Try our new research platform with insights from 80,000+ expert users

CyberArk Privileged Access Manager vs Omada Identity comparison

 

Comparison Buyer's Guide

Executive Summary

Review summaries and opinions

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
 

ROI

Sentiment score
6.6
Organizations gain enhanced security, compliance, and cost savings with CyberArk, improving efficiency, user adoption, and risk reduction.
Sentiment score
5.8
Omada Identity reduces costs and improves security through automation, rapid implementation, and effective account management despite minor issues.
The return on investment lies in improved security infrastructure, addressing over-privileged access, and reducing the risk of credential compromise, which is a major source of data breaches.
Cyber Security Engineer at Isolutions Associates Ltd (ISOLS)
The end users have the authority to reconcile the password or verify it before using session isolation, which is one of the unique features that can be enabled through Privileged Session Manager, preventing any attacks from happening within the organization when connected with sessions through CyberArk Privileged Access Manager.
Senior Engineer at a tech vendor with 1,001-5,000 employees
CyberArk Privileged Access Manager has helped customers save on costs primarily by reducing the number of engineering and information security personnel.
Head of Sales Services Department at a comms service provider with 51-200 employees
Omada Identity has definitely helped us save time when provisioning access for various identities.
Senior Developer at Guidewire Limited
 

Customer Service

Sentiment score
6.5
CyberArk's support receives mixed reviews, praised for expertise but criticized for delays, especially at Tier One, yet committed to improvement.
Sentiment score
6.6
Omada Identity's customer service is mixed, with quick responses praised but delays and outdated documentation criticized. Improvements ongoing.
CyberArk has been exceptional in coming back to us with immediate responses.
IT Cyber Security Lead at a mining and metals company with 1,001-5,000 employees
It could be forever until you talk to someone who knows what they are doing.
Senior PAM Consultant at iC Consult GmbH
Based on the issue resolution and support quality, I rate the support 10 out of 10.
Operation Specialists at a tech vendor with 10,001+ employees
The vendor support needs improvement because we have reported serious incidents that remain unresolved.
Lead Cyber Security Architect at Ernst & Young
We do not contact their technical support directly because we have a service agreement already in place with them with some dedicated and some non-dedicated resources.
Manager at a manufacturing company with 5,001-10,000 employees
first-level support lacks expertise
Identity Access Management (IAM) Engineer at Draexlmaier
 

Scalability Issues

Sentiment score
7.6
CyberArk Privileged Access Manager scales efficiently for diverse needs, with flexible deployment options and positive user feedback on growth adaptability.
Sentiment score
7.7
Omada Identity offers excellent scalability and integration, efficiently adapting to organizational needs with high user satisfaction despite speed concerns.
The CPM can reportedly handle up to 50,000 accounts independently without issue.
Privileged Access Management Engineer at a hospitality company with 10,001+ employees
I would rate it a ten out of ten for scalability.
IT Cyber Security Lead at a mining and metals company with 1,001-5,000 employees
They had 40,000 passwords in this one safe, and it was saving the last ten iterations of each password object. That means they had 400,000 password objects in this safe. They exceeded the limit.
Senior PAM Consultant at iC Consult GmbH
The scalability of Omada Identity is excellent; they offer flexible pricing for licenses, accommodating both full accounts and lighter identities, which makes it truly scalable.
Identity Access Management (IAM) Engineer at Draexlmaier
 

Stability Issues

Sentiment score
7.7
CyberArk Privileged Access Manager is praised for its robust stability and high availability, with minor issues noted under heavy load.
Sentiment score
7.5
Omada Identity is stable but faces challenges in audits and integrations, with users desiring better bug support and communication.
Proper fine-tuning and expertise ensure the product performs well.
Cybersecurity Specialist at a comms service provider with 5,001-10,000 employees
Overall, the stability of the solution is high.
Senior Cybersecurity Manager at a financial services firm with 10,001+ employees
It has a large customer base and positive feedback within my network.
Senior Manager at a energy/utilities company with 1,001-5,000 employees
In terms of stability, I rate Omada Identity a nine out of ten.
Identity Access Management (IAM) Engineer at Draexlmaier
We have experienced too many unexpected errors on a daily basis.
Lead Cyber Security Architect at Ernst & Young
I would rate the stability as having no downtime.
Senior Developer at Guidewire Limited
 

Room For Improvement

CyberArk Privileged Access Manager needs UI, integration, documentation, performance, complexity improvements, better plugins, licensing, reporting, and support.
Omada Identity needs interface updates, better scalability, improved documentation, and enhanced performance for a more efficient user experience.
They want everything to be on the cloud, but even in the SaaS version of CyberArk Privileged Access Manager, they need to deploy some servers on-premises.
Presales Engineer at a computer software company with 201-500 employees
We cannot generate a plug-in for web-based applications.
Contractor at a pharma/biotech company with 5,001-10,000 employees
If they want clients to move to the cloud, they need to support them in real-time.
Senior Manager at a consultancy with 11-50 employees
The biggest issue, which is the reason why we are transitioning from their product to SailPoint, is the overall user experience.
Manager at a manufacturing company with 5,001-10,000 employees
There is room for improvement in Omada Identity, primarily in customization for administrators; many custom tasks require contacting providers even for simple changes.
Identity Access Management (IAM) Engineer at Draexlmaier
The deployment of Omada Identity is complex; the product is not brilliantly documented.
Lead Cyber Security Architect at Ernst & Young
 

Setup Cost

CyberArk Privileged Access Manager is costly but offers robust features and security, providing value despite higher pricing.
Enterprise buyers find Omada Identity competitively priced on-premise, but costly in the cloud, with negotiable licensing and setup.
CyberArk is expensive compared to other products I know.
Cybersecurity Specialist at a comms service provider with 5,001-10,000 employees
CyberArk is comparatively expensive compared to other PAM solutions, such as Delinea, especially during renewal.
Presales Engineer at a computer software company with 201-500 employees
CyberArk's SaaS solution is particularly expensive.
Senior Manager at a energy/utilities company with 1,001-5,000 employees
They are lower than some of their competitors.
Manager at a manufacturing company with 5,001-10,000 employees
the product itself is said to have a good price, although the support can be expensive.
Identity Access Management (IAM) Engineer at Draexlmaier
 

Valuable Features

CyberArk Privileged Access Manager offers password management, session monitoring, and threat analytics to enhance security and compliance.
Omada Identity enhances security with governance, automation, integration, and user-friendly interfaces, streamlining identity management and administrative tasks.
CyberArk Privileged Access Manager helps ensure data privacy because we now know who is using which credentials and at what time.
Senior Cybersecurity Manager at a financial services firm with 10,001+ employees
It keeps a record of activities, allowing me to easily fetch screen recordings to detect any misuse and see who did what and what happened.
Senior Manager at a consultancy with 11-50 employees
It can integrate with Splunk, SNMP, and other solutions and technologies.
Technical Support Analyst at Capgemini
Omada Identity helps automate reviews of access requests and reroutes them to appropriate people, which is what it should do; it really assists in reducing the workload time.
Identity Access Management (IAM) Engineer at Draexlmaier
Technically, the product does everything one would expect from an identity and access management platform.
Manager at a manufacturing company with 5,001-10,000 employees
Omada Identity solution is that it covers most of the concepts of IGA.
Senior Developer at Guidewire Limited
 

Categories and Ranking

CyberArk Privileged Access ...
Average Rating
8.6
Reviews Sentiment
6.8
Number of Reviews
229
Ranking in other categories
User Activity Monitoring (1st), Enterprise Password Managers (3rd), Privileged Access Management (PAM) (1st), Mainframe Security (2nd), Operational Technology (OT) Security (3rd)
Omada Identity
Average Rating
8.0
Reviews Sentiment
6.7
Number of Reviews
51
Ranking in other categories
User Provisioning Software (4th), Identity Management (IM) (4th), Identity and Access Management as a Service (IDaaS) (IAMaaS) (4th), Customer Identity and Access Management (CIAM) (5th)
 

Mindshare comparison

While both are Identity and Access Management solutions, they serve different purposes. CyberArk Privileged Access Manager is designed for Privileged Access Management (PAM) and holds a mindshare of 11.6%, down 20.0% compared to last year.
Omada Identity, on the other hand, focuses on Identity Management (IM), holds 3.3% mindshare, down 3.4% since last year.
Privileged Access Management (PAM) Market Share Distribution
ProductMarket Share (%)
CyberArk Privileged Access Manager11.6%
WALLIX Bastion5.1%
Delinea Secret Server5.0%
Other78.3%
Privileged Access Management (PAM)
Identity Management (IM) Market Share Distribution
ProductMarket Share (%)
Omada Identity3.3%
SailPoint Identity Security Cloud14.6%
Microsoft Entra ID9.3%
Other72.8%
Identity Management (IM)
 

Featured Reviews

SI
Senior PAM Consultant at iC Consult GmbH
Makes privileged access management easy with automation and granular control
Many people underestimate the value of these tools because they treat them as simple automated password management. Once you realize the volume of passwords in your organization and factor in nonhuman passwords, you realize its value. Last year, CyberArk Impact cited 45 nonhuman passwords for every human password. If you have 10,000 employees, you can imagine the number of passwords. There are also many other operations. For example, you have a Qualys scanner that needs to reach out and touch all your endpoints and scan them for vulnerabilities. They use an API call to CyberArk to pull out a Privileged credential that allows them to log in to that target. This is an automated machine call. It is tapping into CyberArk to get that credential. There can be hundreds of thousands of those operations a day. You do not want to manage those passwords by hand. Some people marginalize the significance of such a solution by saying that it is just a fancy password changer. It goes well beyond that, especially with API calls and automation. Its importance extends beyond merely changing passwords; it involves automation, API calls, and process integration, crucial in agile environments for standing up new Amazon servers or other processes needing privileged credentials. CyberArk can automate these tasks into their build processes. Another critical feature is the proxy service via Privileged Session Manager (PSM), providing not only a proxy between your user and the target servers, protecting against malware but also offering session recording. Many companies I have worked with implemented a PAM product as a knee-jerk reaction to SOX audit requirements. They discovered they needed session recording and retention for regulatory compliance. This has become a major factor for clients instituting CyberArk, so PSM is a big deal in addition to regular password rotation.
Lars Henrik Jensen - PeerSpot reviewer
Lead Cyber Security Architect at Ernst & Young
Faced deployment delays and daily errors but have streamlined access reviews and improved termination processes
The deployment of Omada Identity is complex; the product is not brilliantly documented, and it lacks the same level of documentation that could be found for systems such as SailPoint or Saviynt, making it harder to find material or help online, particularly with Omada Cloud. The system performance of Omada Identity is inconsistent; we've been analyzing this issue together with Omada, but we haven't been able to resolve whether the problem lies on their side or my client's side, which causes long response times and long run times in Omada sometimes. Omada Identity does not help deploy IGA within 12 weeks; the time frame for applying the rapid deployment solution was much longer than expected, and I am unsure if it is built on best practices across all systems. When we receive an error or system message from Omada Identity, it's very hard to decode what it means; we have had serious issues in daily imports that we can't explain, indicating a need for improved stability. The comprehensiveness of out-of-the-box connectors that Omada provides differs; the connectors for Microsoft and Salesforce are good, but for SAP, they are basically non-existent.
report
Use our free recommendation engine to learn which Privileged Access Management (PAM) solutions are best for your needs.
879,371 professionals have used our research since 2012.
 

Top Industries

By visitors reading reviews
Financial Services Firm
15%
Computer Software Company
11%
Manufacturing Company
10%
Government
6%
Financial Services Firm
16%
Computer Software Company
10%
Manufacturing Company
9%
Government
6%
 

Company Size

By reviewers
Large Enterprise
Midsize Enterprise
Small Business
By reviewers
Company SizeCount
Small Business59
Midsize Enterprise40
Large Enterprise173
By reviewers
Company SizeCount
Small Business8
Midsize Enterprise3
Large Enterprise42
 

Questions from the Community

How does Sailpoint IdentityIQ compare with CyberArk PAM?
We evaluated Sailpoint IdentityIQ before ultimately choosing CyberArk. Sailpoint Identity Platform is a solution to manage risks in cloud enterprise environments. It automates and streamlines the m...
What do you like most about CyberArk Privileged Access Manager?
The most valuable features of the solution are control and analytics.
What is your experience regarding pricing and costs for CyberArk Privileged Access Manager?
My thoughts on the pricing of CyberArk Privileged Access Manager depend entirely on the vendors' requirements. If they want their things to be secure, they have to spend accordingly. We have four t...
What do you like most about Omada Identity Cloud?
As an administrator, we benefit from a lot of functionality that is available out of the box, but it is also configurable to meet our specific needs.
What is your experience regarding pricing and costs for Omada Identity Cloud?
I'm not fully aware of the pricing details, which are managed by higher management; however, the product itself is said to have a good price, although the support can be expensive.
What needs improvement with Omada Identity Cloud?
There is room for improvement in Omada Identity, primarily in customization for administrators; many custom tasks require contacting providers even for simple changes. We need more hands-on customi...
 

Also Known As

CyberArk Privileged Access Security, CyberArk Enterprise Password Vault
Omada Identity Suite, Omada Identity Cloud
 

Overview

 

Sample Customers

Rockwell Automation
Bayer, ECCO Shoes, Vattenfall, NuStar Energy, Unicredit, Schiphol Group, BMW Group, Deutsche Leasing
Find out what your peers are saying about CyberArk, One Identity, Delinea and others in Privileged Access Management (PAM). Updated: December 2025.
879,371 professionals have used our research since 2012.