Try our new research platform with insights from 80,000+ expert users

CyberArk Privileged Access Manager vs Oracle Access Manager comparison

 

Comparison Buyer's Guide

Executive Summary

Review summaries and opinions

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
 

Categories and Ranking

CyberArk Privileged Access ...
Average Rating
8.6
Reviews Sentiment
6.8
Number of Reviews
229
Ranking in other categories
User Activity Monitoring (1st), Enterprise Password Managers (3rd), Privileged Access Management (PAM) (1st), Mainframe Security (2nd), Operational Technology (OT) Security (3rd)
Oracle Access Manager
Average Rating
8.0
Reviews Sentiment
5.4
Number of Reviews
21
Ranking in other categories
Access Management (15th)
 

Featured Reviews

SI
Senior PAM Consultant at iC Consult GmbH
Makes privileged access management easy with automation and granular control
Many people underestimate the value of these tools because they treat them as simple automated password management. Once you realize the volume of passwords in your organization and factor in nonhuman passwords, you realize its value. Last year, CyberArk Impact cited 45 nonhuman passwords for every human password. If you have 10,000 employees, you can imagine the number of passwords. There are also many other operations. For example, you have a Qualys scanner that needs to reach out and touch all your endpoints and scan them for vulnerabilities. They use an API call to CyberArk to pull out a Privileged credential that allows them to log in to that target. This is an automated machine call. It is tapping into CyberArk to get that credential. There can be hundreds of thousands of those operations a day. You do not want to manage those passwords by hand. Some people marginalize the significance of such a solution by saying that it is just a fancy password changer. It goes well beyond that, especially with API calls and automation. Its importance extends beyond merely changing passwords; it involves automation, API calls, and process integration, crucial in agile environments for standing up new Amazon servers or other processes needing privileged credentials. CyberArk can automate these tasks into their build processes. Another critical feature is the proxy service via Privileged Session Manager (PSM), providing not only a proxy between your user and the target servers, protecting against malware but also offering session recording. Many companies I have worked with implemented a PAM product as a knee-jerk reaction to SOX audit requirements. They discovered they needed session recording and retention for regulatory compliance. This has become a major factor for clients instituting CyberArk, so PSM is a big deal in addition to regular password rotation.
SurajShah - PeerSpot reviewer
Consultant at a tech services company with 11-50 employees
Offers strong support and consistent updates improve security features
It is a heavyweight application. The product deployment and installation takes time, and the environment details are complex. ForgeRock is very quick to deploy on Tomcat, but Oracle Access Manager must be deployed on WebLogic, a heavyweight server. You cannot deploy Oracle Access Manager on Tomcat. If an organization has sufficient budget to spend on servers, then it is useful. For organizations that do not want to spend too much money on Oracle Access Manager, maintenance and upgrades take time, whereas with ForgeRock, that is the opposite as fewer resources are required. Being a heavyweight application, it will take more time for deployment and installation compared to ForgeRock or Okta. Okta is cloud-based, so it does not take much time. ForgeRock on-premise only needs deployment on a Tomcat server, making it less complex as it is a lightweight application.

Quotes from Members

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
 

Pros

"We have accomplished our security goals. We have two-factor authenticated and vaulted our important accounts, so people can't just steal stuff from us."
"Their legacy of more than 20 years is very valuable. It brings a lot of stability to the product and a wide variety of integration with the ecosystem. Because of these factors, it has also been very successful in deployment. So, the legacy and integration with other technologies make the PAM platform very stable and strong. In terms of features, most of the other vendors are still focusing just on the privileged access management or session recording, but CyberArk has incorporated artificial intelligence to make PAM a more proactive system. They have implemented threat analytics into this, and there is also a lot of focus on domain controller production, Windows Server protection, and stuff like that. They have also further advanced it with the security on the cloud and DevOps systems. They have a bundle licensing model, which really helps. They don't have a complex licensing model. Even though in our market, people say CyberArk is expensive as compared to some of the other products, but in terms of overall value and as a bundling solution, it is an affordable and highly scalable product."
"I found it valuable that CyberArk Privileged Access Manager can be integrated with PTA (privileged threat analytics), and this means that it will tell you if there's a risk to the logins and signs of risk and if risky behavior is observed. It's a good feature. Another good feature is the CPM (central password manager) because it helps you rotate the passwords automatically without involving the admins. It can go and update the scheduled tasks and the services. At the same time, if there's an application where it cannot do all of these, CPM will trigger an automatic email to the application owners, telling them that they should go ahead and change the password. This allows you to manage the account password that CyberArk cannot manage, which helps mitigate the risk of old passwords, where the password gets compromised, and also allows you to manage the security of the domain."
"The module called PTA, Privileged Threat Analytics, is very useful. When you give access to a user, it monitors and detects if the user's behavior is unusual. After giving access, it continually checks if the user is the same user."
"CyberArk's GUI is user friendly."
"Previously, we used to share passwords for service and normal admin accounts among team members. However, since we started managing it through the product, we've transitioned to individual admin accounts or implemented dual control for shared accounts. With dual control, exclusive checking and checkout options are available, and passwords are not stored in clear text anywhere in the credentials."
"I really like the PTA (Privileged Threat Analytics). I find this the best feature."
"The solution is stable and reliable."
"Excellent SSO solution for Oracle products."
"I find the authentication module, authentication scheme, and security policy most useful in Oracle Access Manager."
"Once it is set up, it is easy to use and it integrates with most of the products on the market."
"Stability-wise, I rate the solution a nine out of ten."
"The product supports customization."
"I would tell others that this solution is reliable. If they are looking for a solution that is reliable and that is scalable, then this is a good one."
"The product was built to be scalable."
"The most important functions of Oracle Access Manager are single sign-on and its integration capability with different applications."
 

Cons

"It needs better documentation with more examples for the configuration files and API/REST integration"
"The authentication port is available in CyberArk Alero but not Fortinet products."
"As a customer, I might need a plugin for a specific product, or an application, and CyberArk might have already worked with some other client on it. There has to be some platform where it is available for everybody else to go and grab it, instead of my having to reinvent the wheel."
"The current process for accessing RDP through the CyberArk or administrative portal involves downloading an RDP file. This is inconvenient for users and problematic due to security restrictions that prevent accessing servers via downloaded RDP files."
"The initial setup was a bit complex."
"It's not a cheap application. It's very expensive."
"Their support can be better. Their SLA timings are higher than others."
"Their post-sale support area requires a big improvement. Customers cannot automate tickets directly with CyberArk. They have to come through the distributor or bring in partners who have access to the support portal. Basically, the support for post-sales implementation is there, but the role of CyberArk is very minimal. Customers have to rely on partners, which sometimes creates issues. Some of the vendors help you during the implementation process, but the CyberArk support team does not do that. They have 24/7 support for our region, but they help only if there is an emergency or there is a problem with their system. If the password vault is down or the system is down, they provide immediate attention. For almost everything else, they take more time to respond. They give low priority to service-related or migration-related questions."
"The performance of Oracle Access Manager could be improved. It should be quick to install, but it wasn't, so this is another area for improvement. The Oracle Access Manager console also has room for improvement because it's slow."
"The technical support is not very good at all."
"Multi-factor authentication requires a lot of processes and technicalities."
"There are problems with stability."
"In the next release, I would like to see improvements made to the interface."
"Installation and deployment take time, but implementation is straightforward and easy, and they have very good support."
"The product is complicated and difficult to install and configure."
"The mobile access to the solution isn't ideal. They should work to improve its functionality."
 

Pricing and Cost Advice

"Although CyberArk Privileged Access Management is expensive, its protection capabilities outweigh the cost."
"The price of CyberArk Privileged Access Manager is expensive. There are no other fees other than the standard licensing fees."
"CyberArk is good at what they do, and the price reflects that. You have to pay the price for the same."
"It's not a cheap application. It's very expensive."
"With reducing the privileged account access, there has been a huge improvement. They are now bringing more accounts on a little at a time."
"CyberArk Privileged Access Manager is perceived to be somewhat overpriced compared to similar market products. It is a little bit overvalued. It could come down a little bit for my liking. However, the industry-leading reputation and the quality of service justify the high price point to some extent."
"The price of this solution is expensive."
"CyberArk is very expensive and there are additional fees for add-ons."
"On a scale where one is a high price, and ten is a low price, I rate the solution a one. Purchasing a license for the solution is very expensive now."
"Can be expensive as a solution."
"The price is really good and it is flexible because they have CPU licenses. The license is a one-time-only purchase."
"The product is a little expensive."
"The tool is affordable."
"I cannot comment on the exact pricing because Oracle has different licensing models for other clients, making it flexible."
report
Use our free recommendation engine to learn which Access Management solutions are best for your needs.
881,082 professionals have used our research since 2012.
 

Top Industries

By visitors reading reviews
Financial Services Firm
15%
Manufacturing Company
10%
Computer Software Company
9%
Government
6%
Financial Services Firm
18%
Government
12%
Manufacturing Company
9%
Computer Software Company
6%
 

Company Size

By reviewers
Large Enterprise
Midsize Enterprise
Small Business
By reviewers
Company SizeCount
Small Business59
Midsize Enterprise40
Large Enterprise173
By reviewers
Company SizeCount
Small Business16
Midsize Enterprise3
Large Enterprise8
 

Questions from the Community

How does Sailpoint IdentityIQ compare with CyberArk PAM?
We evaluated Sailpoint IdentityIQ before ultimately choosing CyberArk. Sailpoint Identity Platform is a solution to manage risks in cloud enterprise environments. It automates and streamlines the m...
What do you like most about CyberArk Privileged Access Manager?
The most valuable features of the solution are control and analytics.
What is your experience regarding pricing and costs for CyberArk Privileged Access Manager?
My thoughts on the pricing of CyberArk Privileged Access Manager depend entirely on the vendors' requirements. If they want their things to be secure, they have to spend accordingly. We have four t...
What is your experience regarding pricing and costs for Oracle Access Manager?
I am currently not exposed to the pricing issue, but I think Oracle Access Manager is more expensive than other products. I have not dealt with the setup cost concern as we have a team responsible ...
What needs improvement with Oracle Access Manager?
For scalability, Oracle Access Manager demonstrates a high level due to high availability and scalability with redundant nodes to load balance across multiple nodes for Oracle Access Manager and Or...
What is your primary use case for Oracle Access Manager?
My main use cases for Oracle Access Manager involve using it as an authentication server integrated with Oracle Internet Directory as LDAP, which contains the user store for authentication. We have...
 

Also Known As

CyberArk Privileged Access Security, CyberArk Enterprise Password Vault
No data available
 

Overview

 

Sample Customers

Rockwell Automation
SekerBank, University of Melbourne
Find out what your peers are saying about CyberArk Privileged Access Manager vs. Oracle Access Manager and other solutions. Updated: December 2025.
881,082 professionals have used our research since 2012.