Try our new research platform with insights from 80,000+ expert users

CyberArk Privileged Access Manager vs Imprivata OneSign comparison

 

Comparison Buyer's Guide

Executive Summary

Review summaries and opinions

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
 

Categories and Ranking

CyberArk Privileged Access ...
Average Rating
8.6
Reviews Sentiment
6.9
Number of Reviews
221
Ranking in other categories
User Activity Monitoring (1st), Enterprise Password Managers (2nd), Privileged Access Management (PAM) (1st), Mainframe Security (2nd), Operational Technology (OT) Security (3rd)
Imprivata OneSign
Average Rating
9.0
Number of Reviews
2
Ranking in other categories
Single Sign-On (SSO) (19th)
 

Mindshare comparison

While both are Identity and Access Management solutions, they serve different purposes. CyberArk Privileged Access Manager is designed for Privileged Access Management (PAM) and holds a mindshare of 18.3%, down 22.8% compared to last year.
Imprivata OneSign, on the other hand, focuses on Single Sign-On (SSO), holds 2.1% mindshare, up 1.7% since last year.
Privileged Access Management (PAM)
Single Sign-On (SSO)
 

Featured Reviews

Lasantha Wijesinghe - PeerSpot reviewer
We have visibility and control through real-time user behavior analytics
It took us some time to realize its benefits because there was a learning curve for us. It took us about a year to get our heads around this product and start effectively using it. It is a journey. It takes at least five years for any company to make this product very useful and reach maturity. It is not only the product's fault. The company needs to have a vision, and the company culture needs to go with it. Senior leadership needs to support the vision. You need to have lots of ingredients for success. If everything is in place, you will see success after one year. In the first year, it is a struggle for everybody. My company was bought by a bigger company, and they were very new to privileged access management. Everybody was struggling. The advice I would give is to have a good vision for privileged access management. You need dedicated teams, senior management support, and proper company policies and standards before implementing the solution. Start building knowledge slowly and avoid jumping into the deep end without preparation. I would rate CyberArk Privileged Access Manager a nine out of ten.
IS
Reasonably priced, performs well, easy to deploy, and has responsive technical support
We use Imprivata OneSign for the single sign-on Imprivata supports single sign-on. OneSign is the name itself. It provides a service that allows users to sign in to whatever application they are using. This is the most important feature of this solution. The deployment is very quick, and the…

Quotes from Members

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
 

Pros

"Our most valuable features would probably be key rotation, the SKM or SSH key manager, and account discovery."
"I would rate this solution a nine out of ten."
"The best feature of CyberArk Privileged Access Manager is its core function: automatically managing and securing credentials."
"I found it valuable that CyberArk Privileged Access Manager can be integrated with PTA (privileged threat analytics), and this means that it will tell you if there's a risk to the logins and signs of risk and if risky behavior is observed. It's a good feature. Another good feature is the CPM (central password manager) because it helps you rotate the passwords automatically without involving the admins. It can go and update the scheduled tasks and the services. At the same time, if there's an application where it cannot do all of these, CPM will trigger an automatic email to the application owners, telling them that they should go ahead and change the password. This allows you to manage the account password that CyberArk cannot manage, which helps mitigate the risk of old passwords, where the password gets compromised, and also allows you to manage the security of the domain."
"PSM enables after-hours monitoring."
"CyberArk Privileged Access Manager has made our operations more streamlined."
"CyberArk is a very stable product and it's a stable product because it has a simple design and a simple architecture that allows you to leverage the economies of scale across the base of your infrastructure that you already have implemented. It doesn't really introduce any new complex pieces of infrastructure that would make it that much more difficult to scale."
"We could see the benefits of CyberArk Privileged Access Manager immediately after we deployed it and started using it."
"It provides a service that allows users to sign in to whatever application they are using. This is the most important feature of this solution."
"It has benefited my organization in the way that it makes it more secure by making it harder to hack."
 

Cons

"When I was a component owner for PAM's Privileged Threat Analytics (PTA) component, what I wanted was a clear mapping to the MITRE ATT&CK framework, a framework which has a comprehensive list of use cases. We reached out to the vendor and asked them how much coverage they have of the uses cases found on MITRE, which would have given us a better view of things while I was the product owner. Unfortunately they did not have the capability of mapping onto MITRE's framework at that time."
"There are some options in the web portal where they can improve the user experience. For example, in remote, there is a parameter called 'access to remote machine.' When we put host names in that field, we are not able to search it. It"
"One area for improvement is the plug-in development challenge. Although CyberArk provides a plug-in generator utility, it does not fully meet our needs, particularly for web-based applications."
"When something comes out, it's generally airtight and works as advertised. However, sometimes they are a little bit slow to keep up with what's coming out. In 2017, for example, they released support for Windows Server 2016, which had been out for a year or so."
"The only problem involves granting access to people who are authorized to view it."
"The interface could be improved it is not user-friendly, but they have improved but it could still improve. In the policies configuration, it would be a benefit to have more details."
"Currently, in Secure Connect, an end user is required to enter account information manually, and cannot save any of this information for future use."
"Some aspects of the administration need improvement, though they have recently made improvements to the API. However, the management with the interface and configuration are not so user-friendly. It has not changed much during all the years that CyberArk has been on the market. The management part, like platform management as well as PSM connectors definition and management, could be improved, even if it has already been done with the API."
"They should have a landing page."
"I would like for them to make this solution compatible with Mac OS. I would also like for them to provide a portal so that users can easily integrate it with their applications."
 

Pricing and Cost Advice

"The solution is available at a high price"
"My company always complains about the cost of CyberArk Privileged Access Manager because it's too high."
"Previously, the pricing was very meager. They started publicizing and advertising the solution, growing CyberArk, as an organization. They also changed their pricing with that growth, e.g., the pricier the product, the more people who will purchase it."
"Generally, I don't get involved in the licensing or the purchasing side of it, but I do know that the licenses are expensive."
"The solution is very expensive and requires a license. We pay for an enterprise license."
"I do not have any opinions to add about the pricing of the product."
"Quite expensive"
"Pricing and licensing depend on the environment."
"At the moment, I believe the price is reasonable."
"The price is reasonable, it's an affordable solution."
report
Use our free recommendation engine to learn which Privileged Access Management (PAM) solutions are best for your needs.
849,963 professionals have used our research since 2012.
 

Top Industries

By visitors reading reviews
Educational Organization
33%
Financial Services Firm
12%
Computer Software Company
11%
Manufacturing Company
6%
Educational Organization
31%
Healthcare Company
24%
Computer Software Company
8%
Government
5%
 

Company Size

By reviewers
Large Enterprise
Midsize Enterprise
Small Business
No data available
 

Questions from the Community

How does Sailpoint IdentityIQ compare with CyberArk PAM?
We evaluated Sailpoint IdentityIQ before ultimately choosing CyberArk. Sailpoint Identity Platform is a solution to manage risks in cloud enterprise environments. It automates and streamlines the m...
What do you like most about CyberArk Privileged Access Manager?
The most valuable features of the solution are control and analytics.
What is your experience regarding pricing and costs for CyberArk Privileged Access Manager?
With the current model of licensing, for my use cases, sometimes it's hard to convince the management and get budget approvals for it. It's expensive and you're not getting anything new. It's just ...
Ask a question
Earn 20 points
 

Also Known As

CyberArk Privileged Access Security, CyberArk Enterprise Password Vault
OneSign, Imprivata OneSign Authentication Management
 

Overview

 

Sample Customers

Rockwell Automation
AZ Groeninge, Cambridge University Hospitals NHS Foundation Trust, East Kent Hospitals University NHS Foundation Trust, Liverpool Womens NHS Foundation Trust, Mahaska Health Partnership, Phoebe Putney Memorial Hospital, Boulder Community Hospital, City of Marietta, Spencer Hospital, Southwest Washington Medical Center, South Shore Hospital
Find out what your peers are saying about CyberArk, Delinea, One Identity and others in Privileged Access Management (PAM). Updated: April 2025.
849,963 professionals have used our research since 2012.