We performed a comparison between CyberArk Privileged Access Manager and VMware Identity Manager based on real PeerSpot user reviews.
Find out what your peers are saying about CyberArk, Delinea, BeyondTrust and others in Privileged Access Management (PAM)."Creating policies and the password rotation feature have been valuable. We don't have to memorize our password for the ADM account."
"Lessens the risk with privileged access."
"The most valuable feature of CyberArk Privileged Access Manager is the vault. I am satisfied with the interface and the documentation."
"The most valuable feature of CyberArk Privileged Access Manager is privileged threat analytics."
"The automatic password management is the most important feature. The second most important feature is the ability to enforce dual control on the release of those passwords. The combination of these two features is the most important thing for us because we can show that we're in control of who uses any non-personal account, and when they do so."
"The users have the ability to rotate passwords on a daily basis with a Reconcile Account. Or, if they want to do one-time password checkouts, we can manage those, check in, check out. I like the flexibility of the changing of the password, specifically."
"All of the features of CyberArk Privileged Access Manager are valuable."
"It takes people out of the machine work of ensuring credentials remain up-to-date, and handles connection brokering such that human usage and credential management remain independent."
"The solution was easy to deploy."
"The most valuable features in VMware Identity Manager for me are the control groups and rules."
"Its value is when you use it with a Workspace ONE UEM solution as it is part of the ecosystem for VMware Workspace ONE."
"Zero Trust implementation is a great feature."
"The solution is stable."
"When we publish the applications, getting the credentials to log in and keep the application up or running is easy."
"The most valuable feature is single sign-on."
"It helps the end users to work on the road without needing to set up all kinds of VPN connections"
"The web access piece needs improvement. We have version 9.5 or 9.9.5, and now we have to upgrade to version 10."
"The product documentation has to be more precise in certain aspects with explanations for functionality limitations along with reference material or screenshots."
"It should be easy to use for non-technical people. Its interface can be a bit difficult. Some parts of its interface are not very intuitive. Some of the controls are hidden, and instead of having a screen with all the controls for that account on it, you have to use menus and other similar things."
"The turnaround time for technical support is lengthy."
"When something comes out, it's generally airtight and works as advertised. However, sometimes they are a little bit slow to keep up with what's coming out. In 2017, for example, they released support for Windows Server 2016, which had been out for a year or so."
"CyberArk has to continue to evolve with that threat landscape to make sure that they're still protecting those credentials that are owned by those that have privileged accounts in the firms."
"I think having a distributed architecture would certainly help this solution."
"The initial setup was a bit complex."
"There are a lot of difficulties whenever people have a lot of configurations in it, basically related to security certificate configurations and integration with VMware Horizon."
"Many of the features that exist in Active Directory do not exist in Identity Manager, which means that people depend on Active Directory."
"The security features could always use improvement, although there has already been a huge improvement from years ago."
"it's very dependent on an active directory"
"The mobile SSO doesn't work as well on Android."
"vIDM could be improved with the multi-tenant capabilities that VMware tends to offer—features like customization branding and the integration of the app catalog based on the branding. Since the integration has been at top-level OGs, you were not able to then do rebranding if you were required to use specific user groups to highlight specific applications. At the time, I was personally opening feature requests for these things. I haven't worked with the latest release, so I don't know if these features were already deployed or not."
"The license could be better."
"I would like to have better support for multi-cloud sessions."
More CyberArk Privileged Access Manager Pricing and Cost Advice →
CyberArk Privileged Access Manager is ranked 1st in Privileged Access Management (PAM) with 142 reviews while VMware Identity Manager is ranked 15th in Identity and Access Management as a Service (IDaaS) (IAMaaS) with 12 reviews. CyberArk Privileged Access Manager is rated 8.8, while VMware Identity Manager is rated 7.6. The top reviewer of CyberArk Privileged Access Manager writes "Lets you ensure relevant, compliant access in good time and with an audit trail, yet lacks clarity on MITRE ATT&CK". On the other hand, the top reviewer of VMware Identity Manager writes "A tool that needs to improve scalability but is useful to manage user". CyberArk Privileged Access Manager is most compared with Cisco ISE (Identity Services Engine), Microsoft Entra ID, Delinea Secret Server, WALLIX Bastion and One Identity Safeguard, whereas VMware Identity Manager is most compared with Microsoft Entra ID, Cisco ISE (Identity Services Engine), Fortinet FortiAuthenticator, SailPoint IdentityIQ and Okta Workforce Identity.
We monitor all Privileged Access Management (PAM) reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.