No more typing reviews! Try our Samantha, our new voice AI agent.

CyberArk Identity vs IBM Tivoli Access Manager [EOL] comparison

 

Comparison Buyer's Guide

Executive Summary

Review summaries and opinions

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
 

Categories and Ranking

CyberArk Identity
Average Rating
8.2
Reviews Sentiment
6.7
Number of Reviews
29
Ranking in other categories
Authentication Systems (9th), Identity Management (IM) (9th), Authorization Software (3rd), Enterprise Password Managers (9th), User Entity Behavior Analytics (UEBA) (9th), Access Management (8th), Active Directory Management (6th), Cloud Resource Access Management (3rd), Customer Identity and Access Management (CIAM) (7th)
IBM Tivoli Access Manager [...
Average Rating
8.0
Reviews Sentiment
3.8
Number of Reviews
29
Ranking in other categories
No ranking in other categories
 

Featured Reviews

Hariharan Thangasamy - PeerSpot reviewer
Cybersecurity Delivery Analyst at Accenture
Has strengthened privileged access control and improved audit visibility through session monitoring and password rotation
On the identity product side, it is awesome. However, they can improve in the documentation parts. For example, if there is a migration process, I can see the maximum customers are moving from self-hosted to on-premises or from on-premises to the cloud. It would be helpful if they released a generalized document for processes such as migration. A clear overview document would assist us in understanding more about the tool, configurations, and automations to enhance our security. Regarding the initial setup of CyberArk Identity, I faced some challenges. At some points, I could not find proper documentation for deploying, enhancing, or integrating with other components. I could not find the proper documentation in the community portal.
it_user711612 - PeerSpot reviewer
Senior Consultant at a insurance company with 1,001-5,000 employees
Reverse proxy provides central control over authentication and authorization.
It is a single product that caters for all the business needs throughout the organization. It provides a seamless integration that in turn encourages most of the applications to use the SSO features Reverse proxy is the most valuable feature as it provides central control over authentication and…

Quotes from Members

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
 

Pros

"If anyone makes an error, or if an incident occurs by accident, the business will not be harmed as a result of this activity."
"I find the CyberArk Identity portal quite intuitive; it has changed a lot over the last year and a half and if you think logically and understand your environment, it is easy to establish a suitable setup for yourself and all your vendors."
"The most valuable feature of CyberArk Identity is the adaptive interface."
"The straight-through approach of CyberArk Identity is very easy to start with; after you start with it, you can very easily onboard your privileged accounts, and from there on, you can advance further and make it more and more secure."
"The solution helps with auditing, and monitoring, and integrates with Splunk for log analysis. User activity logs are captured in CyberArk Identity and sent to external tools like Splunk for analysis and monitoring."
"I found the solution to be stable."
"The best feature of CyberArk Identity is the single sign-on feature that offers quick and one-click access."
"The features that I personally find most effective in terms of security stem from the fact that it is easy to integrate and also the adoption is faster."
"It provides good scalability and reliability, not to mention the overall availability of the service."
"It is a totally secure way of accessing clients through various application portals for more than ten EU countries, just by using single sign-on."
"This product is highly recommended to meet access management and web single sign-on requirements."
"The Verify feature: A push method which customers are going for."
"Single Sign-On functionality is valuable because the core purpose of the product is to allow universal (or bespoke) SSO for application suites."
"Single Sign-On functionality is valuable because the core purpose of the product is to allow universal (or bespoke) SSO for application suites."
"It is one of the best products in the present market in the area of access management."
"Tivoli Access Manger lets you separate security from applications and manage at one place."
 

Cons

"More integrations would be better."
"They could improve their UI and make everything more user-friendly."
"The OpenID features could improve in CyberArk Identity."
"When you translate the page from one language to another, it can be a difficult process. The translation isn't always good, and it may have a completely different name. I've noticed this in the English to Spanish translation."
"The tool has issues with the third-party SMS gateway. The solution has its own SMS gateway. Integration support is a challenge when we don’t use their SMS gateway. The tool also needs to improve its scalability."
"The solution could be easier to use and I found it to be very complex involving many steps."
"It was pretty complex to implement CyberArk Identity. We had some help from a partner, and that helped a lot. But even for the partner, it was really difficult to streamline the process of implementing."
"At the moment CyberArk needs to enrich Conjur and it needs to be made more viable so that its adoption can be made much faster."
"Initial setup was complicated because TAM was implemented as a part of the IDM solution."
"I would rate the technical support a 6/10."
"The initial set-up is a bit complex for a novice as the Linux version of it needs you to be somewhat good with Linux."
"Multi-factor authentication with social integration needs to improve."
"The whole product could be made into one suite instead of multiple components which are essentially a part of the same infrastructure."
"The license model is pretty complex."
"Redundant Policy servers had to be manually configured using LB."
"The profiling element is incredibly robust, but also equally as complex, it requires an off-site course to be able to understand the context or the plethora of options available."
 

Pricing and Cost Advice

"We find that the pricing and licensing of this solution is adequate, as compared to the other competitors in the market."
"I think it is a fairly priced tool. I rate the tool between six and seven on a scale of one to ten where one is expensive, and ten is cheap."
"Their pricing is obviously a lot higher than many vendors in the marketplace but their service is also unmatched."
"The solution is cheap and I rate its pricing an eight out of ten."
"The pricing of CyberArk Identity is competitive."
"There could be some additional costs apart from the licensing costs of the solution when you want to develop connectors in CyberArk Identity."
"The pricing is acceptable. It is worth considering what we are protecting with the amount charged."
"In terms of pricing, BeyondTrust and CyberArk tend to be more expensive, with CyberArk receiving an eight out of ten, in this regard."
"The IBM prices are, as ever, extortionate, even with a business partnership, and high levels of discounts."
report
Use our free recommendation engine to learn which Identity Management (IM) solutions are best for your needs.
885,880 professionals have used our research since 2012.
 

Top Industries

By visitors reading reviews
Financial Services Firm
15%
Manufacturing Company
10%
Computer Software Company
9%
Construction Company
6%
Construction Company
16%
Marketing Services Firm
15%
Outsourcing Company
11%
Performing Arts
10%
 

Company Size

By reviewers
Large Enterprise
Midsize Enterprise
Small Business
By reviewers
Company SizeCount
Small Business20
Midsize Enterprise4
Large Enterprise10
By reviewers
Company SizeCount
Small Business9
Midsize Enterprise2
Large Enterprise18
 

Questions from the Community

What is your experience regarding pricing and costs for CyberArk Identity?
I am not certain about CyberArk Identity's exact pricing model. For comparison, Okta was around five dollars per user. CyberArk Identity offers good discounts to some clients, which influences thei...
What needs improvement with CyberArk Identity?
We do not specifically use the password vaulting feature of CyberArk Identity. The centralized user dashboard of CyberArk Identity has not been that important for us. If it would be possible to sha...
What is your primary use case for CyberArk Identity?
It's not being purchased through AWS, but we're using CyberArk Identity as a SaaS solution. I think it's running on AWS, but we bought it directly from CyberArk.
Ask a question
Earn 20 points
 

Also Known As

Idaptive
Tivoli Access Manager, IBM Security Access Manager
 

Overview

 

Sample Customers

MLB, Citi, Pfizer, SulAmerica, GE Capital, Shiseido
Essex Technology Group Inc.
Find out what your peers are saying about SailPoint, Microsoft, One Identity and others in Identity Management (IM). Updated: April 2026.
885,880 professionals have used our research since 2012.