No more typing reviews! Try our Samantha, our new voice AI agent.

CyberArk Identity vs SAP Single Sign-On comparison

 

Comparison Buyer's Guide

Executive Summary

Review summaries and opinions

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
 

Categories and Ranking

CyberArk Identity
Average Rating
8.2
Reviews Sentiment
6.7
Number of Reviews
29
Ranking in other categories
Authentication Systems (9th), Identity Management (IM) (9th), Authorization Software (3rd), Enterprise Password Managers (9th), User Entity Behavior Analytics (UEBA) (9th), Access Management (8th), Active Directory Management (6th), Cloud Resource Access Management (3rd), Customer Identity and Access Management (CIAM) (7th)
SAP Single Sign-On
Average Rating
10.0
Reviews Sentiment
8.5
Number of Reviews
1
Ranking in other categories
Single Sign-On (SSO) (16th)
 

Mindshare comparison

While both are Identity and Access Management solutions, they serve different purposes. CyberArk Identity is designed for Customer Identity and Access Management (CIAM) and holds a mindshare of 3.5%, down 3.9% compared to last year.
SAP Single Sign-On, on the other hand, focuses on Single Sign-On (SSO), holds 0.9% mindshare, up 0.3% since last year.
Customer Identity and Access Management (CIAM) Mindshare Distribution
ProductMindshare (%)
CyberArk Identity3.5%
Okta Platform15.5%
Auth0 Platform14.1%
Other66.9%
Customer Identity and Access Management (CIAM)
Single Sign-On (SSO) Mindshare Distribution
ProductMindshare (%)
SAP Single Sign-On0.9%
Microsoft Entra ID11.3%
Okta Platform9.7%
Other78.1%
Single Sign-On (SSO)
 

Featured Reviews

Hariharan Thangasamy - PeerSpot reviewer
Cybersecurity Delivery Analyst at Accenture
Has strengthened privileged access control and improved audit visibility through session monitoring and password rotation
On the identity product side, it is awesome. However, they can improve in the documentation parts. For example, if there is a migration process, I can see the maximum customers are moving from self-hosted to on-premises or from on-premises to the cloud. It would be helpful if they released a generalized document for processes such as migration. A clear overview document would assist us in understanding more about the tool, configurations, and automations to enhance our security. Regarding the initial setup of CyberArk Identity, I faced some challenges. At some points, I could not find proper documentation for deploying, enhancing, or integrating with other components. I could not find the proper documentation in the community portal.
AhmedHaridy - PeerSpot reviewer
Managing Director at Emkan
A flexible solution that has two-factor authentication feature
The solution has been integrated into our mobile workforce using SAP IAS. This service links all SAP products with a central authentication platform, allowing users to access various systems and functionalities. We can easily integrate this solution with Active Directory or other solutions such as Microsoft or IBM. Additionally, SAP IAS also supports digital authentication, not only for SAP but also for other platforms like Microsoft Azure. Customers can quickly establish user authentication with SAP IAS in just a few minutes, enabling secure access to specific products or systems based on predefined rules. The two-factor authentication feature of SAP Single Sign-On is highly valuable for enhancing security. It allows users to access SAP products using various authentication methods, such as Microsoft user or their authentication service. This ensures secure access to all systems, both SAP and non-SAP, while giving the company control over user access. Additionally, the solution offers location-based access control. We find that it's already quite flexible and doesn't require much customization. It's mainly about configuration, which doesn't demand technical expertise. Customers often delve deeper into the solution's features to understand how to use it more effectively. They ask questions that are already addressed within the platform. This reliance on the solution's features, alongside their internal on-premises systems, has a very positive impact. The tool is compatible with different products.

Quotes from Members

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
 

Pros

"The best features in CyberArk Identity that I appreciate most are the recent updates that have added features in the cloud privilege environment, including Secure Infrastructure Access, Secure Cloud Access, and Secure Web Sessions."
"CyberArk Identity is at the top."
"It has machine learning and can help clients to learn the environment and understand what is happening."
"CyberArk Identity's ability to safeguard financial services infrastructure is good."
"The features that I personally find most effective in terms of security stem from the fact that it is easy to integrate and also the adoption is faster."
"The tool is a very strong and valuable enterprise solution, particularly in ensuring the continuity of service."
"I like the RBAC (Role-Based Access Control). It basically involves defining various roles, and then simply assigning those roles to users."
"The support of CyberArk Identity is really good."
"The solution has been integrated into our mobile workforce using SAP IAS. This service links all SAP products with a central authentication platform, allowing users to access various systems and functionalities. We can easily integrate this solution with Active Directory or other solutions such as Microsoft or IBM. Additionally, SAP IAS also supports digital authentication, not only for SAP but also for other platforms like Microsoft Azure. Customers can quickly establish user authentication with SAP IAS in just a few minutes, enabling secure access to specific products or systems based on predefined rules."
 

Cons

"The tool has issues with the third-party SMS gateway. The solution has its own SMS gateway. Integration support is a challenge when we don’t use their SMS gateway. The tool also needs to improve its scalability."
"The user interface could be improved."
"The user interface could be improved."
"It was pretty complex to implement CyberArk Identity. We had some help from a partner, and that helped a lot. But even for the partner, it was really difficult to streamline the process of implementing."
"There is room for improvement in documentation. The documentation could be more specific about the changes needed to achieve specific goals."
"Some areas experience slowness based on the workload. There's a need to enhance network performance despite the good user experience with access management."
"They could improve their UI and make everything more user-friendly."
"While CyberArk Identity is a leader in Identity Security, the integration of multiple components could be improved."
"The only improvement I suggest for SAP Single Sign-On concerns employees without emails. We addressed this by allowing users to set up security questions themselves. However, to further enhance this, integrating with mobile SMS for password resets could be beneficial."
 

Pricing and Cost Advice

"We find that the pricing and licensing of this solution is adequate, as compared to the other competitors in the market."
"The pricing of CyberArk Identity is competitive."
"Their pricing is obviously a lot higher than many vendors in the marketplace but their service is also unmatched."
"CyberArk Identity is an expensive solution."
"I think it is a fairly priced tool. I rate the tool between six and seven on a scale of one to ten where one is expensive, and ten is cheap."
"It's not that affordable compared to Delinea or other products. They're less expensive and allow more customization. For the cost, it is expensive."
"The solution is cheap and I rate its pricing an eight out of ten."
"The pricing is acceptable. It is worth considering what we are protecting with the amount charged."
"The tool is free of cost."
report
Use our free recommendation engine to learn which Customer Identity and Access Management (CIAM) solutions are best for your needs.
885,789 professionals have used our research since 2012.
 

Top Industries

By visitors reading reviews
Financial Services Firm
13%
Manufacturing Company
10%
Computer Software Company
9%
Construction Company
7%
No data available
 

Company Size

By reviewers
Large Enterprise
Midsize Enterprise
Small Business
By reviewers
Company SizeCount
Small Business20
Midsize Enterprise4
Large Enterprise10
No data available
 

Questions from the Community

What is your experience regarding pricing and costs for CyberArk Identity?
I am not certain about CyberArk Identity's exact pricing model. For comparison, Okta was around five dollars per user. CyberArk Identity offers good discounts to some clients, which influences thei...
What needs improvement with CyberArk Identity?
We do not specifically use the password vaulting feature of CyberArk Identity. The centralized user dashboard of CyberArk Identity has not been that important for us. If it would be possible to sha...
What is your primary use case for CyberArk Identity?
It's not being purchased through AWS, but we're using CyberArk Identity as a SaaS solution. I think it's running on AWS, but we bought it directly from CyberArk.
What do you like most about SAP Single Sign-On?
The solution has been integrated into our mobile workforce using SAP IAS. This service links all SAP products with a central authentication platform, allowing users to access various systems and fu...
What needs improvement with SAP Single Sign-On?
The only improvement I suggest for SAP Single Sign-On concerns employees without emails. We addressed this by allowing users to set up security questions themselves. However, to further enhance thi...
 

Also Known As

Idaptive
No data available
 

Overview

 

Sample Customers

MLB, Citi, Pfizer, SulAmerica, GE Capital, Shiseido
1. Adidas 2. Aetna 3. Airbus 4. Allianz 5. American Express 6. AstraZeneca 7. Audi 8.Bayer 9. BMW 10. Boeing 11. Cisco 12. Coca-Cola 13. Colgate-Palmolive 14. Dell 15. Eni 16. Ericsson 17. ExxonMobil 18. Ford 19. General Electric 20. Google 21. Hewlett Packard 22. Honeywell 23. IBM 24. Intel 25. Johnson & Johnson 26. JPMorgan Chase 27. Kellogg's 28. L'Oreal 29. Merck 30. Nestle 31. Nike 32. PG
Find out what your peers are saying about Okta, Ping Identity, Microsoft and others in Customer Identity and Access Management (CIAM). Updated: February 2026.
885,789 professionals have used our research since 2012.