Try our new research platform with insights from 80,000+ expert users

CyberArk Endpoint Privilege Manager vs IBM Tivoli Access Manager [EOL] comparison

 

Comparison Buyer's Guide

Executive Summary

Review summaries and opinions

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
 

Categories and Ranking

CyberArk Endpoint Privilege...
Average Rating
8.2
Reviews Sentiment
6.8
Number of Reviews
38
Ranking in other categories
Endpoint Compliance (5th), Privileged Access Management (PAM) (4th), Anti-Malware Tools (5th), Application Control (3rd), Ransomware Protection (5th)
IBM Tivoli Access Manager [...
Average Rating
8.0
Reviews Sentiment
3.8
Number of Reviews
29
Ranking in other categories
No ranking in other categories
 

Featured Reviews

PH
Manager at a computer software company with 1,001-5,000 employees
MFA boosts protection and has blocking capabilities but dependency on other solutions complicates deployment
The main issues I experience are related to deployment, which requires dependency on other solutions like AD or SCCM. These tools need to be defined and synced with the client or agent and master, sometimes needing manual checks. The agent may have problems syncing, which complicates deployment, especially when users leave the organization, however, agents remain licensed since the server still maintains licenses. Additionally, compared to other endpoint managers like Thycotic, CyberArk Endpoint Privilege Manager lacks recording capabilities, which limits its functionality for critical applications. A feature that records activity, even when bypassing CyberArk Endpoint Privilege Manager, would be beneficial.
it_user711612 - PeerSpot reviewer
Senior Consultant at a insurance company with 1,001-5,000 employees
Reverse proxy provides central control over authentication and authorization.
It is a single product that caters for all the business needs throughout the organization. It provides a seamless integration that in turn encourages most of the applications to use the SSO features Reverse proxy is the most valuable feature as it provides central control over authentication and…

Quotes from Members

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
 

Pros

"CyberArk Endpoint Privilege Manager is entirely cloud-based, so no further upkeep is required."
"The most valuable features of CyberArk Endpoint Privilege Manager are password management, session management, onboarding rules, platform customization, and safety management."
"This is the number one product for privilege account security."
"The department management aspect of the solution is the most valuable aspect."
"Our setup process is moving to the cloud, which is very good. It reduces complexity."
"CyberArk Endpoint Privilege Manager has had a positive impact on my customers' security posture."
"I have always found that CyberArk is a very tight, foolproof product compared to most other products available."
"The most valuable feature is that it does lifecycle management and that it will change to whatever the end target is."
"The WebSEAL reverse proxy is great for protecting your critical systems."
"Flexibility to connect with different environments and product stability are the best features."
"SAML 2.0."
"It is a simple-to-deploy solution, with many features that are supported out-of-the-box without complicated setup."
"I like the primary function of this product allowing the administration of user/network accounts with a fair amount of ease."
"It has helped them to improve and control web and mobile application security."
"OAuth 2 is now the de facto standard for API protection and scoped authorized delegation. IBM TAM now supports OAuth 2 and can act as fully compliant OAuth 2 authorization server."
"TAM component integration and their SSO capabilities and transparency are the most valuable features I have found."
 

Cons

"The product needs a streamlined user interface; improvements to the user interface can enhance user experience and make the solution more intuitive to navigate."
"The installation process is pretty difficult."
"CyberArk should consider whitelisting important applications like PowerShell and DLL that are currently not allowed due to some malicious content."
"The price of the solution should improve."
"Performance could be better. We have a couple of problems with CyberArk right now. One of the problems is performance in our environment. Support also takes a long time to respond. If the user already has local admin rights, then I can't collect any events in the console from this device. There are also some options in CyberArk that are not working properly, and are not helpful in this case. I can't collect any information to create a proper policy for the device. I have to investigate everything manually, or even disable the local admin from the device. I can collect the events only after this, and it's very time consuming. In my case, it's a waste of resources."
"CyberArk Endpoint Privilege Manager could be improved by simplifying the administration process, specifically when setting up policies and applications."
"Technical support is slow to respond when we run into issues."
"Can be improved by allowing computers to be excluded from policies."
"It was complex for us as we have multiple domains."
"This product is also available in the appliance offering which has not yet matured and has many issues."
"Multi-factor authentication with social integration needs to improve."
"The TAMeB policy server is not scalable."
"Installation and configuration. If you don’t know the requirements of the supporting components, it could be complicated to install and this has been improved in the later versions that are renamed to IBM Tivoli Security Access Manager."
"Initial setup was complicated because TAM was implemented as a part of the IDM solution."
"Sometimes, there are long running support tickets (for 6-8 months) and that is unacceptable from the customer's point of view."
"Web Portal Manager does not implement the full set of functions found in the command line"
 

Pricing and Cost Advice

"I rate the solution's pricing an eight out of ten since the price can be too high for smaller businesses."
"The product's license is easy to procure."
"CyberArk Endpoint Privilege Manager is slightly expensive, but costs can be negotiated to become more competitive."
"It's not at the lower end of the market. I think the price is reasonable considering the quality it delivers. It is a top-notch solution at a fair price point."
"I think that it was in the range of $200,000 that had to get approved."
"Although I do not deal directly with the pricing, CyberArk Endpoint Privilege Manager is costly compared to other solutions. However, it offers beneficial features."
"We pay about $17 per user."
"The solution's pricing is reasonable compared to other vendors' products."
"The IBM prices are, as ever, extortionate, even with a business partnership, and high levels of discounts."
report
Use our free recommendation engine to learn which Privileged Access Management (PAM) solutions are best for your needs.
884,933 professionals have used our research since 2012.
 

Top Industries

By visitors reading reviews
Financial Services Firm
13%
Manufacturing Company
11%
Computer Software Company
9%
Government
7%
No data available
 

Company Size

By reviewers
Large Enterprise
Midsize Enterprise
Small Business
By reviewers
Company SizeCount
Small Business17
Midsize Enterprise9
Large Enterprise18
By reviewers
Company SizeCount
Small Business9
Midsize Enterprise2
Large Enterprise18
 

Questions from the Community

Looking for recommendations and a pros/cons template for software to detect insider threats
This is an inside-out --- outside-in --- inside-in question, as an insider can be an outsider as well. There is no short answer other than a blend of a PAM tool with Behavioral Analytics and Endpo...
What do you like most about CyberArk Endpoint Privilege Manager?
The most valuable feature of the solution is its performance.
What is your experience regarding pricing and costs for CyberArk Endpoint Privilege Manager?
I believe it's quite a reasonably priced solution. It's not very common to use CyberArk because it's a niche solution, but customers who are willing to control administrative accounts are willing t...
Ask a question
Earn 20 points
 

Also Known As

Viewfinity
Tivoli Access Manager, IBM Security Access Manager
 

Overview

 

Sample Customers

Information Not Available
Essex Technology Group Inc.
Find out what your peers are saying about CyberArk, One Identity, Okta and others in Privileged Access Management (PAM). Updated: March 2026.
884,933 professionals have used our research since 2012.