Try our new research platform with insights from 80,000+ expert users

CyberArk Privileged Access Manager vs OpenText Identity Manager comparison

 

Comparison Buyer's Guide

Executive Summary

Review summaries and opinions

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
 

Categories and Ranking

CyberArk Privileged Access ...
Average Rating
8.6
Reviews Sentiment
6.8
Number of Reviews
229
Ranking in other categories
User Activity Monitoring (1st), Enterprise Password Managers (2nd), Privileged Access Management (PAM) (1st), Mainframe Security (1st), Operational Technology (OT) Security (3rd)
OpenText Identity Manager
Average Rating
8.0
Reviews Sentiment
6.9
Number of Reviews
18
Ranking in other categories
User Provisioning Software (8th), Identity Management (IM) (15th), Identity Governance Administration (IGA) (7th)
 

Mindshare comparison

While both are Security Software solutions, they serve different purposes. CyberArk Privileged Access Manager is designed for Privileged Access Management (PAM) and holds a mindshare of 11.4%, down 19.6% compared to last year.
OpenText Identity Manager, on the other hand, focuses on User Provisioning Software, holds 3.8% mindshare, down 4.1% since last year.
Privileged Access Management (PAM) Market Share Distribution
ProductMarket Share (%)
CyberArk Privileged Access Manager11.4%
Delinea Secret Server4.9%
One Identity Safeguard4.4%
Other79.3%
Privileged Access Management (PAM)
User Provisioning Software Market Share Distribution
ProductMarket Share (%)
OpenText Identity Manager3.8%
SailPoint Identity Security Cloud22.5%
One Identity Manager11.2%
Other62.5%
User Provisioning Software
 

Featured Reviews

Atul-Gujar - PeerSpot reviewer
CyberArk manager at a comms service provider with 10,001+ employees
Secures critical infrastructures with essential user session audit records
A potential area for improvement is enhancing support for cluster environments and distributed Vaults. Clients in multiple countries that need central access have different challenges that require better solutions from CyberArk. For financial services, CyberArk can improve incident response by ensuring fast support for critical priority tickets to meet compliance requirements. Providing more documentation on CyberArk is recommended for new team members to enhance their troubleshooting capabilities. I understand it's up to the client, but 99% fail to change the demo key, so it's crucial for CyberArk to emphasize changing the key and documenting it as part of the installation process.
reviewer2401464 - PeerSpot reviewer
Architect at a consultancy with 51-200 employees
Updates systems quickly and does not have a limit on the number of users
NetIQ does not have a limit on the number of users. The tool is secure by nature. It can have more than one billion users. Event-based systems know what has to be changed. SQL-based systems can only change using time and date. Event-based systems provide immediate results, while SQL-based systems need time to sync. It is totally different from a security perspective. Event-based systems can update all the systems in seconds or minutes. Other systems do it within 24 hours. The basic event-based system is AI-driven. It has some kind of robotics and programming. Other tools need programming. I like systems that have prebuilt ideas of security. NetIQ has been in the market for a long period. It has all the systems and connectors. There is not much coding. We just need to configure the products. We need not do any programming. I haven't seen any other product that needs only configuration to do the job. Most products in the market are SQL-based. They need programming. Some service providers who sell other products to customers do not sell NetIQ because they can make more money by selling solutions that need more consultancy and programming. More hours lead to more money.

Quotes from Members

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
 

Pros

"Right off the bat, the most valuable feature is the DNA scan. It gives us the ability to scan our environment and find the accounts that we're going to need to take under control."
"The most valuable feature I find in CyberArk Privileged Access Manager is that we can record the sessions. It provides flexible workflows. I can change the workflow to specify if it needs one approval or two approvals, and I can approve my peer."
"I love the ability to customize the passwords: the forbidden characters, the length of the password, the number of capital, lowercase, and special characters. You can customize the password so that it tailor fits, for example, mainframes that can't have more than eight characters. You can say, "I want a random password that doesn't have these special characters, but it is exactly eight characters," so that it doesn't throw errors."
"This solution is quite stable."
"The session recording and monitoring capabilities are valuable. We have real-time session management ability to record, audit, and monitor any privileged user activities. That is a big deal."
"Identity and access management are fundamental in cybersecurity."
"The product is an important security measure against credential theft. It ensures session isolation and password rotation including pushing passwords to the endpoints."
"I found it valuable that CyberArk Privileged Access Manager can be integrated with PTA (privileged threat analytics), and this means that it will tell you if there's a risk to the logins and signs of risk and if risky behavior is observed. It's a good feature. Another good feature is the CPM (central password manager) because it helps you rotate the passwords automatically without involving the admins. It can go and update the scheduled tasks and the services. At the same time, if there's an application where it cannot do all of these, CPM will trigger an automatic email to the application owners, telling them that they should go ahead and change the password. This allows you to manage the account password that CyberArk cannot manage, which helps mitigate the risk of old passwords, where the password gets compromised, and also allows you to manage the security of the domain."
"The most valuable feature of this solution has been the ability for us to integrate a lot of external systems, and the automatic transfer of a lot of identity information. Additionally, the customization is very good."
"The most valuable feature of NetIQ Identity Manager for identity synchronization is the ability to provide users with all necessary access on day one through automated provisioning, facilitated by approval workflows."
"I like the eDirectory feature."
"The most valuable features are Password Reset Alerts, Password Sync, and SQL connectors."
"It's a very flexible tool, so you can synchronize multiple sources of data and you have multiple connections to various kinds of systems."
"The most valuable features of NetIQ Identity Manager are the synchronization of different directories, such as Active Directory. We have many Active Directory systems, not only one."
"The main value lies in the simplicity of implementation, as well as its customized look and feel."
"NetIQ does not have a limit on the number of users."
 

Cons

"There is a lot of room for improvement in the report section. I also work on other tools, such as Thycotic, which allows you to create customized reports for your organization's needs. In CyberArk, there are limited reports, whereas in Thycotic or some of the other PAM tools, because the database is different, you can customize the report based on your needs through SQL queries."
"My concern and area for improvement revolves around reporting."
"They are sometimes not flexible with things. For instance, from one day to another, there might be something that had been done years ago by CyberArk, then they say, "We do not support that." You then have to initiate a complaint and start working with them. Things might become complicated and months pass while you are working with them. Usually, they are good and fast, but sometimes they seem to be blocked with problems, e.g., you will suddenly be working with another team instead of the team that you were working with the day before."
"One thing that could be improved is to create of a better alternative for fixing group policy fees. We currently use Microsoft, but they have introduced new policies that may not be compatible."
"As of now, it does not manage all of the IDM practices. It is only good as a PAM solution."
"Maintaining the product is challenging. Upgrades require a lot of resources, as it impacts the entire organization. For example, upgrading components like the Privileged Session Manager (PSM) and the vault is time-consuming and difficult. In the long term, I would like to see these processes simplified, especially for on-premise installations."
"When something comes out, it's generally airtight and works as advertised. However, sometimes they are a little bit slow to keep up with what's coming out. In 2017, for example, they released support for Windows Server 2016, which had been out for a year or so."
"it manages creds based on Organizational Units. That is, a "safe" is limited to specific OUs. That makes for very elaborate OU structure, or you risk exposing too many devices by putting most of them in fewer OUs."
"We have another system that is using the SAML system, and we also integrate with Active Directory only. If NetIQ Identity Manager can integrate directly, we would not need to use the Active Directory directory."
"The integrations must be made easier."
"Areas for improvement are further enhancing the access granting process to reduce time and improve accuracy."
"NetIQ Identity Manager could improve by updating the user portal, it is out of date."
"It needs some modern features. They should improve and modernize their management interface. It has been created over years and by different persons. You can see different applications, different management consoles for different things. There should be an integrated interface."
"The solution architecture is somewhat complex. For some components, the necessary resilience is not inherent."
"The interface is old and outdated, and the design software seems archaic."
"The vendor must provide an easier console for configuring things for smaller customers."
 

Pricing and Cost Advice

"Its price is high. I have also worked with Delinea. CyberArk is comparatively expensive compared to other PAM solutions, such as Delinea, especially during renewal."
"The price of CyberArk Privileged Access Manager could be less expensive."
"With reducing the privileged account access, there has been a huge improvement. They are now bringing more accounts on a little at a time."
"CyberArk Privileged Access Manager is perceived to be somewhat overpriced compared to similar market products. It is a little bit overvalued. It could come down a little bit for my liking. However, the industry-leading reputation and the quality of service justify the high price point to some extent."
"In comparison to other products on the market, CyberArk is a more costly product."
"I have heard from my leaders that CyberArk is costlier in terms of licensing. The support and maintenance are also costly. We use their premium support, but for the price we pay, we do not get the value."
"The pricing for CyberArk Privileged Access Manager is quite expensive, and the pricing varies from region to region. In APAC, CyberArk Privileged Access Manager can be obtained for less than in North America, according to my understanding."
"CyberArk has been Gartner's number-one pick for the past ten years, so you can infer that their pricing is higher than everyone else. When you are the best, you will charge appropriately for it."
"The price of the solution is a bit high and could be reduced."
"You just need to be aware that the more systems you connect, the more license fees you have to pay."
"Micro Focus is flexible when it comes to price. The cost varies from customer to customer. There are no additional costs, though. Everything is included."
"It would easily help them in getting more market and more customers if more consultants knew about their software. If they could keep it free for schools for teaching purposes, it would be good. I had to pay myself to get it and use it for training. Their competitors are giving it for free. I had to pay for it myself. They are losing market to their competitors."
"I would rate the pricing a two out of ten, with one being low price and ten being high price. It is significantly more cost-effective than the major players in the market."
"The solution is quite affordable."
report
Use our free recommendation engine to learn which Privileged Access Management (PAM) solutions are best for your needs.
883,026 professionals have used our research since 2012.
 

Top Industries

By visitors reading reviews
Financial Services Firm
14%
Manufacturing Company
10%
Computer Software Company
8%
Government
6%
Manufacturing Company
9%
Financial Services Firm
8%
Computer Software Company
7%
Marketing Services Firm
7%
 

Company Size

By reviewers
Large Enterprise
Midsize Enterprise
Small Business
By reviewers
Company SizeCount
Small Business59
Midsize Enterprise41
Large Enterprise173
By reviewers
Company SizeCount
Small Business9
Midsize Enterprise4
Large Enterprise6
 

Questions from the Community

How does Sailpoint IdentityIQ compare with CyberArk PAM?
We evaluated Sailpoint IdentityIQ before ultimately choosing CyberArk. Sailpoint Identity Platform is a solution to manage risks in cloud enterprise environments. It automates and streamlines the m...
What do you like most about CyberArk Privileged Access Manager?
The most valuable features of the solution are control and analytics.
What is your experience regarding pricing and costs for CyberArk Privileged Access Manager?
My thoughts on the pricing of CyberArk Privileged Access Manager depend entirely on the vendors' requirements. If they want their things to be secure, they have to spend accordingly. We have four t...
What do you like most about NetIQ Identity Manager?
The most valuable feature of NetIQ Identity Manager for identity synchronization is the ability to provide users with all necessary access on day one through automated provisioning, facilitated by ...
What is your experience regarding pricing and costs for NetIQ Identity Manager?
The pricing depends on whether we buy the solution as a service or a license. The license is expensive. If we buy it as a service for a large number of users, it is the cheapest tool we can get. Th...
What needs improvement with NetIQ Identity Manager?
The tool is used mostly in big systems to understand what is happening. There are not many technicians who know how to use the product. The vendor must provide an easier console for configuring thi...
 

Also Known As

CyberArk Privileged Access Security, CyberArk Enterprise Password Vault
Novell Identity Manager
 

Overview

 

Sample Customers

Rockwell Automation
Sheetz
Find out what your peers are saying about CyberArk, One Identity, Okta and others in Privileged Access Management (PAM). Updated: February 2026.
883,026 professionals have used our research since 2012.