Try our new research platform with insights from 80,000+ expert users

CyberArk Identity vs Transmit Security comparison

Sponsored
 

Comparison Buyer's Guide

Executive Summary

Review summaries and opinions

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
 

Categories and Ranking

Omada Identity
Sponsored
Ranking in Identity Management (IM)
4th
Ranking in Customer Identity and Access Management (CIAM)
3rd
Average Rating
8.0
Reviews Sentiment
6.8
Number of Reviews
48
Ranking in other categories
User Provisioning Software (3rd), Identity and Access Management as a Service (IDaaS) (IAMaaS) (5th)
CyberArk Identity
Ranking in Identity Management (IM)
10th
Ranking in Customer Identity and Access Management (CIAM)
6th
Average Rating
8.2
Reviews Sentiment
7.0
Number of Reviews
23
Ranking in other categories
Authentication Systems (8th), Authorization Software (3rd), Enterprise Password Managers (7th), User Entity Behavior Analytics (UEBA) (9th), Access Management (6th), Active Directory Management (8th), Cloud Resource Access Management (2nd)
Transmit Security
Ranking in Identity Management (IM)
21st
Ranking in Customer Identity and Access Management (CIAM)
12th
Average Rating
9.0
Reviews Sentiment
7.7
Number of Reviews
1
Ranking in other categories
Remote Access (25th), Passwordless Authentication (7th)
 

Mindshare comparison

As of May 2025, in the Customer Identity and Access Management (CIAM) category, the mindshare of Omada Identity is 1.8%, up from 1.3% compared to the previous year. The mindshare of CyberArk Identity is 3.8%, up from 3.4% compared to the previous year. The mindshare of Transmit Security is 2.7%, up from 0.2% compared to the previous year. It is calculated based on PeerSpot user engagement data.
Customer Identity and Access Management (CIAM)
 

Featured Reviews

Pernilla Hulth - PeerSpot reviewer
The interface is easy to use and gives you a solid overview
The cloud-based deployment was straightforward, but the on-prem deployment was in a highly complex ecosystem. Omada has matured since then. I wouldn't say that it isn't straightforward, but it depends on the customer. A standard deployment is relatively easy, but it can be more painful if you need a lot of customization. We deployed the cloud solution in around four months, nearly meeting the 12-week benchmark. The on-prem deployment took three years. It was a highly complex ecosystem that was dependent on other systems. Depending on the size of your environment, you need a product owner and some specialists for maintenance. My last customer was a university with a complex environment. They had around 12 people involved in maintenance at that organization. Typically, it's between 2-5 people.
Julio Montero - PeerSpot reviewer
Access management system provides strong security and effortless user authentication
The solution can be deployed on cloud or on-premises. CyberArk is more on the cloud than on local hardware. The deployment is initially quite difficult. That said, when you are doing the implementation of CyberArk, there are so many tutorials that make the learning process very easy. The only complaint could be the language barrier. It's difficult if you don't have a very good level of English. Otherwise, it is very easy. You can have it set up within three months without much difficulty. It's hard to get started, however, once you get going, it gets easier. A full deployment takes half a year or less. There is some maintenance necessary. A company is constantly hiring and letting go of employees. The access is always changing, so access must always be adjusted. Or, if we need another law of filter, we would need to add those, or even take them away. That's another aspect of maintenance.
reviewer2382384 - PeerSpot reviewer
Good in terms of customization and security, offers flexible deployment, and easy to use
I like Transmit FlexID, which is more focused on user-based identity. Transmit interface is flexible and user-friendly, which is important for our workload. Switching from one authentication code to multiple exposure or two-factor authentication (MFA) is seamless. Transmit provides security and addresses sensitive administrative work on both technical ends. Their authentication suite helps us secure our infrastructure. Overall, I'd rate Transmit highly in security.

Quotes from Members

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
 

Pros

"The most valuable aspect of the product is that it is Microsoft-based and it supports all Microsoft technology."
"The most appealing aspect of Omada Identity is its self-service upgrade system."
"I'm not using Omada, but the interface is easy to use and gives you a solid overview of your identities."
"The most relevant feature is Omada's reporting engine. Omada never 'forgets' and archives every process. All steps an admin, user, or manager has executed, are recorded in Omada."
"Omada's most valuable aspect is its usability."
"Omada offers a technical solution that addresses both our needs."
"Support-wise, working with Omada has been good. We have very good direct interactions and fast responses."
"It has a very user-friendly interface compared to what we are used to, and it is highly configurable. In the old solution, when we needed to do something, we had to have a programmer sitting next to us, whereas, in Omada Identity, everything is configurable."
"The most valuable feature of CyberArk Identity is the adaptive interface."
"The solution helps with auditing, and monitoring, and integrates with Splunk for log analysis. User activity logs are captured in CyberArk Identity and sent to external tools like Splunk for analysis and monitoring."
"It has machine learning and can help clients to learn the environment and understand what is happening."
"Overall, I would rate CyberArk Identity a nine out of ten."
"I like the RBAC (Role-Based Access Control). It basically involves defining various roles, and then simply assigning those roles to users."
"The features that I personally find most effective in terms of security stem from the fact that it is easy to integrate and also the adoption is faster."
"I found the solution to be stable."
"The best thing I like about CyberArk Identity is that it does not require heavy implementation, complex hardware, or complex training."
"Transmit interface is flexible and user-friendly, which is important for our workload. Switching from one authentication code to multiple exposure or two-factor authentication (MFA) is seamless."
 

Cons

"The reporting on the warehouse data and the import process both have room for improvement."
"Omada could communicate better with us about the product roadmap. We haven't gotten any updates about it. The user interface is often a bit difficult to understand. It isn't optimized for small screens, so it doesn't display all of the information clearly, so users need to scroll a lot."
"Omada could make it a bit more convenient to send emails based on events automatically. Having that functionality is critical for us to maintain transparency."
"The account management integration isn't bad, but it isn't plug-and-play like Microsoft Azure. You need some deep development knowledge to set up the connectors."
"What I would most like to see added to the product is role management, especially enterprise or business role management, and the processes around that."
"I would like to search on date fields, which is not possible now."
"When you do a recalculation of an identity, it's hard to understand what was incorrect before you started the recalculation, and which values are actually updated... all you see are all the new fields that are provisioned, instead of seeing only the fields that are changed."
"The user interface should have a more flexible design, where you can change it to your requirement."
"They can include the Mobile Device Management (MDM) feature."
"It does not have global market penetration, and sometimes, there are support issues."
"CyberArk Identity's GUI is an area with certain shortcomings that need improvement."
"More integrations would be better."
"To enhance the product, they can consider improving the user interface of the software and possibly the customer support team. Sometimes, there is a delay in handling my inquiries via email, which could be addressed for better service."
"In terms of a governance platform, it's worth noting that CyberArk doesn't offer a particularly strong one."
"Integration or deployment is extremely difficult for CyberArk Identity."
"The OpenID features could improve in CyberArk Identity."
"Pricing is an area where Transmit Security could improve. The pricing needs to be more competitive."
 

Pricing and Cost Advice

"Omada isn't cheap or expensive. The licensing model is flexible. I've only had limited interactions with the Omada sales team, but they were positive. They don't sell the customers more licenses than they need. It's important to accurately forecast future usage. For example, we have many licenses that we don't use because we don't have the identities yet. We pay extra, which isn't good."
"It is not cheap. None of these solutions are cheap, but we have good pricing at least for now from a licensing perspective."
"Omada is expensive."
"My client deals directly with the Omada Identity team in terms of licensing. I never look at pricing, so I'm not aware of how much the solution costs, but it's worth the money. Often, when you begin to use Omada Identity and it takes a while to set up, it'll be irreversible, and you'd depend on and focus more on the functionality of the solution, rather than its price tag."
"It's a fair price for the on-premises system. Compared with what we had before, it's much cheaper and we get all the modules in one. We tried to go with the cloud, but it was far too expensive."
"The initial total cost of ownership to implement Omada Identity is not small. The TCO for the implementation is as high as any other solution. However, the cost of maintaining the solution is at par or lower than competitors, including adding more features or maintaining the system after the initial deployment or installation to make sure that they are available for users to use or extending the functionalities of those activities. Those maintenance costs are lower than other vendors, but the initial cost of getting the system installed is still high."
"Omada Identity is competitively priced and delivers good value for our money."
"It is expensive. Fortunately, I had a very good procurement manager on my side, but they are expensive. The closest competitors are also very expensive. You get a full-fledged solution that can do everything you dream of, but you pay for everything."
"Their pricing is obviously a lot higher than many vendors in the marketplace but their service is also unmatched."
"The solution is cheap and I rate its pricing an eight out of ten."
"In terms of pricing, BeyondTrust and CyberArk tend to be more expensive, with CyberArk receiving an eight out of ten, in this regard."
"I think it is a fairly priced tool. I rate the tool between six and seven on a scale of one to ten where one is expensive, and ten is cheap."
"The pricing is acceptable. It is worth considering what we are protecting with the amount charged."
"There could be some additional costs apart from the licensing costs of the solution when you want to develop connectors in CyberArk Identity."
"The pricing of CyberArk Identity is competitive."
"The pricing point is very good. I compared it with other products, and it does not require a heavy investment."
Information not available
report
Use our free recommendation engine to learn which Customer Identity and Access Management (CIAM) solutions are best for your needs.
851,491 professionals have used our research since 2012.
 

Top Industries

By visitors reading reviews
Financial Services Firm
16%
Computer Software Company
13%
Manufacturing Company
8%
Government
7%
Financial Services Firm
17%
Computer Software Company
14%
Manufacturing Company
11%
Healthcare Company
6%
Financial Services Firm
42%
Retailer
8%
Hospitality Company
7%
Healthcare Company
7%
 

Company Size

By reviewers
Large Enterprise
Midsize Enterprise
Small Business
No data available
 

Questions from the Community

What do you like most about Omada Identity Cloud?
As an administrator, we benefit from a lot of functionality that is available out of the box, but it is also configur...
What is your experience regarding pricing and costs for Omada Identity Cloud?
They are positioned at a good price point. They are lower than some of their competitors.
What needs improvement with Omada Identity Cloud?
The biggest issue, which is the reason why we are transitioning from their product to SailPoint, is the overall user ...
What do you like most about CyberArk Identity?
The integration capabilities, ability to integrate CyberArk into the overall IBB strategy of our current clients.
What is your experience regarding pricing and costs for CyberArk Identity?
The pricing point is very good. I compared it with other products, and it does not require a heavy investment.
What needs improvement with CyberArk Identity?
It does not have global market penetration, and sometimes, there are support issues. CyberArk Identity can definitely...
What do you like most about Transmit Security?
Transmit interface is flexible and user-friendly, which is important for our workload. Switching from one authenticat...
What is your experience regarding pricing and costs for Transmit Security?
The product itself is good, and the technical support is strong. However, I'd rate pricing around a seven out of ten,...
What needs improvement with Transmit Security?
Pricing is an area where Transmit Security could improve. The pricing needs to be more competitive.
 

Also Known As

Omada Identity Suite, Omada Identity Cloud
Idaptive
BindID, FlexID, WorkID
 

Overview

 

Sample Customers

Bayer, ECCO Shoes, Vattenfall, NuStar Energy, Unicredit, Schiphol Group, BMW Group, Deutsche Leasing
MLB, Citi, Pfizer, SulAmerica, GE Capital, Shiseido
Mitgate, Telepass, Metro Bank, Santander
Find out what your peers are saying about Auth0, Ping Identity, Omada and others in Customer Identity and Access Management (CIAM). Updated: May 2025.
851,491 professionals have used our research since 2012.