Try our new research platform with insights from 80,000+ expert users

CyberArk Identity vs EVOLVEUM midPoint comparison

 

Comparison Buyer's Guide

Executive SummaryUpdated on Dec 1, 2024

Review summaries and opinions

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
 

Categories and Ranking

CyberArk Identity
Ranking in Identity Management (IM)
9th
Average Rating
8.2
Reviews Sentiment
6.7
Number of Reviews
29
Ranking in other categories
Authentication Systems (9th), Authorization Software (3rd), Enterprise Password Managers (9th), User Entity Behavior Analytics (UEBA) (9th), Access Management (8th), Active Directory Management (6th), Cloud Resource Access Management (3rd), Customer Identity and Access Management (CIAM) (7th)
EVOLVEUM midPoint
Ranking in Identity Management (IM)
22nd
Average Rating
8.0
Reviews Sentiment
7.4
Number of Reviews
3
Ranking in other categories
No ranking in other categories
 

Mindshare comparison

As of March 2026, in the Identity Management (IM) category, the mindshare of CyberArk Identity is 2.3%, down from 2.4% compared to the previous year. The mindshare of EVOLVEUM midPoint is 2.1%, down from 2.9% compared to the previous year. It is calculated based on PeerSpot user engagement data.
Identity Management (IM) Mindshare Distribution
ProductMindshare (%)
CyberArk Identity2.3%
EVOLVEUM midPoint2.1%
Other95.6%
Identity Management (IM)
 

Featured Reviews

Hariharan Thangasamy - PeerSpot reviewer
Cybersecurity Delivery Analyst at Accenture
Has strengthened privileged access control and improved audit visibility through session monitoring and password rotation
On the identity product side, it is awesome. However, they can improve in the documentation parts. For example, if there is a migration process, I can see the maximum customers are moving from self-hosted to on-premises or from on-premises to the cloud. It would be helpful if they released a generalized document for processes such as migration. A clear overview document would assist us in understanding more about the tool, configurations, and automations to enhance our security. Regarding the initial setup of CyberArk Identity, I faced some challenges. At some points, I could not find proper documentation for deploying, enhancing, or integrating with other components. I could not find the proper documentation in the community portal.
Ondrej Balun - PeerSpot reviewer
IAM Expert Group Lead at Ventum
An open-source solution that helps in IAM
Our customers leverage the product as a central component in their identity field management. The process involves connecting it to target systems through connectors. It also helps us in role-based access control implementation. Users are granted access based on predefined roles associated with their positions, organizational hierarchy, or job titles. Instead of direct assignments, users automatically receive roles upon entering the company, aligning with their assignments. The core feature of EVOLVEUM midPoint that I find most valuable is provisioning. Users, including myself, can submit requests that need designated individuals' approval. Additionally, the recertification feature is crucial for regularly reviewing and confirming the appropriateness of user access rights. I find recertifications valuable because they align with clear regulatory requirements for companies to perform them at least once yearly. Using the product, I can initiate a recertification campaign by selecting users and the applications to be recertified. I define the individuals responsible for approving or rejecting access. The goal is to ensure compliance with regulatory standards. The tool's flexibility in handling identity types and tickets has brought notable benefits. It provides full flexibility to extend attributes or the schema for users and organizations. Its audit and reporting capabilities have significantly enhanced our customer's compliance and security posture. Management's regular need for reports, such as the number of users in the application and identifying users with critical access, is addressed. The solution allows easy configuration of reports directly from the front end. Additionally, the ability to schedule and automate report execution, followed by automatic distribution to support or responsible personnel, streamlines the process.

Quotes from Members

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
 

Pros

"The user self-service program and the Office 365 provisioning service feature are the most valuable. It is a very easy and feature-rich solution that gives priority to the users and security."
"The integration capabilities, ability to integrate CyberArk into the overall IBB strategy of our current clients."
"It has machine learning and can help clients to learn the environment and understand what is happening."
"The tool is a very strong and valuable enterprise solution, particularly in ensuring the continuity of service."
"The UI is very simplified, and the documentation of CyberArk Identity is very crisp and clear."
"The best features in CyberArk Identity that I appreciate most are the recent updates that have added features in the cloud privilege environment."
"CyberArk Identity provides identity governance and gives me control over who and how access to environments occurs, offering significant confidentiality in what is accessed."
"I had one machine that I could not use due to an invalid token. They resolved the problem immediately after I reported it, on the same day, within one hour. It is a very good experience."
"The basic setup is straightforward and takes minutes to complete."
"Our customers leverage the product as a central component in their identity field management. The process involves connecting it to target systems through connectors. It also helps us in role-based access control implementation."
"I like that it's open-source, and it's working. It has nice features, and it looks like it's easy to maintain."
 

Cons

"I faced some challenges during the initial setup of CyberArk Identity. At some points, I could not find proper documentation for deploying, enhancing, or integrating with other components."
"I faced some challenges during the initial setup of CyberArk Identity. At some points, I could not find proper documentation for deploying, enhancing, or integrating with other components."
"We would like to see an improvement in the ability to manage mobile devices."
"Some areas experience slowness based on the workload. There's a need to enhance network performance despite the good user experience with access management."
"I'm not sure what needs improvement. It is a good platform."
"They could improve their UI and make everything more user-friendly."
"The OpenID features could improve in CyberArk Identity."
"The product needs to leverage the cloud more, especially in the financial sector, where cloud adoption might be limited. Proper reporting within the cloud is essential. The tool should be more user-friendly to expedite access for users. The current agent-based system poses challenges if a user loses access to the server, making tasks difficult to perform. It should also improve technical support."
"The support isn't ideal - because the product is open-source, it relies on your own ability to make it work unless you pay for support at a high hourly rate."
"One area where I see room for improvement in EVOLVEUM midPoint is enhancing the user interface for configuration. Currently, a significant portion of the configuration involves technical, XML-based settings requiring a higher level of technical expertise."
"I think that the product is missing some of the identity governance functions—for example, the legal stuff and GDPR, and so on. But I think they are currently working on it."
 

Pricing and Cost Advice

"The pricing is acceptable. It is worth considering what we are protecting with the amount charged."
"There could be some additional costs apart from the licensing costs of the solution when you want to develop connectors in CyberArk Identity."
"The solution is cheap and I rate its pricing an eight out of ten."
"It's not that affordable compared to Delinea or other products. They're less expensive and allow more customization. For the cost, it is expensive."
"I would rate the tool’s pricing a seven out of ten. The product’s pricing is expensive and is on a yearly basis. You will need to pay around 10,000 GBP for 500 users."
"The pricing of CyberArk Identity is competitive."
"We find that the pricing and licensing of this solution is adequate, as compared to the other competitors in the market."
"There is an initial license and then there is a subscription needed."
"The product is free to use, but a cost is associated if you opt for official product support. Additionally, there is an option for a platform subscription, which entails professional services provided by the vendor."
"Licensing is defined by the number of users."
"We're EVOLVEUM partners, and I tried it without a license."
report
Use our free recommendation engine to learn which Identity Management (IM) solutions are best for your needs.
884,933 professionals have used our research since 2012.
 

Top Industries

By visitors reading reviews
Financial Services Firm
14%
Manufacturing Company
10%
Computer Software Company
10%
Healthcare Company
6%
University
16%
Government
9%
Outsourcing Company
8%
Financial Services Firm
7%
 

Company Size

By reviewers
Large Enterprise
Midsize Enterprise
Small Business
By reviewers
Company SizeCount
Small Business20
Midsize Enterprise4
Large Enterprise10
No data available
 

Questions from the Community

What do you like most about CyberArk Identity?
The integration capabilities, ability to integrate CyberArk into the overall IBB strategy of our current clients.
What is your experience regarding pricing and costs for CyberArk Identity?
I am not certain about CyberArk Identity's exact pricing model. For comparison, Okta was around five dollars per user. CyberArk Identity offers good discounts to some clients, which influences thei...
What needs improvement with CyberArk Identity?
We do not specifically use the password vaulting feature of CyberArk Identity. The centralized user dashboard of CyberArk Identity has not been that important for us. If it would be possible to sha...
Ask a question
Earn 20 points
 

Also Known As

Idaptive
No data available
 

Overview

 

Sample Customers

MLB, Citi, Pfizer, SulAmerica, GE Capital, Shiseido
European Commisson, University of Illinois, First United Bank & Trust, Deutsche Telekom, Vodafone, Avast
Find out what your peers are saying about CyberArk Identity vs. EVOLVEUM midPoint and other solutions. Updated: March 2026.
884,933 professionals have used our research since 2012.