Keep reading to learn what users really think about these IAM tools.
Oracle Identity Manager
Identity Lifecycle Management
A Principal IAM Architect at a retailer with 1,001-5,000 employees writes:
“The most valuable features are the comprehensiveness; the whole identity lifecycle management; the centralized view of people requesting access to provisioning, to SLD, and to access review; basically, the whole suite.
The features are there. Oracle has always had a good vision about where the product is going.
The greatest benefit is increased efficiency so we can manage the identity lifecycle faster and better and so we can govern the access from a central place and make it easier.”
Simplified Integration with non-Oracle Apps
A DBA Manager/Principal Database Architect at a manufacturing company with 1,001-5,000 employees writes:
“I would like to see it expand to other applications as well. There are certain non-Oracle applications where the integration might be difficult. It would be good if that integration could be simplified.”
CyberArk Privileged Account Security
Improved Access Control
Alan Hammond, Head of Technical Services at a tech services company with 51-200 employees, writes:
“With the ability to better control access to systems and privileged accounts, we no longer need to manage privilege accounts per user. We are able to manage privilege accounts for the service, which is automatically managed by the CPM as part of the solution.
Allowing access to systems by group membership, via safe access, makes controlling actual access much simpler than traditional mapping via the Active Directory.”
Better Usability for Non-Technical People
Den Tom, SD/Infrastructure Coordinator at a software R&D company with 201-500 employees, writes:
“I would like to see better usability for non-technical people. If you use the PVWA interface, I noticed that the end user would need some extra training. The portal doesn't navigate so easily if you don't know it.
With Facebook, for example, people find their way around easily. In PVWA, it takes some time to know how it works from an end-user point of view.”
IBM Tivoli Access Manager
Jatin Vaidya, Senior IAM/ Security Consultant at a tech services company with 11-50 employees, writes:
SSO, URL-based Access Control, OAuth 2 and OIDC
“The SSO, URL-based access control, OAuth 2 and OIDC are the most valuable features.
The URL-based access control has become more important due to the paradigm shift towards RESTful APIs, i.e., where URLs uniquely represent the resources to be protected. IBM TAM has a rich authorization model which simulates the system/environment to be protected by its protected object space.
This makes it easy to visualize the hierarchical model of the end system and to attach ACLs/policies and customized rules, to the objects to be protected.”
Administration from One “Master” Appliance
Wim Thevelin, IAM Security Architect & Consultant at a tech services company with 51-200 employees, writes:
“I would like to see the possibility to administer the appliances from one “master” appliance, instead of having to log in to each particular appliance.”
OneLogin
User Role Mapping
Thomas Blade, Senior Google Sales Engineer at a tech services company with 51-200 employees, writes:
“The most valuable feature is the user role mapping feature that makes adding new users and automatically assigning applications incredibly easy!
I selected OneLogin for my organization not only for the technical capabilities but also the support and communication structure. The groups that I have been in contact with are always easy to reach and quick to respond/resolve. In the realm of IT software, this is a HUGE determining factor for me.”
Idea Portal Submissions are Implemented
Matthew Irvine, Director of Digital Media Services at a university with 501-1,000 employees, writes about OneLogin’s idea portal, “where customers can submit product enhancements to the company”:
Irvine shares that “They regularly implement ideas from their Ideas portal...I have personally submitted 10 ideas through the portal, and the company has taken action on half of these ideas. Two of them have already been implemented into the product.”
For a banking or financial services use case you should check out SplitSecure. Very easy to deploy and use and splits secrets across devices rather than on cloud servers so you get full cryptographic sovereignty and compliance with MiCA, DASCP C10/C27 and DORA by default.
Hello Avinash, it all depends on the timeline and urgency of the project. If you need to deploy a PAM tool that focuses on standing privileges, stopping lateral movement, and incorporating Zero Standing Privileges as part of Zero Trust, then please consider looking at Remediant. I've worked for BeyondTrust and have gone up against the other big players such as Delinea, Centrify, CyberArk, and HashiCorp. They more or less all offer similar solutions, but looking at your current requirements, Remediant really excels in delivering a simple, yet very effective tool in a matter of days and weeks, not months and years.
Based on your extensive list of requirements, CyberArk Privileged Access Manager appears to align well with your needs due to its comprehensive feature set, strong security controls, integration capabilities, and advanced analytics for privileged access. However, it's important to conduct in-depth evaluations, demos, and discussions with each vendor to ensure that the chosen tool meets all your specific needs and integrates seamlessly into your existing infrastructure.
However, I recommend visiting the official website of Broadcom (the company that acquired Symantec's enterprise security business) or contacting their sales representatives to get the most up-to-date information about their PAM solutions, including any rebranding or changes that may have occurred.
When evaluating any PAM solution, it's essential to consider factors such as security, integration capabilities, ease of use, vendor support, scalability, and alignment with your organization's specific needs and compliance requirements. It's also a good practice to request demonstrations, proofs of concept, and references from vendors to ensure that the solution meets your expectations.
Remember to involve key stakeholders, such as IT, security, compliance, and management teams, in the decision-making process to ensure alignment with organizational goals and requirements.
We evaluated Sailpoint IdentityIQ before ultimately choosing CyberArk. Sailpoint Identity Platform is a solution to manage risks in cloud enterprise environments. It automates and streamlines the management of user identities, systems, data, and cloud services. It works great for Identity Access Management, specifically for cleaning up inactive and orphaned accounts. It has the joiner-mover-lea...
We evaluated Sailpoint IdentityIQ before ultimately choosing CyberArk. Sailpoint Identity Platform is a solution to manage risks in cloud enterprise environments. It automates and streamlines the management of user identities, systems, data, and cloud services. It works great for Identity Access Management, specifically for cleaning up inactive and orphaned accounts. It has the joiner-mover-leaver feature.
One of the features we like is the large availability of connectors for different applications and platforms. You can also recertify an account, which is very useful. It is well suited for large companies with lots of users and applications. However, for small companies, it might be a bit of an overkill.
Sailpoint has a steep learning curve, so it is not for inexperienced users. Moreover, it doesn’t offer a lot of supporting documentation. It also doesn’t integrate well with other solutions.
We chose CyberArk despite the cost because it works great for password management. CyberArk helps manage privileged accounts and service accounts, for example, when users need to connect remotely into systems. It is especially useful for IT staff to access their privileged accounts without having to remember the passwords every time - individually and even as a group.
What we like the most about CyberArk is the ease of use and effectiveness in managing privileged accounts. For instance, it automatically changes the passwords for privileged accounts and reconciles and verifies passwords. New users can obtain secure credentials with minimal time and effort.
The initial cost is high, which can be a bit of a stretch for small organizations. It also has high requirements for the initial setup and is difficult to customize. The performance could be faster.
Conclusions
While Sailpoint IdentityIQ is a very good privileged account solution, CyberArk is better suited for us because of its ease of use and efficiency in password management.
Identity Management Consultant at a consultancy with self employed
Dec 1, 2021
The two products are actually complimentary. Both companies have been very good about staying in their lanes and are their respective market leaders.
CyberArk's PAM solution is aimed at protecting privileged accounts by providing features like vaulting, credential rotation, session monitoring and recording. They also have solutions for DevOps and Secrets management.
SailPoint is an Identity Governance solution and actually manages CyberArk as an application the same way it manages accounts and privileges in SAP, AD, AAD and over 100 more applications. For CyberArk, it can add/change/delete users as well as create safes and assign users to those safes. At a user account certification time, it will show the CyberArk users and their associated privileges and allow the user's manager or other appropriate people to approve or revoke the privileged access.
SailPoint creates an Identity warehouse so that a user's accounts and entitlements are gathered, managed and reported on in a centralized manner. See Youtube for a quick explanation - SailPoint Identity Governance Integrates with CyberAek Privileged Access Security.
SailPoint does not provide the vault and session management functions that CyberArk does.
Download our free Identity Management (IM) Report and find out what your peers are saying about CyberArk, SailPoint, Microsoft, and more! Updated: February 2026.