Try our new research platform with insights from 80,000+ expert users

CyberArk Identity vs CyberArk Privileged Access Manager comparison

 

Comparison Buyer's Guide

Executive SummaryUpdated on Dec 16, 2024

Review summaries and opinions

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
 

ROI

Sentiment score
5.2
CyberArk Identity boosts resource efficiency and security, achieving up to 85% savings and enhancing strategic focus for users.
Sentiment score
6.6
CyberArk Privileged Access Manager enhances security, automates tasks, aids SOX compliance, reduces risks, and scales security operations efficiently.
I have seen over 30% return on investment due to the improvement in operational efficiencies through automation, which enhances productivity.
The return on investment lies in improved security infrastructure, addressing over-privileged access, and reducing the risk of credential compromise, which is a major source of data breaches.
The end users have the authority to reconcile the password or verify it before using session isolation, which is one of the unique features that can be enabled through Privileged Session Manager, preventing any attacks from happening within the organization when connected with sessions through CyberArk Privileged Access Manager.
CyberArk Privileged Access Manager has helped customers save on costs primarily by reducing the number of engineering and information security personnel.
 

Customer Service

Sentiment score
6.5
CyberArk Identity's support is praised for effectiveness but needs improvement in response times and engineer expertise consistency.
Sentiment score
6.5
CyberArk's support shows improvement with efficient service but needs faster responses for high-priority issues and better tier coordination.
They resolved the problem immediately after I reported it, on the same day, within one hour.
They respond immediately when requests are raised, and they are always available for priority one tickets.
I received prompt responses and support, which I would rate as very good.
CyberArk has been exceptional in coming back to us with immediate responses.
It could be forever until you talk to someone who knows what they are doing.
Based on the issue resolution and support quality, I rate the support 10 out of 10.
 

Scalability Issues

Sentiment score
7.3
CyberArk Identity is praised for scalability and adaptability, suiting various enterprise sizes despite occasional performance lags.
Sentiment score
7.6
CyberArk Privileged Access Manager is scalable and adaptable, supporting growth and diverse infrastructures despite potential licensing complexities.
We can use it on different phones and computers, demonstrating its scalability.
When delving deep into the concepts, there is a lot to address and learn, especially when facing real-time scenarios.
You can scale it out pretty easily, and you can implement it very small.
The CPM can reportedly handle up to 50,000 accounts independently without issue.
I would rate it a ten out of ten for scalability.
They had 40,000 passwords in this one safe, and it was saving the last ten iterations of each password object. That means they had 400,000 password objects in this safe. They exceeded the limit.
 

Stability Issues

Sentiment score
7.9
CyberArk Identity is praised for stability and reliability, rated highly by users for consistent performance with minimal issues.
Sentiment score
7.7
CyberArk Privileged Access Manager is stable and reliable, with minor bugs often due to configuration or infrastructure issues.
We no longer have our data infiltrated by unauthorized persons, and tracking actions within the system has become very easy.
When you have it in the cloud, you have CyberArk every time you need it.
With a stable network, due to the redundant data centers across the globe, it is a lot easier to use as a SaaS solution.
Proper fine-tuning and expertise ensure the product performs well.
Overall, the stability of the solution is high.
It has a large customer base and positive feedback within my network.
 

Room For Improvement

CyberArk Identity needs enhanced reporting, integration, ease of use, federation capabilities, onboarding, and intuitive user interface.
Users find CyberArk Privileged Access Manager needing UI updates, better integration, improved documentation, customizable reporting, and enhanced automation.
It would be helpful if they released a generalized document for processes such as migration.
Integration or deployment is extremely difficult for CyberArk Identity.
There's a need to enhance network performance.
They want everything to be on the cloud, but even in the SaaS version of CyberArk Privileged Access Manager, they need to deploy some servers on-premises.
We cannot generate a plug-in for web-based applications.
If they want clients to move to the cloud, they need to support them in real-time.
 

Setup Cost

CyberArk Identity pricing is higher but competitive, offering robust services appealing to larger companies needing strong security management.
CyberArk Privileged Access Manager is costly but offers strong security, appealing to large enterprises with flexible subscription options.
Regarding pricing, it can be quite a lot for small companies.
The pricing is acceptable.
If I am not going fully cloud, there are additional resources I will need to purchase, such as spinning more VMs or acquiring an HSM device to encrypt the vault.
CyberArk is expensive compared to other products I know.
CyberArk is comparatively expensive compared to other PAM solutions, such as Delinea, especially during renewal.
CyberArk's SaaS solution is particularly expensive.
 

Valuable Features

CyberArk Identity enhances security and operations with robust integration, SSO, MFA, and user-friendly features for improved team productivity.
CyberArk Privileged Access Manager enhances security with policy automation, AI threat detection, and flexible, scalable privilege account management.
It impacts zero trust security strategies. It prevents lateral movements in the organization.
The two-factor authentication is very important, but the fact that every account is being regenerated every time we use it is the most important security feature for us.
It is the most powerful access management system.
CyberArk Privileged Access Manager helps ensure data privacy because we now know who is using which credentials and at what time.
It keeps a record of activities, allowing me to easily fetch screen recordings to detect any misuse and see who did what and what happened.
It can integrate with Splunk, SNMP, and other solutions and technologies.
 

Categories and Ranking

CyberArk Identity
Ranking in Enterprise Password Managers
6th
Average Rating
8.2
Reviews Sentiment
6.7
Number of Reviews
29
Ranking in other categories
Authentication Systems (10th), Identity Management (IM) (8th), Authorization Software (3rd), User Entity Behavior Analytics (UEBA) (9th), Access Management (6th), Active Directory Management (6th), Cloud Resource Access Management (3rd), Customer Identity and Access Management (CIAM) (6th)
CyberArk Privileged Access ...
Ranking in Enterprise Password Managers
3rd
Average Rating
8.6
Reviews Sentiment
6.8
Number of Reviews
227
Ranking in other categories
User Activity Monitoring (1st), Privileged Access Management (PAM) (1st), Mainframe Security (2nd), Operational Technology (OT) Security (3rd)
 

Mindshare comparison

As of October 2025, in the Enterprise Password Managers category, the mindshare of CyberArk Identity is 1.2%, up from 0.8% compared to the previous year. The mindshare of CyberArk Privileged Access Manager is 7.7%, down from 7.8% compared to the previous year. It is calculated based on PeerSpot user engagement data.
Enterprise Password Managers Market Share Distribution
ProductMarket Share (%)
CyberArk Privileged Access Manager7.7%
CyberArk Identity1.2%
Other91.1%
Enterprise Password Managers
 

Featured Reviews

Hariharan Thangasamy - PeerSpot reviewer
Has strengthened privileged access control and improved audit visibility through session monitoring and password rotation
On the identity product side, it is awesome. However, they can improve in the documentation parts. For example, if there is a migration process, I can see the maximum customers are moving from self-hosted to on-premises or from on-premises to the cloud. It would be helpful if they released a generalized document for processes such as migration. A clear overview document would assist us in understanding more about the tool, configurations, and automations to enhance our security. Regarding the initial setup of CyberArk Identity, I faced some challenges. At some points, I could not find proper documentation for deploying, enhancing, or integrating with other components. I could not find the proper documentation in the community portal.
Atul-Gujar - PeerSpot reviewer
Secures critical infrastructures with essential user session audit records
A potential area for improvement is enhancing support for cluster environments and distributed Vaults. Clients in multiple countries that need central access have different challenges that require better solutions from CyberArk. For financial services, CyberArk can improve incident response by ensuring fast support for critical priority tickets to meet compliance requirements. Providing more documentation on CyberArk is recommended for new team members to enhance their troubleshooting capabilities. I understand it's up to the client, but 99% fail to change the demo key, so it's crucial for CyberArk to emphasize changing the key and documenting it as part of the installation process.
report
Use our free recommendation engine to learn which Enterprise Password Managers solutions are best for your needs.
872,706 professionals have used our research since 2012.
 

Top Industries

By visitors reading reviews
Financial Services Firm
15%
Computer Software Company
12%
Manufacturing Company
11%
Healthcare Company
6%
Financial Services Firm
15%
Computer Software Company
13%
Manufacturing Company
9%
Government
6%
 

Company Size

By reviewers
Large Enterprise
Midsize Enterprise
Small Business
By reviewers
Company SizeCount
Small Business20
Midsize Enterprise4
Large Enterprise10
By reviewers
Company SizeCount
Small Business59
Midsize Enterprise41
Large Enterprise171
 

Questions from the Community

What do you like most about CyberArk Identity?
The integration capabilities, ability to integrate CyberArk into the overall IBB strategy of our current clients.
What is your experience regarding pricing and costs for CyberArk Identity?
I am not certain about CyberArk Identity's exact pricing model. For comparison, Okta was around five dollars per user. CyberArk Identity offers good discounts to some clients, which influences thei...
What needs improvement with CyberArk Identity?
We do not specifically use the password vaulting feature of CyberArk Identity. The centralized user dashboard of CyberArk Identity has not been that important for us. If it would be possible to sha...
How does Sailpoint IdentityIQ compare with CyberArk PAM?
We evaluated Sailpoint IdentityIQ before ultimately choosing CyberArk. Sailpoint Identity Platform is a solution to manage risks in cloud enterprise environments. It automates and streamlines the m...
What do you like most about CyberArk Privileged Access Manager?
The most valuable features of the solution are control and analytics.
What is your experience regarding pricing and costs for CyberArk Privileged Access Manager?
Regarding costs, CyberArk Privileged Access Manager is not a cheap product; hence, many companies struggle with its high licensing cost. While it's valuable, it comes with a high price tag, making ...
 

Also Known As

Idaptive
CyberArk Privileged Access Security, CyberArk Enterprise Password Vault
 

Overview

 

Sample Customers

MLB, Citi, Pfizer, SulAmerica, GE Capital, Shiseido
Rockwell Automation
Find out what your peers are saying about CyberArk Identity vs. CyberArk Privileged Access Manager and other solutions. Updated: September 2025.
872,706 professionals have used our research since 2012.