Try our new research platform with insights from 80,000+ expert users

CyberArk Identity vs Transmit Security comparison

Sponsored
 

Comparison Buyer's Guide

Executive Summary

Review summaries and opinions

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
 

Categories and Ranking

Omada Identity
Sponsored
Ranking in Identity Management (IM)
4th
Ranking in Customer Identity and Access Management (CIAM)
3rd
Average Rating
8.0
Reviews Sentiment
6.8
Number of Reviews
48
Ranking in other categories
User Provisioning Software (4th), Identity and Access Management as a Service (IDaaS) (IAMaaS) (4th)
CyberArk Identity
Ranking in Identity Management (IM)
10th
Ranking in Customer Identity and Access Management (CIAM)
8th
Average Rating
8.2
Reviews Sentiment
7.0
Number of Reviews
23
Ranking in other categories
Authentication Systems (9th), Authorization Software (3rd), Enterprise Password Managers (8th), User Entity Behavior Analytics (UEBA) (9th), Access Management (6th), Active Directory Management (8th), Cloud Resource Access Management (2nd)
Transmit Security
Ranking in Identity Management (IM)
21st
Ranking in Customer Identity and Access Management (CIAM)
10th
Average Rating
9.0
Reviews Sentiment
7.7
Number of Reviews
1
Ranking in other categories
Remote Access (24th), Passwordless Authentication (7th)
 

Mindshare comparison

As of July 2025, in the Customer Identity and Access Management (CIAM) category, the mindshare of Omada Identity is 1.6%, up from 1.5% compared to the previous year. The mindshare of CyberArk Identity is 3.8%, up from 3.5% compared to the previous year. The mindshare of Transmit Security is 2.8%, up from 0.4% compared to the previous year. It is calculated based on PeerSpot user engagement data.
Customer Identity and Access Management (CIAM)
 

Featured Reviews

Pernilla Hulth - PeerSpot reviewer
The interface is easy to use and gives you a solid overview
The cloud-based deployment was straightforward, but the on-prem deployment was in a highly complex ecosystem. Omada has matured since then. I wouldn't say that it isn't straightforward, but it depends on the customer. A standard deployment is relatively easy, but it can be more painful if you need a lot of customization. We deployed the cloud solution in around four months, nearly meeting the 12-week benchmark. The on-prem deployment took three years. It was a highly complex ecosystem that was dependent on other systems. Depending on the size of your environment, you need a product owner and some specialists for maintenance. My last customer was a university with a complex environment. They had around 12 people involved in maintenance at that organization. Typically, it's between 2-5 people.
Julio Montero - PeerSpot reviewer
Access management system provides strong security and effortless user authentication
The solution can be deployed on cloud or on-premises. CyberArk is more on the cloud than on local hardware. The deployment is initially quite difficult. That said, when you are doing the implementation of CyberArk, there are so many tutorials that make the learning process very easy. The only complaint could be the language barrier. It's difficult if you don't have a very good level of English. Otherwise, it is very easy. You can have it set up within three months without much difficulty. It's hard to get started, however, once you get going, it gets easier. A full deployment takes half a year or less. There is some maintenance necessary. A company is constantly hiring and letting go of employees. The access is always changing, so access must always be adjusted. Or, if we need another law of filter, we would need to add those, or even take them away. That's another aspect of maintenance.
reviewer2382384 - PeerSpot reviewer
Good in terms of customization and security, offers flexible deployment, and easy to use
I like Transmit FlexID, which is more focused on user-based identity. Transmit interface is flexible and user-friendly, which is important for our workload. Switching from one authentication code to multiple exposure or two-factor authentication (MFA) is seamless. Transmit provides security and addresses sensitive administrative work on both technical ends. Their authentication suite helps us secure our infrastructure. Overall, I'd rate Transmit highly in security.

Quotes from Members

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
 

Pros

"We don't have to go in and do a lot of the work that we did before. It may have saved us somewhere in the range of 10 to 30 percent of the time we spent on provisioning access."
"As an administrator, we benefit from a lot of functionality that is available out of the box, but it is also configurable to meet our specific needs."
"The most valuable feature is the automatic provisioning and reconciliation of things like the Active Directory groups and memberships."
"I appreciate all the support we receive from Omada."
"Our customers have benefited from Omada Identity automating the certification process. Most of our customers were using manual methods for user access certification. With Omada Identity, you can automate almost all of it, which means that certification now becomes on demand. You don't have to wait for two or three months to execute a certification timeframe. Instead, you can do certifications as often as you want."
"The Governance and self-service that can be set up so you can use them yourself to work in the system are the most valuable features. End users can be enabled to help themselves."
"The most valuable feature in Omada is the governance. We work with other products and other product vendors, but the sweet spot in the market for Omada is where things are heavy on governance."
"I'm not using Omada, but the interface is easy to use and gives you a solid overview of your identities."
"The features that I personally find most effective in terms of security stem from the fact that it is easy to integrate and also the adoption is faster."
"The most valuable features of CyberArk Identity are its ability to control access to administrative staff."
"The user identification is simplified, and managing user privileges, whether adding or revoking them, is also quite straightforward when utilizing CyberArk SaaS."
"The initial setup of CyberArk Identity was straightforward."
"If anyone makes an error, or if an incident occurs by accident, the business will not be harmed as a result of this activity."
"CyberArk Identity's ability to safeguard financial services infrastructure is good."
"The tool is a very strong and valuable enterprise solution, particularly in ensuring the continuity of service."
"The setup, via cloud, is simple."
"Transmit interface is flexible and user-friendly, which is important for our workload. Switching from one authentication code to multiple exposure or two-factor authentication (MFA) is seamless."
 

Cons

"The account management integration isn't bad, but it isn't plug-and-play like Microsoft Azure. You need some deep development knowledge to set up the connectors."
"If I had to name one thing, it would be the user interface (UI)."
"The user interface should have a more flexible design, where you can change it to your requirement."
"When making a process, you should be able to use some coding to do some advanced calculations. The calculations you can currently do are too basic. I would also like some additional script features."
"They need to improve the cost for small companies."
"The user interface could be improved. The interface between Omada and the user is mainly text-based."
"We are trying to use Omada's standards and to adapt our processes. But we have had some trouble with the bad documentation. This is something that they could improve on. It has not been possible for us to analyze some of the problems so far, based on the documentation. We always need consultants. The documentation should include some implementation hints and some guidelines for implementing the processes."
"Improved traceability would be helpful for administrators. For example, let's say a user's permission is being revoked. We can only see the system that has carried out a particular action but not what triggered it. If an event definition or something has changed in the criteria for the permission being removed or something like that, we don't have immediate access to that information. It takes a little detective work."
"Integration or deployment is extremely difficult for CyberArk Identity."
"I'm not sure what needs improvement. It is a good platform."
"The OpenID features could improve in CyberArk Identity."
"Something they could improve is the management of multifactor authentication. When you translate the page from one language to another, it can be a difficult process."
"The product needs to leverage the cloud more, especially in the financial sector, where cloud adoption might be limited. Proper reporting within the cloud is essential. The tool should be more user-friendly to expedite access for users. The current agent-based system poses challenges if a user loses access to the server, making tasks difficult to perform. It should also improve technical support."
"More integrations would be better."
"CyberArk Identity's GUI is an area with certain shortcomings that need improvement."
"To enhance the product, they can consider improving the user interface of the software and possibly the customer support team. Sometimes, there is a delay in handling my inquiries via email, which could be addressed for better service."
"Pricing is an area where Transmit Security could improve. The pricing needs to be more competitive."
 

Pricing and Cost Advice

"The pricing for Omada Identity is fair."
"Omada is expensive."
"It is not cheap. None of these solutions are cheap, but we have good pricing at least for now from a licensing perspective."
"It is fairly priced for an on-premise environment, but for the cloud environment, I am not that happy with the pricing."
"My client deals directly with the Omada Identity team in terms of licensing. I never look at pricing, so I'm not aware of how much the solution costs, but it's worth the money. Often, when you begin to use Omada Identity and it takes a while to set up, it'll be irreversible, and you'd depend on and focus more on the functionality of the solution, rather than its price tag."
"They are positioned at a good price point. They are lower than some of their competitors."
"It's a fair price for the on-premises system. Compared with what we had before, it's much cheaper and we get all the modules in one. We tried to go with the cloud, but it was far too expensive."
"Being Dutch, I can only say that it is extremely expensive, but all software products are expensive. If you have 38,000 users, then even one dollar or one euro per person would amount to a significant amount of money. Because of the high number of users, anything gets expensive very fast here."
"CyberArk Identity is an expensive solution."
"It's not that affordable compared to Delinea or other products. They're less expensive and allow more customization. For the cost, it is expensive."
"There could be some additional costs apart from the licensing costs of the solution when you want to develop connectors in CyberArk Identity."
"There is an initial license and then there is a subscription needed."
"We find that the pricing and licensing of this solution is adequate, as compared to the other competitors in the market."
"The pricing of CyberArk Identity is competitive."
"I would rate the tool’s pricing a seven out of ten. The product’s pricing is expensive and is on a yearly basis. You will need to pay around 10,000 GBP for 500 users."
"The solution is cheap and I rate its pricing an eight out of ten."
Information not available
report
Use our free recommendation engine to learn which Customer Identity and Access Management (CIAM) solutions are best for your needs.
860,168 professionals have used our research since 2012.
 

Top Industries

By visitors reading reviews
Financial Services Firm
16%
Computer Software Company
13%
Manufacturing Company
9%
Government
6%
Financial Services Firm
16%
Computer Software Company
13%
Manufacturing Company
11%
Healthcare Company
6%
Financial Services Firm
41%
Retailer
9%
Healthcare Company
5%
Transportation Company
5%
 

Company Size

By reviewers
Large Enterprise
Midsize Enterprise
Small Business
No data available
 

Questions from the Community

What do you like most about Omada Identity Cloud?
As an administrator, we benefit from a lot of functionality that is available out of the box, but it is also configur...
What is your experience regarding pricing and costs for Omada Identity Cloud?
They are positioned at a good price point. They are lower than some of their competitors.
What needs improvement with Omada Identity Cloud?
The biggest issue, which is the reason why we are transitioning from their product to SailPoint, is the overall user ...
What do you like most about CyberArk Identity?
The integration capabilities, ability to integrate CyberArk into the overall IBB strategy of our current clients.
What is your experience regarding pricing and costs for CyberArk Identity?
The pricing is acceptable. It is worth considering what we are protecting with the amount charged.
What needs improvement with CyberArk Identity?
Some areas experience slowness based on the workload. There's a need to enhance network performance despite the good ...
What do you like most about Transmit Security?
Transmit interface is flexible and user-friendly, which is important for our workload. Switching from one authenticat...
What is your experience regarding pricing and costs for Transmit Security?
The product itself is good, and the technical support is strong. However, I'd rate pricing around a seven out of ten,...
What needs improvement with Transmit Security?
Pricing is an area where Transmit Security could improve. The pricing needs to be more competitive.
 

Also Known As

Omada Identity Suite, Omada Identity Cloud
Idaptive
BindID, FlexID, WorkID
 

Overview

 

Sample Customers

Bayer, ECCO Shoes, Vattenfall, NuStar Energy, Unicredit, Schiphol Group, BMW Group, Deutsche Leasing
MLB, Citi, Pfizer, SulAmerica, GE Capital, Shiseido
Mitgate, Telepass, Metro Bank, Santander
Find out what your peers are saying about Auth0, Ping Identity, Omada and others in Customer Identity and Access Management (CIAM). Updated: June 2025.
860,168 professionals have used our research since 2012.