We performed a comparison between CyberArk Identity and CyberArk Privileged Access Manager based on real PeerSpot user reviews.
Find out in this report how the two Access Management solutions compare in terms of features, pricing, service and support, easy of deployment, and ROI."The initial setup of CyberArk Identity was straightforward."
"It has machine learning and can help clients to learn the environment and understand what is happening."
"The user identification is simplified, and managing user privileges, whether adding or revoking them, is also quite straightforward when utilizing CyberArk SaaS."
"The solution helps with auditing, and monitoring, and integrates with Splunk for log analysis. User activity logs are captured in CyberArk Identity and sent to external tools like Splunk for analysis and monitoring."
"If anyone makes an error, or if an incident occurs by accident, the business will not be harmed as a result of this activity."
"The tool helps with authentication. It acts as an MFA for any kind of privileged access that occurs in our organization."
"The most valuable feature of CyberArk Identity is the adaptive interface."
"The user self-service program and the Office 365 provisioning service feature are the most valuable. It is a very easy and feature-rich solution that gives priority to the users and security."
"It is scalable."
"PSM (Privilege Session Manager."
"We have demoted a lot of domain admins and taken a lot of that away from people, giving it a shared account structure."
"Rather than multiple tools for maintaining regulatory compliance around passwords and privileged accounts, we have centralized as much as possible with CyberArk. This is now a one stop shop for end users to access their elevated credentials."
"All the features of CyberArk are useful for me, but the biggest one is that CyberArk has logs for all the features. That is important when there is a problem. You know where to look and you have the information. In cyber security, the most important aspect is information."
"The most valuable aspects of the solution include password management and Rest API retrieval of vaulted credentials."
"We are able to rotate credentials and have privileged account access."
"It gives us the capability to rotate passwords."
"CyberArk Identity's GUI is an area with certain shortcomings that need improvement."
"We would like to see an improvement in the ability to manage mobile devices."
"The OpenID features could improve in CyberArk Identity."
"The solution's difficulty in gaining skill sets should be improved because it's a vertical product."
"More integrations would be better."
"The solution could be easier to use and I found it to be very complex involving many steps."
"They could improve their UI and make everything more user-friendly."
"I'm not sure what needs improvement. It is a good platform."
"For users to access a system via CyberArk Privileged Session Manager, a universal connector needs to be coded in a language called AutoIT and its support for web browsers is so-so. Other products like Centrify have browser plugins that can help automate the process when using their products."
"CyberArk Privileged Access Manager could improve the integration with other solutions and ease of use. Additionally, there should be a feature to have remote connections without a VPN."
"I think having a distributed architecture would certainly help this solution."
"Some aspects of the administration need improvement, though they have recently made improvements to the API. However, the management with the interface and configuration are not so user-friendly. It has not changed much during all the years that CyberArk has been on the market. The management part, like platform management as well as PSM connectors definition and management, could be improved, even if it has already been done with the API."
"The Vault's disaster recovery features need improvement."
"Our DevOps team is looking in the direction of cloud, because we are not in it today. We are hoping to build it with Conjur from the ground up."
"There is room for improvement in the availability of custom connectors on the marketplace for this solution. Additionally, their services for the CICD pipeline and ease of integration could be improved."
"The tool’s pricing and scalability can be better."
More CyberArk Privileged Access Manager Pricing and Cost Advice →
CyberArk Identity is ranked 8th in Access Management with 17 reviews while CyberArk Privileged Access Manager is ranked 1st in Privileged Access Management (PAM) with 142 reviews. CyberArk Identity is rated 8.2, while CyberArk Privileged Access Manager is rated 8.8. The top reviewer of CyberArk Identity writes "Allows Linux and Unix administrators to login with single password ". On the other hand, the top reviewer of CyberArk Privileged Access Manager writes "Lets you ensure relevant, compliant access in good time and with an audit trail, yet lacks clarity on MITRE ATT&CK". CyberArk Identity is most compared with Microsoft Intune, Microsoft Entra ID, SailPoint IdentityIQ, PingFederate and VMware Workspace ONE, whereas CyberArk Privileged Access Manager is most compared with Cisco ISE (Identity Services Engine), Microsoft Entra ID, Delinea Secret Server, WALLIX Bastion and CyberArk Endpoint Privilege Manager. See our CyberArk Identity vs. CyberArk Privileged Access Manager report.
See our list of best Access Management vendors.
We monitor all Access Management reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.