No more typing reviews! Try our Samantha, our new voice AI agent.

CyberArk Privileged Access Manager vs IBM Tivoli Access Manager [EOL] comparison

 

Comparison Buyer's Guide

Executive Summary

Review summaries and opinions

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
 

Categories and Ranking

CyberArk Privileged Access ...
Average Rating
8.6
Reviews Sentiment
6.8
Number of Reviews
230
Ranking in other categories
User Activity Monitoring (1st), Enterprise Password Managers (2nd), Privileged Access Management (PAM) (1st), Mainframe Security (1st), Operational Technology (OT) Security (3rd)
IBM Tivoli Access Manager [...
Average Rating
8.0
Reviews Sentiment
3.8
Number of Reviews
29
Ranking in other categories
No ranking in other categories
 

Featured Reviews

Atul-Gujar - PeerSpot reviewer
CyberArk manager at a comms service provider with 10,001+ employees
Secures critical infrastructures with essential user session audit records
A potential area for improvement is enhancing support for cluster environments and distributed Vaults. Clients in multiple countries that need central access have different challenges that require better solutions from CyberArk. For financial services, CyberArk can improve incident response by ensuring fast support for critical priority tickets to meet compliance requirements. Providing more documentation on CyberArk is recommended for new team members to enhance their troubleshooting capabilities. I understand it's up to the client, but 99% fail to change the demo key, so it's crucial for CyberArk to emphasize changing the key and documenting it as part of the installation process.
it_user711612 - PeerSpot reviewer
Senior Consultant at a insurance company with 1,001-5,000 employees
Reverse proxy provides central control over authentication and authorization.
It is a single product that caters for all the business needs throughout the organization. It provides a seamless integration that in turn encourages most of the applications to use the SSO features Reverse proxy is the most valuable feature as it provides central control over authentication and…

Quotes from Members

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
 

Pros

"The ability to monitor privileged accounts throughout the enterprises."
"Thus far I can say technical support is excellent. We haven't had any issues or difficulties."
"There are no issues with scalability, and our clients are very happy to use the product."
"We use the solution for password vaulting, password rotation, session management, and secret management."
"CyberArk Privileged Access Manager has helped our organization by controlling users' access."
"CyberArk's capabilities and functionality outperform other solutions."
"It is useful for protecting passwords; if you need to do access security management, you can first use the CyberArk console, and after that, you can connect the firewall interface or firewall command line."
"Technical support is very helpful whenever we have any questions."
"Capabilities of advanced security are enhanced to support strong, flexible authentifications and authentications based on risks as well as critical internet vulnerabilities."
"IBM directory server offers the best roll-out experience."
"It is a single product that caters for all the business needs throughout the organization."
"TAM component integration and their SSO capabilities and transparency are the most valuable features I have found."
"I like the primary function of this product allowing the administration of user/network accounts with a fair amount of ease."
"OAuth 2 is now the de facto standard for API protection and scoped authorized delegation. IBM TAM now supports OAuth 2 and can act as fully compliant OAuth 2 authorization server."
"It is a simple-to-deploy solution, with many features that are supported out-of-the-box without complicated setup."
"Single Sign-On functionality is valuable because the core purpose of the product is to allow universal (or bespoke) SSO for application suites."
 

Cons

"The issue of technical support is crucial, as there are not many specialized partners available in Brazil to provide this service. While English language support is of good quality, there is a significant shortage of partners capable of meeting the demand locally."
"There was a functionality of the solution that was missing. I had noticed it in Beyond Trust, but not in this solution. But, recently they have incorporated something similar."
"The reporting should be improved. There should be more customization."
"Updates have been somewhat difficult, resulting in challenges when moving from one version to another. The current version includes automatic updates."
"The current user interface is a little dated. However, I hear there are changes coming in the next version."
"I would prefer that this is a fully-managed service, rather than have to manage the software ourselves and keep it up to date."
"The one place where we found that this product really needs to improve is the cloud. Simple integrations don't exist, even today. We don't have anything specific on CyberArk for managing, SaaS products, SaaS vendors, SaaS credentials. I understand it's a vendor-based thing and that they have to coordinate with the other vendors to be able to do that, and there are integrations coming. But these are the major places where CyberArk definitely needs to invest some more time."
"CyberArk's license is too expensive. I rate it seven out of 10 for affordability."
"Administration of the product can be improved a lot."
"The pricing is always costly."
"Multi-factor authentication with social integration needs to improve."
"The user interface looks like it was designed for technical personnel only."
"There were endless issues with stability in version 8.0.1."
"Older TAM versions are not compatible for connecting to a DB."
"The self-service portal needs improvement."
"The initial set-up is a bit complex for a novice as the Linux version of it needs you to be somewhat good with Linux."
 

Pricing and Cost Advice

"This solution is considered to be more expensive than others out there on the market today."
"It costs us around $200 per user."
"Pricing is a problem. CyberArk is expensive compared to other products I know. It is similar to buying a German car. It comes with all the bells and whistles, but some companies may find it too expensive."
"CyberArk is good at what they do, and the price reflects that. You have to pay the price for the same."
"They have two types of licensing: purchase and subscription. You have to pay for each admin user, such as Microsoft admin, mail admin, database admin, etc."
"CyberArk Enterprise Password Vault is a very expensive product."
"The cost is high compared to other products."
"I have heard from my leaders that CyberArk is costlier in terms of licensing. The support and maintenance are also costly. We use their premium support, but for the price we pay, we do not get the value."
"The IBM prices are, as ever, extortionate, even with a business partnership, and high levels of discounts."
report
Use our free recommendation engine to learn which Privileged Access Management (PAM) solutions are best for your needs.
885,376 professionals have used our research since 2012.
 

Top Industries

By visitors reading reviews
Financial Services Firm
13%
Manufacturing Company
10%
Computer Software Company
8%
Government
6%
No data available
 

Company Size

By reviewers
Large Enterprise
Midsize Enterprise
Small Business
By reviewers
Company SizeCount
Small Business59
Midsize Enterprise42
Large Enterprise174
By reviewers
Company SizeCount
Small Business9
Midsize Enterprise2
Large Enterprise18
 

Questions from the Community

How does Sailpoint IdentityIQ compare with CyberArk PAM?
We evaluated Sailpoint IdentityIQ before ultimately choosing CyberArk. Sailpoint Identity Platform is a solution to manage risks in cloud enterprise environments. It automates and streamlines the m...
What do you like most about CyberArk Privileged Access Manager?
The most valuable features of the solution are control and analytics.
What is your experience regarding pricing and costs for CyberArk Privileged Access Manager?
My thoughts on the pricing of CyberArk Privileged Access Manager depend entirely on the vendors' requirements. If they want their things to be secure, they have to spend accordingly. We have four t...
Ask a question
Earn 20 points
 

Also Known As

CyberArk Privileged Access Security, CyberArk Enterprise Password Vault
Tivoli Access Manager, IBM Security Access Manager
 

Overview

 

Sample Customers

Rockwell Automation
Essex Technology Group Inc.
Find out what your peers are saying about CyberArk, One Identity, Okta and others in Privileged Access Management (PAM). Updated: March 2026.
885,376 professionals have used our research since 2012.