We performed a comparison between CyberArk Privileged Access Manager, IBM Security Identity Governance and Intelligence, and Keeper based on real PeerSpot user reviews.
Find out what your peers are saying about CyberArk, Delinea, BeyondTrust and others in Privileged Access Management (PAM)."The password vault and session monitoring are useful."
"The threat analytics is an important feature."
"Its' quite stable."
"The risk of lost password and forbidden access to resources has been drastically reduced which increased the security level for the entire company,"
"CyberArk is a very stable product and it's a stable product because it has a simple design and a simple architecture that allows you to leverage the economies of scale across the base of your infrastructure that you already have implemented. It doesn't really introduce any new complex pieces of infrastructure that would make it that much more difficult to scale."
"When we started with RPA, there was a requirement that every credential and the bots themselves be protected through the PAM system. From the get-go, we've had CyberArk in the middle... We've got a pretty robust RPA implementation with our PAM platform. Users, bots, the credentials — everything is managed via our PAM solution."
"Technical support is very helpful whenever we have any questions."
"We are able to know who is accessing what and when; having accountability."
"Lifecycle management, governance and documentation."
"I would rate the price eight out of 10, with 10 as the best value for money."
More IBM Security Identity Governance and Intelligence Pros →
"I like Keeper's mobility and its accessibility."
"Keeper has strong security features."
"It keeps my passwords organized and safe."
"Possibility to login using the fingerprint sensor on Android/iPhone."
"It syncs with all devices and supports all platforms."
"Keeper was user-friendly."
"Support is very quick to respond, and they have fixed any issues that I have had."
"I like the tool's keyword editor and SSO."
"The product documentation has to be more precise in certain aspects with explanations for functionality limitations along with reference material or screenshots."
"CyberArk has a lot on the privileged access side but they have to concentrate more on the application side as well."
"It should be easy to use for non-technical people. Its interface can be a bit difficult. Some parts of its interface are not very intuitive. Some of the controls are hidden, and instead of having a screen with all the controls for that account on it, you have to use menus and other similar things."
"The initial setup of CyberArk Privileged Access Manager difficulty depends on the environment that you are implementing it into. However, it typically is simple."
"Areas the product could be improved are in some of the reporting capabilities and how the reports are configured."
"There is a lot of room for improvement in the report section. I also work on other tools, such as Thycotic, which allows you to create customized reports for your organization's needs. In CyberArk, there are limited reports, whereas in Thycotic or some of the other PAM tools, because the database is different, you can customize the report based on your needs through SQL queries."
"The support services could act faster when people reach out to resolve issues."
"I would like to see improvement in the custom connector for integration with different devices."
"The solution is a bit pricey for some regions."
"Self service center is not always easy to understand."
More IBM Security Identity Governance and Intelligence Cons →
"Maybe a sort of category organizer to help with organizing passwords for different things, such as banking, medical, shopping, and school."
"Search functions are sometimes weird."
"I would love it if you didn't have to re-authenticate when you start up a new browser."
"The organization of items needs improvement. For example, when I log onto the cloud version as well, everything is shown on my folder. It is hard to differentiate between files and documents in my list of items I have stored inside."
"The stability of the solution can be improved."
"API possible needs improvement. Although, this feature is for enterprises which need more then the usual usage."
"Rearranging folders via drag/drop functionality would be very helpful."
"Room for improvement in my eyes would be being able to share my credit cards and other types of information. The only thing they really share is passwords, and you can only do it with one password at a time. When you're trying to share it out or trying to remove it from being shared, you can't do multiple selections."
More CyberArk Privileged Access Manager Pricing and Cost Advice →
More IBM Security Identity Governance and Intelligence Pricing and Cost Advice →