Compare CyberArk PAS vs. SAP Identity Management

Cancel
You must select at least 2 products to compare!
Most Helpful Review
Anonymous User
Find out what your peers are saying about CyberArk, One Identity, Thycotic and others in Privileged Access Management. Updated: November 2020.
447,718 professionals have used our research since 2012.
Quotes From Members

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:

Pros
"This solution is quite stable.""We are maintaining compliance in PCI, SOX and HIPPA, which is a big thing. Auditors really like it, and it has made us stay compliant.""We are able to know who is accessing what and when; having accountability.""There are no issues with scalability. Our clients are very happy to use the product.""For a while, there were individual IDs having privileged access. We wanted to restrict that. We implemented the solution so that it can be more of internal control. We can have session recordings happening and reduce our attacks.""The Password Upload Utility tool makes it easier when setting up a Safe that contains multiple accounts and has cut down the amount of time that it takes to complete the task.""When we started with RPA, there was a requirement that every credential and the bots themselves be protected through the PAM system. From the get-go, we've had CyberArk in the middle... We've got a pretty robust RPA implementation with our PAM platform. Users, bots, the credentials — everything is managed via our PAM solution.""Right off the bat, the most valuable feature is the DNA scan. It gives us the ability to scan our environment and find the accounts that we're going to need to take under control."

More CyberArk PAS Pros »

"The most valuable feature is the user experience for managing information.""Rather than implement a basic SSO, this solution assisted us with setting up two-factor authentication.""It provides basic automatic user administration and role provisioning to save time."

More SAP Identity Management Pros »

Cons
"I think having a distributed architecture would certainly help this solution.""Make it easier to deploy.""The initial setup of CyberArk is a challenge if you do not have prior experience with it.""Integration with the ticketing system should allow any number of fields to be used for validation before allowing a user to be evaluated and able to access a server.""Currently, in Secure Connect, an end user is required to enter account information manually, and cannot save any of this information for future use.""The one place where we found that this product really needs to improve is the cloud. Simple integrations don't exist, even today. We don't have anything specific on CyberArk for managing, SaaS products, SaaS vendors, SaaS credentials. I understand it's a vendor-based thing and that they have to coordinate with the other vendors to be able to do that, and there are integrations coming. But these are the major places where CyberArk definitely needs to invest some more time.""It's a big program. To scale excessively, locally, on an on-prem application, takes a lot of servers.""CyberArk has to continue to evolve with that threat landscape to make sure that they're still protecting those credentials that are owned by those that have privileged accounts in the firms."

More CyberArk PAS Cons »

"Research and marketing need to be improved.""It needs to have the SSO for the HANA modules that SAP is releasing.""A lack of startup connectors to different systems, and could have better connectors for SAP IDM."

More SAP Identity Management Cons »

Pricing and Cost Advice
"In comparison to other products on the market, CyberArk is a more costly product."

More CyberArk PAS Pricing and Cost Advice »

Information Not Available
report
Use our free recommendation engine to learn which Privileged Access Management solutions are best for your needs.
447,718 professionals have used our research since 2012.
Questions from the Community
Top Answer: Right off the bat, the most valuable feature is the DNA scan. It gives us the ability to scan our environment and find the accounts that we're going to need to take under control.
Top Answer: Privileged Access Management is a business transformation program. It forces business to look at their overall operating model for system administrative and application based access, and develop a… more »
Top Answer: We're pretty excited about Alero, the third-party access management. As a small company we lean on vendors quite a bit and we do that in multiple areas. That's going to be a big one for us. It's just… more »
Top Answer: It provides basic automatic user administration and role provisioning to save time.
Top Answer: I believe they could make a lot of improvements on SAP IDM. The user interface is not satisfactory and is only available in Web Dynpro and you need Fiori to maybe get some enhancements, but that's not… more »
Top Answer: Our primary use case is basically focused on SAP landscape, the complete SAP User Lifecycle. We're currently using SailPoint and SAP Identity Management. As part of a dissertation I'm working on to… more »
Ranking
Views
38,398
Comparisons
18,200
Reviews
24
Average Words per Review
522
Avg. Rating
9.0
9th
Views
2,294
Comparisons
1,800
Reviews
3
Average Words per Review
400
Avg. Rating
8.3
Popular Comparisons
Compared 6% of the time.
Also Known As
CyberArk Privileged Access Security, CyberArk Privileged Account Security, SSH Key Manager, Privileged Session Manager, Privileged Threat Analytics, Application Identity Manager, On-Demand Privileges Manager, Endpoint Privilege ManagerSAP NetWeaver Identity Management, NetWeaver Identity Management
Learn
CyberArk
SAP
Overview

CyberArk is the trusted expert in privileged account security. Designed from the ground up with a focus on security, CyberArk has developed a powerful, modular technology platform that provides the industry's most comprehensive Privileged Account Security Solution.

Reduce risk and centrally manage user access across your enterprise – with SAP Identity Management. The software integrates with your business processes to provide robust data and application security. Keep your operations running smoothly – and boost productivity by providing role-based user access, self-service password reset, approval workflows, and more.

Offer
Learn more about CyberArk PAS
Learn more about SAP Identity Management
Sample Customers
Rockwell AutomationState of Indiana, Automotive Resources International (ARI), Alliander N.V., Chemion Logistik GmbH, Seoul National University Bundang Hospital (SNUBH)
Top Industries
REVIEWERS
Financial Services Firm25%
Insurance Company15%
Energy/Utilities Company10%
Healthcare Company8%
VISITORS READING REVIEWS
Computer Software Company33%
Comms Service Provider19%
Financial Services Firm7%
Government5%
VISITORS READING REVIEWS
Computer Software Company37%
Comms Service Provider19%
Retailer8%
Government7%
Company Size
REVIEWERS
Small Business18%
Midsize Enterprise10%
Large Enterprise72%
VISITORS READING REVIEWS
Small Business16%
Midsize Enterprise9%
Large Enterprise76%
No Data Available
Find out what your peers are saying about CyberArk, One Identity, Thycotic and others in Privileged Access Management. Updated: November 2020.
447,718 professionals have used our research since 2012.
CyberArk PAS is ranked 1st in Privileged Access Management with 22 reviews while SAP Identity Management is ranked 9th in Identity Management (IM) with 3 reviews. CyberArk PAS is rated 9.0, while SAP Identity Management is rated 8.4. The top reviewer of CyberArk PAS writes "Provides simplicity and ease of implementation for the right level of security controls". On the other hand, the top reviewer of SAP Identity Management writes "Automatic user provisioning is valuable but could use better cloud integration connectors". CyberArk PAS is most compared with BeyondTrust Endpoint Privilege Management, Thycotic Secret Server, Microsoft Azure Active Directory Premium, Cisco ISE (Identity Services Engine) and SailPoint IdentityIQ, whereas SAP Identity Management is most compared with SailPoint IdentityIQ, Microsoft Identity Manager, Symantec Identity Governance and Administration, Saviynt and Fortinet FortiAuthenticator.

See our list of .

We monitor all Privileged Access Management reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.