No more typing reviews! Try our Samantha, our new voice AI agent.

CyberArk Privileged Access Manager vs OpenIAM Identity Governance comparison

 

Comparison Buyer's Guide

Executive Summary

Review summaries and opinions

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
 

Categories and Ranking

CyberArk Privileged Access ...
Average Rating
8.6
Reviews Sentiment
6.8
Number of Reviews
230
Ranking in other categories
User Activity Monitoring (1st), Enterprise Password Managers (3rd), Privileged Access Management (PAM) (1st), Mainframe Security (1st), Operational Technology (OT) Security (3rd)
OpenIAM Identity Governance
Average Rating
8.0
Reviews Sentiment
7.3
Number of Reviews
1
Ranking in other categories
User Provisioning Software (12th), Identity Management (IM) (27th)
 

Mindshare comparison

While both are Identity and Access Management solutions, they serve different purposes. CyberArk Privileged Access Manager is designed for Privileged Access Management (PAM) and holds a mindshare of 10.4%, down 18.5% compared to last year.
OpenIAM Identity Governance, on the other hand, focuses on User Provisioning Software, holds 2.8% mindshare, up 1.3% since last year.
Privileged Access Management (PAM) Mindshare Distribution
ProductMindshare (%)
CyberArk Privileged Access Manager10.4%
Delinea Secret Server4.5%
One Identity Safeguard4.4%
Other80.7%
Privileged Access Management (PAM)
User Provisioning Software Mindshare Distribution
ProductMindshare (%)
OpenIAM Identity Governance2.8%
SailPoint Identity Security Cloud19.3%
One Identity Manager9.5%
Other68.4%
User Provisioning Software
 

Featured Reviews

Atul-Gujar - PeerSpot reviewer
CyberArk manager at a comms service provider with 10,001+ employees
Secures critical infrastructures with essential user session audit records
A potential area for improvement is enhancing support for cluster environments and distributed Vaults. Clients in multiple countries that need central access have different challenges that require better solutions from CyberArk. For financial services, CyberArk can improve incident response by ensuring fast support for critical priority tickets to meet compliance requirements. Providing more documentation on CyberArk is recommended for new team members to enhance their troubleshooting capabilities. I understand it's up to the client, but 99% fail to change the demo key, so it's crucial for CyberArk to emphasize changing the key and documenting it as part of the installation process.
SM
Lead Consultant at a security firm with 51-200 employees
Manages user identities and application access in a centralized way from a single console/portal
OpenIAM provides an Identity and Access Management platform which includes identity and access management (i.e., SSO, Multi-factor Authentication, password synchronization, and RBAC). Below are the features : Lower Cost of Implementation & Total Cost of Ownership: * OpenIAM uses tools, such as Groovy script to implement business rules, Grails to create new UI functionality, Activiti for workflow, PowerShell, etc. It also support web services. So it is important to find skilled technical resources readily and at reasonable cost in comparison to the large vendors, which use proprietary tools for developing custom connector or product customization as per business requirement. * OpenIAM is also based on Open Source technologies (i.e., JBoss, Apache, MySQL, CentOS), so Total Cost of Ownership is very low in comparison to other IAM products. * Compliance with standards simplifies integration. * Subscription-based license model. Ease of Use: OpenIAM offers a single unified Admin console and a single unified self-service portal for customers to use and manage the IAM suite (i.e. Identity Management, Access Management, and Multi-Factor Authentication). Modern Architecture: * Built from the ground up, not through acquisitions and proprietary technology. * SOA architecture * Cloud-enabled Enterprise Grade Product: Even though OpenIAM is based on Open Source technologies, it is: * Built on industry standards * Simplified integration * Uses established industry frameworks

Quotes from Members

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
 

Pros

"The most valuable aspects of the solution include password management and Rest API retrieval of vaulted credentials."
"We are utilizing CyberArk to secure applications, credentials, and endpoints."
"I find the threat analytics is an important feature, as CyberArk can look at the log details and analyze who is using the applications, which are their locations, and which are the IP locations from which they are accessing, enabling the solution to find the exact location the threat is emanating from, which we really value."
"We utilize PTA, and we are now integrating that into our risk management program so we can identify the uses of the vault which are outside of the norm, e.g., people accessing after hours. It has reduced the amount of time that we are looking through logs and audit logs."
"CyberArk does its job very well, all the components are very useful and the benefits are all evident."
"With CyberArk, everything is a click away for us."
"Security is the solution's most valuable feature."
"It has helped us with our adoption with other teams, and it has also helped us to integrate it at the ground level."
"Customer support is very good and available in almost all time zones."
 

Cons

"We had an issue with the Copy feature... Apparently, in version 10, that Copy feature does not work. You actually have to click Show and then copy the password from within Show and then paste it. We've had a million tickets and we had to figure out a workaround to it."
"We would like to expand the usage of the auto discovery accounts feed, then on our end, tie in the REST API for automation."
"They are taking two to three days for resolution are too slow. Customers, including myself, do not want to wait this long for solutions."
"I think having a distributed architecture would certainly help this solution."
"The graphical user interface could be simplified and harmonized for better usability. It should be consistent. Its GUI is very confusing."
"CyberArk Enterprise Password Vault's deployment is complex for resources with little experience. Tech support needs to be improved as well based on quality and knowledge."
"It's a big program. To scale excessively, locally, on an on-prem application, takes a lot of servers."
"There is a learning curve when it comes to planning out the deployment strategy, but once it is defined, it runs itself."
"OpenIAM should improve the product/API documentation on portal which gives more flexibility to developers for product customization and connector development."
 

Pricing and Cost Advice

"I would rate the tool’s pricing a six out of ten."
"CyberArk Enterprise Password Vault is a very expensive product."
"The price of this solution is expensive."
"It's an affordable platform."
"With the current model of licensing, for my use cases, sometimes it's hard to convince the management and get budget approvals for it. It's expensive and you're not getting anything new. It's just a control, but in terms of risk, you are covering a big impact on the company. Improvement in the licensing prices is something I would want to have."
"This solution is considered to be more expensive than others out there on the market today."
"They have two types of licensing: purchase and subscription. You have to pay for each admin user, such as Microsoft admin, mail admin, database admin, etc."
"From a client perspective, CyberArk's pricing is fair but there is a significant increase each year. They should limit the price increase because this could potentially drive customers to other partners. Price changes should be at defined intervals. There should not be sudden jumps."
Information not available
report
Use our free recommendation engine to learn which Privileged Access Management (PAM) solutions are best for your needs.
895,151 professionals have used our research since 2012.
 

Top Industries

By visitors reading reviews
Financial Services Firm
13%
Manufacturing Company
10%
Computer Software Company
7%
Comms Service Provider
6%
University
15%
Construction Company
11%
Outsourcing Company
9%
Government
8%
 

Company Size

By reviewers
Large Enterprise
Midsize Enterprise
Small Business
By reviewers
Company SizeCount
Small Business59
Midsize Enterprise42
Large Enterprise174
No data available
 

Questions from the Community

How does Sailpoint IdentityIQ compare with CyberArk PAM?
We evaluated Sailpoint IdentityIQ before ultimately choosing CyberArk. Sailpoint Identity Platform is a solution to manage risks in cloud enterprise environments. It automates and streamlines the m...
What do you like most about CyberArk Privileged Access Manager?
The most valuable features of the solution are control and analytics.
What is your experience regarding pricing and costs for CyberArk Privileged Access Manager?
My thoughts on the pricing of CyberArk Privileged Access Manager depend entirely on the vendors' requirements. If they want their things to be secure, they have to spend accordingly. We have four t...
Ask a question
Earn 20 points
 

Also Known As

CyberArk Privileged Access Security, CyberArk Enterprise Password Vault
OpenIAM, OpenIAM IGA
 

Overview

 

Sample Customers

Rockwell Automation
Citicorp, Deutsche Bank, Morgan Stanley, Marsh and McLennan, SBC Warburg, GE Electric Insurance, Tata Communications, NettBuss, AMSCAN, Time Warner, MultiPlan, Stater Bros., County of Orange - California, TUI Hotels, NV Energy, EMCOR Group, Previred
Find out what your peers are saying about CyberArk, One Identity, Okta and others in Privileged Access Management (PAM). Updated: May 2026.
895,151 professionals have used our research since 2012.