Try our new research platform with insights from 80,000+ expert users

CyberArk Privileged Access Manager vs WSO2 Identity Server comparison

 

Comparison Buyer's Guide

Executive Summary

Review summaries and opinions

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
 

Categories and Ranking

CyberArk Privileged Access ...
Average Rating
8.6
Reviews Sentiment
6.8
Number of Reviews
227
Ranking in other categories
User Activity Monitoring (1st), Enterprise Password Managers (3rd), Privileged Access Management (PAM) (1st), Mainframe Security (2nd), Operational Technology (OT) Security (3rd)
WSO2 Identity Server
Average Rating
8.2
Reviews Sentiment
7.1
Number of Reviews
11
Ranking in other categories
Customer Identity and Access Management (CIAM) (12th)
 

Mindshare comparison

While both are Identity and Access Management solutions, they serve different purposes. CyberArk Privileged Access Manager is designed for Privileged Access Management (PAM) and holds a mindshare of 15.8%, down 21.4% compared to last year.
WSO2 Identity Server, on the other hand, focuses on Customer Identity and Access Management (CIAM), holds 1.5% mindshare, down 3.5% since last year.
Privileged Access Management (PAM) Market Share Distribution
ProductMarket Share (%)
CyberArk Privileged Access Manager15.8%
WALLIX Bastion7.2%
Delinea Secret Server7.1%
Other69.9%
Privileged Access Management (PAM)
Customer Identity and Access Management (CIAM) Market Share Distribution
ProductMarket Share (%)
WSO2 Identity Server1.5%
Auth019.4%
Ping Identity Platform11.8%
Other67.3%
Customer Identity and Access Management (CIAM)
 

Featured Reviews

Atul-Gujar - PeerSpot reviewer
Secures critical infrastructures with essential user session audit records
A potential area for improvement is enhancing support for cluster environments and distributed Vaults. Clients in multiple countries that need central access have different challenges that require better solutions from CyberArk. For financial services, CyberArk can improve incident response by ensuring fast support for critical priority tickets to meet compliance requirements. Providing more documentation on CyberArk is recommended for new team members to enhance their troubleshooting capabilities. I understand it's up to the client, but 99% fail to change the demo key, so it's crucial for CyberArk to emphasize changing the key and documenting it as part of the installation process.
Ritesh_Shah - PeerSpot reviewer
Utilizing key management and seamless single sign-on integration for enhanced user profile management
WSO2 Identity Server's key management feature stands out as a particularly impactful feature for enhancing security. Additionally, from a user perspective, the self-user portal and user profile management capabilities are highly valuable. It allows users to manage their profiles, change passwords, and offers a self-care portal type of functionality. The single sign-on capability integrates seamlessly with various platforms, including Google, Facebook, LDAP, and Active Directory, which supports rapid product launches.

Quotes from Members

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
 

Pros

"The best feature of CyberArk Privileged Access Manager is its core function: automatically managing and securing credentials."
"The solution helps our developers access internal systems. It also helps us in Privilege Access Management."
"We are maintaining compliance in PCI, SOX and HIPPA, which is a big thing. Auditors really like it, and it has made us stay compliant."
"The session recording and monitoring capabilities are valuable. We have real-time session management ability to record, audit, and monitor any privileged user activities. That is a big deal."
"Identity and access management are fundamental in cybersecurity."
"Overall, I would rate it a ten out of ten."
"All the features of CyberArk are useful for me, but the biggest one is that CyberArk has logs for all the features. That is important when there is a problem. You know where to look and you have the information. In cyber security, the most important aspect is information."
"The tool has safe vaults. We keep our passwords in the Vault. The tool’s recording feature is also valuable for us."
"The solution gets the job done, and we don't have to do the main configuration."
"We use the solution for customer identity management, authenticating customers coming in through a web portal."
"The keystore feature has been most valuable for us."
"The product's initial setup phase is easy."
"It's very easy to implement everything."
"I would rate the solution's stability eight or nine out of ten."
"Comprehensive ecosystem."
"The product provides easy integration between API manager and IT server components."
 

Cons

"In CyberArk Privileged Access Manager, the UI has room for improvement, as does the dashboard reporting, which could be made better or easier to use."
"It could be more user-friendly. Sometimes I encounter issues, and I do not know what the issue is. It takes a lot of time to find the error and fix it. Sometimes it gives an error, but I do not know what the error is. I have to find the documents, but it does not provide all the details needed to fix the error. This is one of the day-to-day issues with CyberArk."
"CyberArk PAM is a very broad product as everyone's requirements for implementation are different. In our particular case, the initial implementation was planned and developed by people who didn't know our specific network requirements, so the initial implementation needed to be tweaked over time. While this is normal, at the time all these "major" changes required CyberArk professional services to come in-plant and "assist" with the changes."
"Their support can be better. Their SLA timings are higher than others."
"Improved user-friendliness, granularity, and functionality would enhance the product further."
"Their post-sale support area requires a big improvement. Customers cannot automate tickets directly with CyberArk. They have to come through the distributor or bring in partners who have access to the support portal. Basically, the support for post-sales implementation is there, but the role of CyberArk is very minimal. Customers have to rely on partners, which sometimes creates issues. Some of the vendors help you during the implementation process, but the CyberArk support team does not do that. They have 24/7 support for our region, but they help only if there is an emergency or there is a problem with their system. If the password vault is down or the system is down, they provide immediate attention. For almost everything else, they take more time to respond. They give low priority to service-related or migration-related questions."
"CyberArk Enterprise Password Vault must incorporate connectors for password and session managers in the marketplace."
"There is some stuff that we still have not fully integrated, which is our AIM solution. We are having all types of issues with it. I have been working with Level 3 support on it, but otherwise, from a functionality perspective, everything has been working except for the AIM solution."
"There needs to be a good support model and easy-to-understand documentation."
"The solution's licensing model could be more flexible, and pricing could be improved."
"I found the initial setup to be very complex."
"Sometimes working with the code is difficult because I search for documentation about the code and how to work with the code, which is where I believe they should improve, by providing some documentation on how to work with the code."
"The high availability architecture has to be improved."
"The solution could improve its development from a user perspective."
"The solution seems to be pretty outdated."
"The price of the product is an area of concern where improvements are required."
 

Pricing and Cost Advice

"CyberArk Enterprise Password Vault is a very expensive product."
"CyberArk is one of the best PAM solutions and one of the most expensive, but it works better than the others, so the pricing is fair."
"Cost efficiency is the number one thing that can be improved in my mind. This would change lots of companies minds on purchasing the product."
"It's an affordable platform."
"The solution is very expensive and requires a license. We pay for an enterprise license."
"It costs us around $200 per user."
"CyberArk Privileged Access Manager is on the expensive side. It is very expensive."
"The pricing for CyberArk is on the higher side compared to other Privileged Access Management products. Something should be done regarding enterprise licensing for long-standing customers."
"WSO2 Identity Server is not an expensive solution."
"I have found the solutions license is priced competitively compared to others."
"They should bring in some good pricing models to host the marketplace."
"At this time we are working with the open-source version."
"We have to take their support, but that is a minimal charge if I'm comparing it to other identity managers."
"I rate the product price an eight out of ten. There is a need to pay more for the extra features provided by the solution."
report
Use our free recommendation engine to learn which Privileged Access Management (PAM) solutions are best for your needs.
870,701 professionals have used our research since 2012.
 

Top Industries

By visitors reading reviews
Financial Services Firm
15%
Computer Software Company
14%
Manufacturing Company
9%
Government
6%
Financial Services Firm
11%
Comms Service Provider
10%
Computer Software Company
10%
Transportation Company
8%
 

Company Size

By reviewers
Large Enterprise
Midsize Enterprise
Small Business
By reviewers
Company SizeCount
Small Business59
Midsize Enterprise41
Large Enterprise171
By reviewers
Company SizeCount
Small Business4
Midsize Enterprise2
Large Enterprise5
 

Questions from the Community

How does Sailpoint IdentityIQ compare with CyberArk PAM?
We evaluated Sailpoint IdentityIQ before ultimately choosing CyberArk. Sailpoint Identity Platform is a solution to manage risks in cloud enterprise environments. It automates and streamlines the m...
What do you like most about CyberArk Privileged Access Manager?
The most valuable features of the solution are control and analytics.
What is your experience regarding pricing and costs for CyberArk Privileged Access Manager?
Regarding costs, CyberArk Privileged Access Manager is not a cheap product; hence, many companies struggle with its high licensing cost. While it's valuable, it comes with a high price tag, making ...
What do you like most about WSO2 Identity Server?
The product provides easy integration between API manager and IT server components.
What is your experience regarding pricing and costs for WSO2 Identity Server?
The pricing is currently the same as the API Manager, so it's not surprising. Since we used it primarily for SSO and the self portal, there were no additional pricing concerns.
What needs improvement with WSO2 Identity Server?
Currently, all required features are supported. If new use cases for artificial intelligence arise, it could be beneficial to incorporate those. However, for our current projects, WSO2 Identity Ser...
 

Also Known As

CyberArk Privileged Access Security, CyberArk Enterprise Password Vault
No data available
 

Overview

 

Sample Customers

Rockwell Automation
Nutanix, ELM, AlmavivA, BDigital, StubHub, M-creations, MedVision360
Find out what your peers are saying about CyberArk Privileged Access Manager vs. WSO2 Identity Server and other solutions. Updated: January 2023.
870,701 professionals have used our research since 2012.