Try our new research platform with insights from 80,000+ expert users

CyberArk Endpoint Privilege Manager vs IBM Tivoli Access Manager [EOL] comparison

 

Comparison Buyer's Guide

Executive Summary

Review summaries and opinions

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
 

Categories and Ranking

CyberArk Endpoint Privilege...
Average Rating
8.2
Reviews Sentiment
6.8
Number of Reviews
38
Ranking in other categories
Endpoint Compliance (5th), Privileged Access Management (PAM) (4th), Anti-Malware Tools (5th), Application Control (3rd), Ransomware Protection (5th)
IBM Tivoli Access Manager [...
Average Rating
8.0
Reviews Sentiment
3.8
Number of Reviews
29
Ranking in other categories
No ranking in other categories
 

Featured Reviews

PH
Manager at a computer software company with 1,001-5,000 employees
MFA boosts protection and has blocking capabilities but dependency on other solutions complicates deployment
The main issues I experience are related to deployment, which requires dependency on other solutions like AD or SCCM. These tools need to be defined and synced with the client or agent and master, sometimes needing manual checks. The agent may have problems syncing, which complicates deployment, especially when users leave the organization, however, agents remain licensed since the server still maintains licenses. Additionally, compared to other endpoint managers like Thycotic, CyberArk Endpoint Privilege Manager lacks recording capabilities, which limits its functionality for critical applications. A feature that records activity, even when bypassing CyberArk Endpoint Privilege Manager, would be beneficial.
it_user711612 - PeerSpot reviewer
Senior Consultant at a insurance company with 1,001-5,000 employees
Reverse proxy provides central control over authentication and authorization.
It is a single product that caters for all the business needs throughout the organization. It provides a seamless integration that in turn encourages most of the applications to use the SSO features Reverse proxy is the most valuable feature as it provides central control over authentication and…

Quotes from Members

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
 

Pros

"The most valuable feature of the solution is its performance."
"The most valuable feature of CyberArk Endpoint Privilege Manager is its scalability."
"We did immediately begin to see results when using CyberArk."
"The most valuable feature of CyberArk Endpoint Privilege Manager is its high performance, it's the best identity security platform. The security is good. It's easy to showcase the feature and capabilities and compare it with other competitors. It competes well with other solutions. Additionally, it is a complete solution."
"The tool is an endpoint management system. It monitors everything a standard user does and helps elevate privileges when necessary for advanced users. It keeps an auditable trail of all activities. Practically, it stops and blocks potentially hazardous user behavior, whether intentional or unintentional. Certain companies must use endpoint management software because of national or international rules or ISO norms."
"CyberArk Endpoint Privilege Manager enhances computer security by providing minimal access, effectively preventing ransomware attacks."
"Our setup process is moving to the cloud, which is very good. It reduces complexity."
"The product is stable."
"Capabilities of advanced security are enhanced to support strong, flexible authentifications and authentications based on risks as well as critical internet vulnerabilities."
"Since its birth it is an unbelievable stable product."
"SAML 2.0."
"The Verify feature: A push method which customers are going for."
"It is a totally secure way of accessing clients through various application portals for more than ten EU countries, just by using single sign-on."
"It is a simple-to-deploy solution, with many features that are supported out-of-the-box without complicated setup."
"Some of the valuable features are: Reverse proxy Protected object space Ease of integration Multiple and robust AuthN and AuthZ mechanisms built-in No single point of failure (SPOF)"
"It provided a secure and robust end to end security solution."
 

Cons

"Without knowledge, you are not able to find some items as they are really hidden within the UI."
"Despite newer versions and functionalities, CyberArk Endpoint Privilege Manager lacks sufficient knowledgeable support staff, resulting in longer wait times for assistance."
"While CyberArk Endpoint Privilege Manager is a great tool, I believe the functionality could be wider. If it could work not only with permissions but also involve pure EDR tasks or User and Entity Behavior Analytics, it would be great."
"The product needs a streamlined user interface; improvements to the user interface can enhance user experience and make the solution more intuitive to navigate."
"A customization option is required for certain policies. For instance, if we need to stop PowerShell scripting, we have to create a different policy for that. Being able to create a sub-level policy within a top-level policy would be good."
"CyberArk Endpoint Privilege Manager can improve its Identity Governance, which is already working effectively yet could continue to enhance its capabilities."
"The price of the solution should improve."
"CyberArk Endpoint Privilege Manager could be improved by simplifying the administration process, specifically when setting up policies and applications."
"Web Portal Manager does not implement the full set of functions found in the command line"
"The initial set-up is a bit complex for a novice as the Linux version of it needs you to be somewhat good with Linux."
"Installation and configuration. If you don’t know the requirements of the supporting components, it could be complicated to install and this has been improved in the later versions that are renamed to IBM Tivoli Security Access Manager."
"What I don’t particularly like is the flow duration."
"The profiling element is incredibly robust, but also equally as complex, it requires an off-site course to be able to understand the context or the plethora of options available."
"This product is also available in the appliance offering which has not yet matured and has many issues."
"The pricing is always costly."
"The TAMeB policy server is not scalable."
 

Pricing and Cost Advice

"CyberArk Endpoint Privilege Manager has a very high price, so it's a one out of ten for me in terms of pricing."
"The tool's pricing is reasonable for customers."
"I rate the solution's pricing an eight out of ten since the price can be too high for smaller businesses."
"The solution requires an annual license to use it. There can be some extra costs in some cases."
"The tool is priced high. I would rate its pricing an eight out of ten."
"The cost for CyberArk is very high."
"It is an expensive solution."
"CyberArk Endpoint Privilege Manager is slightly expensive, but costs can be negotiated to become more competitive."
"The IBM prices are, as ever, extortionate, even with a business partnership, and high levels of discounts."
report
Use our free recommendation engine to learn which Privileged Access Management (PAM) solutions are best for your needs.
884,933 professionals have used our research since 2012.
 

Top Industries

By visitors reading reviews
Financial Services Firm
13%
Manufacturing Company
11%
Computer Software Company
9%
Government
7%
No data available
 

Company Size

By reviewers
Large Enterprise
Midsize Enterprise
Small Business
By reviewers
Company SizeCount
Small Business17
Midsize Enterprise9
Large Enterprise18
By reviewers
Company SizeCount
Small Business9
Midsize Enterprise2
Large Enterprise18
 

Questions from the Community

Looking for recommendations and a pros/cons template for software to detect insider threats
This is an inside-out --- outside-in --- inside-in question, as an insider can be an outsider as well. There is no short answer other than a blend of a PAM tool with Behavioral Analytics and Endpo...
What do you like most about CyberArk Endpoint Privilege Manager?
The most valuable feature of the solution is its performance.
What is your experience regarding pricing and costs for CyberArk Endpoint Privilege Manager?
I believe it's quite a reasonably priced solution. It's not very common to use CyberArk because it's a niche solution, but customers who are willing to control administrative accounts are willing t...
Ask a question
Earn 20 points
 

Also Known As

Viewfinity
Tivoli Access Manager, IBM Security Access Manager
 

Overview

 

Sample Customers

Information Not Available
Essex Technology Group Inc.
Find out what your peers are saying about CyberArk, One Identity, Okta and others in Privileged Access Management (PAM). Updated: March 2026.
884,933 professionals have used our research since 2012.