No more typing reviews! Try our Samantha, our new voice AI agent.

CyberArk Privileged Access Manager vs IBM Security Identity Governance and Intelligence comparison

 

Comparison Buyer's Guide

Executive Summary

Review summaries and opinions

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
 

Categories and Ranking

CyberArk Privileged Access ...
Average Rating
8.6
Reviews Sentiment
6.8
Number of Reviews
230
Ranking in other categories
User Activity Monitoring (1st), Enterprise Password Managers (3rd), Privileged Access Management (PAM) (1st), Mainframe Security (1st), Operational Technology (OT) Security (3rd)
IBM Security Identity Gover...
Average Rating
7.6
Reviews Sentiment
6.7
Number of Reviews
2
Ranking in other categories
User Provisioning Software (15th), Identity Management (IM) (30th)
 

Mindshare comparison

While both are Identity and Access Management solutions, they serve different purposes. CyberArk Privileged Access Manager is designed for Privileged Access Management (PAM) and holds a mindshare of 10.4%, down 18.5% compared to last year.
IBM Security Identity Governance and Intelligence, on the other hand, focuses on User Provisioning Software, holds 2.9% mindshare, up 1.9% since last year.
Privileged Access Management (PAM) Mindshare Distribution
ProductMindshare (%)
CyberArk Privileged Access Manager10.4%
Delinea Secret Server4.5%
One Identity Safeguard4.4%
Other80.7%
Privileged Access Management (PAM)
User Provisioning Software Mindshare Distribution
ProductMindshare (%)
IBM Security Identity Governance and Intelligence2.9%
SailPoint Identity Security Cloud19.3%
One Identity Manager9.5%
Other68.3%
User Provisioning Software
 

Featured Reviews

Atul-Gujar - PeerSpot reviewer
CyberArk manager at a comms service provider with 10,001+ employees
Secures critical infrastructures with essential user session audit records
A potential area for improvement is enhancing support for cluster environments and distributed Vaults. Clients in multiple countries that need central access have different challenges that require better solutions from CyberArk. For financial services, CyberArk can improve incident response by ensuring fast support for critical priority tickets to meet compliance requirements. Providing more documentation on CyberArk is recommended for new team members to enhance their troubleshooting capabilities. I understand it's up to the client, but 99% fail to change the demo key, so it's crucial for CyberArk to emphasize changing the key and documenting it as part of the installation process.
reviewer1830612 - PeerSpot reviewer
Head, Cybersecurity at a tech services company with 11-50 employees
We use the solution to ensure organizations conform to industry base certifications and best practices
We use the product to ensure organizations conform to industry base certifications and best practices and do not contradict their security policies within the base points they specify in the system, which are used to match everything against their governance use cases I think the product's most…

Quotes from Members

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
 

Pros

"The most valuable features of CyberArk Enterprise Password Vault are password vaulting and automatic rotation of passwords after use."
"We chose CyberArk because of its great functionalities, the ability to be deployed granularly at a different scale for each function, and the ability to be deployed in a distributed infrastructure."
"All access to our servers by both staff and vendors is monitored and recorded."
"It is useful for protecting passwords; if you need to do access security management, you can first use the CyberArk console, and after that, you can connect the firewall interface or firewall command line."
"The most valuable feature is the ability to manage many accounts and broker connections between devices without needing to know passwords."
"Because we now have the ability to grant access to management utilities like DNS Manager, Sequel Studio, and MMC, in a secure fashion, without system admins being required to continually reenter various passwords that are stored who knows where, it has really made the system admin's job much easier. It has made the PSM's job much easier. It has made the auditor's job and the security team's job and the access manager's job significantly easier, because we're able to move much more quickly toward a role-based access management system, and that is really streamlining the whole onboarding/offboarding management process."
"The product enables us manage passwords of highly privileged (service) accounts, which are not tied to a person, and they include a full audit trail and approval workflow functionality."
"Overall, it has been a great product and helped out a lot with being able to manage privileged accounts."
"We use the product to ensure organizations conform to industry base certifications and best practices and do not contradict their security policies within the base points they specify in the system, which are used to match everything against their governance use cases."
"This solution has a very good dashboard and the documentation is also very good, and life cycle management and governance are also good features in this solution."
"Lifecycle management, governance and documentation."
"I would rate the price eight out of 10, with 10 as the best value for money."
 

Cons

"CyberArk Privileged Access Manager could improve the integration with other solutions and ease of use. Additionally, there should be a feature to have remote connections without a VPN."
"It's a big program. To scale excessively, locally, on an on-prem application, takes a lot of servers."
"Having a cloud version would be very helpful. You have to invest a lot of money for the infrastructure hardware so the cloud version would help."
"I'd like it to be a little more granular. I want a little bit more control over exactly what we do. I know if you do that, you add more knobs and dials to deal with, but that's just my personal approach: granular access."
"More additional features as far as the REST is concerned, because we have something which was the predecessor to REST. A lot of the features which were in the predecessor have not necessarily been ported over to REST yet."
"The continuous scanning of the assets is limited to Windows and Unix. We like to have the solution scan any databases, network devices, and security devices for privileged accounts. That would be very helpful."
"New functionalities or discovered bugs take a little longer to patch."
"Better search functionality in the EPM console. It becomes difficult to search lengthy policies for specific items."
"Self service center is not always easy to understand."
"The solution is a bit pricey for some regions."
"The solution is also a bit pricey for the Nigeria region."
"I think improvements could be made in the self service center, making it easier for the user to understand."
 

Pricing and Cost Advice

"I haven't seen the numbers. I know it is not cheap, but I don't know what it is. I would rate it a six out of ten in terms of pricing. It is definitely more expensive than the other product, but it also provides more functionality, and it is modular too. So, we pay for the functionality we're actually going to use, and that's nice."
"Our risk is definitely significantly lower. Also, our resources are low."
"This solution is considered to be more expensive than others out there on the market today."
"Since CyberArk is at the top of the Gartner list, the cost is indeed on the higher side, but customers must discern which entities are essential to purchase. They should weigh the cost against the quality received."
"CyberArk has been Gartner's number-one pick for the past ten years, so you can infer that their pricing is higher than everyone else. When you are the best, you will charge appropriately for it."
"Quite expensive"
"I do not have any opinions to add about the pricing of the product."
"The pricing for CyberArk is on the higher side compared to other Privileged Access Management products. Something should be done regarding enterprise licensing for long-standing customers."
"I would rate the price eight out of 10, with 10 as the best value for money."
report
Use our free recommendation engine to learn which Privileged Access Management (PAM) solutions are best for your needs.
893,311 professionals have used our research since 2012.
 

Top Industries

By visitors reading reviews
Financial Services Firm
13%
Manufacturing Company
11%
Computer Software Company
7%
Comms Service Provider
6%
Construction Company
15%
Government
12%
Financial Services Firm
12%
Computer Software Company
10%
 

Company Size

By reviewers
Large Enterprise
Midsize Enterprise
Small Business
By reviewers
Company SizeCount
Small Business59
Midsize Enterprise42
Large Enterprise174
No data available
 

Questions from the Community

How does Sailpoint IdentityIQ compare with CyberArk PAM?
We evaluated Sailpoint IdentityIQ before ultimately choosing CyberArk. Sailpoint Identity Platform is a solution to manage risks in cloud enterprise environments. It automates and streamlines the m...
What do you like most about CyberArk Privileged Access Manager?
The most valuable features of the solution are control and analytics.
What is your experience regarding pricing and costs for CyberArk Privileged Access Manager?
My thoughts on the pricing of CyberArk Privileged Access Manager depend entirely on the vendors' requirements. If they want their things to be secure, they have to spend accordingly. We have four t...
Ask a question
Earn 20 points
 

Also Known As

CyberArk Privileged Access Security, CyberArk Enterprise Password Vault
IGI, IBM Security Identity Manager, ISIM
 

Overview

 

Sample Customers

Rockwell Automation
E.ON Global Commodities
Find out what your peers are saying about CyberArk, One Identity, Okta and others in Privileged Access Management (PAM). Updated: April 2026.
893,311 professionals have used our research since 2012.