Try our new research platform with insights from 80,000+ expert users

CyberArk Privileged Access Manager vs IBM Security Identity Governance and Intelligence vs Ping Identity Platform comparison

 

Comparison Buyer's Guide

Executive Summary

Review summaries and opinions

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
 

Mindshare comparison

Privileged Access Management (PAM)
User Provisioning Software
Authentication Systems
 

Featured Reviews

Abdul Durrani - PeerSpot reviewer
Enables granular and secure access with just-in-time access and Zero Trust model
CyberArk provides a good amount of control over access types. However, as a future enhancement, having additional features for cross-platform integration would be beneficial. It would be good to have integrations with other tools and firewalls, such as Zscaler and CrowdStrike. Although I am not fully aware of recent updates, more cross-platform integration would be valuable. A SOC analyst would like to have centralized access in terms of information flowing in even for privileged access management. They would like to have control over everything instead of opening four to five tabs for different sorts of information. Cross-platform integration would help with that. Customers also want CyberArk's pricing to be better so that they can implement it further and have more licenses. Implementing a privileged access management solution can be challenging. It would be great if CyberArk could provide recommendations based on the compliance standards of an organization. It would help system admins ensure that all the required ports are closed and the systems are being managed properly. If any system is not being used anymore, any ports opened for that system need to be closed. Having such recommendations would be helpful.
Siraz Shaik - PeerSpot reviewer
Clear evaluation and life cycle management; service center could be more user friendly
Our primary use case is for publishing and our customer has somewhere between 3,000-4,000 users. We're partners with IBM and I work as a security consultant.  This solution has a very good dashboard and the documentation is also very good. Life cycle management and governance are also good…
MAHESHKUMAR7 - PeerSpot reviewer
Offers multi-factor authentication and application support side of PingFederate but application only supports specific protocols
A lot of teams work with technical support, but I work with it for user issues only. You might need support with things like application swaps, application names, and application URLs. I didn't know where to find those in Ping Identity, so I contacted technical support for those issues. The support team is very clever and active. They provide end-to-end support once an issue is created. I have worked with most of the support team. I also work with the support team because I work with the operations team. I provide 24/7 support to production and non-production environments. I coordinate with application and network teams to troubleshoot critical tickets and issues related to Ping Identity solutions.

Quotes from Members

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
 

Pros

"Session monitoring is excellent. It may be the solution's most valuable aspect."
"CyberArk's support is excellent, providing personalized assistance through a dedicated local account manager and sales engineer."
"For me, CyberArk Privileged Access Manager's most valuable features are password and session management."
"It is a central repository. Therefore, if someone needs to access a server, then they go through CyberArk PAM. It provides a secure way to do this and CyberArk PAM records everything. For example, if you are connecting to a Linux server, then once you get into the Linux server and if it is integrated with CyberArk, it will automatically start recording everything that is being done. In most banks, seeing the recordings is very useful. If there are any gaps or something has happened which shouldn't have happened, then we can check the logs and videos. So, it gives security, in a robust manner, to the organization."
"Increased our insight into how privileged accounts are being used and distributed within our footprint."
"You can see the benefits of CyberArk Privileged Access Manager immediately."
"CyberArk Privileged Access Manager provides granularity. You can break things down into individual safes. You have specific access to safes by individual or group. The interface is with AD, with LDAP, or with local CyberArk passwords. You also have the ability to establish policies for your individual credentials."
"You can write different types of policies for custom business needs or any developer needs. If they need certain functions allocated, they can be customized easily."
"Lifecycle management, governance and documentation."
"I would rate the price eight out of 10, with 10 as the best value for money."
"This is a user-friendly solution."
"It is a stable solution. Stability-wise, I rate the solution a ten out of ten."
"From a security perspective, I highly value the product's biometric authentication methods such as FIDO, FaceID, YubiKey, and the mobile app."
"It offers robust features and customization options that justify the cost."
"I like the self-service feature. The 502 and UBP systems are also excellent. PingID's ability to authenticate with SSH, RDP, and Windows login is pretty handy. It covers the entire spectrum of use."
"PingFederate is very flexible. We can do many customizations, and it also provides an SDK to tailor it to our specific requirements. There are also numerous plugins available. I've worked with tools like ForgeRock and Okta, but I find PingFederate to be the most customizable."
"It's convenient for users to log in through Ping using the Kerberos adapter because it doesn't require them to authenticate again."
"The solution is stable. We haven't experienced any bugs or glitches."
 

Cons

"We don't often contact technical support, but when we do it, the response could be faster and better."
"Upgrading the product is very difficult, so this could be an area for improvement."
"The solution needs better features for end users to manage their own whitelisting for API retrieval."
"The license is expensive."
"Improved user-friendliness, granularity, and functionality would enhance the product further."
"There were a lot of manual steps in the initial setup which could have been automated. I read the 10.4 release that was sent out about a month or two ago, and I saw the steps required for upgrade have been reduced by about 90%. That was a big thing for me, but I still haven't seen that yet because we have not upgrade past 9.9.5."
"Its GUI is very confusing."
"There is some stuff that we still have not fully integrated, which is our AIM solution. We are having all types of issues with it. I have been working with Level 3 support on it, but otherwise, from a functionality perspective, everything has been working except for the AIM solution."
"The solution is a bit pricey for some regions."
"Self service center is not always easy to understand."
"The solution should allow for better integration with other platforms and the UBT."
"Currently, the main integration is SAML-based, but other integration methodologies need to be supported."
"Some colleagues have mentioned API connectivity, data security, and privacy issues."
"In Ping Identity, we have had some issues. We've worked with logging and troubleshooting, including some firewall and security issues."
"The management console needs to be improved. PingID should revise it."
"PingID's device management portal should be more easily accessible via a link. They provide no link to the portal like they do for the service. The passwordless functionality could be more comprehensive. You can't filter based on hardware devices. Having that filtering option would be great. Device authentication would be a great feature."
"One significant challenge was ensuring smooth user migration during system upgrades in Ping."
"The product's community has certain shortcomings that require improvement."
 

Pricing and Cost Advice

"Compared to other solutions, it is costly."
"The price of CyberArk Privileged Access Manager is expensive. There are no other fees other than the standard licensing fees."
"I haven't seen the numbers. I know it is not cheap, but I don't know what it is. I would rate it a six out of ten in terms of pricing. It is definitely more expensive than the other product, but it also provides more functionality, and it is modular too. So, we pay for the functionality we're actually going to use, and that's nice."
"The cost is high compared to other products."
"It's per-company, license-based."
"It's expensive, certainly. But CyberArk is the leader in the market with regards to privileged access management. You pay a lot, but you are paying for the value that is being delivered."
"CyberArk provides all the features bundled. This is compared to other vendors who provide them as a different license for each functionality."
"It costs us around $200 per user."
"I would rate the price eight out of 10, with 10 as the best value for money."
"Ping Identity Platform is not very expensive."
"The pricing is neither too expensive nor too cheap."
"The platform's value justifies the pricing, especially considering its security features and scalability."
"The tool is quite affordable."
"PingID pricing is a ten out of ten because it's a little bit cheaper than other tools, such as Okta and ForgeRock, and supports multiple tools."
"The product is costly."
"Ping Identity Platform is not an expensive solution."
"PingID's pricing is pretty competitive."
report
Use our free recommendation engine to learn which Privileged Access Management (PAM) solutions are best for your needs.
865,140 professionals have used our research since 2012.
 

Top Industries

By visitors reading reviews
Computer Software Company
15%
Financial Services Firm
15%
Manufacturing Company
9%
Government
7%
Government
13%
Financial Services Firm
13%
Computer Software Company
12%
Insurance Company
9%
Financial Services Firm
24%
Computer Software Company
10%
Manufacturing Company
9%
Retailer
8%
 

Company Size

By reviewers
Large Enterprise
Midsize Enterprise
Small Business
No data available
 

Questions from the Community

How does Sailpoint IdentityIQ compare with CyberArk PAM?
We evaluated Sailpoint IdentityIQ before ultimately choosing CyberArk. Sailpoint Identity Platform is a solution to m...
What do you like most about CyberArk Privileged Access Manager?
The most valuable features of the solution are control and analytics.
Ask a question
Earn 20 points
What do you like most about PingID?
The mobile biometric authentication option improved user experience. It's always about security because, with two-fac...
What is your experience regarding pricing and costs for PingID?
The pricing is neither too expensive nor too cheap.
What needs improvement with PingID?
The management console needs to be improved. PingID should revise it.
 

Also Known As

CyberArk Privileged Access Security, CyberArk Enterprise Password Vault
IGI, IBM Security Identity Manager, ISIM
Ping Identity (ID), PingFederate, PingAccess, PingOne, PingDataGovernance, PingDirectory, OpenDJ
 

Overview

 

Sample Customers

Rockwell Automation
E.ON Global Commodities
Equinix, Land O'Lakes, CDPHP, Box, International SOS, Opower, VSP, Chevron, Truist, Academy of Art University, Northern Air Cargo, Repsol
Find out what your peers are saying about CyberArk, Delinea, One Identity and others in Privileged Access Management (PAM). Updated: July 2025.
865,140 professionals have used our research since 2012.