Try our new research platform with insights from 80,000+ expert users

CyberArk Privileged Access Manager vs IBM Security Identity Governance and Intelligence comparison

 

Comparison Buyer's Guide

Executive Summary

Review summaries and opinions

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
 

Categories and Ranking

CyberArk Privileged Access ...
Average Rating
8.6
Reviews Sentiment
6.8
Number of Reviews
230
Ranking in other categories
User Activity Monitoring (1st), Enterprise Password Managers (2nd), Privileged Access Management (PAM) (1st), Mainframe Security (1st), Operational Technology (OT) Security (3rd)
IBM Security Identity Gover...
Average Rating
7.6
Reviews Sentiment
6.7
Number of Reviews
2
Ranking in other categories
User Provisioning Software (14th), Identity Management (IM) (30th)
 

Mindshare comparison

While both are Identity and Access Management solutions, they serve different purposes. CyberArk Privileged Access Manager is designed for Privileged Access Management (PAM) and holds a mindshare of 11.4%, down 19.6% compared to last year.
IBM Security Identity Governance and Intelligence, on the other hand, focuses on User Provisioning Software, holds 2.4% mindshare, up 2.1% since last year.
Privileged Access Management (PAM) Mindshare Distribution
ProductMindshare (%)
CyberArk Privileged Access Manager11.4%
Delinea Secret Server4.9%
One Identity Safeguard4.4%
Other79.3%
Privileged Access Management (PAM)
User Provisioning Software Mindshare Distribution
ProductMindshare (%)
IBM Security Identity Governance and Intelligence2.4%
SailPoint Identity Security Cloud22.5%
One Identity Manager11.2%
Other63.900000000000006%
User Provisioning Software
 

Featured Reviews

Atul-Gujar - PeerSpot reviewer
CyberArk manager at a comms service provider with 10,001+ employees
Secures critical infrastructures with essential user session audit records
A potential area for improvement is enhancing support for cluster environments and distributed Vaults. Clients in multiple countries that need central access have different challenges that require better solutions from CyberArk. For financial services, CyberArk can improve incident response by ensuring fast support for critical priority tickets to meet compliance requirements. Providing more documentation on CyberArk is recommended for new team members to enhance their troubleshooting capabilities. I understand it's up to the client, but 99% fail to change the demo key, so it's crucial for CyberArk to emphasize changing the key and documenting it as part of the installation process.
reviewer1830612 - PeerSpot reviewer
Head, Cybersecurity at a tech services company with 11-50 employees
We use the solution to ensure organizations conform to industry base certifications and best practices
We use the product to ensure organizations conform to industry base certifications and best practices and do not contradict their security policies within the base points they specify in the system, which are used to match everything against their governance use cases I think the product's most…

Quotes from Members

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
 

Pros

"Technical support is very well aware of this."
"We utilize PTA, and we are now integrating that into our risk management program so we can identify the uses of the vault which are outside of the norm, e.g., people accessing after hours. It has reduced the amount of time that we are looking through logs and audit logs."
"This is a complete solution that can detect cyber attacks well."
"We primarily use this product for privileged identity management, restricting privileged IDs, and governance."
"All features of the CyberArk PAS solution are valuable."
"The PSM is excellent and the ability to write your own connectors and plugins is invaluable as far as flexibility goes."
"BeyondTrust and ARCOS were introduced in market at that time; these tools are good but do not seem to be as user friendly as CyberArk PAM, which is more convenient in installing and deployment and easier to customize as per client requirement."
"Rather than multiple tools for maintaining regulatory compliance around passwords and privileged accounts, we have centralized as much as possible with CyberArk."
"Lifecycle management, governance and documentation."
"I would rate the price eight out of 10, with 10 as the best value for money."
"We use the product to ensure organizations conform to industry base certifications and best practices and do not contradict their security policies within the base points they specify in the system, which are used to match everything against their governance use cases."
"This solution has a very good dashboard and the documentation is also very good, and life cycle management and governance are also good features in this solution."
 

Cons

"Initial setup is complex. Lots of architecture, lots of planning, and lots of education and training are needed."
"Performance of PIM could be better and intended for usability as well as security."
"It is complicated to deploy for Windows servers compared to other vendors."
"There were a lot of manual steps in the initial setup which could have been automated."
"CyberArk definitely needs to improve user experience and reduce complexity."
"The major pain point that we have is the capacity of CyberArk due to the sheer volume of NPAs that we are managing. We are a large organization and we have hundreds of thousands of non-personal accounts to manage. We have already found out that there are certain capacity limitations within CyberArk that might introduce performance issues. From my perspective, something that would be valuable would be if the vault could hold more passwords and be more scalable."
"One area for improvement is the plug-in development challenge. Although CyberArk provides a plug-in generator utility, it does not fully meet our needs, particularly for web-based applications. The plug-in generator currently works only for Telnet and SSH connections. We cannot generate a plug-in for web-based applications."
"I'd like to see a more expansive SSH tunneling situation through PSMP. Right now you have an account that exists in the vault and you say, "I want to create a tunnel using this account." I'd like to see something that is not account-based where I could say, "I want to create a tunnel to this machine over here," and then authenticate through the PSMP and then your tunnel is set up. You wouldn't need to then authenticate to a machine."
"The solution is also a bit pricey for the Nigeria region."
"Self service center is not always easy to understand."
"The solution is a bit pricey for some regions."
"I think improvements could be made in the self service center, making it easier for the user to understand."
 

Pricing and Cost Advice

"CyberArk Privileged Access Manager is on the expensive side. It is very expensive."
"CyberArk Enterprise Password Vault is a very expensive product."
"With reducing the privileged account access, there has been a huge improvement. They are now bringing more accounts on a little at a time."
"The solution is available at a high price"
"The pricing for CyberArk Privileged Access Manager is quite expensive, and the pricing varies from region to region. In APAC, CyberArk Privileged Access Manager can be obtained for less than in North America, according to my understanding."
"Pricing is a problem. CyberArk is expensive compared to other products I know. It is similar to buying a German car. It comes with all the bells and whistles, but some companies may find it too expensive."
"The product’s pricing is feasible for enterprise customers. The pricing is expensive for smaller businesses. You need to pay additional costs for service implementation and local support."
"Overall, its pricing is really good. The main difference from all the other vendors is that they have one package that covers all the functionality and modules of the basic PAM, except the add-on modules like adware and server protection. It also doesn't include the licenses for domain controller protection or maybe an API call-related feature. For the basic privileged access management, the bundle pricing is really good, but when it comes to an agent-based solution for advanced cyber protection or application identity managers, it is expensive. Services are also very expensive if you hire the services team from CyberArk, but these guys are really good. For a couple of large banking projects, we had an experience with them. The banks wanted to have things quickly and efficiently, so we had to hire them. If we take four weeks, these guys can do everything on a weekend. They charge quite a big sum of money, but they know the system well."
"I would rate the price eight out of 10, with 10 as the best value for money."
report
Use our free recommendation engine to learn which Privileged Access Management (PAM) solutions are best for your needs.
884,976 professionals have used our research since 2012.
 

Top Industries

By visitors reading reviews
Financial Services Firm
14%
Manufacturing Company
10%
Computer Software Company
8%
Government
6%
Financial Services Firm
16%
Government
14%
Insurance Company
11%
Computer Software Company
10%
 

Company Size

By reviewers
Large Enterprise
Midsize Enterprise
Small Business
By reviewers
Company SizeCount
Small Business59
Midsize Enterprise42
Large Enterprise174
No data available
 

Questions from the Community

How does Sailpoint IdentityIQ compare with CyberArk PAM?
We evaluated Sailpoint IdentityIQ before ultimately choosing CyberArk. Sailpoint Identity Platform is a solution to manage risks in cloud enterprise environments. It automates and streamlines the m...
What do you like most about CyberArk Privileged Access Manager?
The most valuable features of the solution are control and analytics.
What is your experience regarding pricing and costs for CyberArk Privileged Access Manager?
My thoughts on the pricing of CyberArk Privileged Access Manager depend entirely on the vendors' requirements. If they want their things to be secure, they have to spend accordingly. We have four t...
Ask a question
Earn 20 points
 

Also Known As

CyberArk Privileged Access Security, CyberArk Enterprise Password Vault
IGI, IBM Security Identity Manager, ISIM
 

Overview

 

Sample Customers

Rockwell Automation
E.ON Global Commodities
Find out what your peers are saying about CyberArk, One Identity, Okta and others in Privileged Access Management (PAM). Updated: March 2026.
884,976 professionals have used our research since 2012.