Try our new research platform with insights from 80,000+ expert users

CyberArk Privileged Access Manager vs OpenIAM Identity Governance comparison

 

Comparison Buyer's Guide

Executive Summary

Review summaries and opinions

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
 

Categories and Ranking

CyberArk Privileged Access ...
Average Rating
8.6
Reviews Sentiment
6.8
Number of Reviews
229
Ranking in other categories
User Activity Monitoring (1st), Enterprise Password Managers (3rd), Privileged Access Management (PAM) (1st), Mainframe Security (2nd), Operational Technology (OT) Security (3rd)
OpenIAM Identity Governance
Average Rating
8.0
Reviews Sentiment
7.3
Number of Reviews
1
Ranking in other categories
User Provisioning Software (17th), Identity Management (IM) (28th)
 

Mindshare comparison

While both are Identity and Access Management solutions, they serve different purposes. CyberArk Privileged Access Manager is designed for Privileged Access Management (PAM) and holds a mindshare of 16.3%, down 22.0% compared to last year.
OpenIAM Identity Governance, on the other hand, focuses on User Provisioning Software, holds 1.3% mindshare, up 1.2% since last year.
Privileged Access Management (PAM) Market Share Distribution
ProductMarket Share (%)
CyberArk Privileged Access Manager16.3%
Delinea Secret Server7.5%
WALLIX Bastion7.4%
Other68.8%
Privileged Access Management (PAM)
User Provisioning Software Market Share Distribution
ProductMarket Share (%)
OpenIAM Identity Governance1.3%
SailPoint Identity Security Cloud30.2%
Saviynt14.4%
Other54.1%
User Provisioning Software
 

Featured Reviews

Atul-Gujar - PeerSpot reviewer
Secures critical infrastructures with essential user session audit records
A potential area for improvement is enhancing support for cluster environments and distributed Vaults. Clients in multiple countries that need central access have different challenges that require better solutions from CyberArk. For financial services, CyberArk can improve incident response by ensuring fast support for critical priority tickets to meet compliance requirements. Providing more documentation on CyberArk is recommended for new team members to enhance their troubleshooting capabilities. I understand it's up to the client, but 99% fail to change the demo key, so it's crucial for CyberArk to emphasize changing the key and documenting it as part of the installation process.
SM
Manages user identities and application access in a centralized way from a single console/portal
OpenIAM provides an Identity and Access Management platform which includes identity and access management (i.e., SSO, Multi-factor Authentication, password synchronization, and RBAC). Below are the features : Lower Cost of Implementation & Total Cost of Ownership: * OpenIAM uses tools, such as Groovy script to implement business rules, Grails to create new UI functionality, Activiti for workflow, PowerShell, etc. It also support web services. So it is important to find skilled technical resources readily and at reasonable cost in comparison to the large vendors, which use proprietary tools for developing custom connector or product customization as per business requirement. * OpenIAM is also based on Open Source technologies (i.e., JBoss, Apache, MySQL, CentOS), so Total Cost of Ownership is very low in comparison to other IAM products. * Compliance with standards simplifies integration. * Subscription-based license model. Ease of Use: OpenIAM offers a single unified Admin console and a single unified self-service portal for customers to use and manage the IAM suite (i.e. Identity Management, Access Management, and Multi-Factor Authentication). Modern Architecture: * Built from the ground up, not through acquisitions and proprietary technology. * SOA architecture * Cloud-enabled Enterprise Grade Product: Even though OpenIAM is based on Open Source technologies, it is: * Built on industry standards * Simplified integration * Uses established industry frameworks
report
Use our free recommendation engine to learn which Privileged Access Management (PAM) solutions are best for your needs.
867,676 professionals have used our research since 2012.
 

Top Industries

By visitors reading reviews
Financial Services Firm
15%
Computer Software Company
14%
Manufacturing Company
9%
Government
6%
University
13%
Financial Services Firm
12%
Outsourcing Company
8%
Government
8%
 

Company Size

By reviewers
Large Enterprise
Midsize Enterprise
Small Business
By reviewers
Company SizeCount
Small Business60
Midsize Enterprise41
Large Enterprise171
No data available
 

Questions from the Community

How does Sailpoint IdentityIQ compare with CyberArk PAM?
We evaluated Sailpoint IdentityIQ before ultimately choosing CyberArk. Sailpoint Identity Platform is a solution to manage risks in cloud enterprise environments. It automates and streamlines the m...
What do you like most about CyberArk Privileged Access Manager?
The most valuable features of the solution are control and analytics.
What is your experience regarding pricing and costs for CyberArk Privileged Access Manager?
There has been no reduced cost associated with CyberArk Privileged Access Manager, as when it is required, you must pay for their licensing and prepare the full environment. While there are costs f...
Ask a question
Earn 20 points
 

Also Known As

CyberArk Privileged Access Security, CyberArk Enterprise Password Vault
OpenIAM, OpenIAM IGA
 

Overview

 

Sample Customers

Rockwell Automation
Citicorp, Deutsche Bank, Morgan Stanley, Marsh and McLennan, SBC Warburg, GE Electric Insurance, Tata Communications, NettBuss, AMSCAN, Time Warner, MultiPlan, Stater Bros., County of Orange - California, TUI Hotels, NV Energy, EMCOR Group, Previred
Find out what your peers are saying about CyberArk, Delinea, One Identity and others in Privileged Access Management (PAM). Updated: August 2025.
867,676 professionals have used our research since 2012.