CyberArk Privileged Access Manager vs WSO2 Identity Server comparison

 

Comparison Buyer's Guide

Executive Summary
 

Categories and Ranking

CyberArk Privileged Access ...
Average Rating
8.8
Number of Reviews
144
Ranking in other categories
User Activity Monitoring (1st), Privileged Access Management (PAM) (1st)
WSO2 Identity Server
Average Rating
8.2
Number of Reviews
9
Ranking in other categories
Customer Identity and Access Management (CIAM) (7th)
 

Mindshare comparison

As of July 2024, in the Privileged Access Management (PAM) category, the mindshare of CyberArk Privileged Access Manager is 19.5%, down from 23.1% compared to the previous year. The mindshare of WSO2 Identity Server is 0.9%, up from 0.5% compared to the previous year. It is calculated based on PeerSpot user engagement data.
Privileged Access Management (PAM)
Unique Categories:
User Activity Monitoring
15.0%
Customer Identity and Access Management (CIAM)
6.5%
 

Featured Reviews

RD
Aug 23, 2022
The Privileged Session Manager Proxy makes it extremely convenient for UNIX Administrators to utilize their favorite SSH client software
We use this solution for privileged systems access with a high emphasis on security. End users are required to go through a process of being vetted in our NERC environment in order to use the solution. This product has been used by my company for about five years now This product has placed a new…
Clement Hsieh - PeerSpot reviewer
Jun 11, 2024
Supports API integrations with different systems
My company uses multi-factor authentication and we tried using it integrating with FIDO Server. It was done to make sure that the multi-factor authentication feature gets used during the authentication process. AI can be used for better authentication, but right now, our company has not used any such feature. I recommend the product to others. It is easy to install and easy to use. Understanding a feature before you integrate a tool with other tools is important. In my company, there is another team with five to six engineers that takes care of the support part of the tool. The product has helped me to meet my security management requirements as per ISO 7001. I rate the tool a nine out of ten.

Quotes from Members

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
 

Pros

"The regulation of accounts is by far the most needed and valuable part of the application."
"It is useful for protecting passwords. If you need to do access security management, you can first use the CyberArk console, and after that, you can connect the firewall interface or firewall command line. Similarly, if you need to do an RDP session, you need to first log in to CyberArk before connecting to the Windows RDP session. This way, the admin doesn't know the password, and that password is changed immediately. To change the password, you first discover the old password in the network, and after that, you can change the password."
"CyberArk has the ability to change the credentials on every platform."
"It enables us to secure accounts and make sure they are compliant."
"There are no issues with scalability. Our clients are very happy to use the product."
"The product is for hardening access and making the organization more secure, therefore reducing chances of a breach."
"It has helped from an auditing perspective identify who has access to privileged accounts."
"I'm no longer the product owner for PAM, but I can say that the most useful feature is the vault functionality, which keeps all your passwords secure in a digital vault."
"The product's initial setup phase is easy."
"Comprehensive ecosystem."
"The solution gets the job done, and we don't have to do the main configuration."
"I would rate the solution's stability eight or nine out of ten."
"It's very easy to implement everything."
"The keystore feature has been most valuable for us."
"Some of the valuable features of the solution are the easy integration with processes, such as Single Sign-On. Overall WSO2 is straightforward and does not need customization."
"The single sign-on procedure itself, as well as the ability to connect to external user sources such as Microsoft Active Directory and LDAP servers, are the solution's most valuable features."
 

Cons

"There is room for improvement in the availability of custom connectors on the marketplace for this solution. Additionally, their services for the CICD pipeline and ease of integration could be improved."
"The issue of technical support is crucial, as there are not many specialized partners available in Brazil to provide this service. While English language support is of good quality, there is a significant shortage of partners capable of meeting the demand locally."
"Some aspects of the administration need improvement, though they have recently made improvements to the API. However, the management with the interface and configuration are not so user-friendly. It has not changed much during all the years that CyberArk has been on the market. The management part, like platform management as well as PSM connectors definition and management, could be improved, even if it has already been done with the API."
"What could be improved in CyberArk Privileged Access Manager is the licensing model. It should be more flexible in terms of the users. Currently, it's based on the number of users, but many users only log in once in four months or once in five months. It would be great if the licensing model could be modified based on user needs. We even have users who have not logged in even once."
"One thing that could be improved is to create of a better alternative for fixing group policy fees. We currently use Microsoft, but they have introduced new policies that may not be compatible."
"New functionalities and discovered bugs take longer to patch. We would greatly appreciate quicker development of security patches and bug corrections."
"When I was a component owner for PAM's Privileged Threat Analytics (PTA) component, what I wanted was a clear mapping to the MITRE ATT&CK framework, a framework which has a comprehensive list of use cases. We reached out to the vendor and asked them how much coverage they have of the uses cases found on MITRE, which would have given us a better view of things while I was the product owner. Unfortunately they did not have the capability of mapping onto MITRE's framework at that time."
"The initial setup of CyberArk is a challenge if you do not have prior experience with it."
"This solution does not have BPM workflows already integrated, we had to integrate the BPM module externally. They do not provide full-featured auditing and certification modules out of the box."
"The solution seems to be pretty outdated."
"The price of the product is an area of concern where improvements are required."
"There needs to be a good support model and easy-to-understand documentation."
"I found the initial setup to be very complex."
"The solution could improve its development from a user perspective."
"Sometimes working with the code is difficult because I search for documentation about the code and how to work with the code, which is where I believe they should improve, by providing some documentation on how to work with the code."
"The high availability architecture has to be improved."
 

Pricing and Cost Advice

"It can be an expensive product."
"The solution is very expensive and requires a license. We pay for an enterprise license."
"The price of CyberArk Privileged Access Manager could be less expensive."
"With reducing the privileged account access, there has been a huge improvement. They are now bringing more accounts on a little at a time."
"It is not a cheap solution. It is expensive as compared with other solutions. However, it is one of the best solutions in their domain."
"The price of this solution is quite reasonable."
"The main problem for the tool is its licensing. I work for a really big company. When you try to develop this as a service, usually you work with leverage teams who are formed with dozens of members. You might dedicate one FTE, or less, for something, e.g., an antivirus administrator. You might have half an FTE's effort dedicated to administering the antivirus, but then you have a team of about 30 users who might access that ticket. The problem is that CyberArk eliminated the possibility of concurrent users years ago. This is a big problem for companies who work with leverage teams. You need to pay for everyone. 40 licenses are used by 20 or 30 people. This is a big problem because licenses are not precisely cheap."
"I would rate CyberArk's pricing a nine out of ten, with one being cheap and ten being expensive. It's one of the most expensive solutions in the market, but it's worth it."
"At this time we are working with the open-source version."
"I have found the solutions license is priced competitively compared to others."
"I rate the product price an eight out of ten. There is a need to pay more for the extra features provided by the solution."
"WSO2 Identity Server is not an expensive solution."
"They should bring in some good pricing models to host the marketplace."
"We have to take their support, but that is a minimal charge if I'm comparing it to other identity managers."
report
Use our free recommendation engine to learn which Privileged Access Management (PAM) solutions are best for your needs.
792,098 professionals have used our research since 2012.
 

Top Industries

By visitors reading reviews
Educational Organization
32%
Computer Software Company
12%
Financial Services Firm
11%
Manufacturing Company
5%
Computer Software Company
17%
Financial Services Firm
14%
Government
9%
Comms Service Provider
5%
 

Company Size

By reviewers
Large Enterprise
Midsize Enterprise
Small Business
 

Questions from the Community

How does Sailpoint IdentityIQ compare with CyberArk PAM?
We evaluated Sailpoint IdentityIQ before ultimately choosing CyberArk. Sailpoint Identity Platform is a solution to manage risks in cloud enterprise environments. It automates and streamlines the m...
What do you like most about CyberArk Privileged Access Manager?
The most valuable features of the solution are control and analytics.
What is your experience regarding pricing and costs for CyberArk Privileged Access Manager?
CyberArk Privileged Access Manager comes at a high cost. But the solution is worth its price.
What do you like most about WSO2 Identity Server?
The product provides easy integration between API manager and IT server components.
What is your experience regarding pricing and costs for WSO2 Identity Server?
I rate the product price an eight out of ten. There is a need to pay more for the extra features provided by the solution.
What needs improvement with WSO2 Identity Server?
The price of the product is an area of concern where improvements are required. From an improvement perspective, the pricing of the product needs to be lowered. Multi-factor authentication is an ar...
 

Also Known As

CyberArk Privileged Access Security
No data available
 

Learn More

 

Overview

 

Sample Customers

Rockwell Automation
Nutanix, ELM, AlmavivA, BDigital, StubHub, M-creations, MedVision360
Find out what your peers are saying about CyberArk Privileged Access Manager vs. WSO2 Identity Server and other solutions. Updated: January 2023.
792,098 professionals have used our research since 2012.