

Find out what your peers are saying about CyberArk, One Identity, Okta and others in Privileged Access Management (PAM).
| Product | Mindshare (%) |
|---|---|
| CyberArk Privileged Access Manager | 10.4% |
| Delinea Secret Server | 4.5% |
| One Identity Safeguard | 4.4% |
| Other | 80.7% |
| Product | Mindshare (%) |
|---|---|
| IBM Security Identity Governance and Intelligence | 2.9% |
| SailPoint Identity Security Cloud | 19.3% |
| One Identity Manager | 9.5% |
| Other | 68.3% |

| Company Size | Count |
|---|---|
| Small Business | 59 |
| Midsize Enterprise | 42 |
| Large Enterprise | 174 |
CyberArk Privileged Access Manager safeguards privileged accounts through password management, credential rotation, and session recording. With seamless integration and real-time monitoring, it ensures robust security across platforms.
CyberArk Privileged Access Manager is recognized for its extensive capabilities in managing and securing privileged accounts. It offers vital functionalities such as automatic password rotation, real-time session monitoring, and cross-platform integration through APIs and custom connectors. Users find the flexibility in workflows and granular access controls beneficial, particularly in protecting access across cloud and on-prem infrastructures. However, improvements in its interface, installation process, plugin support, and integration with third-party tools are often suggested. Pricing is a concern for many, along with the need for better dashboard reporting, user provisioning, and enhanced documentation. Organizations leverage this tool for encrypting and monitoring critical account activities and automating password management to bolster security.
What are the key features of CyberArk Privileged Access Manager?CyberArk Privileged Access Manager finds substantial use in industries such as finance, healthcare, and technology, where the protection of privileged accounts is critical. These sectors rely on its capabilities to manage application credentials securely and provide safe access for developers, administrators, and vendors across various infrastructures.
IBM Security Identity Governance and Intelligence is a comprehensive platform designed to help businesses manage identity governance and compliance. It enables organizations to streamline processes while ensuring security.
Focusing on identity governance, IBM Security Identity Governance and Intelligence offers valuable features that enhance security and operational efficiency. It provides tools for effective access management and auditing, ensuring that enterprises maintain compliance with regulations. As businesses navigate complex regulatory environments, this platform becomes crucial in safeguarding sensitive information and supporting IT governance strategies, ultimately securing business operations and data integrity.
What are the key features of IBM Security Identity Governance and Intelligence?IBM Security Identity Governance and Intelligence is implemented across industries such as finance, healthcare, and retail. In finance, it supports stringent compliance requirements, ensuring data protection and secure transactions. In healthcare, it safeguards patient data, enabling secure access for medical professionals while maintaining privacy standards. Retailers use it to protect consumer data and streamline employee access management, ensuring both customer trust and efficient back-end operations.
We monitor all Privileged Access Management (PAM) reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.