Try our new research platform with insights from 80,000+ expert users

CyberArk Identity vs OpenText Behavioral Signals comparison

 

Comparison Buyer's Guide

Executive SummaryUpdated on Sep 21, 2025

Review summaries and opinions

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
 

ROI

Sentiment score
5.6
CyberArk Identity improved security, saved time, and offered over 100% ROI, proving valuable despite some indirect financial results.
Sentiment score
8.9
ArcSight Intelligence boosts security and ROI by automating threat detection, reducing false positives, and streamlining workflows with advanced analytics.
I have seen over 30% return on investment due to the improvement in operational efficiencies through automation, which enhances productivity.
 

Customer Service

Sentiment score
6.5
CyberArk Identity's support is praised for expertise and quick resolution, despite some concerns about response times and product knowledge.
Sentiment score
6.7
OpenText Behavioral Signals' support is responsive and skilled, but resolution may be slow and feedback sometimes lacks depth.
They always respond on time and offer 24/7 support.
They resolved the problem immediately after I reported it, on the same day, within one hour.
They respond immediately when requests are raised, and they are always available for priority one tickets.
 

Scalability Issues

Sentiment score
7.3
CyberArk Identity offers scalable and adaptable solutions, but some users face challenges with extensive architectural scaling and performance when scaled.
Sentiment score
6.3
OpenText Behavioral Signals faces scalability challenges, while technologies like ArcSight Intelligence excel, prompting consideration of alternatives like Splunk.
We can use it on different phones and computers, demonstrating its scalability.
For scalability and reliability, it rates a perfect 10 out of 10.
You can scale it out pretty easily, and you can implement it very small.
 

Stability Issues

Sentiment score
7.9
CyberArk Identity is stable with rare downtime, though challenges exist in connectivity and managing various components for global users.
Sentiment score
8.4
OpenText Behavioral Signals is praised for its stability, receiving high ratings and fostering user trust through reliable performance.
We no longer have our data infiltrated by unauthorized persons, and tracking actions within the system has become very easy.
When you have it in the cloud, you have CyberArk every time you need it.
With a stable network, due to the redundant data centers across the globe, it is a lot easier to use as a SaaS solution.
 

Room For Improvement

CyberArk Identity requires enhancements in integration, scalability, usability, and support, focusing on mobile management, interface, and multifactor authentication.
OpenText and ArcSight require updates for usability, scalability, and pricing to compete with QRadar and Splunk effectively.
Integration or deployment is extremely difficult for CyberArk Identity.
There's a need to enhance network performance.
For CyberArk Identity, you need knowledge of their scripting language to pull different sets of reports.
 

Setup Cost

Enterprise buyers find CyberArk Identity's pricing expensive but justified by comprehensive features and unmatched service for large organizations.
OpenText Behavioral Signals offers enterprise-priced licensing options with additional charges for new features not in the base license.
Regarding pricing, it can be quite a lot for small companies.
The pricing is acceptable.
If I am not going fully cloud, there are additional resources I will need to purchase, such as spinning more VMs or acquiring an HSM device to encrypt the vault.
 

Valuable Features

CyberArk Identity offers seamless integration, strong security, and user-friendly features for enhanced identity protection and operational efficiency.
OpenText Behavioral Signals synthesizes diverse logs, customizes environments, and enhances efficiency with a user-friendly, consolidated interface.
It impacts zero trust security strategies. It prevents lateral movements in the organization.
The two-factor authentication is very important, but the fact that every account is being regenerated every time we use it is the most important security feature for us.
It is the most powerful access management system.
 

Categories and Ranking

CyberArk Identity
Ranking in User Entity Behavior Analytics (UEBA)
9th
Average Rating
8.4
Reviews Sentiment
6.8
Number of Reviews
29
Ranking in other categories
Authentication Systems (10th), Identity Management (IM) (8th), Authorization Software (3rd), Enterprise Password Managers (6th), Access Management (6th), Active Directory Management (6th), Cloud Resource Access Management (3rd), Customer Identity and Access Management (CIAM) (6th)
OpenText Behavioral Signals
Ranking in User Entity Behavior Analytics (UEBA)
14th
Average Rating
8.0
Reviews Sentiment
6.6
Number of Reviews
5
Ranking in other categories
Security Information and Event Management (SIEM) (38th)
 

Mindshare comparison

As of October 2025, in the User Entity Behavior Analytics (UEBA) category, the mindshare of CyberArk Identity is 0.8%, up from 0.1% compared to the previous year. The mindshare of OpenText Behavioral Signals is 2.0%, up from 1.4% compared to the previous year. It is calculated based on PeerSpot user engagement data.
User Entity Behavior Analytics (UEBA) Market Share Distribution
ProductMarket Share (%)
CyberArk Identity0.8%
OpenText Behavioral Signals2.0%
Other97.2%
User Entity Behavior Analytics (UEBA)
 

Featured Reviews

Julio Montero - PeerSpot reviewer
Access management system provides strong security and effortless user authentication
The solution can be deployed on cloud or on-premises. CyberArk is more on the cloud than on local hardware. The deployment is initially quite difficult. That said, when you are doing the implementation of CyberArk, there are so many tutorials that make the learning process very easy. The only complaint could be the language barrier. It's difficult if you don't have a very good level of English. Otherwise, it is very easy. You can have it set up within three months without much difficulty. It's hard to get started, however, once you get going, it gets easier. A full deployment takes half a year or less. There is some maintenance necessary. A company is constantly hiring and letting go of employees. The access is always changing, so access must always be adjusted. Or, if we need another law of filter, we would need to add those, or even take them away. That's another aspect of maintenance.
Pravir KumarSinha - PeerSpot reviewer
Has essential threat detection capabilities, but the features for intelligence need enhancement
We integrated this tool with our security infrastructure. We installed it on a Linux server, where we have a Logger and ESM installed. With the Linux server as the hub, we manage all the configurations and rules, including those for email triggers. The logs are routed through a connector to the Logger, allowing us to monitor our infrastructure effectively. The platform helps us improve threat detection capabilities. I recommend it to others and rate it a seven out of ten.
report
Use our free recommendation engine to learn which User Entity Behavior Analytics (UEBA) solutions are best for your needs.
869,202 professionals have used our research since 2012.
 

Comparison Review

it_user186927 - PeerSpot reviewer
Feb 16, 2015
Cybereason vs. Interset vs. SQRRL
Capture DB - they all use NoSQL db and hence solve the ad hoc query and 'go back in time' problem with current best of breed SIEM and DLP solutions that rely on real time analysis of incoming logs (and don't store them). This means deeper and quicker iterative threat analysis and assessment…
 

Top Industries

By visitors reading reviews
Financial Services Firm
15%
Computer Software Company
12%
Manufacturing Company
11%
Healthcare Company
6%
Government
20%
Computer Software Company
13%
Outsourcing Company
7%
Manufacturing Company
7%
 

Company Size

By reviewers
Large Enterprise
Midsize Enterprise
Small Business
By reviewers
Company SizeCount
Small Business20
Midsize Enterprise4
Large Enterprise9
No data available
 

Questions from the Community

What do you like most about CyberArk Identity?
The integration capabilities, ability to integrate CyberArk into the overall IBB strategy of our current clients.
What is your experience regarding pricing and costs for CyberArk Identity?
I am not certain about CyberArk Identity's exact pricing model. For comparison, Okta was around five dollars per user. CyberArk Identity offers good discounts to some clients, which influences thei...
What needs improvement with CyberArk Identity?
The reporting functionality is somewhat complicated. While I would rate CyberArk Identity and Okta on the same level, Okta's reporting is crisper and clearer. For CyberArk Identity, you need knowle...
What do you like most about ArcSight Interset / Intelligence?
The platform helps us improve threat detection capabilities.
What needs improvement with ArcSight Interset / Intelligence?
The product could be improved in several areas; it currently requires significant enhancement. Compared to QRadar and Splunk, ArcSight Intelligence falls behind, placing it as the third choice amon...
 

Also Known As

Idaptive
ArcSight Interset / Intelligence, FileTrek, Interset UEBA, Micro Focus Interset UEBA, Micro Focus Interset, ArcSight Interset
 

Overview

 

Sample Customers

MLB, Citi, Pfizer, SulAmerica, GE Capital, Shiseido
Accuvant, Splunk Inc., NuTech, Box, rSolutions, Voodoo Technology Limited
Find out what your peers are saying about CyberArk Identity vs. OpenText Behavioral Signals and other solutions. Updated: September 2025.
869,202 professionals have used our research since 2012.