Try our new research platform with insights from 80,000+ expert users

CyberArk Privileged Access Manager vs IBM Tivoli Access Manager [EOL] vs RSA Identity Governance and Lifecycle comparison

 

Comparison Buyer's Guide

Executive Summary

Review summaries and opinions

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
 

Featured Reviews

Atul-Gujar - PeerSpot reviewer
CyberArk manager at a comms service provider with 10,001+ employees
Secures critical infrastructures with essential user session audit records
A potential area for improvement is enhancing support for cluster environments and distributed Vaults. Clients in multiple countries that need central access have different challenges that require better solutions from CyberArk. For financial services, CyberArk can improve incident response by ensuring fast support for critical priority tickets to meet compliance requirements. Providing more documentation on CyberArk is recommended for new team members to enhance their troubleshooting capabilities. I understand it's up to the client, but 99% fail to change the demo key, so it's crucial for CyberArk to emphasize changing the key and documenting it as part of the installation process.
it_user711612 - PeerSpot reviewer
Senior Consultant at a insurance company with 1,001-5,000 employees
Reverse proxy provides central control over authentication and authorization.
It is a single product that caters for all the business needs throughout the organization. It provides a seamless integration that in turn encourages most of the applications to use the SSO features Reverse proxy is the most valuable feature as it provides central control over authentication and…
Harshul Nayak - PeerSpot reviewer
Senior Project Manager at a consultancy with 10,001+ employees
Streamline identity lifecycle management with intuitive interfaces and robust policy features
The functions of RSA Identity Governance and Lifecycle, especially the IGA, are quite strong with their custom forms and workflows integrated. The user interface is very friendly and easy to use, making it a good product overall. However, it still has to be on-premise and the cloud version is not easily accessible, as dedicated instances are required and machines cannot be shared as multi-tenant for various customers. The advanced policy features of RSA definitely help in defining certain policies such as segregation of duties. That's particularly useful along with creating different access reviews. Regarding access control in simplifying access management, RSA Identity Governance and Lifecycle has strong foundations of groups and roles, which help in defining all policies very easily. This makes it very easy to integrate with other access management tools or privileged access management tools.

Quotes from Members

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
 

Pros

"I appreciate CyberArk's real-time capabilities. I can secure critical sessions, such as SSH or database sessions. As a security professional, I have real-time visibility into ongoing sessions. If anything suspicious occurs, I can terminate or freeze the session, which is part of user behavior analytics."
"By implementing CyberArk Privileged Access Manager, we wanted to secure the password data and password accounts. We could see the benefits of CyberArk Privileged Access Manager immediately after we deployed it and started using it."
"The best feature of CyberArk Privileged Access Manager is its core function: automatically managing and securing credentials."
"Increased our insight into how privileged accounts are being used and distributed within our footprint."
"We have been able to manage application credentials in CyberArk, whether they come as a custom plugin or straight out-of-the-box."
"CyberArk Privileged Access Manager has helped our organization remain compliant in the privileged access management space."
"It has helped from an auditing perspective identify who has access to privileged accounts."
"Automatic password management, which will automatically change passwords based on compliance requirements."
"SAML 2.0."
"Single Sign-On functionality is valuable because the core purpose of the product is to allow universal (or bespoke) SSO for application suites."
"The integration effort with the end application is quite straightforward and easy."
"OAuth 2 is now the de facto standard for API protection and scoped authorized delegation. IBM TAM now supports OAuth 2 and can act as fully compliant OAuth 2 authorization server."
"The Verify feature: A push method which customers are going for."
"The data collection is excellent and easy to do. It does not require a lot of configuration nor does it require rules to be written like other competitors do."
"The most valuable feature is the security, in particular, the One Time Password support."
"RSA Identity Governance and lifecycles are good for the access certification and auditing sections."
"Roles, connectors for provisioning and re-accreditation or reviews help greatly to govern user access."
"The user interface is very friendly and easy to use, making it a good product overall."
"With the tool in place, you need to hire fewer people to provide access, and you have control over your processes."
 

Cons

"Report creation could be improved. The policies could be more customized."
"Making the reports more editable would be beneficial."
"Improvements in CyberArk Privileged Access Manager should focus on simplifying installation and upgrade times, and also consider making professional services training more accessible to implementers and partners."
"The solution that they proposed was not straightforward because of the backend processes of CyberArk."
"Integration with the ticketing system should allow any number of fields to be used for validation before allowing a user to be evaluated and able to access a server."
"The Vault's disaster recovery features need improvement."
"We'd like to see the creation of some kind of memo field for each device account, which could be used, in our network at least, to leave a note about the device for either the security or network engineering team members."
"It could be more user-friendly. Sometimes I encounter issues, and I do not know what the issue is. It takes a lot of time to find the error and fix it. Sometimes it gives an error, but I do not know what the error is. I have to find the documents, but it does not provide all the details needed to fix the error. This is one of the day-to-day issues with CyberArk."
"The self-service portal needs improvement."
"Multi-factor authentication with social integration needs to improve."
"The profiling element is incredibly robust, but also equally as complex, it requires an off-site course to be able to understand the context or the plethora of options available."
"An Amazon Machine Image (AMI) for the newer appliance versions for hosting the virtual appliances on AWS will help."
"Looking at their roadmap, they have a broad grasp of the security features which the industry needs."
"RSA Identity Governance and Lifecycle could improve out-of-the-box customization."
"Every connector that you have in the product needs to be custom-built, so there are not a lot of standard connectors available in the product, because of which there are a lot of hidden consultancy costs."
"Technical support in Pakistan can be improved."
"There are scalability issues. This product does not scale very well. It is not a good product for load balancing / active–active architecture."
"If you use the appliance version then it won't handle a huge database volume."
"The user interface and workflow need improvement, and more connectors would help."
"This product is missing a lot of features which other competitors are providing. One of the key features that are missing right now is risk scoring. Additionally, there is not much scope for customization - everything is hard-coded and predefined, so it does not allow the developers to make many modifications."
 

Pricing and Cost Advice

"With reducing the privileged account access, there has been a huge improvement. They are now bringing more accounts on a little at a time."
"Licensing fees are paid on a yearly basis."
"I do not have any opinions to add about the pricing of the product."
"The pricing for CyberArk Privileged Access Manager is quite expensive, and the pricing varies from region to region. In APAC, CyberArk Privileged Access Manager can be obtained for less than in North America, according to my understanding."
"In comparison to other products on the market, CyberArk is a more costly product."
"The price of CyberArk Privileged Access Manager could be less expensive."
"It's per-company, license-based."
"This solution is expensive."
"The IBM prices are, as ever, extortionate, even with a business partnership, and high levels of discounts."
"We are using the cloud platform, but we don't find it compatible to be served as a multi-tenant platform. This is a large drawback. It becomes expensive because it is then an all-dedicated solution. You have to have a separate tenant for each client, which increases the cost. The overall unit pricing can be less expensive than how it is right now."
"Pricing varies based on user count/number of modules you need."
"I rate the product's price a five on a scale of one to ten, where one is cheap, and ten is expensive."
report
Use our free recommendation engine to learn which Privileged Access Management (PAM) solutions are best for your needs.
881,821 professionals have used our research since 2012.
 

Top Industries

By visitors reading reviews
Financial Services Firm
15%
Manufacturing Company
10%
Computer Software Company
9%
Government
6%
No data available
Financial Services Firm
14%
Comms Service Provider
12%
Computer Software Company
10%
Media Company
6%
 

Company Size

By reviewers
Large Enterprise
Midsize Enterprise
Small Business
By reviewers
Company SizeCount
Small Business59
Midsize Enterprise40
Large Enterprise173
By reviewers
Company SizeCount
Small Business9
Midsize Enterprise2
Large Enterprise18
By reviewers
Company SizeCount
Small Business2
Midsize Enterprise2
Large Enterprise6
 

Questions from the Community

How does Sailpoint IdentityIQ compare with CyberArk PAM?
We evaluated Sailpoint IdentityIQ before ultimately choosing CyberArk. Sailpoint Identity Platform is a solution to m...
What do you like most about CyberArk Privileged Access Manager?
The most valuable features of the solution are control and analytics.
What is your experience regarding pricing and costs for CyberArk Privileged Access Manager?
My thoughts on the pricing of CyberArk Privileged Access Manager depend entirely on the vendors' requirements. If the...
Ask a question
Earn 20 points
What needs improvement with RSA Identity Governance and Lifecycle?
There is room for improvement with RSA Identity Governance and Lifecycle. As the size becomes larger, the collections...
What is your primary use case for RSA Identity Governance and Lifecycle?
We provide RSA Identity Governance and Lifecycle as a service, mainly to oversee the digital identity lifecycle, from...
What advice do you have for others considering RSA Identity Governance and Lifecycle?
Overall, I would rate RSA Identity Governance and Lifecycle at an eight out of ten.
 

Also Known As

CyberArk Privileged Access Security, CyberArk Enterprise Password Vault
Tivoli Access Manager, IBM Security Access Manager
SecurID
 

Overview

 

Sample Customers

Rockwell Automation
Essex Technology Group Inc.
NTT Com Asia, Virgin Blue, Bank of Uganda, EMEA Telecommunications Company, LAit (Lazio Innovazione Tecnologica), NyNet, OTP Bank, Red Bull Racing, Rupert House School, Signify, UK Local Authority, Bancolombia, Banco Popular de Puerto Rico (BPPR), TIVIT, Array Services, International Computerware, KPMG LLP, Moffitt Cancer Center
Find out what your peers are saying about CyberArk, One Identity, Delinea and others in Privileged Access Management (PAM). Updated: January 2026.
881,821 professionals have used our research since 2012.