You need to know a few things from the back end, however, as you learn it, it becomes easy."
"The performance is quite bad, but this is because we have a very old version."
"I would like to integrate automated testing with One Identity, and it would be great to have some support from the vendor on here."
"They could make the product more user-friendly. It takes a lot of work to build technical and business cases with the product. The solution is more complex than you think to use."
"I would like it to have an easier integration with phones."
More CyberArk Privileged Access Manager Pricing and Cost Advice →
CyberArk Privileged Access Manager is ranked 1st in Privileged Access Management (PAM) with 142 reviews while One Identity Manager is ranked 3rd in Identity Management (IM) with 74 reviews. CyberArk Privileged Access Manager is rated 8.8, while One Identity Manager is rated 8.0. The top reviewer of CyberArk Privileged Access Manager writes "Lets you ensure relevant, compliant access in good time and with an audit trail, yet lacks clarity on MITRE ATT&CK". On the other hand, the top reviewer of One Identity Manager writes "The JML is customizable but the support team isn't strong". CyberArk Privileged Access Manager is most compared with Cisco ISE (Identity Services Engine), Microsoft Entra ID, Delinea Secret Server, WALLIX Bastion and One Identity Safeguard, whereas One Identity Manager is most compared with SailPoint IdentityIQ, Oracle Identity Governance, EVOLVEUM midPoint, Cisco ISE (Identity Services Engine) and ForgeRock.
We monitor all Privileged Access Management (PAM) reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.