Try our new research platform with insights from 80,000+ expert users

CyberArk Identity vs SAP Single Sign-On comparison

 

Comparison Buyer's Guide

Executive Summary

Review summaries and opinions

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
 

Categories and Ranking

CyberArk Identity
Average Rating
8.2
Reviews Sentiment
7.1
Number of Reviews
24
Ranking in other categories
Authentication Systems (9th), Identity Management (IM) (9th), Authorization Software (3rd), Enterprise Password Managers (8th), User Entity Behavior Analytics (UEBA) (9th), Access Management (5th), Active Directory Management (8th), Cloud Resource Access Management (3rd), Customer Identity and Access Management (CIAM) (7th)
SAP Single Sign-On
Average Rating
10.0
Reviews Sentiment
8.5
Number of Reviews
1
Ranking in other categories
Single Sign-On (SSO) (15th)
 

Mindshare comparison

While both are Identity and Access Management solutions, they serve different purposes. CyberArk Identity is designed for Customer Identity and Access Management (CIAM) and holds a mindshare of 3.8%, up 3.6% compared to last year.
SAP Single Sign-On, on the other hand, focuses on Single Sign-On (SSO), holds 0.3% mindshare, up 0.1% since last year.
Customer Identity and Access Management (CIAM)
Single Sign-On (SSO)
 

Featured Reviews

Julio Montero - PeerSpot reviewer
Access management system provides strong security and effortless user authentication
The solution can be deployed on cloud or on-premises. CyberArk is more on the cloud than on local hardware. The deployment is initially quite difficult. That said, when you are doing the implementation of CyberArk, there are so many tutorials that make the learning process very easy. The only complaint could be the language barrier. It's difficult if you don't have a very good level of English. Otherwise, it is very easy. You can have it set up within three months without much difficulty. It's hard to get started, however, once you get going, it gets easier. A full deployment takes half a year or less. There is some maintenance necessary. A company is constantly hiring and letting go of employees. The access is always changing, so access must always be adjusted. Or, if we need another law of filter, we would need to add those, or even take them away. That's another aspect of maintenance.
AhmedHaridy - PeerSpot reviewer
A flexible solution that has two-factor authentication feature
The solution has been integrated into our mobile workforce using SAP IAS. This service links all SAP products with a central authentication platform, allowing users to access various systems and functionalities. We can easily integrate this solution with Active Directory or other solutions such as Microsoft or IBM. Additionally, SAP IAS also supports digital authentication, not only for SAP but also for other platforms like Microsoft Azure. Customers can quickly establish user authentication with SAP IAS in just a few minutes, enabling secure access to specific products or systems based on predefined rules. The two-factor authentication feature of SAP Single Sign-On is highly valuable for enhancing security. It allows users to access SAP products using various authentication methods, such as Microsoft user or their authentication service. This ensures secure access to all systems, both SAP and non-SAP, while giving the company control over user access. Additionally, the solution offers location-based access control. We find that it's already quite flexible and doesn't require much customization. It's mainly about configuration, which doesn't demand technical expertise. Customers often delve deeper into the solution's features to understand how to use it more effectively. They ask questions that are already addressed within the platform. This reliance on the solution's features, alongside their internal on-premises systems, has a very positive impact. The tool is compatible with different products.

Quotes from Members

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
 

Pros

"What I like most about CyberArk Identity is the model that is in place."
"I like the RBAC (Role-Based Access Control). It basically involves defining various roles, and then simply assigning those roles to users."
"CyberArk Identity is at the top."
"CyberArk Identity provides identity governance and gives me control over who and how access to environments occurs, offering significant confidentiality in what is accessed."
"I had one machine that I could not use due to an invalid token. They resolved the problem immediately after I reported it, on the same day, within one hour. It is a very good experience."
"The features that I personally find most effective in terms of security stem from the fact that it is easy to integrate and also the adoption is faster."
"The user identification is simplified, and managing user privileges, whether adding or revoking them, is also quite straightforward when utilizing CyberArk SaaS."
"The tool is a very strong and valuable enterprise solution, particularly in ensuring the continuity of service."
"The solution has been integrated into our mobile workforce using SAP IAS. This service links all SAP products with a central authentication platform, allowing users to access various systems and functionalities. We can easily integrate this solution with Active Directory or other solutions such as Microsoft or IBM. Additionally, SAP IAS also supports digital authentication, not only for SAP but also for other platforms like Microsoft Azure. Customers can quickly establish user authentication with SAP IAS in just a few minutes, enabling secure access to specific products or systems based on predefined rules."
 

Cons

"In terms of general user feedback, the more security you put in front of a user, the more they complain. So usability and the user experience are always a challenge. So there's always room for improvement."
"Integration or deployment is extremely difficult for CyberArk Identity."
"One area for improvement is the complexity of the learning curve for new users."
"We would like to see an improvement in the ability to manage mobile devices."
"CyberArk Identity could improve by having the ability to better manage the network, such as Cisco. There seem to be some issues in this area."
"They could improve their UI and make everything more user-friendly."
"They can include the Mobile Device Management (MDM) feature."
"At the moment CyberArk needs to enrich Conjur and it needs to be made more viable so that its adoption can be made much faster."
"The only improvement I suggest for SAP Single Sign-On concerns employees without emails. We addressed this by allowing users to set up security questions themselves. However, to further enhance this, integrating with mobile SMS for password resets could be beneficial."
 

Pricing and Cost Advice

"Their pricing is obviously a lot higher than many vendors in the marketplace but their service is also unmatched."
"There could be some additional costs apart from the licensing costs of the solution when you want to develop connectors in CyberArk Identity."
"It's not that affordable compared to Delinea or other products. They're less expensive and allow more customization. For the cost, it is expensive."
"The pricing is acceptable. It is worth considering what we are protecting with the amount charged."
"There is an initial license and then there is a subscription needed."
"The solution is cheap and I rate its pricing an eight out of ten."
"The pricing of CyberArk Identity is competitive."
"In terms of pricing, BeyondTrust and CyberArk tend to be more expensive, with CyberArk receiving an eight out of ten, in this regard."
"The tool is free of cost."
report
Use our free recommendation engine to learn which Customer Identity and Access Management (CIAM) solutions are best for your needs.
865,164 professionals have used our research since 2012.
 

Top Industries

By visitors reading reviews
Financial Services Firm
15%
Computer Software Company
11%
Manufacturing Company
11%
Healthcare Company
6%
No data available
 

Company Size

By reviewers
Large Enterprise
Midsize Enterprise
Small Business
No data available
 

Questions from the Community

What do you like most about CyberArk Identity?
The integration capabilities, ability to integrate CyberArk into the overall IBB strategy of our current clients.
What is your experience regarding pricing and costs for CyberArk Identity?
The pricing is acceptable. It is worth considering what we are protecting with the amount charged.
What needs improvement with CyberArk Identity?
Some areas experience slowness based on the workload. There's a need to enhance network performance despite the good user experience with access management.
What do you like most about SAP Single Sign-On?
The solution has been integrated into our mobile workforce using SAP IAS. This service links all SAP products with a central authentication platform, allowing users to access various systems and fu...
What needs improvement with SAP Single Sign-On?
The only improvement I suggest for SAP Single Sign-On concerns employees without emails. We addressed this by allowing users to set up security questions themselves. However, to further enhance thi...
 

Also Known As

Idaptive
No data available
 

Overview

 

Sample Customers

MLB, Citi, Pfizer, SulAmerica, GE Capital, Shiseido
1. Adidas 2. Aetna 3. Airbus 4. Allianz 5. American Express 6. AstraZeneca 7. Audi 8.Bayer 9. BMW 10. Boeing 11. Cisco 12. Coca-Cola 13. Colgate-Palmolive 14. Dell 15. Eni 16. Ericsson 17. ExxonMobil 18. Ford 19. General Electric 20. Google 21. Hewlett Packard 22. Honeywell 23. IBM 24. Intel 25. Johnson & Johnson 26. JPMorgan Chase 27. Kellogg's 28. L'Oreal 29. Merck 30. Nestle 31. Nike 32. PG
Find out what your peers are saying about Auth0, Ping Identity, Omada and others in Customer Identity and Access Management (CIAM). Updated: July 2025.
865,164 professionals have used our research since 2012.