We performed a comparison between CyberArk Privileged Access Manager and Leiberman RED Identity Management [EOL] based on real PeerSpot user reviews.
Find out what your peers are saying about CyberArk, Delinea, BeyondTrust and others in Privileged Access Management (PAM)."Automates password management to remove the human chain weakness."
"We have been able to manage application credentials in CyberArk, whether they come as a custom plugin or straight out-of-the-box."
"It is a single tool that isolates possible kinds of malware. You get lateral movement blocking and auditing information, e.g., you know who is doing what. You are getting protections from the service as well as a useful environment. All your admins can easily go in and out of your company while accessing your servers in a secure way, even if they are working abroad."
"Technical support is very helpful whenever we have any questions."
"All access to our servers by both staff and vendors is monitored and recorded."
"CyberArk has the ability to change the credentials on every platform."
"Creating policies and the password rotation feature have been valuable. We don't have to memorize our password for the ADM account."
"Performance-wise, it is excellent."
"It's more of a risk reduction. It takes passwords that are not being managed properly and manages them automatically which really reduces risk."
"It's hard to find competent resellers/support."
"We would, of course, always prefer it if the pricing was cheaper."
"CyberArk Privileged Access Manager could improve the integration docking, it should have more layers. For example, integration with OpenShift."
"It can be integrated with other systems, but it is not easy to integrate. It takes too long to integrate it. Its integration should be easier and simpler."
"There is a learning curve when it comes to planning out the deployment strategy, but once it is defined, it runs itself."
"More than the product itself, there is room for improvement in the documentation. The documentation should be very detailed and very structured. It has a lot of good information, on one level, but I feel that it could be more elaborate and more structured."
"Some of the additional features that we are looking at are in the Conjur product. I am specifically discussing key management, API Keys, and things for connecting applications in the CI/CD pipelines."
"I'm not a fan of technical support with CyberArk. It's like jumping through red tape and hoops. Quite frankly, it's almost like when you call CyberArk you get the Help Desk or the level-one. I'm a level-one. I got the CCD, I know how to do the initial troubleshooting. When I call CyberArk it's because I can't figure the problem out. So I need a level-two, three, four. I don't need you to tell me, "Hey, open a ticket and then give me logs.""
"They should improve the application password management. The capability to manage high availability application passwords is its biggest shortcoming."
More CyberArk Privileged Access Manager Pricing and Cost Advice →
Earn 20 points
CyberArk Privileged Access Manager is ranked 1st in Privileged Access Management (PAM) with 142 reviews while Leiberman RED Identity Management [EOL] doesn't meet the minimum requirements to be ranked in Privileged Access Management (PAM). CyberArk Privileged Access Manager is rated 8.8, while Leiberman RED Identity Management [EOL] is rated 7.8. The top reviewer of CyberArk Privileged Access Manager writes "Lets you ensure relevant, compliant access in good time and with an audit trail, yet lacks clarity on MITRE ATT&CK". On the other hand, the top reviewer of Leiberman RED Identity Management [EOL] writes "It’s greatest ability is that it can easily randomize all local accounts on almost any endpoint". CyberArk Privileged Access Manager is most compared with Cisco ISE (Identity Services Engine), Microsoft Entra ID, Delinea Secret Server, WALLIX Bastion and One Identity Safeguard, whereas Leiberman RED Identity Management [EOL] is most compared with .
See our list of best Privileged Access Management (PAM) vendors.
We monitor all Privileged Access Management (PAM) reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.