Try our new research platform with insights from 80,000+ expert users

CyberArk Identity vs EVOLVEUM midPoint comparison

Sponsored
 

Comparison Buyer's Guide

Executive SummaryUpdated on Dec 1, 2024

Review summaries and opinions

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
 

Categories and Ranking

Omada Identity
Sponsored
Ranking in Identity Management (IM)
4th
Average Rating
8.0
Reviews Sentiment
6.7
Number of Reviews
51
Ranking in other categories
User Provisioning Software (4th), Identity and Access Management as a Service (IDaaS) (IAMaaS) (4th), Customer Identity and Access Management (CIAM) (5th)
CyberArk Identity
Ranking in Identity Management (IM)
8th
Average Rating
8.2
Reviews Sentiment
6.7
Number of Reviews
29
Ranking in other categories
Authentication Systems (9th), Authorization Software (3rd), Enterprise Password Managers (6th), User Entity Behavior Analytics (UEBA) (8th), Access Management (6th), Active Directory Management (6th), Cloud Resource Access Management (3rd), Customer Identity and Access Management (CIAM) (6th)
EVOLVEUM midPoint
Ranking in Identity Management (IM)
12th
Average Rating
8.0
Reviews Sentiment
7.4
Number of Reviews
3
Ranking in other categories
No ranking in other categories
 

Mindshare comparison

As of December 2025, in the Identity Management (IM) category, the mindshare of Omada Identity is 3.1%, down from 3.4% compared to the previous year. The mindshare of CyberArk Identity is 2.1%, up from 1.6% compared to the previous year. The mindshare of EVOLVEUM midPoint is 2.5%, up from 2.4% compared to the previous year. It is calculated based on PeerSpot user engagement data.
Identity Management (IM) Market Share Distribution
ProductMarket Share (%)
Omada Identity3.1%
CyberArk Identity2.1%
EVOLVEUM midPoint2.5%
Other92.3%
Identity Management (IM)
 

Featured Reviews

Lars Henrik Jensen - PeerSpot reviewer
Lead Cyber Security Architect at Ernst & Young
Faced deployment delays and daily errors but have streamlined access reviews and improved termination processes
The deployment of Omada Identity is complex; the product is not brilliantly documented, and it lacks the same level of documentation that could be found for systems such as SailPoint or Saviynt, making it harder to find material or help online, particularly with Omada Cloud. The system performance of Omada Identity is inconsistent; we've been analyzing this issue together with Omada, but we haven't been able to resolve whether the problem lies on their side or my client's side, which causes long response times and long run times in Omada sometimes. Omada Identity does not help deploy IGA within 12 weeks; the time frame for applying the rapid deployment solution was much longer than expected, and I am unsure if it is built on best practices across all systems. When we receive an error or system message from Omada Identity, it's very hard to decode what it means; we have had serious issues in daily imports that we can't explain, indicating a need for improved stability. The comprehensiveness of out-of-the-box connectors that Omada provides differs; the connectors for Microsoft and Salesforce are good, but for SAP, they are basically non-existent.
Hariharan Thangasamy - PeerSpot reviewer
Cybersecurity Delivery Analyst at Accenture
Has strengthened privileged access control and improved audit visibility through session monitoring and password rotation
On the identity product side, it is awesome. However, they can improve in the documentation parts. For example, if there is a migration process, I can see the maximum customers are moving from self-hosted to on-premises or from on-premises to the cloud. It would be helpful if they released a generalized document for processes such as migration. A clear overview document would assist us in understanding more about the tool, configurations, and automations to enhance our security. Regarding the initial setup of CyberArk Identity, I faced some challenges. At some points, I could not find proper documentation for deploying, enhancing, or integrating with other components. I could not find the proper documentation in the community portal.
Ondrej Balun - PeerSpot reviewer
IAM Expert Group Lead at Ventum
An open-source solution that helps in IAM
Our customers leverage the product as a central component in their identity field management. The process involves connecting it to target systems through connectors. It also helps us in role-based access control implementation. Users are granted access based on predefined roles associated with their positions, organizational hierarchy, or job titles. Instead of direct assignments, users automatically receive roles upon entering the company, aligning with their assignments. The core feature of EVOLVEUM midPoint that I find most valuable is provisioning. Users, including myself, can submit requests that need designated individuals' approval. Additionally, the recertification feature is crucial for regularly reviewing and confirming the appropriateness of user access rights. I find recertifications valuable because they align with clear regulatory requirements for companies to perform them at least once yearly. Using the product, I can initiate a recertification campaign by selecting users and the applications to be recertified. I define the individuals responsible for approving or rejecting access. The goal is to ensure compliance with regulatory standards. The tool's flexibility in handling identity types and tickets has brought notable benefits. It provides full flexibility to extend attributes or the schema for users and organizations. Its audit and reporting capabilities have significantly enhanced our customer's compliance and security posture. Management's regular need for reports, such as the number of users in the application and identifying users with critical access, is addressed. The solution allows easy configuration of reports directly from the front end. Additionally, the ability to schedule and automate report execution, followed by automatic distribution to support or responsible personnel, streamlines the process.

Quotes from Members

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
 

Pros

"Omada's onboarding features reflect our processes for onboarding new employees well. That is the primary reason we use this solution. We use role-based access control. I'm not sure how much it has improved our security posture, but it's made managing identities more convenient."
"The most appealing aspect of Omada Identity is its self-service upgrade system."
"The most valuable functionality of the solution for us is that when employees stop working for the municipality, they are automatically disabled in Active Directory. Omada controls that 100 percent. They are disabled for 30 days, and after that time Omada deletes the Active Directory account. The same type of thing happens when we employ a new person. Their information is automatically imported to Omada and they are equipped with the roles and rights so they can do their jobs."
"Omada's user interface is elegant and easy to work with. I like Omada's ability to automatically generate accounts for new hires and allow them access to all required systems by established policies. Around 80 percent of workers can start working immediately on their first day without requesting further access."
"For me, the best feature of Omada Identity is its web interface because it's really easy for users to understand."
"It has a lot of out-of-the-box features. It is flexible, and there are a lot of possibilities to configure and extend it. It is user-friendly. It has an interface that is end-user or business-user friendly."
"The most valuable aspect of the product is that it is Microsoft-based and it supports all Microsoft technology."
"Surveying is a valuable feature because it allows us to import data and see who has access to what data, for example."
"The most valuable features of CyberArk Identity are its ability to control access to administrative staff."
"I like the RBAC (Role-Based Access Control). It basically involves defining various roles, and then simply assigning those roles to users."
"What I like most about CyberArk Identity is the model that is in place."
"CyberArk Identity provides identity governance and gives me control over who and how access to environments occurs, offering significant confidentiality in what is accessed."
"It has aided in troubleshooting by allowing logs to be extracted and sent to a correlation engine, such as QRadar, for notifications or alerts."
"As soon as it is implemented, it fundamentally changes how users access systems, providing immediate security benefits."
"I find the CyberArk Identity portal quite intuitive; it has changed a lot over the last year and a half and if you think logically and understand your environment, it is easy to establish a suitable setup for yourself and all your vendors."
"The user self-service program and the Office 365 provisioning service feature are the most valuable. It is a very easy and feature-rich solution that gives priority to the users and security."
"I like that it's open-source, and it's working. It has nice features, and it looks like it's easy to maintain."
"Our customers leverage the product as a central component in their identity field management. The process involves connecting it to target systems through connectors. It also helps us in role-based access control implementation."
"The basic setup is straightforward and takes minutes to complete."
 

Cons

"There's a challenge with handling large amounts of data in this system."
"We are still on Omada on-prem, but I understand that when Omada is in the cloud, you cannot send an attachment via email. We have some emails with attachments for new employees because we have to explain to them how to register and do their multi-factor authentication. All that information is in the attachment. People have to do that before they are in our system. We cannot give them a link to our Intranet and SharePoint because they do not yet have access. They have to register before that, so I need to send the attachments, but this functionality is not there in the cloud."
"The user interface should have a more flexible design, where you can change it to your requirement."
"One thing that we are not so happy about is the user interface. It is a bit dated. I know that they are working on that, but the user interface is quite dated. Currently, it is a little bit difficult to customize the user interface to the need of the business, which is a little bit disappointing. It needs it to be a little bit easier to operate, and it should have a better user interface."
"When you do a recalculation of an identity, it's hard to understand what was incorrect before you started the recalculation, and which values are actually updated... all you see are all the new fields that are provisioned, instead of seeing only the fields that are changed."
"It is not possible to customize reports on Omada Identity."
"Omada Identity's user interface needs improvement, especially for new users."
"I am not working with the product, but they have this BI tool for role-based mining, and I think that should be included in the core product rather than an add-on."
"In terms of a governance platform, it's worth noting that CyberArk doesn't offer a particularly strong one."
"More integrations would be better."
"The reporting functionality is somewhat complicated."
"I faced some challenges during the initial setup of CyberArk Identity. At some points, I could not find proper documentation for deploying, enhancing, or integrating with other components."
"Integration or deployment is extremely difficult for CyberArk Identity."
"The tool has issues with the third-party SMS gateway. The solution has its own SMS gateway. Integration support is a challenge when we don’t use their SMS gateway. The tool also needs to improve its scalability."
"The product is not cheap, especially if you opt for an on-premise deployment requiring a complex server infrastructure. On the other hand, choosing the software as a service version simplifies infrastructure requirements but necessitates being online all the time."
"Integration or deployment is extremely difficult for CyberArk Identity."
"The support isn't ideal - because the product is open-source, it relies on your own ability to make it work unless you pay for support at a high hourly rate."
"I think that the product is missing some of the identity governance functions—for example, the legal stuff and GDPR, and so on. But I think they are currently working on it."
"One area where I see room for improvement in EVOLVEUM midPoint is enhancing the user interface for configuration. Currently, a significant portion of the configuration involves technical, XML-based settings requiring a higher level of technical expertise."
 

Pricing and Cost Advice

"Omada Identity offers a reasonable price point, but it will increase as we transition to the cloud."
"From an on-prem point of view, the cost is quite transparent and reasonable. The direct cost is primarily for licenses and maintenance on licenses."
"It is fairly priced for an on-premise environment, but for the cloud environment, I am not that happy with the pricing."
"The pricing is too high for SMBs."
"The pricing is okay."
"It is expensive. Fortunately, I had a very good procurement manager on my side, but they are expensive. The closest competitors are also very expensive. You get a full-fledged solution that can do everything you dream of, but you pay for everything."
"Omada continues to be very competitive on pricing, especially on the Omada cloud product."
"It is licensed per managed user per year."
"I would rate the tool’s pricing a seven out of ten. The product’s pricing is expensive and is on a yearly basis. You will need to pay around 10,000 GBP for 500 users."
"It's not that affordable compared to Delinea or other products. They're less expensive and allow more customization. For the cost, it is expensive."
"I think it is a fairly priced tool. I rate the tool between six and seven on a scale of one to ten where one is expensive, and ten is cheap."
"CyberArk Identity is an expensive solution."
"The pricing is acceptable. It is worth considering what we are protecting with the amount charged."
"There could be some additional costs apart from the licensing costs of the solution when you want to develop connectors in CyberArk Identity."
"Their pricing is obviously a lot higher than many vendors in the marketplace but their service is also unmatched."
"The solution is cheap and I rate its pricing an eight out of ten."
"The product is free to use, but a cost is associated if you opt for official product support. Additionally, there is an option for a platform subscription, which entails professional services provided by the vendor."
"Licensing is defined by the number of users."
"We're EVOLVEUM partners, and I tried it without a license."
report
Use our free recommendation engine to learn which Identity Management (IM) solutions are best for your needs.
879,371 professionals have used our research since 2012.
 

Top Industries

By visitors reading reviews
Financial Services Firm
16%
Computer Software Company
10%
Manufacturing Company
9%
Government
6%
Financial Services Firm
15%
Computer Software Company
12%
Manufacturing Company
11%
Healthcare Company
6%
University
15%
Government
10%
Retailer
8%
Computer Software Company
7%
 

Company Size

By reviewers
Large Enterprise
Midsize Enterprise
Small Business
By reviewers
Company SizeCount
Small Business8
Midsize Enterprise3
Large Enterprise42
By reviewers
Company SizeCount
Small Business20
Midsize Enterprise4
Large Enterprise10
No data available
 

Questions from the Community

What do you like most about Omada Identity Cloud?
As an administrator, we benefit from a lot of functionality that is available out of the box, but it is also configur...
What is your experience regarding pricing and costs for Omada Identity Cloud?
I'm not fully aware of the pricing details, which are managed by higher management; however, the product itself is sa...
What needs improvement with Omada Identity Cloud?
There is room for improvement in Omada Identity, primarily in customization for administrators; many custom tasks req...
What do you like most about CyberArk Identity?
The integration capabilities, ability to integrate CyberArk into the overall IBB strategy of our current clients.
What is your experience regarding pricing and costs for CyberArk Identity?
I am not certain about CyberArk Identity's exact pricing model. For comparison, Okta was around five dollars per user...
What needs improvement with CyberArk Identity?
We do not specifically use the password vaulting feature of CyberArk Identity. The centralized user dashboard of Cybe...
What do you like most about EVOLVEUM midPoint?
Our customers leverage the product as a central component in their identity field management. The process involves co...
What is your experience regarding pricing and costs for EVOLVEUM midPoint?
The product is free to use, but a cost is associated if you opt for official product support. Additionally, there is ...
What needs improvement with EVOLVEUM midPoint?
One area where I see room for improvement in EVOLVEUM midPoint is enhancing the user interface for configuration. Cur...
 

Also Known As

Omada Identity Suite, Omada Identity Cloud
Idaptive
No data available
 

Overview

 

Sample Customers

Bayer, ECCO Shoes, Vattenfall, NuStar Energy, Unicredit, Schiphol Group, BMW Group, Deutsche Leasing
MLB, Citi, Pfizer, SulAmerica, GE Capital, Shiseido
European Commisson, University of Illinois, First United Bank & Trust, Deutsche Telekom, Vodafone, Avast
Find out what your peers are saying about CyberArk Identity vs. EVOLVEUM midPoint and other solutions. Updated: December 2025.
879,371 professionals have used our research since 2012.