Try our new research platform with insights from 80,000+ expert users

CyberArk Identity vs Symantec VIP Access Manager comparison

 

Comparison Buyer's Guide

Executive SummaryUpdated on Aug 11, 2024

Review summaries and opinions

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
 

Categories and Ranking

CyberArk Identity
Ranking in Authentication Systems
9th
Ranking in Access Management
5th
Average Rating
8.2
Reviews Sentiment
7.1
Number of Reviews
24
Ranking in other categories
Identity Management (IM) (9th), Authorization Software (3rd), Enterprise Password Managers (8th), User Entity Behavior Analytics (UEBA) (9th), Active Directory Management (8th), Cloud Resource Access Management (3rd), Customer Identity and Access Management (CIAM) (7th)
Symantec VIP Access Manager
Ranking in Authentication Systems
15th
Ranking in Access Management
17th
Average Rating
8.4
Reviews Sentiment
7.4
Number of Reviews
15
Ranking in other categories
No ranking in other categories
 

Mindshare comparison

As of August 2025, in the Authentication Systems category, the mindshare of CyberArk Identity is 2.1%, up from 1.0% compared to the previous year. The mindshare of Symantec VIP Access Manager is 1.8%, down from 2.4% compared to the previous year. It is calculated based on PeerSpot user engagement data.
Authentication Systems
 

Featured Reviews

Julio Montero - PeerSpot reviewer
Access management system provides strong security and effortless user authentication
The solution can be deployed on cloud or on-premises. CyberArk is more on the cloud than on local hardware. The deployment is initially quite difficult. That said, when you are doing the implementation of CyberArk, there are so many tutorials that make the learning process very easy. The only complaint could be the language barrier. It's difficult if you don't have a very good level of English. Otherwise, it is very easy. You can have it set up within three months without much difficulty. It's hard to get started, however, once you get going, it gets easier. A full deployment takes half a year or less. There is some maintenance necessary. A company is constantly hiring and letting go of employees. The access is always changing, so access must always be adjusted. Or, if we need another law of filter, we would need to add those, or even take them away. That's another aspect of maintenance.
Berk Onur - PeerSpot reviewer
With its mobile application, this tool offers a convenient and user-friendly experience to its users
To improve the tool, I think that the solution should consider integrations with other cybersecurity and IT technologies, such as Privileged Access Management and Site Integration. Additionally, the implementation of second-factor authentication via Symantec VIP Access Manager, CyberArk, and Delinea, among other technologies, could be best for the product. While the existing technology is okay, improving the integration capabilities for Symantec VIP Access Manager would benefit the product. I would like to see the solution meet the integration needs at our company. While many cybersecurity solutions can function independently, they often lack integration with our systems due to missed integration points. Improving the solution's integration feature would be beneficial.

Quotes from Members

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
 

Pros

"CyberArk Identity's ability to safeguard financial services infrastructure is good."
"The tool helps with authentication. It acts as an MFA for any kind of privileged access that occurs in our organization."
"The initial setup of CyberArk Identity was straightforward."
"I had one machine that I could not use due to an invalid token. They resolved the problem immediately after I reported it, on the same day, within one hour. It is a very good experience."
"The setup, via cloud, is simple."
"The feature that we find most valuable is the ability to integrate multiple IDs for on-premises Active Directory."
"The solution helps with auditing, and monitoring, and integrates with Splunk for log analysis. User activity logs are captured in CyberArk Identity and sent to external tools like Splunk for analysis and monitoring."
"CyberArk Identity is a mature product."
"Other than it provides us with remote access, so it's fairly easy to install, fairly easy to set up, and provides us the ability to get into our corporate environment."
"The product is useful for providing user access from an in-built office server as we follow the work-from-home model."
"Cloud-based service and management."
"It's a good tool. It's pretty straightforward."
"It is easy to use."
"The tool has been very stable, in my experience. Also, I haven't faced any issues or problems with integration or connectivity."
"In this version 9.1, lots of changes are done for the dashboard, User Store etc."
"It offers more platform support, like Apple, Android, and Microsoft."
 

Cons

"We would like to see an improvement in the ability to manage mobile devices."
"One area for improvement is the complexity of the learning curve for new users."
"The OpenID features could improve in CyberArk Identity."
"More integrations would be better."
"When you translate the page from one language to another, it can be a difficult process. The translation isn't always good, and it may have a completely different name. I've noticed this in the English to Spanish translation."
"In terms of general user feedback, the more security you put in front of a user, the more they complain. So usability and the user experience are always a challenge. So there's always room for improvement."
"The user interface could be improved."
"The product is not cheap, especially if you opt for an on-premise deployment requiring a complex server infrastructure. On the other hand, choosing the software as a service version simplifies infrastructure requirements but necessitates being online all the time."
"The User Store synchronization part needs to improve. Also, the logs, reports, and dashboard can be improved."
"In the next release, I would like the ability to work offline with remote access."
"Every time that I have a new phone or computer, it takes a little longer to deploy it."
"The gateway server is a RADIUS server, but it lacks the functionality of returning RADIUS attributes other than those that are required for the gateway to authenticate the users."
"If they had dashboards or a report for managers or executives, then it would allow them to see the status and have it make sense to them."
"It is challenging to use when installing a new version."
"Geofencing needs improvement."
"It gets out of sync with Active Directory or whatever it might be, whatever the authentication piece is on Active Directory, and they just reset it on the backend. I never have to contact the vendor."
 

Pricing and Cost Advice

"The solution is cheap and I rate its pricing an eight out of ten."
"Their pricing is obviously a lot higher than many vendors in the marketplace but their service is also unmatched."
"The pricing is acceptable. It is worth considering what we are protecting with the amount charged."
"It's not that affordable compared to Delinea or other products. They're less expensive and allow more customization. For the cost, it is expensive."
"In terms of pricing, BeyondTrust and CyberArk tend to be more expensive, with CyberArk receiving an eight out of ten, in this regard."
"CyberArk Identity is an expensive solution."
"I would rate the tool’s pricing a seven out of ten. The product’s pricing is expensive and is on a yearly basis. You will need to pay around 10,000 GBP for 500 users."
"There is an initial license and then there is a subscription needed."
"I can say that the solution is worth the money."
"There are additional costs for maintenance."
"Licensing and pricing seems very fair."
"There is a one-time setup fee plus the licenses are provided as per the number of users. For SMS and voice calls, the costs are separate."
report
Use our free recommendation engine to learn which Authentication Systems solutions are best for your needs.
865,384 professionals have used our research since 2012.
 

Top Industries

By visitors reading reviews
Financial Services Firm
14%
Computer Software Company
11%
Manufacturing Company
11%
Healthcare Company
6%
Computer Software Company
14%
Financial Services Firm
10%
Insurance Company
9%
Manufacturing Company
8%
 

Company Size

By reviewers
Large Enterprise
Midsize Enterprise
Small Business
 

Questions from the Community

What do you like most about CyberArk Identity?
The integration capabilities, ability to integrate CyberArk into the overall IBB strategy of our current clients.
What is your experience regarding pricing and costs for CyberArk Identity?
The pricing is acceptable. It is worth considering what we are protecting with the amount charged.
What needs improvement with CyberArk Identity?
Some areas experience slowness based on the workload. There's a need to enhance network performance despite the good user experience with access management.
What do you like most about Symantec VIP Access Manager?
The product is useful for providing user access from an in-built office server as we follow the work-from-home model.
What is your experience regarding pricing and costs for Symantec VIP Access Manager?
The pricing would most likely charge per user based on how many accounts have access to the IT managers.
What needs improvement with Symantec VIP Access Manager?
The product's connection speed needs improvement. Sometimes, I need help connecting my mobile to the main office's system due to a version upgrade. It is challenging to use when installing a new ve...
 

Also Known As

Idaptive
Symantec VIP
 

Overview

 

Sample Customers

MLB, Citi, Pfizer, SulAmerica, GE Capital, Shiseido
Maine Medical Center, Aria S.p.A
Find out what your peers are saying about CyberArk Identity vs. Symantec VIP Access Manager and other solutions. Updated: August 2025.
865,384 professionals have used our research since 2012.