CyberArk Privileged Access Security vs Oracle Identity Manager (Oracle IAM)

CyberArk Privileged Access Security is ranked 1st in Identity and Access Management (IAM) with 55 reviews vs Oracle Identity Manager (Oracle IAM) which is ranked 2nd in Identity and Access Management (IAM) with 18 reviews. The top reviewer of CyberArk Privileged Access Security writes "Gives us the security of all credentials in one place and lightens our administrative load". The top reviewer of Oracle Identity Manager (Oracle IAM) writes "It provides a consistent user interface and technical support is good". CyberArk Privileged Access Security is most compared with BeyondTrust PowerBroker, Cisco Identity Services Engine and Oracle Identity Manager (Oracle IAM). Oracle Identity Manager (Oracle IAM) is most compared with SailPoint IdentityIQ, CyberArk Privileged Access Security and ForgeRock. See our CyberArk Privileged Access Security vs Oracle Identity Manager (Oracle IAM) report.
Cancel
You must select at least 2 products to compare!
+Add products to compare
Most Helpful Review
Find out what your peers are saying about CyberArk Privileged Access Security vs Oracle Identity Manager (Oracle IAM) and others in Identity and Access Management (IAM).
287,566 professionals have used our research since 2012.

Quotes From Members Comparing CyberArk Privileged Access Security vs Oracle Identity Manager (Oracle IAM)

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
Pros
CyberArk is not just an IT security or cybersecurity tool. It's also an administrator tool. I had a fair number of systems where the passwords were not fully managed by CyberArk yet, and they were expiring every 30 or 45 days. I was able to get management turned on for those accounts. From an administrator perspective, I didn't have to go back into those systems and manually change those passwords anymore. CyberArk... lightened the load on our administrative work.You can write different types of policies for custom business needs or any developer needs. If they need certain functions allocated, they can be customized easily.We can make a policy that affects everybody instantly.We have accomplished our security goals. We have two-factor authenticated and vaulted our important accounts, so people can't just steal stuff from us.The flexibility of integrating with other technologies is important because of a lot of applications - a lot of COTS products - are not supported when we are bringing the application IDs. The CyberArk platform provides a lot of opportunities to do customization.We are maintaining compliance in PCI, SOX and HIPPA, which is a big thing. Auditors really like it, and it has made us stay compliant.We are able to know who is accessing what and when; having accountability.We are able to rotate credentials and have privileged account access.

Read more »

Its most valuable feature is its scalability.OIM in my organization has improved its use and dependability, allowing us to pass audit each time.The proactive controls which can be configured to a granular level allowing the organization the flexibility to meet the changing demands of the workforce.It helps provision the required accesses through policies, approvals, and whatever would be the business requirement.Identifying connector framework for unifying provisioning capabilities from OIM.The most important features that have impacted our environment recently are the Single Sign-On solution, role based provisioning, and the automated provisioning of accounts to target systems.I have found the OIM Connector framework, based on ICF, to be the most valuable feature.

Read more »

Cons
This is probably a common thing, but they do ask for a lot of log files, a lot of information. They ask you to provide a lot of information to them before they're willing to give you anything at all upfront. It would be better if they were a little more give-and-take upfront: "Why don't you try these couple of things while we take your log files and stuff and go research them?" A little bit of that might be more helpful.The interface on version 9 looks old.One of our current issues is a publishing issue. If we whitelist Google Chrome, all the events of Google Chrome should be gone. It is not happening.CyberArk has a lot on the privileged access side but they have to concentrate more on the application side as well.Make it easier to deploy.There is some stuff that we still have not fully integrated, which is our AIM solution. We are having all types of issues with it. I have been working with Level 3 support on it, but otherwise, from a functionality perspective, everything has been working except for the AIM solution. We had an issue with the Copy feature... Apparently, in version 10, that Copy feature does not work. You actually have to click Show and then copy the password from within Show and then paste it. We've had a million tickets and we had to figure out a workaround to it.I don't know if "failed authentication" is a glitch or if that was an update... However, since we are the CyberArk support within our organization, we need to know that the password is suspended and we won't know that unless we have the ITA log up. So when a user calls and says, "Hey, I'm locked out of CyberArk, I can't get into CyberArk," we have to go through all of these other troubleshooting steps because the first thing we don't think of right now is, "The account is suspended." It doesn't say that anymore.

Read more »

They need to improve their backup strategy.Automation of validation exercises performed by humans over Recon Exceptions generated as a result of an access synchronization event over a user's need for access or not.I have yet to see its full functionality exercised in my organization.I would like to see more segregation managed through Oracle Identity Manager.It would be great if the Oracle Fusion Middleware team worked on making it compatible with other application servers, as it exists in OIM9.x.t is too complex, has too many bugs, and is an immature product, even the best case, beta version.The development and the administration side could be a lot more intuitive and easier to use than it currently is, in terms of functionality and what it tries to achieve as a Single Sign-On entity for an enterprise environment.OIA needs to improve its governance features.

Read more »

Pricing and Cost Advice
With reducing the privileged account access, there has been a huge improvement. They are now bringing more accounts on a little at a time.If you are looking at implementing this solution, buy the training and go to it.Our risk is definitely significantly lower. Also, our resources are low.The cost is high compared to other products.CyberArk provides all the features bundled. This is compared to other vendors who provide them as a different license for each functionality.Cost efficiency is the number one thing that can be improved in my mind. This would change lots of companies minds on purchasing the product.It can be an expensive product.It is not a cheap solution. It is expensive as compared with other solutions. However, it is one of the best solutions in their domain.

Read more »

Oracle licenses are expensive. I suggest making pricing and licensing decisions that align with architectural requirements and the project's budget.

Read more »

report
Use our free recommendation engine to learn which Identity and Access Management (IAM) solutions are best for your needs.
287,566 professionals have used our research since 2012.
Ranking
RANKING
Views
31,688
Comparisons
16,752
Reviews
56
Followers
1,608
Avg. Rating
8.6
Views
27,171
Comparisons
11,152
Reviews
18
Followers
1,377
Avg. Rating
7.0
Top Comparisons
Top ComparisonsSee more CyberArk Privileged Access Security competitors »See more Oracle Identity Manager (Oracle IAM) competitors »
Also Known As
Also Known AsCyberArk Privileged Account Security, SSH Key Manager, Privileged Session Manager, Privileged Threat Analytics, Application Identity Manager, On-Demand Privileges Manager, Endpoint Privilege Manager
Website/Video
Website/VideoCyberArk
Oracle
Overview
Overview

CyberArk is the trusted expert in privileged account security. Designed from the ground up with a focus on security, CyberArk has developed a powerful, modular technology platform that provides the industry's most comprehensive Privileged Account Security Solution.

Oracle Identity Manager is a powerful and flexible enterprise identity management system that automatically manages users' access privileges within enterprise IT resources. Its flexible architecture easily handles the most uncompromising and rigorous IT and business requirements -- without requiring changes to existing infrastructure, policies or procedures.

For more information on Oracle Identity Manager, visit Oracle.com

OFFER
Learn more about CyberArk Privileged Access Security
Learn more about Oracle Identity Manager (Oracle IAM)
Sample Customers
Sample CustomersRockwell AutomationKaiser, SaskTel, SuperValu
Top Industries
Top Industries
REVIEWERS
Financial Services Firm
27%
Insurance Company
15%
Healthcare Company
12%
Retailer
9%
VISITORS READING REVIEWS
Financial Services Firm
30%
Insurance Company
8%
Comms Service Provider
7%
Energy/Utilities Company
7%
REVIEWERS
Manufacturing Company
16%
Comms Service Provider
11%
Software R&D Company
11%
Government
11%
VISITORS READING REVIEWS
Financial Services Firm
21%
Comms Service Provider
20%
Energy/Utilities Company
8%
Media Company
6%
Company Size
Company Size
REVIEWERS
Small Business
21%
Midsize Enterprise
10%
Large Enterprise
69%
VISITORS READING REVIEWS
Small Business
18%
Midsize Enterprise
23%
Large Enterprise
59%
REVIEWERS
Small Business
20%
Midsize Enterprise
11%
Large Enterprise
68%
VISITORS READING REVIEWS
Small Business
11%
Midsize Enterprise
20%
Large Enterprise
69%
Find out what your peers are saying about CyberArk Privileged Access Security vs Oracle Identity Manager (Oracle IAM) and others in Identity and Access Management (IAM).
Download now
287,566 professionals have used our research since 2012.
We monitor all Identity and Access Management (IAM) reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.

Sign Up with Email