No more typing reviews! Try our Samantha, our new voice AI agent.

BeyondTrust Endpoint Privilege Management vs CyberArk Privileged Access Manager vs Oracle Identity Governance comparison

 

Comparison Buyer's Guide

Executive Summary

Review summaries and opinions

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
 

ROI

Sentiment score
6.9
BeyondTrust Endpoint Privilege Management offers ROI through compliance, security, cost savings, and efficient PAM benefits on Microsoft Azure.
Sentiment score
6.6
CyberArk enhances security, reduces risks and costs, improves efficiency, and streamlines workflows, but ROI remains difficult to quantify.
Sentiment score
5.4
Oracle Identity Governance offers automation benefits, yet opinions vary on cost-efficiency and customization for complex needs.
Money saving is the main part because every organization tries to reduce their costs.
System Engineer at Corporate Projukti Limited
The return on investment lies in improved security infrastructure, addressing over-privileged access, and reducing the risk of credential compromise, which is a major source of data breaches.
Cyber Security Engineer at Isolutions Associates Ltd (ISOLS)
The end users have the authority to reconcile the password or verify it before using session isolation, which is one of the unique features that can be enabled through Privileged Session Manager, preventing any attacks from happening within the organization when connected with sessions through CyberArk Privileged Access Manager.
Senior Engineer at a tech vendor with 1,001-5,000 employees
CyberArk Privileged Access Manager has helped customers save on costs primarily by reducing the number of engineering and information security personnel.
Head of Sales Services Department at a comms service provider with 51-200 employees
It is able to save time and money as everything is automated: user access provisioning, password policy management, and reporting.
Consultant at a tech services company with 11-50 employees
 

Customer Service

Sentiment score
7.1
BeyondTrust Endpoint Privilege Management support is positively rated for expertise but could improve response times, especially in Pacific time.
Sentiment score
6.5
CyberArk Privileged Access Manager's customer service is knowledgeable but experiences delays and inconsistency in response times.
Sentiment score
5.2
Customer service ratings are mixed, with issues in technical support, resolution times, and product familiarity varying by region.
Support is critical, especially when challenges arise related to PAM.
Solution Architect at FVC
They offer support around the clock, and responses are generally quick.
CEO at a non-tech company with 11-50 employees
BeyondTrust support is reliable.
System Engineer at Corporate Projukti Limited
CyberArk has been exceptional in coming back to us with immediate responses.
IT Cyber Security Lead at a mining and metals company with 1,001-5,000 employees
It could be forever until you talk to someone who knows what they are doing.
Senior PAM Consultant at iC Consult GmbH
Based on the issue resolution and support quality, I rate the support 10 out of 10.
Operation Specialists at a tech vendor with 10,001+ employees
I do have dedicated support called the PUMA support, and they are providing excellent service.
Company Manager at cloudbreak
The team is not very knowledgeable and takes too long to respond.
Senior Manager at a consultancy with 10,001+ employees
While they are familiar with me, the team is not large enough, which impacts their availability.
Associate VIce President at Mastek Ltd
 

Scalability Issues

Sentiment score
7.3
BeyondTrust Endpoint Privilege Management scales effectively, supports large networks, and integrates easily, meeting enterprise-level needs efficiently.
Sentiment score
7.6
CyberArk Privileged Access Manager is scalable, supports diverse environments, but scaling decisions depend on licensing and proper planning.
Sentiment score
6.9
Oracle Identity Governance is scalable for medium to large enterprises, with expert configuration optimizing performance and load management.
The initial understanding of the environment is crucial, followed by a simple deployment process.
Solution Architect at FVC
The CPM can reportedly handle up to 50,000 accounts independently without issue.
Privileged Access Management Engineer at a hospitality company with 10,001+ employees
I would rate it a ten out of ten for scalability.
IT Cyber Security Lead at a mining and metals company with 1,001-5,000 employees
They had 40,000 passwords in this one safe, and it was saving the last ten iterations of each password object. That means they had 400,000 password objects in this safe. They exceeded the limit.
Senior PAM Consultant at iC Consult GmbH
 

Stability Issues

Sentiment score
7.6
BeyondTrust Endpoint Privilege Management is stable and excels in cloud deployments, with minor configuration-related issues noted.
Sentiment score
7.7
CyberArk Privileged Access Manager is highly reliable and stable, with minor issues mainly from older versions or configurations.
Sentiment score
6.2
Oracle Identity Governance's stability varies, requiring correct configuration and frequent patches, with performance affected by system load and hardware.
The appliances are stable, and there are no significant issues with backups or recovery.
CEO at a non-tech company with 11-50 employees
BeyondTrust Endpoint Privilege Management is very easy to use; if you know the process of cybersecurity, you will not experience downtime.
Presales Engineer at SAUDI PARAMOUNT COMPUTER SYSTEMS
Proper fine-tuning and expertise ensure the product performs well.
Cybersecurity Specialist at a comms service provider with 5,001-10,000 employees
Overall, the stability of the solution is high.
Senior Cybersecurity Manager at a financial services firm with 10,001+ employees
It has a large customer base and positive feedback within my network.
Senior Manager at a energy/utilities company with 1,001-5,000 employees
 

Room For Improvement

BeyondTrust Endpoint Privilege Management needs UI enhancement, better OS integration, smoother deployment, improved support, and streamlined policy management.
CyberArk Privileged Access Manager needs improved navigation, reporting, automation, integration, platform compatibility, and pricing for enhanced user satisfaction.
Oracle Identity Governance needs enhancements in setup, UI, resource efficiency, documentation, support, integration, AI, and built-in functionalities.
The ability to view recorded live sessions of specific users is a crucial benefit.
Solution Architect at FVC
There is a need for better MQ integration with DevOps and improvements in architecture.
CEO at a non-tech company with 11-50 employees
This product is highly ranked on Gartner, Peers, and other review sites.
System Engineer at Corporate Projukti Limited
They want everything to be on the cloud, but even in the SaaS version of CyberArk Privileged Access Manager, they need to deploy some servers on-premises.
Presales Engineer at a computer software company with 201-500 employees
We cannot generate a plug-in for web-based applications.
Contractor at a pharma/biotech company with 5,001-10,000 employees
If they want clients to move to the cloud, they need to support them in real-time.
Senior Manager at a consultancy with 11-50 employees
Incorporating AI to reduce manual work would be beneficial.
Senior Manager at a consultancy with 10,001+ employees
Oracle Identity Governance is a thick, heavy application and has fewer application connectors compared to SailPoint, which offers a large number of out-of-box connectors, making integration easier.
Consultant at a tech services company with 11-50 employees
Improvements could include making Oracle Identity Governance a simpler plug-and-play product.
Associate VIce President at Mastek Ltd
 

Setup Cost

BeyondTrust Endpoint Privilege Management offers complex, competitive pricing with varying licensing models, recommended for negotiation and fixed-price deals.
CyberArk Privileged Access Manager is costly but valued for features and security, deemed worthwhile for large implementations.
Oracle Identity Governance is costly, influenced by licensing, support, implementation, with complex planning and lengthy setup increasing expenses.
If a solution fits a customer's budget, considerations must be made that it may not have all the features of more expensive solutions.
Solution Architect at FVC
CyberArk is expensive compared to other products I know.
Cybersecurity Specialist at a comms service provider with 5,001-10,000 employees
CyberArk is comparatively expensive compared to other PAM solutions, such as Delinea, especially during renewal.
Presales Engineer at a computer software company with 201-500 employees
CyberArk's SaaS solution is particularly expensive.
Senior Manager at a energy/utilities company with 1,001-5,000 employees
They sell the solution cheaply, but setting up and maintaining it becomes very expensive.
Senior Manager at a consultancy with 10,001+ employees
If you want to implement it at full scale, it's not an entry-level product; it's an enterprise-class product and it is expensive.
General Manager Technical at Techaccess Pakistan
Oracle Identity Governance is very expensive.
Associate VIce President at Mastek Ltd
 

Valuable Features

BeyondTrust Endpoint Privilege Management enhances security with granular control, integration, and features like asset discovery and threat detection.
CyberArk Privileged Access Manager enhances security and efficiency with robust features, seamless integrations, and user-friendly, scalable architecture.
Oracle Identity Governance streamlines user management, enhancing compliance and security with automation, rich connectors, and integration capabilities.
Another important aspect is the ability to move the solution to the cloud or install it on-premises, offering my customers flexibility.
CEO at a non-tech company with 11-50 employees
When any unauthorized user makes an attempt, it notifies the administrators.
System Engineer at Corporate Projukti Limited
For security purposes in BeyondTrust Endpoint Privilege Management, when employees are working in the system, we can make a recording of the video, showing the modifications and configurations they made, allowing us to see everything.
Presales Engineer at SAUDI PARAMOUNT COMPUTER SYSTEMS
CyberArk Privileged Access Manager helps ensure data privacy because we now know who is using which credentials and at what time.
Senior Cybersecurity Manager at a financial services firm with 10,001+ employees
It keeps a record of activities, allowing me to easily fetch screen recordings to detect any misuse and see who did what and what happened.
Senior Manager at a consultancy with 11-50 employees
It can integrate with Splunk, SNMP, and other solutions and technologies.
Technical Support Analyst at Capgemini
The reporting function and Identity Audit function help with compliance, as they provide access review certification, segregation of duties, and a reporting feature.
Consultant at a tech services company with 11-50 employees
The features I find most effective in Oracle Identity Governance include size and scale management, which is good for large organizations.
Senior Manager at a consultancy with 10,001+ employees
The solution's capabilities in provisioning, de-provisioning, terminations, and transfers are excellent.
Associate VIce President at Mastek Ltd
 

Mindshare comparison

Privileged Access Management (PAM) Mindshare Distribution
ProductMindshare (%)
BeyondTrust Endpoint Privilege Management3.0%
CyberArk Privileged Access Manager10.5%
Delinea Secret Server4.5%
Other82.0%
Privileged Access Management (PAM)
Privileged Access Management (PAM) Mindshare Distribution
ProductMindshare (%)
CyberArk Privileged Access Manager10.5%
Delinea Secret Server4.5%
One Identity Safeguard4.4%
Other80.6%
Privileged Access Management (PAM)
Identity Governance Administration (IGA) Mindshare Distribution
ProductMindshare (%)
Oracle Identity Governance4.9%
SailPoint Identity Security Cloud30.9%
Saviynt Identity Cloud18.7%
Other45.5%
Identity Governance Administration (IGA)
 

Featured Reviews

Md Abdul Hakim - PeerSpot reviewer
System Engineer at Corporate Projukti Limited
Offers solid performance and user adaptability but needs better pricing options and local support
BeyondTrust is a strong, compliance-driven solution with excellent market recognition (Gartner, Peers, etc.), making it appealing for Bangladeshi enterprises. However, some key improvements could accelerate adoption: Areas for Improvement: Pricing & Local Affordability While the product’s capabilities justify its value, cost remains a barrier for many Bangladeshi organizations. Competitive pricing or regional discounts would make it more accessible. Local Support & Partnerships Currently, lack of local partners or trainers creates delays in support, implementation, and pricing negotiations. Establishing a Bangladesh-based support team or authorized resellers would improve responsiveness and trust. Enhanced Onboarding & Training Offering localized training programs (in Bengali/English) and documentation would help IT teams deploy and manage the solution more efficiently. Recommendations for Next Release: Introduce tiered pricing for emerging markets like Bangladesh. Develop a partner network in Bangladesh for faster service and sales. Add simplified dashboards for easier monitoring by non-technical staff. Final Note: BeyondTrust is already a top-tier PAM solution, but addressing these gaps would solidify its leadership in Bangladesh’s growing cybersecurity market.
Atul-Gujar - PeerSpot reviewer
CyberArk manager at a comms service provider with 10,001+ employees
Secures critical infrastructures with essential user session audit records
A potential area for improvement is enhancing support for cluster environments and distributed Vaults. Clients in multiple countries that need central access have different challenges that require better solutions from CyberArk. For financial services, CyberArk can improve incident response by ensuring fast support for critical priority tickets to meet compliance requirements. Providing more documentation on CyberArk is recommended for new team members to enhance their troubleshooting capabilities. I understand it's up to the client, but 99% fail to change the demo key, so it's crucial for CyberArk to emphasize changing the key and documenting it as part of the installation process.
Ziad Khawam - PeerSpot reviewer
Company Manager at cloudbreak
Identity workflows have delivered strong governance but remain complex to install and customize
I would describe the installation of Oracle Identity Governance on-premises as quite complex. Very complex. To install the product, it took us maybe three or four days to get it up and running just to go through the installation procedures. I repeated the same exercise in 2017 because I also migrated from 11c to 12c. That was the migration in 2017 that I managed. The migration took a long time. It took two to three years to be able to literally migrate all the code that I had. So it was quite complex. To summarize it quickly, I would describe the product as complete, very powerful, and very capable. However, it is extremely complex because Oracle relies on their own framework to customize and develop and fine-tune the functionalities. It is not Java, it is not some public framework. It is Java-based more or less, but it has their own Oracle framework for development and that makes the product quite complex to harness.
report
Use our free recommendation engine to learn which Privileged Access Management (PAM) solutions are best for your needs.
890,124 professionals have used our research since 2012.
 

Top Industries

By visitors reading reviews
Financial Services Firm
16%
Manufacturing Company
9%
Government
9%
Comms Service Provider
7%
Financial Services Firm
13%
Manufacturing Company
10%
Computer Software Company
7%
Comms Service Provider
6%
Financial Services Firm
16%
Construction Company
8%
Manufacturing Company
8%
Healthcare Company
7%
 

Company Size

By reviewers
Large Enterprise
Midsize Enterprise
Small Business
By reviewers
Company SizeCount
Small Business15
Midsize Enterprise3
Large Enterprise15
By reviewers
Company SizeCount
Small Business60
Midsize Enterprise42
Large Enterprise174
By reviewers
Company SizeCount
Small Business23
Midsize Enterprise11
Large Enterprise46
 

Questions from the Community

Looking for recommendations and a pros/cons template for software to detect insider threats
This is an inside-out --- outside-in --- inside-in question, as an insider can be an outsider as well. There is no sh...
What is your experience regarding pricing and costs for BeyondTrust Endpoint Privilege Management?
BeyondTrust's pricing is premium but negotiable for Bangladesh. Expect 20-30% extra costs from currency/import factor...
What needs improvement with BeyondTrust Endpoint Privilege Management?
In future updates of BeyondTrust Endpoint Privilege Management, I would prefer to see features for Password Safe and ...
How does Sailpoint IdentityIQ compare with CyberArk PAM?
We evaluated Sailpoint IdentityIQ before ultimately choosing CyberArk. Sailpoint Identity Platform is a solution to m...
What do you like most about CyberArk Privileged Access Manager?
The most valuable features of the solution are control and analytics.
What is your experience regarding pricing and costs for CyberArk Privileged Access Manager?
My thoughts on the pricing of CyberArk Privileged Access Manager depend entirely on the vendors' requirements. If the...
What is your experience regarding pricing and costs for Oracle Identity Governance?
Whether Oracle Identity Governance is affordable or slightly expensive depends on the category. For a small-scale com...
What needs improvement with Oracle Identity Governance?
I would describe the installation of Oracle Identity Governance on-premises as quite complex. Very complex. To instal...
What is your primary use case for Oracle Identity Governance?
I am currently working on Oracle Identity Governance and Oracle Access Manager (OAM), as I am specialized in the IAM ...
 

Also Known As

BeyondTrust PowerBroker, BeyondTrust Endpoint Privilege Management for Windows, BeyondTrust Endpoint Privilege Management for Mac, BeyondTrust Endpoint Privilege Management for Linux, BeyondTrust Endpoint Privilege Management for Unix, Avecto Defendpoint
CyberArk Privileged Access Security, CyberArk Enterprise Password Vault
Oracle Identity Manager, Oracle IAM, Oracle Identity and Access Management Suite
 

Overview

 

Sample Customers

Aera Energy LLC, Care New England, James Madison University
Rockwell Automation
Werkbank, Oshkosh, PeerPay, Boingo, Kellogg's, Pella, Slanska, Avaya, D+M
Find out what your peers are saying about CyberArk, One Identity, Okta and others in Privileged Access Management (PAM). Updated: April 2026.
890,124 professionals have used our research since 2012.