Try our new research platform with insights from 80,000+ expert users

CyberArk Privileged Access Manager vs OpenIAM Identity Governance comparison

 

Comparison Buyer's Guide

Executive Summary

Review summaries and opinions

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
 

Categories and Ranking

CyberArk Privileged Access ...
Average Rating
8.6
Reviews Sentiment
6.8
Number of Reviews
229
Ranking in other categories
User Activity Monitoring (1st), Enterprise Password Managers (2nd), Privileged Access Management (PAM) (1st), Mainframe Security (2nd), Operational Technology (OT) Security (3rd)
OpenIAM Identity Governance
Average Rating
8.0
Reviews Sentiment
7.3
Number of Reviews
1
Ranking in other categories
User Provisioning Software (16th), Identity Management (IM) (26th)
 

Mindshare comparison

While both are Identity and Access Management solutions, they serve different purposes. CyberArk Privileged Access Manager is designed for Privileged Access Management (PAM) and holds a mindshare of 11.2%, down 19.7% compared to last year.
OpenIAM Identity Governance, on the other hand, focuses on User Provisioning Software, holds 1.7% mindshare, up 1.1% since last year.
Privileged Access Management (PAM) Market Share Distribution
ProductMarket Share (%)
CyberArk Privileged Access Manager11.2%
Delinea Secret Server5.0%
WALLIX Bastion4.5%
Other79.3%
Privileged Access Management (PAM)
User Provisioning Software Market Share Distribution
ProductMarket Share (%)
OpenIAM Identity Governance1.7%
SailPoint Identity Security Cloud24.5%
Saviynt13.0%
Other60.8%
User Provisioning Software
 

Featured Reviews

Atul-Gujar - PeerSpot reviewer
CyberArk manager at a comms service provider with 10,001+ employees
Secures critical infrastructures with essential user session audit records
A potential area for improvement is enhancing support for cluster environments and distributed Vaults. Clients in multiple countries that need central access have different challenges that require better solutions from CyberArk. For financial services, CyberArk can improve incident response by ensuring fast support for critical priority tickets to meet compliance requirements. Providing more documentation on CyberArk is recommended for new team members to enhance their troubleshooting capabilities. I understand it's up to the client, but 99% fail to change the demo key, so it's crucial for CyberArk to emphasize changing the key and documenting it as part of the installation process.
SM
Lead Consultant at a security firm with 51-200 employees
Manages user identities and application access in a centralized way from a single console/portal
OpenIAM provides an Identity and Access Management platform which includes identity and access management (i.e., SSO, Multi-factor Authentication, password synchronization, and RBAC). Below are the features : Lower Cost of Implementation & Total Cost of Ownership: * OpenIAM uses tools, such as Groovy script to implement business rules, Grails to create new UI functionality, Activiti for workflow, PowerShell, etc. It also support web services. So it is important to find skilled technical resources readily and at reasonable cost in comparison to the large vendors, which use proprietary tools for developing custom connector or product customization as per business requirement. * OpenIAM is also based on Open Source technologies (i.e., JBoss, Apache, MySQL, CentOS), so Total Cost of Ownership is very low in comparison to other IAM products. * Compliance with standards simplifies integration. * Subscription-based license model. Ease of Use: OpenIAM offers a single unified Admin console and a single unified self-service portal for customers to use and manage the IAM suite (i.e. Identity Management, Access Management, and Multi-Factor Authentication). Modern Architecture: * Built from the ground up, not through acquisitions and proprietary technology. * SOA architecture * Cloud-enabled Enterprise Grade Product: Even though OpenIAM is based on Open Source technologies, it is: * Built on industry standards * Simplified integration * Uses established industry frameworks
report
Use our free recommendation engine to learn which Privileged Access Management (PAM) solutions are best for your needs.
881,757 professionals have used our research since 2012.
 

Top Industries

By visitors reading reviews
Financial Services Firm
15%
Manufacturing Company
10%
Computer Software Company
9%
Government
6%
University
13%
Outsourcing Company
9%
Financial Services Firm
8%
Computer Software Company
8%
 

Company Size

By reviewers
Large Enterprise
Midsize Enterprise
Small Business
By reviewers
Company SizeCount
Small Business59
Midsize Enterprise40
Large Enterprise173
No data available
 

Questions from the Community

How does Sailpoint IdentityIQ compare with CyberArk PAM?
We evaluated Sailpoint IdentityIQ before ultimately choosing CyberArk. Sailpoint Identity Platform is a solution to manage risks in cloud enterprise environments. It automates and streamlines the m...
What do you like most about CyberArk Privileged Access Manager?
The most valuable features of the solution are control and analytics.
What is your experience regarding pricing and costs for CyberArk Privileged Access Manager?
My thoughts on the pricing of CyberArk Privileged Access Manager depend entirely on the vendors' requirements. If they want their things to be secure, they have to spend accordingly. We have four t...
Ask a question
Earn 20 points
 

Also Known As

CyberArk Privileged Access Security, CyberArk Enterprise Password Vault
OpenIAM, OpenIAM IGA
 

Overview

 

Sample Customers

Rockwell Automation
Citicorp, Deutsche Bank, Morgan Stanley, Marsh and McLennan, SBC Warburg, GE Electric Insurance, Tata Communications, NettBuss, AMSCAN, Time Warner, MultiPlan, Stater Bros., County of Orange - California, TUI Hotels, NV Energy, EMCOR Group, Previred
Find out what your peers are saying about CyberArk, One Identity, Delinea and others in Privileged Access Management (PAM). Updated: January 2026.
881,757 professionals have used our research since 2012.