Try our new research platform with insights from 80,000+ expert users

CyberArk Identity vs WSO2 Identity Server comparison

 

Comparison Buyer's Guide

Executive SummaryUpdated on Jan 27, 2025

Review summaries and opinions

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
 

Categories and Ranking

CyberArk Identity
Ranking in Customer Identity and Access Management (CIAM)
7th
Average Rating
8.2
Reviews Sentiment
7.1
Number of Reviews
24
Ranking in other categories
Authentication Systems (9th), Identity Management (IM) (9th), Authorization Software (3rd), Enterprise Password Managers (8th), User Entity Behavior Analytics (UEBA) (9th), Access Management (5th), Active Directory Management (8th), Cloud Resource Access Management (3rd)
WSO2 Identity Server
Ranking in Customer Identity and Access Management (CIAM)
12th
Average Rating
8.2
Reviews Sentiment
7.1
Number of Reviews
11
Ranking in other categories
No ranking in other categories
 

Mindshare comparison

As of August 2025, in the Customer Identity and Access Management (CIAM) category, the mindshare of CyberArk Identity is 3.8%, up from 3.6% compared to the previous year. The mindshare of WSO2 Identity Server is 1.6%, down from 3.1% compared to the previous year. It is calculated based on PeerSpot user engagement data.
Customer Identity and Access Management (CIAM)
 

Featured Reviews

Julio Montero - PeerSpot reviewer
Access management system provides strong security and effortless user authentication
The solution can be deployed on cloud or on-premises. CyberArk is more on the cloud than on local hardware. The deployment is initially quite difficult. That said, when you are doing the implementation of CyberArk, there are so many tutorials that make the learning process very easy. The only complaint could be the language barrier. It's difficult if you don't have a very good level of English. Otherwise, it is very easy. You can have it set up within three months without much difficulty. It's hard to get started, however, once you get going, it gets easier. A full deployment takes half a year or less. There is some maintenance necessary. A company is constantly hiring and letting go of employees. The access is always changing, so access must always be adjusted. Or, if we need another law of filter, we would need to add those, or even take them away. That's another aspect of maintenance.
Ritesh_Shah - PeerSpot reviewer
Utilizing key management and seamless single sign-on integration for enhanced user profile management
WSO2 Identity Server's key management feature stands out as a particularly impactful feature for enhancing security. Additionally, from a user perspective, the self-user portal and user profile management capabilities are highly valuable. It allows users to manage their profiles, change passwords, and offers a self-care portal type of functionality. The single sign-on capability integrates seamlessly with various platforms, including Google, Facebook, LDAP, and Active Directory, which supports rapid product launches.

Quotes from Members

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
 

Pros

"CyberArk Identity is at the top."
"It has machine learning and can help clients to learn the environment and understand what is happening."
"I had one machine that I could not use due to an invalid token. They resolved the problem immediately after I reported it, on the same day, within one hour. It is a very good experience."
"CyberArk Identity's ability to safeguard financial services infrastructure is good."
"The solution helps with auditing, and monitoring, and integrates with Splunk for log analysis. User activity logs are captured in CyberArk Identity and sent to external tools like Splunk for analysis and monitoring."
"I found the solution to be stable."
"The user identification is simplified, and managing user privileges, whether adding or revoking them, is also quite straightforward when utilizing CyberArk SaaS."
"Being able to integrate CyberArk Identity with Microsoft Defender is valuable."
"It's very easy to implement everything."
"Comprehensive ecosystem."
"I am completely satisfied with WSO2 Identity Server and would definitely recommend it to other companies."
"The keystore feature has been most valuable for us."
"The solution gets the job done, and we don't have to do the main configuration."
"The single sign-on procedure itself, as well as the ability to connect to external user sources such as Microsoft Active Directory and LDAP servers, are the solution's most valuable features."
"The product provides easy integration between API manager and IT server components."
"We use the solution for customer identity management, authenticating customers coming in through a web portal."
 

Cons

"Some areas experience slowness based on the workload. There's a need to enhance network performance despite the good user experience with access management."
"At the moment CyberArk needs to enrich Conjur and it needs to be made more viable so that its adoption can be made much faster."
"CyberArk Identity could improve by having the ability to better manage the network, such as Cisco. There seem to be some issues in this area."
"To enhance the product, they can consider improving the user interface of the software and possibly the customer support team. Sometimes, there is a delay in handling my inquiries via email, which could be addressed for better service."
"Integration or deployment is extremely difficult for CyberArk Identity."
"The user interface could be improved."
"The tool has issues with the third-party SMS gateway. The solution has its own SMS gateway. Integration support is a challenge when we don’t use their SMS gateway. The tool also needs to improve its scalability."
"I'm not sure what needs improvement. It is a good platform."
"The price of the product is an area of concern where improvements are required."
"The solution's licensing model could be more flexible, and pricing could be improved."
"This solution requires extensive knowledge to be used effectively as certain areas of its use are not user friendly."
"There needs to be a good support model and easy-to-understand documentation."
"Sometimes working with the code is difficult because I search for documentation about the code and how to work with the code, which is where I believe they should improve, by providing some documentation on how to work with the code."
"This solution does not have BPM workflows already integrated, we had to integrate the BPM module externally. They do not provide full-featured auditing and certification modules out of the box."
"The high availability architecture has to be improved."
"The solution seems to be pretty outdated."
 

Pricing and Cost Advice

"I would rate the tool’s pricing a seven out of ten. The product’s pricing is expensive and is on a yearly basis. You will need to pay around 10,000 GBP for 500 users."
"There could be some additional costs apart from the licensing costs of the solution when you want to develop connectors in CyberArk Identity."
"The pricing is acceptable. It is worth considering what we are protecting with the amount charged."
"The solution is cheap and I rate its pricing an eight out of ten."
"In terms of pricing, BeyondTrust and CyberArk tend to be more expensive, with CyberArk receiving an eight out of ten, in this regard."
"The pricing of CyberArk Identity is competitive."
"CyberArk Identity is an expensive solution."
"There is an initial license and then there is a subscription needed."
"WSO2 Identity Server is not an expensive solution."
"We have to take their support, but that is a minimal charge if I'm comparing it to other identity managers."
"At this time we are working with the open-source version."
"They should bring in some good pricing models to host the marketplace."
"I have found the solutions license is priced competitively compared to others."
"I rate the product price an eight out of ten. There is a need to pay more for the extra features provided by the solution."
report
Use our free recommendation engine to learn which Customer Identity and Access Management (CIAM) solutions are best for your needs.
865,384 professionals have used our research since 2012.
 

Top Industries

By visitors reading reviews
Financial Services Firm
14%
Computer Software Company
11%
Manufacturing Company
11%
Healthcare Company
6%
Financial Services Firm
15%
Computer Software Company
9%
Comms Service Provider
8%
Transportation Company
7%
 

Company Size

By reviewers
Large Enterprise
Midsize Enterprise
Small Business
 

Questions from the Community

What do you like most about CyberArk Identity?
The integration capabilities, ability to integrate CyberArk into the overall IBB strategy of our current clients.
What is your experience regarding pricing and costs for CyberArk Identity?
The pricing is acceptable. It is worth considering what we are protecting with the amount charged.
What needs improvement with CyberArk Identity?
Some areas experience slowness based on the workload. There's a need to enhance network performance despite the good user experience with access management.
What do you like most about WSO2 Identity Server?
The product provides easy integration between API manager and IT server components.
What is your experience regarding pricing and costs for WSO2 Identity Server?
The pricing is currently the same as the API Manager, so it's not surprising. Since we used it primarily for SSO and the self portal, there were no additional pricing concerns.
What needs improvement with WSO2 Identity Server?
Currently, all required features are supported. If new use cases for artificial intelligence arise, it could be beneficial to incorporate those. However, for our current projects, WSO2 Identity Ser...
 

Also Known As

Idaptive
No data available
 

Overview

 

Sample Customers

MLB, Citi, Pfizer, SulAmerica, GE Capital, Shiseido
Nutanix, ELM, AlmavivA, BDigital, StubHub, M-creations, MedVision360
Find out what your peers are saying about CyberArk Identity vs. WSO2 Identity Server and other solutions. Updated: July 2025.
865,384 professionals have used our research since 2012.