Try our new research platform with insights from 80,000+ expert users

CyberArk Endpoint Privilege Manager vs One Identity Manager comparison

 

Comparison Buyer's Guide

Executive Summary

Review summaries and opinions

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
 

ROI

Sentiment score
7.1
CyberArk Endpoint Privilege Manager enhances security, reduces risks and costs, saves resources, and protects sensitive information effectively.
Sentiment score
7.3
One Identity Manager enhances efficiency, security, and compliance, reducing costs and onboarding time while increasing productivity and role-based access.
Deploying CyberArk Endpoint Privilege Manager has secured the infrastructure, which saves money, time, and resources.
I consider CyberArk Endpoint Privilege Manager's return on investment to be good since it effectively accomplishes the goals expected from privilege access management solutions.
Without it, we would need thousands of additional people.
If you do not see it as purely an Identity Management tool but as a possibility to automate processes in the company, it provides a huge amount of value.
One Identity Manager saved us approximately thirty to forty percent in terms of time, money, and resources compared to our pre-deployment setup.
 

Customer Service

Sentiment score
6.2
CyberArk Endpoint Privilege Manager support is knowledgeable but needs improvements in response times, accessibility, and first-level assistance.
Sentiment score
6.7
Customer service for One Identity Manager is mixed, with premium support praised but inconsistency in regular support noted.
They respond immediately to our inquiries, resolve issues promptly, and provide valuable guidance, especially in critical situations.
We engage them when needed and receive prompt responses that typically resolve our issues.
Earlier, we received support for normal tickets within a day, but now it takes one or two days to resolve issues.
If you have outages or critical production problems, you can count on the manufacturer to help resolve the situation.
If I raised a request while they were active, I received responses within an hour.
After submission, they contact the product team, which often takes one or two months to respond.
 

Scalability Issues

Sentiment score
7.7
CyberArk Endpoint Privilege Manager efficiently scales for large deployments, praised for growth-centered architecture despite integration complexities.
Sentiment score
7.2
One Identity Manager is scalable but requires performance optimizations for large environments due to database and backend limitations.
We can set permissions per team or department, allowing some teams to elevate specific applications while others have different permissions.
CyberArk Endpoint Privilege Manager is quite scalable.
The available reports and other security tools assist in scaling it according to my organization's needs.
We could handle about 1,00,000 records for different users.
I would rate its scalability as strong since we have not experienced any significant challenges.
We are hosting it centrally in Switzerland.
 

Stability Issues

Sentiment score
8.2
CyberArk Endpoint Privilege Manager is stable, with 99.99% uptime, reliable on Windows, needing console improvements and minimal memory.
Sentiment score
7.3
One Identity Manager is stable, with issues mainly due to custom setups, not the software itself, except during upgrades.
It is a robust solution that has effectively supported our environment without major issues.
Since implementing it, we have not experienced any outages or stability issues.
CyberArk Endpoint Privilege Manager offers multiple options for creating and stopping policies.
I would rate it a nine out of ten for stability.
Specifically affecting the test and development environments, not the production environment.
One Identity Manager has improved in terms of performance and added functionality.
 

Room For Improvement

CyberArk Endpoint Privilege Manager needs improved integration, user interface, and pricing, along with enhanced compatibility and functionality.
One Identity Manager struggles with performance, integration, usability, configuration complexity, insufficient documentation, and slow support services.
CyberArk Endpoint Privilege Manager could be improved by simplifying the administration process, specifically when setting up policies and applications.
Currently, no user-based policy option is available inside the EPM console.
Some features provided in the self-hosted version of EPM are not supported in the software as a service version, like connection to some analysis applied by Palo Alto.
This lack of 24-hour support is problematic from a testing and development standpoint.
It is crucial for them to expand their support team to match their product's success.
In terms of providing a single platform for enterprise-level administration and governance of users, data, and privileged accounts, One Identity is not yet there.
 

Setup Cost

CyberArk Endpoint Privilege Manager's high pricing is justified by its quality, features, and appeal to large enterprises in finance.
One Identity Manager offers competitive pricing and robust features, valued for cost-efficiency by enterprises seeking regulatory compliance.
CyberArk Endpoint Privilege Manager is slightly expensive, but costs can be negotiated to become more competitive.
CyberArk Endpoint Privilege Manager is costly compared to other solutions.
I've received feedback that the pricing is high, however, for me, the value it brings is worth the cost.
On-premises might incur higher costs.
We have a good enterprise license agreement, and we are very happy with what we get for the price we pay for it.
On-premises, it is cheap.
 

Valuable Features

CyberArk Endpoint Privilege Manager enhances security by managing privileges, integrating seamlessly, and preventing ransomware while ensuring regulatory compliance.
One Identity Manager provides flexible customization, automation, user-friendly interface, seamless integration, and robust governance for enhanced security and compliance.
CyberArk Endpoint Privilege Manager effectively reduces malicious content in applications by allowing us to identify and block dangerous applications.
It allows them to granularly manage controls to prevent some malicious activities on the endpoint machine.
CyberArk Endpoint Privilege Manager enhances computer security by providing minimal access, effectively preventing ransomware attacks.
It ensures high security through multiple approval processes, preventing unauthorized access and enhancing compliance by providing time-based access for privileged accounts with proper audit trails.
It continuously monitors user behavior in real-time, triggering automated responses, and manages secure access for both on-premises and cloud applications using protocols such as SAML.
Once you have some experience, it demonstrates best practices and guides you on the correct way to use the tool.
 

Categories and Ranking

CyberArk Endpoint Privilege...
Average Rating
8.2
Reviews Sentiment
6.8
Number of Reviews
38
Ranking in other categories
Endpoint Compliance (5th), Privileged Access Management (PAM) (3rd), Anti-Malware Tools (5th), Application Control (5th), Ransomware Protection (5th)
One Identity Manager
Average Rating
8.0
Reviews Sentiment
6.9
Number of Reviews
121
Ranking in other categories
User Provisioning Software (1st), Identity Management (IM) (3rd)
 

Mindshare comparison

While both are Identity and Access Management solutions, they serve different purposes. CyberArk Endpoint Privilege Manager is designed for Privileged Access Management (PAM) and holds a mindshare of 3.2%, down 3.8% compared to last year.
One Identity Manager, on the other hand, focuses on Identity Management (IM), holds 6.0% mindshare, down 7.2% since last year.
Privileged Access Management (PAM)
Identity Management (IM)
 

Featured Reviews

Sumit Chavan - PeerSpot reviewer
Helps secure the infrastructure and control users with admin rights
There are many features that are currently missing. A customization option is required for certain policies. For instance, if we need to stop PowerShell scripting, we have to create a different policy for that. Being able to create a sub-level policy within a top-level policy would be good. Currently, no user-based policy option is available inside the EPM console. We can only create computer-based policies. The database is available, but there is a drawback in not being able to create local groups on the EPM console. We only have to depend on Active Directory. This limits infrastructure security as we depend on the Active Directory team to manage user groups. If they remove any users, we lose control. If we could create groups locally and block them or set specific policies, we would have more control. Local endpoint management is missing from the EPM site. Moreover, there is an issue with policies not running as expected when we make enhancements. We have to find multiple ways to whitelist applications or enhance policies.
Ranjan Mishra - PeerSpot reviewer
Enables our organization to manage accounts across multiple target systems from a central identity management solution
The One Identity Manager web portal needs simplification. While a new Angular portal was introduced with version 8.2, the knowledge base lacks sufficient information and resources. Even with an Angular developer or a One Identity specialist, a knowledge gap exists due to the combination of AngularJS and One Identity schema expertise required. This makes it difficult to find resources that can effectively utilize the portal, highlighting the need for a more user-friendly interface. One Identity Manager currently offers Long Term Support only for version 9.0. All other versions have a two-year lifecycle with extended support. For organizations managing a complex environment with numerous connected systems, users, and assignments, upgrading every two years is impractical. Extending support for regular versions by one or two years would benefit clients in this situation.
report
Use our free recommendation engine to learn which Privileged Access Management (PAM) solutions are best for your needs.
865,140 professionals have used our research since 2012.
 

Top Industries

By visitors reading reviews
Computer Software Company
14%
Financial Services Firm
14%
Manufacturing Company
11%
Government
8%
Computer Software Company
16%
Financial Services Firm
13%
Manufacturing Company
8%
Government
6%
 

Company Size

By reviewers
Large Enterprise
Midsize Enterprise
Small Business
 

Questions from the Community

Looking for recommendations and a pros/cons template for software to detect insider threats
This is an inside-out --- outside-in --- inside-in question, as an insider can be an outsider as well. There is no short answer other than a blend of a PAM tool with Behavioral Analytics and Endpo...
What do you like most about CyberArk Endpoint Privilege Manager?
The most valuable feature of the solution is its performance.
What is your experience regarding pricing and costs for CyberArk Endpoint Privilege Manager?
I believe it's quite a reasonably priced solution. It's not very common to use CyberArk because it's a niche solution, but customers who are willing to control administrative accounts are willing t...
What do you like most about One Identity Manager?
The One Identity birthright process has helped generate user accounts more accurately and quickly.
What is your experience regarding pricing and costs for One Identity Manager?
The pricing for One Identity Manager is competitive in our region, so there is no issue with the license pricing. However, aside from the license for the StarLink apps, the cost is justified.
What needs improvement with One Identity Manager?
The ease of use of One Identity Manager could improve as the web portal is not the most user-friendly, and there are many places where the settings exist which can make it fuzzy and difficult to fi...
 

Also Known As

Viewfinity
Quest One Identity Manager
 

Overview

 

Sample Customers

Information Not Available
Texas A&M, Sky Media, BHF Bank, Swiss Post, Union Investment, Wayne State University. More at OneIdentity.com/casestudies
Find out what your peers are saying about CyberArk, Delinea, One Identity and others in Privileged Access Management (PAM). Updated: July 2025.
865,140 professionals have used our research since 2012.