We performed a comparison between CyberArk Privileged Access Manager and One Identity Privileged Access Suite for Unix based on real PeerSpot user reviews.
Find out in this report how the two Privileged Access Management (PAM) solutions compare in terms of features, pricing, service and support, easy of deployment, and ROI."CyberArk has helped us to identify, store, protect, and monitor the usage of privileged accounts."
"AIM has been a great help in automating password retrieval which removes the need for hard-coded credentials."
"The biggest feature is the security of the overall solution. It's very secure. The vaulting technology and the number of security layers involved in the vault, where privileged accounts are actually stored, is the heart of the solution."
"I like the integrations for external applications."
"The product has allowed us to improve both the management and access to privileged credentials, while also creating a full audit trail of all activities happening within isolated sessions of all tasks and activities taking place within the solution."
"Provides improved security around having your credentials locked down and rotated regularly."
"We found the initial setup to be easy."
"PSM (Privilege Session Manager."
"The most valuable feature of this solution is that it is easy to use."
"Privileged Access Suite's best feature is it's straightforward to use."
"The most valuable features are session and password management."
"I think having a distributed architecture would certainly help this solution."
"CyberArk PAM could greatly benefit from an under-the-hood update; integrating machine learning algorithms could provide predictive insights."
"It's hard to find competent resellers/support."
"I don't know if "failed authentication" is a glitch or if that was an update... However, since we are the CyberArk support within our organization, we need to know that the password is suspended and we won't know that unless we have the ITA log up. So when a user calls and says, "Hey, I'm locked out of CyberArk, I can't get into CyberArk," we have to go through all of these other troubleshooting steps because the first thing we don't think of right now is, "The account is suspended." It doesn't say that anymore."
"Sometimes the infrastructure team is hesitant to provide more resources."
"There were a lot of manual steps in the initial setup which could have been automated. I read the 10.4 release that was sent out about a month or two ago, and I saw the steps required for upgrade have been reduced by about 90%. That was a big thing for me, but I still haven't seen that yet because we have not upgrade past 9.9.5."
"There is room for improvement in the availability of custom connectors on the marketplace for this solution. Additionally, their services for the CICD pipeline and ease of integration could be improved."
"There is room for improvement in the pricing model."
"Privileged Access Suite's interface could be better."
"There is a new trend of not having any privileged users or accounts."
"Product management should be improved."
More CyberArk Privileged Access Manager Pricing and Cost Advice →
CyberArk Privileged Access Manager is ranked 1st in Privileged Access Management (PAM) with 142 reviews while One Identity Privileged Access Suite for Unix is ranked 20th in Privileged Access Management (PAM) with 3 reviews. CyberArk Privileged Access Manager is rated 8.8, while One Identity Privileged Access Suite for Unix is rated 7.6. The top reviewer of CyberArk Privileged Access Manager writes "Lets you ensure relevant, compliant access in good time and with an audit trail, yet lacks clarity on MITRE ATT&CK". On the other hand, the top reviewer of One Identity Privileged Access Suite for Unix writes "A reliable solution with great password and session management". CyberArk Privileged Access Manager is most compared with Cisco ISE (Identity Services Engine), Microsoft Entra ID, Delinea Secret Server, WALLIX Bastion and One Identity Safeguard, whereas One Identity Privileged Access Suite for Unix is most compared with ManageEngine PAM360 and WALLIX Bastion. See our CyberArk Privileged Access Manager vs. One Identity Privileged Access Suite for Unix report.
See our list of best Privileged Access Management (PAM) vendors.
We monitor all Privileged Access Management (PAM) reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.