We performed a comparison between CyberArk Privileged Access Manager and NetIQ Identity Governance based on real PeerSpot user reviews.
Find out what your peers are saying about CyberArk, Delinea, BeyondTrust and others in Privileged Access Management (PAM)."The most valuable feature is Special Monitoring."
"When we started with RPA, there was a requirement that every credential and the bots themselves be protected through the PAM system. From the get-go, we've had CyberArk in the middle... We've got a pretty robust RPA implementation with our PAM platform. Users, bots, the credentials — everything is managed via our PAM solution."
"With PAM in place, we've experienced a significant reduction in potential security breaches."
"It has a centralized page where you can manage everything. This makes work easier. You don't have to remember different module URLs or browser applications. It is very easy to get all the secure identities of other environments into a single page, which is very important for us as it helps a lot in terms of operations, e.g., reduces management time. This is a single page where you can manage all accounts and onboard them to the CyberArk. You can then secure and see passwords from everywhere. So, there is a single pane of glass where you can manage all the identities across environments as well as across different types of identities."
"You can easily manage more than 4000 accounts with one PSM."
"The Vault offers great capabilities for structuring and accessing data."
"They just released Marketplace, and they are constantly releasing updates to the components and adding new components, like Conjur. This is something that we ran into with Secret Server and DevOps, so it is already scalable, but becoming more so in the future."
"PSM (Privilege Session Manager."
"NetIQ Identity Governance has improved the security of my company."
"I really like the separation of the duties. It is the most ambitious model in the server because you have to create all the different rules, especially business rules. You have to check with the client and set different policies and rules, and then, you to have refine them. You will notice what is bad in the company and where the real problem is."
"All three functionalities, access certification, the configuration of duties, and role mining - especially role mining - are very advanced compared with the competition."
"I like the queries and find the catalog to be comparatively powerful."
"This solution has been around for a long time. It has had lots of successful deployments and releases."
"When doing a review you can either make manual or automatic fulfillment to immediately apply the manager's decision to the system, like removing or adding new permissions to the user account."
"We’re very satisfied with technical support. Usually we get people with the right knowledge who understand the solution very well."
"You can run reports and verify the access each user has. There is a process that runs automatically for access review. It sends an email to the manager and provides a task for the manager to review the users and access. The manager can approve or reject, and then it goes to the application owner for further review. This feature is especially important in large customer environments, as manual review can be challenging."
"The current interface doesn't scale that well, and has some screens still in the old layout."
"There was a functionality of the solution that was missing. I had noticed it in Beyond Trust, but not in this solution. But, recently they have incorporated something similar."
"The product documentation has to be more precise in certain aspects with explanations for functionality limitations along with reference material or screenshots."
"It is web-based, but other competitors have apps. We need to get there. It is just smoother to have an app. You don't have all the bugs from having a browser, and people like them better, since you can get to them via mobile."
"Sometimes the infrastructure team is hesitant to provide more resources."
"There is some stuff that we still have not fully integrated, which is our AIM solution. We are having all types of issues with it. I have been working with Level 3 support on it, but otherwise, from a functionality perspective, everything has been working except for the AIM solution."
"Over the past seven years, I have seen a lot of ups and downs with the product."
"The initial setup of CyberArk is a challenge if you do not have prior experience with it."
"The solution should provide more connectors in future releases. The solution also should offer more monitoring."
"The product could use more advanced features related to Identity Intelligence."
"Technical support is horrible."
"They haven't really evolved the product to the cloud, so they don't have a cloud solution."
"NetIQ Identity Governance is not flexible. Sometimes, filtering information to provide users with options, such as selecting the application to which they want to request access, can be challenging. It needs to improve application integration as well."
"We need more connectors to cloud applications like AWS."
"With NetIQ, you have to install two or more products. It would be better if we could install one product and have one server and one dashboard."
"The initial setup has room for improvement."
More CyberArk Privileged Access Manager Pricing and Cost Advice →
CyberArk Privileged Access Manager is ranked 1st in Privileged Access Management (PAM) with 142 reviews while NetIQ Identity Governance is ranked 21st in Identity Management (IM) with 9 reviews. CyberArk Privileged Access Manager is rated 8.8, while NetIQ Identity Governance is rated 8.0. The top reviewer of CyberArk Privileged Access Manager writes "Lets you ensure relevant, compliant access in good time and with an audit trail, yet lacks clarity on MITRE ATT&CK". On the other hand, the top reviewer of NetIQ Identity Governance writes "Helps to run reports and verify user access but improvement is needed in integration ". CyberArk Privileged Access Manager is most compared with Cisco ISE (Identity Services Engine), Microsoft Entra ID, Delinea Secret Server, WALLIX Bastion and One Identity Safeguard, whereas NetIQ Identity Governance is most compared with SailPoint IdentityIQ, OpenText Identity and Access Management and One Identity Manager.
We monitor all Privileged Access Management (PAM) reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.