In the review excerpts below, users discuss factors such as user-level management, privileged account management, and integration with other solutions.
Continue reading to learn what real users have to say about Oracle Identity Manager vs. CyberArk Privileged Account Security.
Oracle Identity Manager: Most Valuable Features
A DBA Manager/Principal Database Architect at a manufacturing company with 1,001-5,000 employees emphasizes the benefits of user-level management:
“The user-level management has improved when you have this solution in place. It's very difficult for us to manage the user access at the corporate level. It is a 24/7 job and we are global with multiple locations. We have user groups who manage all user access on the global level. That is easier to do with Oracle Identity Management in place.”
A Principal IAM Architect at a retailer with 1,001-5,000 employees discusses what he describes as Oracle Identity Manager’s “comprehensiveness”:
“The most valuable features are the comprehensiveness; the whole identity lifecycle management; the centralized view of people requesting access to provisioning, to SLD, and to access review; basically, the whole suite.
The features are there. Oracle has always had a good vision about where the product is going.”
CyberArk Privileged Account Security: Most Valuable Features
Malhar Vora, a CyberArk PAS Solution Professional / Project Manager at a tech vendor with 1,001-5,000 employees, discusses CyberArk PAS’s “digital vault” feature:
In version v9.7, CyberArk has introduced the Cluster Vault feature, which enhances high availability of the Vault server.”server.”high availability of the Vault server.”
An IT Admin at a tech company with 1,001-5,000 employees discusses the software’s proxy solution, which improves its overall security capabilities:
Security has been improved. It has improved compliance and there is more control over the privileged users.”
Oracle Identity Manager: Room for Improvement
Thiruraghavan Seshadri, an IAM Architect at a tech vendor with 1,001-5,000 employees, points out a need for integration with “solutions and products outside the Oracle stack”:
This Principal IAM Architect at a retailer with 1,001-5,000 employees also suggests that improvements be made to the solution’s “profile-based provisioning”:
“I would like them to focus on profile-based provisioning, make what we call the birthright access management. We need to have an easier way for people to find out the birthright rules and based on the birthright roles, the people get the access they need to get what they want done.”
CyberArk Privileged Account Security: Room for Improvement
Anitha Arulrajkumar, Senior Executive Information Security at a Consumer Goods with 1,001-5,000 employees, discusses CyberArk PAS’s integration capabilities:
“With every version, I can see that the product wins on functionality and user experience. On the latter though, I hear from customers that on the UI level, things could be better.
CyberArk continuously asks for feedback on the product (e.g., via support, yearly summits) from customers and partners, and hence, with version 10, they are addressing these remarks already.”
Identity Management Analyst at a financial services firm with 5,001-10,000 employees
Real User
Jun 13, 2017
This article doesn't make sense. these are two different tools with two different purposes. If you want a comparison, talk about Oracles Privileged access manager vs CyberArk
Identity Management is crucial for modern companies to ensure security, compliance, and enhance user experience. Businesses should consider the following aspects:
Security enhancements
Regulatory compliance
User access control
Efficiency improvements
Cost reduction
Importance of Identity Management is underscored by its ability to streamline user authentication and authorization processes, whic...
Identity Management is crucial for modern companies to ensure security, compliance, and enhance user experience. Businesses should consider the following aspects:
Security enhancements
Regulatory compliance
User access control
Efficiency improvements
Cost reduction
Importance of Identity Management is underscored by its ability to streamline user authentication and authorization processes, which significantly heightens security. Implementing effective IM systems minimizes the risk of identity theft and reduces exposure to data breaches. With IM solutions, companies can enforce policies ensuring that only authorized personnel have access to critical assets. This is accomplished through multi-factor authentication, role-based access control, and periodic audits. By restricting access based on roles and responsibilities, organizations can better protect sensitive information.Regulatory compliance is another vital aspect of Identity Management’s importance to businesses. Many industries are governed by stringent regulations requiring rigorous identity verification and data protection protocols. IM systems help businesses meet compliance standards such as GDPR, HIPAA, and others by providing detailed access logs and management. This ensures that companies are prepared for audits and reduces liability related to non-compliance. Additionally, the automation of user management processes through IM can lead to increased efficiency, reducing manual workloads and associated costs. Efficient identity solutions streamline user provisioning and de-provisioning, enhancing operational agility and reducing the risks of outdated or incorrect user access.
The Twilio incident shows that even tech-savvy companies can fall victim to well-crafted social engineering. Here's what I think we need to focus on:
First, we have to tackle phishing beyond just email.
Look, most anti-phishing tools are great at catching sketchy emails, but SMS phishing? That's a whole different game. The attackers were smart - they sent texts pretending to be from IT saying "...
IDM Engineer at a tech services company with 51-200 employees
Aug 10, 2022
In case of sophisticated social engineering attack designed to steal employee credentials there is a need to pay attention regarding education of employee first and if not already in place apply Zero Trust approach by implementing OTP and using it as mandatory for all employees. Any technical solution is not good enough to avoid willing leak of employee credentials by themself.
The Twilio incident shows that even tech-savvy companies can fall victim to well-crafted social engineering. Here's what I think we need to focus on:
First, we have to tackle phishing beyond just email.
Look, most anti-phishing tools are great at catching sketchy emails, but SMS phishing? That's a whole different game. The attackers were smart - they sent texts pretending to be from IT saying "your password expired" or "your schedule changed." Classic urgency tactics.
What we need:
Regular training that actually covers SMS and voice phishing scenarios. Not just the standard "don't click suspicious links" email training we've all sat through a million times
Work with telecom providers to get some SMS filtering in place (yeah, it's harder than email filtering, but it's necessary)
A simple rule: If someone texts you asking for credentials, pick up the phone and call IT directly. Old school verification still works
Second, we need to get serious about access management.
This is where Zero Trust and IGA come into play. Basically, stop trusting anyone by default - even your employees.
Here's what actually works:
Lock down access based on context. If Bob from accounting suddenly logs in from Romania at 3 AM, maybe don't let him access the financial systems?
Time-based access is huge. Why does anyone need 24/7 access to sensitive systems? Give people access during their work hours, from their usual devices
Get rid of SMS-based MFA yesterday. Hardware keys aren't sexy, but they work. Twilio learned this the hard way
Keep privileges tight. Does Sarah really need admin access to that system she uses once a quarter? Probably not. Give her temporary access when she needs it
The bottom line? Even if someone steals credentials through phishing, they shouldn't be able to waltz into your systems. Make them jump through hoops - legitimate users won't mind the extra security if you explain why it's there.
These aren't revolutionary ideas, but the Twilio breach shows we're still not doing the basics right. It's time to stop treating security as a checkbox exercise and actually implement these controls properly.
Download our free Identity Management (IM) Report and find out what your peers are saying about SailPoint, Microsoft, One Identity, and more! Updated: October 2025.
This article doesn't make sense. these are two different tools with two different purposes. If you want a comparison, talk about Oracles Privileged access manager vs CyberArk
I am wondering while reading this article. Does it make sense by comparing the two different tools which used for different purposes.
Amazon's AWS ,as is Azure, Linkedin, Google, Twitter and more are all supported devices for CyberArk's solution.