Try our new research platform with insights from 80,000+ expert users

CyberArk Identity vs CyberArk Privileged Access Manager comparison

 

Comparison Buyer's Guide

Executive SummaryUpdated on Dec 16, 2024

Review summaries and opinions

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
 

ROI

Sentiment score
5.0
Many users find CyberArk Identity valuable for saving time, enhancing security, fostering efficiency, and yielding beneficial returns.
Sentiment score
6.6
Organizations gain enhanced security, compliance, and cost savings with CyberArk, improving efficiency, user adoption, and risk reduction.
I have seen over 30% return on investment due to the improvement in operational efficiencies through automation, which enhances productivity.
Private Wealth Advisor at Arima Fund Limited
The return on investment lies in improved security infrastructure, addressing over-privileged access, and reducing the risk of credential compromise, which is a major source of data breaches.
Cyber Security Engineer at Isolutions Associates Ltd (ISOLS)
The end users have the authority to reconcile the password or verify it before using session isolation, which is one of the unique features that can be enabled through Privileged Session Manager, preventing any attacks from happening within the organization when connected with sessions through CyberArk Privileged Access Manager.
Senior Engineer at a tech vendor with 1,001-5,000 employees
CyberArk Privileged Access Manager has helped customers save on costs primarily by reducing the number of engineering and information security personnel.
Head of Sales Services Department at a comms service provider with 51-200 employees
 

Customer Service

Sentiment score
6.4
CyberArk Identity's customer service is generally effective but faces criticism for response delays and expertise inconsistencies.
Sentiment score
6.5
CyberArk's support receives mixed reviews, praised for expertise but criticized for delays, especially at Tier One, yet committed to improvement.
They resolved the problem immediately after I reported it, on the same day, within one hour.
Access Management Analyst at Telefónica
They respond immediately when requests are raised, and they are always available for priority one tickets.
Lead Identity Engineer at a tech vendor with 501-1,000 employees
I received prompt responses and support, which I would rate as very good.
Cybersecurity Delivery Analyst at Accenture
CyberArk has been exceptional in coming back to us with immediate responses.
IT Cyber Security Lead at a mining and metals company with 1,001-5,000 employees
It could be forever until you talk to someone who knows what they are doing.
Senior PAM Consultant at iC Consult GmbH
Based on the issue resolution and support quality, I rate the support 10 out of 10.
Operation Specialists at a tech vendor with 10,001+ employees
 

Scalability Issues

Sentiment score
7.4
CyberArk Identity is praised for its scalability, accommodating diverse company sizes and ease of license expansion.
Sentiment score
7.6
CyberArk Privileged Access Manager scales efficiently for diverse needs, with flexible deployment options and positive user feedback on growth adaptability.
We can use it on different phones and computers, demonstrating its scalability.
Program associate at IMAGINE HER
When delving deep into the concepts, there is a lot to address and learn, especially when facing real-time scenarios.
Cybersecurity Delivery Analyst at Accenture
You can scale it out pretty easily, and you can implement it very small.
Cloud Specialist at Perini Beheer
The CPM can reportedly handle up to 50,000 accounts independently without issue.
Privileged Access Management Engineer at a hospitality company with 10,001+ employees
I would rate it a ten out of ten for scalability.
IT Cyber Security Lead at a mining and metals company with 1,001-5,000 employees
They had 40,000 passwords in this one safe, and it was saving the last ten iterations of each password object. That means they had 400,000 password objects in this safe. They exceeded the limit.
Senior PAM Consultant at iC Consult GmbH
 

Stability Issues

Sentiment score
8.0
CyberArk Identity is highly praised for its reliable stability, quick issue resolution, and effective performance, despite network connectivity challenges.
Sentiment score
7.7
CyberArk Privileged Access Manager is praised for its robust stability and high availability, with minor issues noted under heavy load.
We no longer have our data infiltrated by unauthorized persons, and tracking actions within the system has become very easy.
Private Wealth Advisor at Arima Fund Limited
When you have it in the cloud, you have CyberArk every time you need it.
Access Management Analyst at Telefónica
With a stable network, due to the redundant data centers across the globe, it is a lot easier to use as a SaaS solution.
Senior Cyber Security Specialist Architect at a tech consulting company with 11-50 employees
Proper fine-tuning and expertise ensure the product performs well.
Cybersecurity Specialist at a comms service provider with 5,001-10,000 employees
Overall, the stability of the solution is high.
Senior Cybersecurity Manager at a financial services firm with 10,001+ employees
It has a large customer base and positive feedback within my network.
Senior Manager at a energy/utilities company with 1,001-5,000 employees
 

Room For Improvement

CyberArk Identity requires user interface improvements, better integration, enhanced documentation, and easier deployment for improved adoption and operations.
CyberArk Privileged Access Manager needs UI, integration, documentation, performance, complexity improvements, better plugins, licensing, reporting, and support.
It would be helpful if they released a generalized document for processes such as migration.
Cybersecurity Delivery Analyst at Accenture
Integration or deployment is extremely difficult for CyberArk Identity.
Head of IT at Skutin Solutions
There's a need to enhance network performance.
Senior Technology Manager at a outsourcing company with 501-1,000 employees
They want everything to be on the cloud, but even in the SaaS version of CyberArk Privileged Access Manager, they need to deploy some servers on-premises.
Presales Engineer at a computer software company with 201-500 employees
We cannot generate a plug-in for web-based applications.
Contractor at a pharma/biotech company with 5,001-10,000 employees
If they want clients to move to the cloud, they need to support them in real-time.
Senior Manager at a consultancy with 11-50 employees
 

Setup Cost

CyberArk Identity pricing is high but justified for enterprises with discounts and flexible licensing to balance costs.
CyberArk Privileged Access Manager is costly but offers robust features and security, providing value despite higher pricing.
Regarding pricing, it can be quite a lot for small companies.
Access Management Analyst at Telefónica
The pricing is acceptable.
Program associate at IMAGINE HER
If I am not going fully cloud, there are additional resources I will need to purchase, such as spinning more VMs or acquiring an HSM device to encrypt the vault.
Head of IT at Skutin Solutions
CyberArk is expensive compared to other products I know.
Cybersecurity Specialist at a comms service provider with 5,001-10,000 employees
CyberArk is comparatively expensive compared to other PAM solutions, such as Delinea, especially during renewal.
Presales Engineer at a computer software company with 201-500 employees
CyberArk's SaaS solution is particularly expensive.
Senior Manager at a energy/utilities company with 1,001-5,000 employees
 

Valuable Features

CyberArk Identity enhances security and efficiency through integrations, password management, user monitoring, and comprehensive compliance and risk analysis tools.
CyberArk Privileged Access Manager offers password management, session monitoring, and threat analytics to enhance security and compliance.
It impacts zero trust security strategies. It prevents lateral movements in the organization.
Head of IT at Skutin Solutions
The two-factor authentication is very important, but the fact that every account is being regenerated every time we use it is the most important security feature for us.
Cloud Specialist at Perini Beheer
It is the most powerful access management system.
Access Management Analyst at Telefónica
CyberArk Privileged Access Manager helps ensure data privacy because we now know who is using which credentials and at what time.
Senior Cybersecurity Manager at a financial services firm with 10,001+ employees
It keeps a record of activities, allowing me to easily fetch screen recordings to detect any misuse and see who did what and what happened.
Senior Manager at a consultancy with 11-50 employees
It can integrate with Splunk, SNMP, and other solutions and technologies.
Technical Support Analyst at Capgemini
 

Categories and Ranking

CyberArk Identity
Ranking in Enterprise Password Managers
7th
Average Rating
8.2
Reviews Sentiment
6.7
Number of Reviews
29
Ranking in other categories
Authentication Systems (9th), Identity Management (IM) (9th), Authorization Software (3rd), User Entity Behavior Analytics (UEBA) (9th), Access Management (7th), Active Directory Management (6th), Cloud Resource Access Management (2nd), Customer Identity and Access Management (CIAM) (6th)
CyberArk Privileged Access ...
Ranking in Enterprise Password Managers
3rd
Average Rating
8.6
Reviews Sentiment
6.8
Number of Reviews
229
Ranking in other categories
User Activity Monitoring (1st), Privileged Access Management (PAM) (1st), Mainframe Security (2nd), Operational Technology (OT) Security (3rd)
 

Mindshare comparison

As of January 2026, in the Enterprise Password Managers category, the mindshare of CyberArk Identity is 1.1%, up from 1.0% compared to the previous year. The mindshare of CyberArk Privileged Access Manager is 6.9%, down from 7.4% compared to the previous year. It is calculated based on PeerSpot user engagement data.
Enterprise Password Managers Market Share Distribution
ProductMarket Share (%)
CyberArk Privileged Access Manager6.9%
CyberArk Identity1.1%
Other92.0%
Enterprise Password Managers
 

Featured Reviews

Hariharan Thangasamy - PeerSpot reviewer
Cybersecurity Delivery Analyst at Accenture
Has strengthened privileged access control and improved audit visibility through session monitoring and password rotation
On the identity product side, it is awesome. However, they can improve in the documentation parts. For example, if there is a migration process, I can see the maximum customers are moving from self-hosted to on-premises or from on-premises to the cloud. It would be helpful if they released a generalized document for processes such as migration. A clear overview document would assist us in understanding more about the tool, configurations, and automations to enhance our security. Regarding the initial setup of CyberArk Identity, I faced some challenges. At some points, I could not find proper documentation for deploying, enhancing, or integrating with other components. I could not find the proper documentation in the community portal.
SI
Senior PAM Consultant at iC Consult GmbH
Makes privileged access management easy with automation and granular control
Many people underestimate the value of these tools because they treat them as simple automated password management. Once you realize the volume of passwords in your organization and factor in nonhuman passwords, you realize its value. Last year, CyberArk Impact cited 45 nonhuman passwords for every human password. If you have 10,000 employees, you can imagine the number of passwords. There are also many other operations. For example, you have a Qualys scanner that needs to reach out and touch all your endpoints and scan them for vulnerabilities. They use an API call to CyberArk to pull out a Privileged credential that allows them to log in to that target. This is an automated machine call. It is tapping into CyberArk to get that credential. There can be hundreds of thousands of those operations a day. You do not want to manage those passwords by hand. Some people marginalize the significance of such a solution by saying that it is just a fancy password changer. It goes well beyond that, especially with API calls and automation. Its importance extends beyond merely changing passwords; it involves automation, API calls, and process integration, crucial in agile environments for standing up new Amazon servers or other processes needing privileged credentials. CyberArk can automate these tasks into their build processes. Another critical feature is the proxy service via Privileged Session Manager (PSM), providing not only a proxy between your user and the target servers, protecting against malware but also offering session recording. Many companies I have worked with implemented a PAM product as a knee-jerk reaction to SOX audit requirements. They discovered they needed session recording and retention for regulatory compliance. This has become a major factor for clients instituting CyberArk, so PSM is a big deal in addition to regular password rotation.
report
Use our free recommendation engine to learn which Enterprise Password Managers solutions are best for your needs.
881,082 professionals have used our research since 2012.
 

Top Industries

By visitors reading reviews
Financial Services Firm
14%
Computer Software Company
11%
Manufacturing Company
11%
Healthcare Company
6%
Financial Services Firm
15%
Manufacturing Company
10%
Computer Software Company
9%
Government
6%
 

Company Size

By reviewers
Large Enterprise
Midsize Enterprise
Small Business
By reviewers
Company SizeCount
Small Business20
Midsize Enterprise4
Large Enterprise10
By reviewers
Company SizeCount
Small Business59
Midsize Enterprise40
Large Enterprise173
 

Questions from the Community

What do you like most about CyberArk Identity?
The integration capabilities, ability to integrate CyberArk into the overall IBB strategy of our current clients.
What is your experience regarding pricing and costs for CyberArk Identity?
I am not certain about CyberArk Identity's exact pricing model. For comparison, Okta was around five dollars per user. CyberArk Identity offers good discounts to some clients, which influences thei...
What needs improvement with CyberArk Identity?
We do not specifically use the password vaulting feature of CyberArk Identity. The centralized user dashboard of CyberArk Identity has not been that important for us. If it would be possible to sha...
How does Sailpoint IdentityIQ compare with CyberArk PAM?
We evaluated Sailpoint IdentityIQ before ultimately choosing CyberArk. Sailpoint Identity Platform is a solution to manage risks in cloud enterprise environments. It automates and streamlines the m...
What do you like most about CyberArk Privileged Access Manager?
The most valuable features of the solution are control and analytics.
What is your experience regarding pricing and costs for CyberArk Privileged Access Manager?
My thoughts on the pricing of CyberArk Privileged Access Manager depend entirely on the vendors' requirements. If they want their things to be secure, they have to spend accordingly. We have four t...
 

Also Known As

Idaptive
CyberArk Privileged Access Security, CyberArk Enterprise Password Vault
 

Overview

 

Sample Customers

MLB, Citi, Pfizer, SulAmerica, GE Capital, Shiseido
Rockwell Automation
Find out what your peers are saying about CyberArk Identity vs. CyberArk Privileged Access Manager and other solutions. Updated: January 2026.
881,082 professionals have used our research since 2012.