Compare CyberArk Privileged Access Manager vs. Omada Identity

Cancel
You must select at least 2 products to compare!
Most Helpful Review
Find out what your peers are saying about CyberArk, One Identity, Thycotic and others in Privileged Access Management (PAM). Updated: July 2021.
521,189 professionals have used our research since 2012.
Quotes From Members

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:

Pros
"When we started with RPA, there was a requirement that every credential and the bots themselves be protected through the PAM system. From the get-go, we've had CyberArk in the middle... We've got a pretty robust RPA implementation with our PAM platform. Users, bots, the credentials — everything is managed via our PAM solution.""Right off the bat, the most valuable feature is the DNA scan. It gives us the ability to scan our environment and find the accounts that we're going to need to take under control.""CyberArk is a very stable product and it's a stable product because it has a simple design and a simple architecture that allows you to leverage the economies of scale across the base of your infrastructure that you already have implemented. It doesn't really introduce any new complex pieces of infrastructure that would make it that much more difficult to scale.""CyberArk has been easy for us to implement and the adoption has been good. We've been able to standardize a bunch of things. We've been able to standardize relatively easily with the use of the platforms and managing the policies.""The risk of lost password and forbidden access to resources has been drastically reduced which increased the security level for the entire company,""The technical support is good.""The most valuable feature is Special Monitoring.""The Password Upload Utility tool makes it easier when setting up a Safe that contains multiple accounts and has cut down the amount of time that it takes to complete the task."

More CyberArk Privileged Access Manager Pros »

"The most valuable aspect of the product is that it is Microsoft-based and it supports all Microsoft technology.""Our customers have benefited from Omada Identity automating the certification process. Most of our customers were using manual methods for user access certification. With Omada Identity, you can automate almost all of it, which means that certification now becomes on demand. You don't have to wait for two or three months to execute a certification timeframe. Instead, you can do certifications as often as you want.""It has a lot of out-of-the-box features. It is flexible, and there are a lot of possibilities to configure and extend it. It is user-friendly. It has an interface that is end-user or business-user friendly.""When we started with identity and access management, we cleaned up and skipped 500 accounts. Therefore, there are a lot of people who are still in our system. Using this tool, we have cleaned up a lot of accounts for ourselves as well as our partners and suppliers. So, we can manage everything now.""The most valuable functionality of the solution for us is that when employees stop working for the municipality, they are automatically disabled in Active Directory. Omada controls that 100 percent. They are disabled for 30 days, and after that time Omada deletes the Active Directory account. The same type of thing happens when we employ a new person. Their information is automatically imported to Omada and they are equipped with the roles and rights so they can do their jobs.""The identity lifecycle support is definitely valuable because we are a complex organization, and there is a lot of onboarding, movement, and offboarding in our organization. We have 31,000 users, and there are a lot of users who are constantly onboarding, offboarding, and moving. So, we need to make sure that these activities are supported. In old times, we used to do everything manually. Everyone was onboarded, offboarded, or moved manually. So, from a business point of view and an economics point of view, identity lifecycle is most valuable. From a security point of view, access review is the most important feature for us."

More Omada Identity Pros »

Cons
"The one place where we found that this product really needs to improve is the cloud. Simple integrations don't exist, even today. We don't have anything specific on CyberArk for managing, SaaS products, SaaS vendors, SaaS credentials. I understand it's a vendor-based thing and that they have to coordinate with the other vendors to be able to do that, and there are integrations coming. But these are the major places where CyberArk definitely needs to invest some more time.""It's a big program. To scale excessively, locally, on an on-prem application, takes a lot of servers.""CyberArk has to continue to evolve with that threat landscape to make sure that they're still protecting those credentials that are owned by those that have privileged accounts in the firms.""There is a bit of a learning curve, but it's a pretty complex solution.""It needs better documentation with more examples for the configuration files and API/REST integration""We found a lot of errors during the initial setup. They should work to improve the implementation experience and to remove errors from the process.""The authentication port is available in CyberArk Alero but not Fortinet products.""Currently, in Secure Connect, an end user is required to enter account information manually, and cannot save any of this information for future use."

More CyberArk Privileged Access Manager Cons »

"When the re-certification process is launched that makes Omada very slow. There are performance issues in the current version.""The Omada Identity SaaS version doesn't provide all the features Omada Identity on-premise provides.""Its flexibility is both a good thing and a bad thing. Because it is very flexible, it also becomes too complex. This is common for most of the products we evaluated. Its scalability should be better. It had a few scalability issues.""I would like to search on date fields, which is not possible now.""If you find an error and you need it fixed, you have to upgrade. It's not like they say, "Okay, we'll fix this problem for you." You have to upgrade. The last time we upgraded, because there was an error in a previous version, we had to pay 150,000 Danish Krone (about $24,000 at the time of this review) to upgrade our systems... That means that we have to pay to get errors fixed that Omada has made in programming the system. I hope they change this way of looking at things.""One thing that we are not so happy about is the user interface. It is a bit dated. I know that they are working on that, but the user interface is quite dated. Currently, it is a little bit difficult to customize the user interface to the need of the business, which is a little bit disappointing. It needs it to be a little bit easier to operate, and it should have a better user interface."

More Omada Identity Cons »

Pricing and Cost Advice
"I believe that this solution is priced well. It's the market leader and I think that it's the best solution.""Overall, its pricing is really good. The main difference from all the other vendors is that they have one package that covers all the functionality and modules of the basic PAM, except the add-on modules like adware and server protection. It also doesn't include the licenses for domain controller protection or maybe an API call-related feature. For the basic privileged access management, the bundle pricing is really good, but when it comes to an agent-based solution for advanced cyber protection or application identity managers, it is expensive. Services are also very expensive if you hire the services team from CyberArk, but these guys are really good. For a couple of large banking projects, we had an experience with them. The banks wanted to have things quickly and efficiently, so we had to hire them. If we take four weeks, these guys can do everything on a weekend. They charge quite a big sum of money, but they know the system well.""The price of this solution is quite reasonable.""The solution is very expensive and requires a license. We pay for an enterprise license.""Pricing is quite high and it could be improved.""They have two types of licensing: purchase and subscription. You have to pay for each admin user, such as Microsoft admin, mail admin, database admin, etc."

More CyberArk Privileged Access Manager Pricing and Cost Advice »

"The initial total cost of ownership to implement Omada Identity is not small. The TCO for the implementation is as high as any other solution. However, the cost of maintaining the solution is at par or lower than competitors, including adding more features or maintaining the system after the initial deployment or installation to make sure that they are available for users to use or extending the functionalities of those activities. Those maintenance costs are lower than other vendors, but the initial cost of getting the system installed is still high.""It is licensed per managed user per year.""There were a lot of administrator, partner, and supplier accounts for people who were no longer working for us but still in the system. So, we reduced the number of users no longer with the company, which saved us some money on licensing.""It's a fair price for the on-premises system. Compared with what we had before, it's much cheaper and we get all the modules in one. We tried to go with the cloud, but it was far too expensive.""From an on-prem point of view, the cost is quite transparent and reasonable. The direct cost is primarily for licenses and maintenance on licenses."

More Omada Identity Pricing and Cost Advice »

report
Use our free recommendation engine to learn which Privileged Access Management (PAM) solutions are best for your needs.
521,189 professionals have used our research since 2012.
Questions from the Community
Top Answer: Within the solution, I love the fact that everything is recorded. The configuration capabilities are great, too.
Top Answer: The price of this solution is quite reasonable.
Top Answer: Return on investment on over all product solution cost. especially hardware cost. when the licence increase due to jumpbox concept Hardware requirement also increase. secondly customisation duration… more »
Top Answer: The most valuable functionality of the solution for us is that when employees stop working for the municipality, they are automatically disabled in Active Directory. Omada controls that 100 percent… more »
Top Answer: It's a fair price for the on-premises system. Compared with what we had before, it's much cheaper and we get all the modules in one. We tried to go with the cloud, but it was far too expensive. We… more »
Top Answer: Generally, I find the whole solution to be very good. But the way errors in the system are handled could be improved. If you find an error and you need it fixed, you have to upgrade. It's not like… more »
Ranking
Views
36,972
Comparisons
19,289
Reviews
11
Average Words per Review
644
Rating
8.2
Views
1,897
Comparisons
1,007
Reviews
5
Average Words per Review
1,006
Rating
8.0
Popular Comparisons
Also Known As
CyberArk Privileged Access Security
Omada Identity Suite
Learn More
CyberArk
Video Not Available
Omada
Video Not Available
Overview

CyberArk is the trusted expert in privileged access management and a global leader Identity Security. Designed from the ground up with a focus on security, CyberArk has developed a powerful, modular technology platform that provides the industry's most comprehensive Privileged Account Security Solution.

Omada Identity delivers an end-to-end identity and access management solution with essential identity governance functionality for secure, compliant, and efficient administration of all users' access rights across on-premises or cloud-based systems. The solution provides configurable best practice processes that covers all identity and access related scenarios from providing an access risk overview, management of identities lifecycle, to automated enforcement of policies.

Offer
Learn more about CyberArk Privileged Access Manager
Learn more about Omada Identity
Sample Customers
Rockwell Automation
Bayer, ECCO Shoes, Vattenfall, NuStar Energy, Unicredit, Schiphol Group
Top Industries
REVIEWERS
Financial Services Firm24%
Insurance Company15%
Energy/Utilities Company9%
Healthcare Company7%
VISITORS READING REVIEWS
Computer Software Company29%
Comms Service Provider20%
Financial Services Firm10%
Government5%
REVIEWERS
Government57%
Mining And Metals Company14%
Financial Services Firm14%
Computer Software Company14%
VISITORS READING REVIEWS
Computer Software Company31%
Comms Service Provider16%
Financial Services Firm9%
Energy/Utilities Company6%
Company Size
REVIEWERS
Small Business21%
Midsize Enterprise12%
Large Enterprise67%
VISITORS READING REVIEWS
Small Business26%
Midsize Enterprise12%
Large Enterprise62%
REVIEWERS
Small Business22%
Large Enterprise78%
Find out what your peers are saying about CyberArk, One Identity, Thycotic and others in Privileged Access Management (PAM). Updated: July 2021.
521,189 professionals have used our research since 2012.

CyberArk Privileged Access Manager is ranked 1st in Privileged Access Management (PAM) with 15 reviews while Omada Identity is ranked 4th in User Provisioning Software with 6 reviews. CyberArk Privileged Access Manager is rated 8.2, while Omada Identity is rated 7.8. The top reviewer of CyberArk Privileged Access Manager writes "Provides simplicity and ease of implementation for the right level of security controls". On the other hand, the top reviewer of Omada Identity writes "Automatically shuts down AD accounts of people who are no longer employees, improving our audit situation". CyberArk Privileged Access Manager is most compared with BeyondTrust Endpoint Privilege Management, Thycotic Secret Server, Azure Active Directory, SailPoint IdentityIQ and Cisco ISE (Identity Services Engine), whereas Omada Identity is most compared with SailPoint IdentityIQ, Saviynt, One Identity Manager, SAP Identity Management and PingID.

See our list of .

We monitor all Privileged Access Management (PAM) reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.