Try our new research platform with insights from 80,000+ expert users

CyberArk Identity vs RSA Identity Governance and Lifecycle comparison

Sponsored
 

Comparison Buyer's Guide

Executive SummaryUpdated on Dec 1, 2024

Review summaries and opinions

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
 

Categories and Ranking

Omada Identity
Sponsored
Ranking in Identity Management (IM)
4th
Average Rating
8.0
Reviews Sentiment
6.8
Number of Reviews
48
Ranking in other categories
User Provisioning Software (4th), Identity and Access Management as a Service (IDaaS) (IAMaaS) (4th), Customer Identity and Access Management (CIAM) (3rd)
CyberArk Identity
Ranking in Identity Management (IM)
9th
Average Rating
8.2
Reviews Sentiment
7.1
Number of Reviews
24
Ranking in other categories
Authentication Systems (9th), Authorization Software (3rd), Enterprise Password Managers (8th), User Entity Behavior Analytics (UEBA) (9th), Access Management (5th), Active Directory Management (8th), Cloud Resource Access Management (3rd), Customer Identity and Access Management (CIAM) (7th)
RSA Identity Governance and...
Ranking in Identity Management (IM)
24th
Average Rating
7.0
Reviews Sentiment
5.9
Number of Reviews
10
Ranking in other categories
No ranking in other categories
 

Mindshare comparison

As of August 2025, in the Identity Management (IM) category, the mindshare of Omada Identity is 3.2%, down from 3.5% compared to the previous year. The mindshare of CyberArk Identity is 2.3%, up from 1.2% compared to the previous year. The mindshare of RSA Identity Governance and Lifecycle is 1.3%, down from 1.4% compared to the previous year. It is calculated based on PeerSpot user engagement data.
Identity Management (IM)
 

Featured Reviews

Pernilla Hulth - PeerSpot reviewer
The interface is easy to use and gives you a solid overview
The cloud-based deployment was straightforward, but the on-prem deployment was in a highly complex ecosystem. Omada has matured since then. I wouldn't say that it isn't straightforward, but it depends on the customer. A standard deployment is relatively easy, but it can be more painful if you need a lot of customization. We deployed the cloud solution in around four months, nearly meeting the 12-week benchmark. The on-prem deployment took three years. It was a highly complex ecosystem that was dependent on other systems. Depending on the size of your environment, you need a product owner and some specialists for maintenance. My last customer was a university with a complex environment. They had around 12 people involved in maintenance at that organization. Typically, it's between 2-5 people.
Julio Montero - PeerSpot reviewer
Access management system provides strong security and effortless user authentication
The solution can be deployed on cloud or on-premises. CyberArk is more on the cloud than on local hardware. The deployment is initially quite difficult. That said, when you are doing the implementation of CyberArk, there are so many tutorials that make the learning process very easy. The only complaint could be the language barrier. It's difficult if you don't have a very good level of English. Otherwise, it is very easy. You can have it set up within three months without much difficulty. It's hard to get started, however, once you get going, it gets easier. A full deployment takes half a year or less. There is some maintenance necessary. A company is constantly hiring and letting go of employees. The access is always changing, so access must always be adjusted. Or, if we need another law of filter, we would need to add those, or even take them away. That's another aspect of maintenance.
Harshul Nayak - PeerSpot reviewer
Streamline identity lifecycle management with intuitive interfaces and robust policy features
The functions of RSA Identity Governance and Lifecycle, especially the IGA, are quite strong with their custom forms and workflows integrated. The user interface is very friendly and easy to use, making it a good product overall. However, it still has to be on-premise and the cloud version is not easily accessible, as dedicated instances are required and machines cannot be shared as multi-tenant for various customers. The advanced policy features of RSA definitely help in defining certain policies such as segregation of duties. That's particularly useful along with creating different access reviews. Regarding access control in simplifying access management, RSA Identity Governance and Lifecycle has strong foundations of groups and roles, which help in defining all policies very easily. This makes it very easy to integrate with other access management tools or privileged access management tools.

Quotes from Members

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
 

Pros

"The most valuable feature of Omada is its API connectivity, which allows seamless integration with various services like SAP, GRC, and Microsoft licenses."
"The customer success and support teams have been crucial."
"I appreciate all the support we receive from Omada."
"The most valuable feature is the automatic provisioning and reconciliation of things like the Active Directory groups and memberships."
"Omada's onboarding features reflect our processes for onboarding new employees well. That is the primary reason we use this solution. We use role-based access control. I'm not sure how much it has improved our security posture, but it's made managing identities more convenient."
"User-friendly solution."
"Support-wise, working with Omada has been good. We have very good direct interactions and fast responses."
"The most valuable functionality of the solution for us is that when employees stop working for the municipality, they are automatically disabled in Active Directory. Omada controls that 100 percent. They are disabled for 30 days, and after that time Omada deletes the Active Directory account. The same type of thing happens when we employ a new person. Their information is automatically imported to Omada and they are equipped with the roles and rights so they can do their jobs."
"The most valuable feature of CyberArk Identity is the adaptive interface."
"The most valuable features of CyberArk Identity are its ability to control access to administrative staff."
"It has machine learning and can help clients to learn the environment and understand what is happening."
"The user identification is simplified, and managing user privileges, whether adding or revoking them, is also quite straightforward when utilizing CyberArk SaaS."
"The integration capabilities, ability to integrate CyberArk into the overall IBB strategy of our current clients."
"The initial setup is straightforward. It takes me up to an hour and a half."
"I like the RBAC (Role-Based Access Control). It basically involves defining various roles, and then simply assigning those roles to users."
"The tool is a very strong and valuable enterprise solution, particularly in ensuring the continuity of service."
"The most valuable feature is the security, in particular, the One Time Password support."
"With the tool in place, you need to hire fewer people to provide access, and you have control over your processes."
"RSA Identity Governance and lifecycles are good for the access certification and auditing sections."
"Roles, connectors for provisioning and re-accreditation or reviews help greatly to govern user access."
"The data collection is excellent and easy to do. It does not require a lot of configuration nor does it require rules to be written like other competitors do."
 

Cons

"The current reporting tools in Omada are limited, but we expect significant improvements in the new version."
"The reporting on the warehouse data and the import process both have room for improvement."
"The architecture of the entire system should also be less complex. The way they process the data is complex."
"The UI design needs improvement. One or two years ago, Omada changed its user interface to simplify, but the simplification has not really kicked in."
"When you do a recalculation of an identity, it's hard to understand what was incorrect before you started the recalculation, and which values are actually updated... all you see are all the new fields that are provisioned, instead of seeing only the fields that are changed."
"They need to improve the cost for small companies."
"If you find an error and you need it fixed, you have to upgrade. It's not like they say, "Okay, we'll fix this problem for you." You have to upgrade. The last time we upgraded, because there was an error in a previous version, we had to pay 150,000 Danish Krone (about $24,000 at the time of this review) to upgrade our systems... That means that we have to pay to get errors fixed that Omada has made in programming the system. I hope they change this way of looking at things."
"If you're running Omada on a cloud service, you may have some issues deploying the newest release. Sometimes, the latest release doesn't adapt to the processes we have already installed. Identity Access Management is a critical system for our organization, and we need to ensure that everyone has the same access as they did before the release."
"More integrations would be better."
"The solution could be easier to use and I found it to be very complex involving many steps."
"At the moment CyberArk needs to enrich Conjur and it needs to be made more viable so that its adoption can be made much faster."
"In terms of general user feedback, the more security you put in front of a user, the more they complain. So usability and the user experience are always a challenge. So there's always room for improvement."
"They can include the Mobile Device Management (MDM) feature."
"The user interface could be improved."
"The tool has issues with the third-party SMS gateway. The solution has its own SMS gateway. Integration support is a challenge when we don’t use their SMS gateway. The tool also needs to improve its scalability."
"One area for improvement is the complexity of the learning curve for new users."
"The user interface and workflow need improvement, and more connectors would help."
"This product is missing a lot of features which other competitors are providing. One of the key features that are missing right now is risk scoring. Additionally, there is not much scope for customization - everything is hard-coded and predefined, so it does not allow the developers to make many modifications."
"Every connector that you have in the product needs to be custom-built, so there are not a lot of standard connectors available in the product, because of which there are a lot of hidden consultancy costs."
"RSA Identity Governance and Lifecycle could improve out-of-the-box customization."
"Technical support in Pakistan can be improved."
"If you use the appliance version then it won't handle a huge database volume."
"There are scalability issues. This product does not scale very well. It is not a good product for load balancing / active–active architecture."
 

Pricing and Cost Advice

"Omada Identity is competitively priced and delivers good value for our money."
"It is not cheap. It is expensive, but compared to what we did almost three years ago, it is value for money. It is worth it."
"There were a lot of administrator, partner, and supplier accounts for people who were no longer working for us but still in the system. So, we reduced the number of users no longer with the company, which saved us some money on licensing."
"The initial total cost of ownership to implement Omada Identity is not small. The TCO for the implementation is as high as any other solution. However, the cost of maintaining the solution is at par or lower than competitors, including adding more features or maintaining the system after the initial deployment or installation to make sure that they are available for users to use or extending the functionalities of those activities. Those maintenance costs are lower than other vendors, but the initial cost of getting the system installed is still high."
"Omada continues to be very competitive on pricing, especially on the Omada cloud product."
"Omada Identity offers a reasonable price point, but it will increase as we transition to the cloud."
"Omada is too expensive. We are in the automotive industry. The pricing might be high because most of the other customers are in the insurance or banking sectors, but it's steep for an auto supply company."
"The pricing is too high for SMBs."
"I would rate the tool’s pricing a seven out of ten. The product’s pricing is expensive and is on a yearly basis. You will need to pay around 10,000 GBP for 500 users."
"CyberArk Identity is an expensive solution."
"There is an initial license and then there is a subscription needed."
"There could be some additional costs apart from the licensing costs of the solution when you want to develop connectors in CyberArk Identity."
"It's not that affordable compared to Delinea or other products. They're less expensive and allow more customization. For the cost, it is expensive."
"The pricing of CyberArk Identity is competitive."
"I think it is a fairly priced tool. I rate the tool between six and seven on a scale of one to ten where one is expensive, and ten is cheap."
"In terms of pricing, BeyondTrust and CyberArk tend to be more expensive, with CyberArk receiving an eight out of ten, in this regard."
"We are using the cloud platform, but we don't find it compatible to be served as a multi-tenant platform. This is a large drawback. It becomes expensive because it is then an all-dedicated solution. You have to have a separate tenant for each client, which increases the cost. The overall unit pricing can be less expensive than how it is right now."
"Pricing varies based on user count/number of modules you need."
"I rate the product's price a five on a scale of one to ten, where one is cheap, and ten is expensive."
report
Use our free recommendation engine to learn which Identity Management (IM) solutions are best for your needs.
865,384 professionals have used our research since 2012.
 

Top Industries

By visitors reading reviews
Financial Services Firm
15%
Computer Software Company
13%
Manufacturing Company
9%
Government
6%
Financial Services Firm
14%
Computer Software Company
11%
Manufacturing Company
11%
Healthcare Company
6%
Financial Services Firm
21%
Computer Software Company
12%
Manufacturing Company
8%
Educational Organization
6%
 

Company Size

By reviewers
Large Enterprise
Midsize Enterprise
Small Business
 

Questions from the Community

What do you like most about Omada Identity Cloud?
As an administrator, we benefit from a lot of functionality that is available out of the box, but it is also configur...
What is your experience regarding pricing and costs for Omada Identity Cloud?
They are positioned at a good price point. They are lower than some of their competitors.
What needs improvement with Omada Identity Cloud?
The biggest issue, which is the reason why we are transitioning from their product to SailPoint, is the overall user ...
What do you like most about CyberArk Identity?
The integration capabilities, ability to integrate CyberArk into the overall IBB strategy of our current clients.
What is your experience regarding pricing and costs for CyberArk Identity?
The pricing is acceptable. It is worth considering what we are protecting with the amount charged.
What needs improvement with CyberArk Identity?
Some areas experience slowness based on the workload. There's a need to enhance network performance despite the good ...
What do you like most about RSA Identity Governance and Lifecycle?
With the tool in place, you need to hire fewer people to provide access, and you have control over your processes.
What needs improvement with RSA Identity Governance and Lifecycle?
There is room for improvement with RSA Identity Governance and Lifecycle. As the size becomes larger, the collections...
What is your primary use case for RSA Identity Governance and Lifecycle?
We provide RSA Identity Governance and Lifecycle as a service, mainly to oversee the digital identity lifecycle, from...
 

Also Known As

Omada Identity Suite, Omada Identity Cloud
Idaptive
SecurID
 

Overview

 

Sample Customers

Bayer, ECCO Shoes, Vattenfall, NuStar Energy, Unicredit, Schiphol Group, BMW Group, Deutsche Leasing
MLB, Citi, Pfizer, SulAmerica, GE Capital, Shiseido
NTT Com Asia, Virgin Blue, Bank of Uganda, EMEA Telecommunications Company, LAit (Lazio Innovazione Tecnologica), NyNet, OTP Bank, Red Bull Racing, Rupert House School, Signify, UK Local Authority, Bancolombia, Banco Popular de Puerto Rico (BPPR), TIVIT, Array Services, International Computerware, KPMG LLP, Moffitt Cancer Center
Find out what your peers are saying about CyberArk Identity vs. RSA Identity Governance and Lifecycle and other solutions. Updated: July 2025.
865,384 professionals have used our research since 2012.