

Find out what your peers are saying about CyberArk, One Identity, Okta and others in Privileged Access Management (PAM).
Money saving is the main part because every organization tries to reduce their costs.
I have seen a return on investment with Omada Identity in terms of time saved and fewer employees needed.
If we look at one customer where we initially started, they had about four to ten employees working on IGA, and it is now almost half of it.
Omada Identity has definitely helped us save time when provisioning access for various identities.
Support is critical, especially when challenges arise related to PAM.
They offer support around the clock, and responses are generally quick.
BeyondTrust support is reliable.
The vendor support needs improvement because we have reported serious incidents that remain unresolved.
Maintenance is necessary, and aside from that, if there are issues with Salesforce cloud, then Omada Identity may go down.
The customer support for Omada Identity is excellent.
The initial understanding of the environment is crucial, followed by a simple deployment process.
The scalability of Omada Identity is excellent; they offer flexible pricing for licenses, accommodating both full accounts and lighter identities, which makes it truly scalable.
Omada Identity is a top-growing tool that is booming in the market.
Omada Identity scales very well for our organization.
The appliances are stable, and there are no significant issues with backups or recovery.
BeyondTrust Endpoint Privilege Management is very easy to use; if you know the process of cybersecurity, you will not experience downtime.
In terms of stability, I rate Omada Identity a nine out of ten.
We have experienced too many unexpected errors on a daily basis.
Omada Identity is a stable and reliable tool.
The ability to view recorded live sessions of specific users is a crucial benefit.
There is a need for better MQ integration with DevOps and improvements in architecture.
This product is highly ranked on Gartner, Peers, and other review sites.
The biggest issue, which is the reason why we are transitioning from their product to SailPoint, is the overall user experience.
There is room for improvement in Omada Identity, primarily in customization for administrators; many custom tasks require contacting providers even for simple changes.
The deployment of Omada Identity is complex; the product is not brilliantly documented.
If a solution fits a customer's budget, considerations must be made that it may not have all the features of more expensive solutions.
They are lower than some of their competitors.
the product itself is said to have a good price, although the support can be expensive.
Another important aspect is the ability to move the solution to the cloud or install it on-premises, offering my customers flexibility.
When any unauthorized user makes an attempt, it notifies the administrators.
For security purposes in BeyondTrust Endpoint Privilege Management, when employees are working in the system, we can make a recording of the video, showing the modifications and configurations they made, allowing us to see everything.
Omada Identity helps automate reviews of access requests and reroutes them to appropriate people, which is what it should do; it really assists in reducing the workload time.
You can really do it codeless by creating a custom process with the process designer, adding the building blocks of the process designer into the process, and then getting it to work.
The integration with those systems helps my workflow and saves time considerably because I can manage all the accesses and assignments through Omada Identity at once, eliminating the need to add a license through Azure or a mailbox through Exchange.
| Product | Mindshare (%) |
|---|---|
| BeyondTrust Endpoint Privilege Management | 3.0% |
| CyberArk Privileged Access Manager | 10.5% |
| Delinea Secret Server | 4.5% |
| Other | 82.0% |
| Product | Mindshare (%) |
|---|---|
| Omada Identity | 12.1% |
| SailPoint Identity Security Cloud | 30.9% |
| Saviynt Identity Cloud | 18.7% |
| Other | 38.3% |


| Company Size | Count |
|---|---|
| Small Business | 15 |
| Midsize Enterprise | 3 |
| Large Enterprise | 15 |
| Company Size | Count |
|---|---|
| Small Business | 9 |
| Midsize Enterprise | 4 |
| Large Enterprise | 45 |
BeyondTrust Endpoint Privilege Management offers enhanced security through asset discovery and privilege elevation without administrative rights, supporting seamless operations in complex environments.
BeyondTrust Endpoint Privilege Management combines advanced threat detection with powerful tools like application control and session management. It is designed to secure IT infrastructures by removing local admin privileges and facilitating remote application publishing. With integration capabilities and robust compliance support, it is suitable for sectors needing stringent security measures. However, improvements in update frequency, Mac integration, and pricing, along with enhanced reporting and console access, are needed to broaden market reach. Organizations value its scalability and flexibility, despite needing better support and development maturity.
What Features Define BeyondTrust Endpoint Privilege Management?BeyondTrust Endpoint Privilege Management is widely adopted in the finance and healthcare industries for privileged access management and compliance. It is instrumental in secure server access and remote management, aligning with zero-trust approaches and integrating smoothly with enterprise platforms.
Omada Identity offers robust governance, user lifecycle management, and seamless provisioning with Active Directory integration, simplifying access management with a user-friendly, self-service interface.
Omada Identity combines strict governance with easy configuration, offering automation that excels in user lifecycle management. Its integration capabilities with systems like Active Directory provide seamless provisioning. The platform features a user-friendly self-service interface, enabling efficient process design without coding, which simplifies access management. Role-based access control, reporting, and compliance features elevate security and operational efficiency. Omada Identity is adaptable to evolving requirements, ensuring scalability while maintaining ease of use and rapid response in support services.
What are the key features of Omada Identity?Industries implement Omada Identity to streamline identity lifecycles, provisioning, and certification processes. It supports cloud and on-premises environments, enhancing security, governance, and compliance. Automated access reviews and security policy enforcement are critical for managing diverse user groups. Organizations in sectors such as finance, healthcare, and retail leverage these capabilities to ensure smooth operations and safeguard sensitive data.
We monitor all Privileged Access Management (PAM) reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.