User Reviews of CyberArk Privileged Access Manager & IBM Security Verify Access

Updated March 2024

Would you like to learn about products from people using them now? Simplify your research with trusted advice from people like you.

Download our FREE report comparing CyberArk Privileged Access Manager and IBM Security Verify Access based on reviews, features, and more!

Where should we email your report?






CyberArk Privileged Access Manager review

SatishIyer
SatishIyer
Assistant Vice President at a financial services firm with 10,001+ employees
Lets you ensure relevant, compliant access in good time and with an audit trail,...
When I was a component owner for PAM's Privileged Threat Analytics (PTA) component, what I wanted was a clear mapping to the MITRE ATT&CK framework, a framework which has a comprehensive list of use cases. We reached out to the vendor and asked them how much coverage they have of the uses cases found on MITRE, which would have given us a...
IBM Security Verify Access review

Gaurav Gaurav
Gaurav Gaurav
Architect at a tech services company with 10,001+ employees
Supports on-prem and cloud environments, has good integration capabilities, and is...
They can improve the single sign-on configuration for OIDC and OAuth. That is not very mature in this product, and they can improve it in this particular area. OIDC is a third-party integration that we do with the cloud platforms, and OAuth is an authorization mechanism for allowing a user having an account with Google or any other provider...

Since 2012, we've had 768,578 professionals use our research.

As seen in