Try our new research platform with insights from 80,000+ expert users

CyberArk Privileged Access Manager vs IBM Tivoli Access Manager [EOL] vs RSA Identity Governance and Lifecycle comparison

 

Comparison Buyer's Guide

Executive Summary

Review summaries and opinions

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
 

Featured Reviews

Atul-Gujar - PeerSpot reviewer
CyberArk manager at a comms service provider with 10,001+ employees
Secures critical infrastructures with essential user session audit records
A potential area for improvement is enhancing support for cluster environments and distributed Vaults. Clients in multiple countries that need central access have different challenges that require better solutions from CyberArk. For financial services, CyberArk can improve incident response by ensuring fast support for critical priority tickets to meet compliance requirements. Providing more documentation on CyberArk is recommended for new team members to enhance their troubleshooting capabilities. I understand it's up to the client, but 99% fail to change the demo key, so it's crucial for CyberArk to emphasize changing the key and documenting it as part of the installation process.
it_user711612 - PeerSpot reviewer
Senior Consultant at a insurance company with 1,001-5,000 employees
Reverse proxy provides central control over authentication and authorization.
It is a single product that caters for all the business needs throughout the organization. It provides a seamless integration that in turn encourages most of the applications to use the SSO features Reverse proxy is the most valuable feature as it provides central control over authentication and…
Harshul Nayak - PeerSpot reviewer
Senior Project Manager at a consultancy with 10,001+ employees
Streamline identity lifecycle management with intuitive interfaces and robust policy features
The functions of RSA Identity Governance and Lifecycle, especially the IGA, are quite strong with their custom forms and workflows integrated. The user interface is very friendly and easy to use, making it a good product overall. However, it still has to be on-premise and the cloud version is not easily accessible, as dedicated instances are required and machines cannot be shared as multi-tenant for various customers. The advanced policy features of RSA definitely help in defining certain policies such as segregation of duties. That's particularly useful along with creating different access reviews. Regarding access control in simplifying access management, RSA Identity Governance and Lifecycle has strong foundations of groups and roles, which help in defining all policies very easily. This makes it very easy to integrate with other access management tools or privileged access management tools.

Quotes from Members

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
 

Pros

"The password vault and session monitoring are useful."
"It is a scalable product."
"We are able to know who is accessing what and when; having accountability."
"The password protection itself is the most important feature. It's something we didn't have before."
"CyberArk Privileged Access Manager has made our operations more streamlined."
"CyberArk has resulted in a massive increase in our security footprint."
"Technical support is very helpful whenever we have any questions."
"Its' quite stable."
"The Verify feature: A push method which customers are going for."
"The integration effort with the end application is quite straightforward and easy."
"SAML 2.0."
"Single Sign-On functionality is valuable because the core purpose of the product is to allow universal (or bespoke) SSO for application suites."
"OAuth 2 is now the de facto standard for API protection and scoped authorized delegation. IBM TAM now supports OAuth 2 and can act as fully compliant OAuth 2 authorization server."
"The user interface is very friendly and easy to use, making it a good product overall."
"The data collection is excellent and easy to do. It does not require a lot of configuration nor does it require rules to be written like other competitors do."
"The most valuable feature is the security, in particular, the One Time Password support."
"With the tool in place, you need to hire fewer people to provide access, and you have control over your processes."
"Roles, connectors for provisioning and re-accreditation or reviews help greatly to govern user access."
"RSA Identity Governance and lifecycles are good for the access certification and auditing sections."
 

Cons

"The initial setup of CyberArk is a challenge if you do not have prior experience with it."
"It's not a cheap application. It's very expensive."
"The architecture needs to be improved."
"One area for improvement is the plug-in development challenge. Although CyberArk provides a plug-in generator utility, it does not fully meet our needs, particularly for web-based applications."
"The solution could improve by adding more connectors."
"The solution needs better features for end users to manage their own whitelisting for API retrieval."
"The price is high compared to Azure Key Vault. It's the most expensive solution."
"I would like to see an easier way to define delegated roles within the administration of the core product."
"An Amazon Machine Image (AMI) for the newer appliance versions for hosting the virtual appliances on AWS will help."
"The profiling element is incredibly robust, but also equally as complex, it requires an off-site course to be able to understand the context or the plethora of options available."
"Looking at their roadmap, they have a broad grasp of the security features which the industry needs."
"Multi-factor authentication with social integration needs to improve."
"The self-service portal needs improvement."
"If you use the appliance version then it won't handle a huge database volume."
"Technical support in Pakistan can be improved."
"This product is missing a lot of features which other competitors are providing. One of the key features that are missing right now is risk scoring. Additionally, there is not much scope for customization - everything is hard-coded and predefined, so it does not allow the developers to make many modifications."
"The user interface and workflow need improvement, and more connectors would help."
"There are scalability issues. This product does not scale very well. It is not a good product for load balancing / active–active architecture."
"Every connector that you have in the product needs to be custom-built, so there are not a lot of standard connectors available in the product, because of which there are a lot of hidden consultancy costs."
"RSA Identity Governance and Lifecycle could improve out-of-the-box customization."
 

Pricing and Cost Advice

"Pricing and licensing depend on the environment."
"The solution is cost-effective for the features."
"Overall, its pricing is really good. The main difference from all the other vendors is that they have one package that covers all the functionality and modules of the basic PAM, except the add-on modules like adware and server protection. It also doesn't include the licenses for domain controller protection or maybe an API call-related feature. For the basic privileged access management, the bundle pricing is really good, but when it comes to an agent-based solution for advanced cyber protection or application identity managers, it is expensive. Services are also very expensive if you hire the services team from CyberArk, but these guys are really good. For a couple of large banking projects, we had an experience with them. The banks wanted to have things quickly and efficiently, so we had to hire them. If we take four weeks, these guys can do everything on a weekend. They charge quite a big sum of money, but they know the system well."
"I would rate the cost of CyberArk Privileged Access Manager seven out of ten with ten being the most expensive."
"In comparison to other products on the market, CyberArk is a more costly product."
"I'm aware that the organization had purchased licensing for almost all of CyberArk's solutions including licensing for PTA, EPM, and the Application Identity Manager. But when it comes to PSM, this is one of the components where there's an additional charge for any extra PSMs that you want to deploy. I believe that there's some rider where the vendor has a bit of leeway to, at times, charge a premium on whatever additional services you may require above the board."
"The solution is very expensive and requires a license. We pay for an enterprise license."
"Compared to other solutions, it is costly."
"The IBM prices are, as ever, extortionate, even with a business partnership, and high levels of discounts."
"We are using the cloud platform, but we don't find it compatible to be served as a multi-tenant platform. This is a large drawback. It becomes expensive because it is then an all-dedicated solution. You have to have a separate tenant for each client, which increases the cost. The overall unit pricing can be less expensive than how it is right now."
"Pricing varies based on user count/number of modules you need."
"I rate the product's price a five on a scale of one to ten, where one is cheap, and ten is expensive."
report
Use our free recommendation engine to learn which Privileged Access Management (PAM) solutions are best for your needs.
881,821 professionals have used our research since 2012.
 

Top Industries

By visitors reading reviews
Financial Services Firm
15%
Manufacturing Company
10%
Computer Software Company
9%
Government
6%
No data available
Financial Services Firm
14%
Comms Service Provider
12%
Computer Software Company
10%
Media Company
6%
 

Company Size

By reviewers
Large Enterprise
Midsize Enterprise
Small Business
By reviewers
Company SizeCount
Small Business59
Midsize Enterprise40
Large Enterprise173
By reviewers
Company SizeCount
Small Business9
Midsize Enterprise2
Large Enterprise18
By reviewers
Company SizeCount
Small Business2
Midsize Enterprise2
Large Enterprise6
 

Questions from the Community

How does Sailpoint IdentityIQ compare with CyberArk PAM?
We evaluated Sailpoint IdentityIQ before ultimately choosing CyberArk. Sailpoint Identity Platform is a solution to m...
What do you like most about CyberArk Privileged Access Manager?
The most valuable features of the solution are control and analytics.
What is your experience regarding pricing and costs for CyberArk Privileged Access Manager?
My thoughts on the pricing of CyberArk Privileged Access Manager depend entirely on the vendors' requirements. If the...
Ask a question
Earn 20 points
What needs improvement with RSA Identity Governance and Lifecycle?
There is room for improvement with RSA Identity Governance and Lifecycle. As the size becomes larger, the collections...
What is your primary use case for RSA Identity Governance and Lifecycle?
We provide RSA Identity Governance and Lifecycle as a service, mainly to oversee the digital identity lifecycle, from...
What advice do you have for others considering RSA Identity Governance and Lifecycle?
Overall, I would rate RSA Identity Governance and Lifecycle at an eight out of ten.
 

Also Known As

CyberArk Privileged Access Security, CyberArk Enterprise Password Vault
Tivoli Access Manager, IBM Security Access Manager
SecurID
 

Overview

 

Sample Customers

Rockwell Automation
Essex Technology Group Inc.
NTT Com Asia, Virgin Blue, Bank of Uganda, EMEA Telecommunications Company, LAit (Lazio Innovazione Tecnologica), NyNet, OTP Bank, Red Bull Racing, Rupert House School, Signify, UK Local Authority, Bancolombia, Banco Popular de Puerto Rico (BPPR), TIVIT, Array Services, International Computerware, KPMG LLP, Moffitt Cancer Center
Find out what your peers are saying about CyberArk, One Identity, Delinea and others in Privileged Access Management (PAM). Updated: January 2026.
881,821 professionals have used our research since 2012.