Try our new research platform with insights from 80,000+ expert users

CyberArk Privileged Access Manager vs OpenText Identity Manager comparison

 

Comparison Buyer's Guide

Executive Summary

Review summaries and opinions

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
 

Categories and Ranking

CyberArk Privileged Access ...
Average Rating
8.6
Reviews Sentiment
6.8
Number of Reviews
229
Ranking in other categories
User Activity Monitoring (1st), Enterprise Password Managers (3rd), Privileged Access Management (PAM) (1st), Mainframe Security (2nd), Operational Technology (OT) Security (3rd)
OpenText Identity Manager
Average Rating
8.0
Reviews Sentiment
6.9
Number of Reviews
18
Ranking in other categories
User Provisioning Software (9th), Identity Management (IM) (17th)
 

Mindshare comparison

While both are Identity and Access Management solutions, they serve different purposes. CyberArk Privileged Access Manager is designed for Privileged Access Management (PAM) and holds a mindshare of 12.8%, down 20.5% compared to last year.
OpenText Identity Manager, on the other hand, focuses on User Provisioning Software, holds 3.2% mindshare, down 3.4% since last year.
Privileged Access Management (PAM) Market Share Distribution
ProductMarket Share (%)
CyberArk Privileged Access Manager12.8%
WALLIX Bastion5.9%
Delinea Secret Server5.7%
Other75.6%
Privileged Access Management (PAM)
User Provisioning Software Market Share Distribution
ProductMarket Share (%)
OpenText Identity Manager3.2%
SailPoint Identity Security Cloud26.8%
Saviynt12.5%
Other57.5%
User Provisioning Software
 

Featured Reviews

SI
Senior PAM Consultant at iC Consult GmbH
Makes privileged access management easy with automation and granular control
Many people underestimate the value of these tools because they treat them as simple automated password management. Once you realize the volume of passwords in your organization and factor in nonhuman passwords, you realize its value. Last year, CyberArk Impact cited 45 nonhuman passwords for every human password. If you have 10,000 employees, you can imagine the number of passwords. There are also many other operations. For example, you have a Qualys scanner that needs to reach out and touch all your endpoints and scan them for vulnerabilities. They use an API call to CyberArk to pull out a Privileged credential that allows them to log in to that target. This is an automated machine call. It is tapping into CyberArk to get that credential. There can be hundreds of thousands of those operations a day. You do not want to manage those passwords by hand. Some people marginalize the significance of such a solution by saying that it is just a fancy password changer. It goes well beyond that, especially with API calls and automation. Its importance extends beyond merely changing passwords; it involves automation, API calls, and process integration, crucial in agile environments for standing up new Amazon servers or other processes needing privileged credentials. CyberArk can automate these tasks into their build processes. Another critical feature is the proxy service via Privileged Session Manager (PSM), providing not only a proxy between your user and the target servers, protecting against malware but also offering session recording. Many companies I have worked with implemented a PAM product as a knee-jerk reaction to SOX audit requirements. They discovered they needed session recording and retention for regulatory compliance. This has become a major factor for clients instituting CyberArk, so PSM is a big deal in addition to regular password rotation.
reviewer2401464 - PeerSpot reviewer
Architect at a consultancy with 51-200 employees
Updates systems quickly and does not have a limit on the number of users
NetIQ does not have a limit on the number of users. The tool is secure by nature. It can have more than one billion users. Event-based systems know what has to be changed. SQL-based systems can only change using time and date. Event-based systems provide immediate results, while SQL-based systems need time to sync. It is totally different from a security perspective. Event-based systems can update all the systems in seconds or minutes. Other systems do it within 24 hours. The basic event-based system is AI-driven. It has some kind of robotics and programming. Other tools need programming. I like systems that have prebuilt ideas of security. NetIQ has been in the market for a long period. It has all the systems and connectors. There is not much coding. We just need to configure the products. We need not do any programming. I haven't seen any other product that needs only configuration to do the job. Most products in the market are SQL-based. They need programming. Some service providers who sell other products to customers do not sell NetIQ because they can make more money by selling solutions that need more consultancy and programming. More hours lead to more money.

Quotes from Members

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
 

Pros

"It is a central repository. Therefore, if someone needs to access a server, then they go through CyberArk PAM. It provides a secure way to do this and CyberArk PAM records everything. For example, if you are connecting to a Linux server, then once you get into the Linux server and if it is integrated with CyberArk, it will automatically start recording everything that is being done. In most banks, seeing the recordings is very useful. If there are any gaps or something has happened which shouldn't have happened, then we can check the logs and videos. So, it gives security, in a robust manner, to the organization."
"Service count rotation is probably one of my favorite features... The ability to automatically rotate any password I need to really helps with the entire enterprise strategy that we're pushing right now."
"It enables companies to automate password management on target systems gaining a more secure access management approach."
"CyberArk Privileged Access Manager provides granularity. You can break things down into individual safes. You have specific access to safes by individual or group. The interface is with AD, with LDAP, or with local CyberArk passwords. You also have the ability to establish policies for your individual credentials."
"You can write different types of policies for custom business needs or any developer needs. If they need certain functions allocated, they can be customized easily."
"It is very simple to use."
"It is a leading solution and one of the best SaaS solutions in the market."
"CyberArk Privileged Access Manager has positively impacted my organization, showing significant improvement since all sessions are monitored and isolated using isolated RDP sessions, which are created temporarily and expire if not used."
"The most valuable features are Password Reset Alerts, Password Sync, and SQL connectors."
"NetIQ does not have a limit on the number of users."
"The access request management has improved significantly in terms of its user interface. What sets it apart from competitors like SailPoint is that it's an event-based solution rather than schedule-based. That's a key differentiator."
"The product is easy to use."
"The most valuable feature of this solution has been the ability for us to integrate a lot of external systems, and the automatic transfer of a lot of identity information. Additionally, the customization is very good."
"The most valuable feature of NetIQ Identity Manager for identity synchronization is the ability to provide users with all necessary access on day one through automated provisioning, facilitated by approval workflows."
"The most valuable features of NetIQ Identity Manager are the synchronization of different directories, such as Active Directory. We have many Active Directory systems, not only one."
"I like the eDirectory feature."
 

Cons

"I sometimes require learning resources when there is a new solution for CyberArk."
"My concern and area for improvement revolves around reporting."
"Currently, in Secure Connect, an end user is required to enter account information manually, and cannot save any of this information for future use."
"It should be easy to use for non-technical people. Its interface can be a bit difficult. Some parts of its interface are not very intuitive. Some of the controls are hidden, and instead of having a screen with all the controls for that account on it, you have to use menus and other similar things."
"We'd like to see the creation of some kind of memo field for each device account, which could be used, in our network at least, to leave a note about the device for either the security or network engineering team members."
"Overall what I would really love to see is the third-party PAS reporter tool pulled more into the overall solution, ideally as its own deployable component service installation package."
"I'm not a fan of technical support with CyberArk. It's like jumping through red tape and hoops. Quite frankly, it's almost like when you call CyberArk you get the Help Desk or the level-one. I'm a level-one. I got the CCD, I know how to do the initial troubleshooting. When I call CyberArk it's because I can't figure the problem out. So I need a level-two, three, four. I don't need you to tell me, "Hey, open a ticket and then give me logs.""
"We found a lot of errors during the initial setup. They should work to improve the implementation experience and to remove errors from the process."
"The integrations must be made easier."
"If it could be operated in such a way that anybody could use it, with just the user interface, and there's no need for programming, then that would be a great improvement."
"The solution architecture is somewhat complex. For some components, the necessary resilience is not inherent."
"There's no huge thing missing, because it's already comprehensive. Now and then, however, there might be a minor issue."
"Areas for improvement are further enhancing the access granting process to reduce time and improve accuracy."
"NetIQ Identity Manager could improve by updating the user portal, it is out of date."
"It needs some modern features. They should improve and modernize their management interface. It has been created over years and by different persons. You can see different applications, different management consoles for different things. There should be an integrated interface."
"We have another system that is using the SAML system, and we also integrate with Active Directory only. If NetIQ Identity Manager can integrate directly, we would not need to use the Active Directory directory."
 

Pricing and Cost Advice

"CyberArk DNA is free if you purchase the CyberArk solution. There is no additional charge for CyberArk DNA, which is great."
"The license CyberArk Privileged Access Manager is on an annual basis."
"This product is very expensive."
"Payments have to be made on a yearly basis toward the licensing costs of the solution."
"This solution is expensive."
"The main problem for the tool is its licensing. I work for a really big company. When you try to develop this as a service, usually you work with leverage teams who are formed with dozens of members. You might dedicate one FTE, or less, for something, e.g., an antivirus administrator. You might have half an FTE's effort dedicated to administering the antivirus, but then you have a team of about 30 users who might access that ticket. The problem is that CyberArk eliminated the possibility of concurrent users years ago. This is a big problem for companies who work with leverage teams. You need to pay for everyone. 40 licenses are used by 20 or 30 people. This is a big problem because licenses are not precisely cheap."
"The pricing is slightly higher compared to other solutions, but it is reasonable because there are better security features."
"In comparison to other products on the market, CyberArk is a more costly product."
"Micro Focus is flexible when it comes to price. The cost varies from customer to customer. There are no additional costs, though. Everything is included."
"You just need to be aware that the more systems you connect, the more license fees you have to pay."
"I would rate the pricing a two out of ten, with one being low price and ten being high price. It is significantly more cost-effective than the major players in the market."
"The price of the solution is a bit high and could be reduced."
"It would easily help them in getting more market and more customers if more consultants knew about their software. If they could keep it free for schools for teaching purposes, it would be good. I had to pay myself to get it and use it for training. Their competitors are giving it for free. I had to pay for it myself. They are losing market to their competitors."
"The solution is quite affordable."
report
Use our free recommendation engine to learn which Privileged Access Management (PAM) solutions are best for your needs.
879,259 professionals have used our research since 2012.
 

Top Industries

By visitors reading reviews
Financial Services Firm
15%
Computer Software Company
11%
Manufacturing Company
10%
Government
6%
Computer Software Company
9%
Manufacturing Company
9%
Financial Services Firm
7%
Government
7%
 

Company Size

By reviewers
Large Enterprise
Midsize Enterprise
Small Business
By reviewers
Company SizeCount
Small Business59
Midsize Enterprise40
Large Enterprise173
By reviewers
Company SizeCount
Small Business9
Midsize Enterprise4
Large Enterprise6
 

Questions from the Community

How does Sailpoint IdentityIQ compare with CyberArk PAM?
We evaluated Sailpoint IdentityIQ before ultimately choosing CyberArk. Sailpoint Identity Platform is a solution to manage risks in cloud enterprise environments. It automates and streamlines the m...
What do you like most about CyberArk Privileged Access Manager?
The most valuable features of the solution are control and analytics.
What is your experience regarding pricing and costs for CyberArk Privileged Access Manager?
My thoughts on the pricing of CyberArk Privileged Access Manager depend entirely on the vendors' requirements. If they want their things to be secure, they have to spend accordingly. We have four t...
What do you like most about NetIQ Identity Manager?
The most valuable feature of NetIQ Identity Manager for identity synchronization is the ability to provide users with all necessary access on day one through automated provisioning, facilitated by ...
What is your experience regarding pricing and costs for NetIQ Identity Manager?
The pricing depends on whether we buy the solution as a service or a license. The license is expensive. If we buy it as a service for a large number of users, it is the cheapest tool we can get. Th...
What needs improvement with NetIQ Identity Manager?
The tool is used mostly in big systems to understand what is happening. There are not many technicians who know how to use the product. The vendor must provide an easier console for configuring thi...
 

Also Known As

CyberArk Privileged Access Security, CyberArk Enterprise Password Vault
Novell Identity Manager
 

Overview

 

Sample Customers

Rockwell Automation
Sheetz
Find out what your peers are saying about CyberArk, Delinea, Okta and others in Privileged Access Management (PAM). Updated: December 2025.
879,259 professionals have used our research since 2012.