We performed a comparison between CyberArk Identity, IBM Tivoli Access Manager [EOL], and Symantec Siteminder based on real PeerSpot user reviews.
Find out what your peers are saying about Microsoft, Cisco, Auth0 and others in Single Sign-On (SSO)."The integration capabilities, ability to integrate CyberArk into the overall IBB strategy of our current clients."
"If anyone makes an error, or if an incident occurs by accident, the business will not be harmed as a result of this activity."
"The most valuable feature of CyberArk Identity is the adaptive interface."
"The feature that we find most valuable is the ability to integrate multiple IDs for on-premises Active Directory."
"The solution helps with auditing, and monitoring, and integrates with Splunk for log analysis. User activity logs are captured in CyberArk Identity and sent to external tools like Splunk for analysis and monitoring."
"CyberArk Identity is a mature product."
"The setup, via cloud, is simple."
"It has machine learning and can help clients to learn the environment and understand what is happening."
"Single Sign-On functionality is valuable because the core purpose of the product is to allow universal (or bespoke) SSO for application suites."
"The Verify feature: A push method which customers are going for."
"SAML 2.0."
"OAuth 2 is now the de facto standard for API protection and scoped authorized delegation. IBM TAM now supports OAuth 2 and can act as fully compliant OAuth 2 authorization server."
"The integration effort with the end application is quite straightforward and easy."
"A valuable feature of Siteminder is the way it handles bulk traffic. The features it has, in terms of routing the traffic and load balancing, are good."
"I liked the debugging part. There are only two files (trace file and log file) that you need to look into while performing debugging, and the logs give you the exact info on where and what needs to be fixed."
"Authentication & Authorization are important because all the sites need authentication for security purposes. That has been handled pretty well all these years with SSO."
"SAML is the best thing we're using right now because there is no need for creating an external account."
"It provides the breadth and the width to provide solutions for the different kinds of technologies which we have."
"Ease of use is very good, for administrating it. It's very well known."
"IWA is an out-of-the-box feature. The SAML-based federation is standard for all tools. However, CA Single Sign-On has made the federation configuration way too simple and handy to set up and use."
"It has considerably reduced the amount of time that new users would take to join into the organization. Previously, it was a lengthy, manual process because it's a very secure environment, where they need to verify the user before they can actually grant him a user-ID and password. Integrating with the built-in custom application, and exposing CA Single Sign On to the internet, we were able to get the employees onboard. The time that we gained was: previously it would generally take from four to eight weeks for each employee, we brought it to one to two days."
"The tool has issues with the third-party SMS gateway. The solution has its own SMS gateway. Integration support is a challenge when we don’t use their SMS gateway. The tool also needs to improve its scalability."
"They could improve their UI and make everything more user-friendly."
"I'm not sure what needs improvement. It is a good platform."
"The product needs to leverage the cloud more, especially in the financial sector, where cloud adoption might be limited. Proper reporting within the cloud is essential. The tool should be more user-friendly to expedite access for users. The current agent-based system poses challenges if a user loses access to the server, making tasks difficult to perform. It should also improve technical support."
"The user interface could be improved."
"The solution could be easier to use and I found it to be very complex involving many steps."
"CyberArk Identity could improve by having the ability to better manage the network, such as Cisco. There seem to be some issues in this area."
"More integrations would be better."
"The profiling element is incredibly robust, but also equally as complex, it requires an off-site course to be able to understand the context or the plethora of options available."
"Looking at their roadmap, they have a broad grasp of the security features which the industry needs."
"The self-service portal needs improvement."
"Multi-factor authentication with social integration needs to improve."
"An Amazon Machine Image (AMI) for the newer appliance versions for hosting the virtual appliances on AWS will help."
"I think they need to integrate some of the newer types of authentication into the product. I'm not seeing the innovation when it comes to biometrics in the product."
"To add more value to this solution it needs to be more user-friendly."
"The main thing is we do not have the traceability and good monitoring that CA can provide us to capture problems when they occur."
"The GUIs are not very clear, especially when integrating with other products from CA."
"An area Siteminder could improve on is that there are a few limitations, in terms of new protocols for OpenID. If I want to have different scopes, the features are limited. They also do not have APIs exposed, which is a major drawback. API is a feature I would like to see included in the next release."
"We're currently unable to find information about if the solution can do a full implementation with SQL. Some better and more accessible documentation for new users or those curious about the product would be helpful."
"The support could be faster."
"The tech support has not been very good for us so we don't use them anymore. We have had some issues. Nobody is perfect."
More IBM Tivoli Access Manager [EOL] Pricing and Cost Advice →
Earn 20 points