No more typing reviews! Try our Samantha, our new voice AI agent.

CyberArk Privileged Access Manager vs RSA Identity Governance and Lifecycle comparison

 

Comparison Buyer's Guide

Executive Summary

Review summaries and opinions

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
 

Categories and Ranking

CyberArk Privileged Access ...
Average Rating
8.6
Reviews Sentiment
6.8
Number of Reviews
230
Ranking in other categories
User Activity Monitoring (1st), Enterprise Password Managers (3rd), Privileged Access Management (PAM) (1st), Mainframe Security (1st), Operational Technology (OT) Security (3rd)
RSA Identity Governance and...
Average Rating
7.0
Reviews Sentiment
5.9
Number of Reviews
10
Ranking in other categories
Identity Management (IM) (20th)
 

Mindshare comparison

While both are Identity and Access Management solutions, they serve different purposes. CyberArk Privileged Access Manager is designed for Privileged Access Management (PAM) and holds a mindshare of 10.4%, down 18.5% compared to last year.
RSA Identity Governance and Lifecycle, on the other hand, focuses on Identity Management (IM), holds 1.1% mindshare, down 1.4% since last year.
Privileged Access Management (PAM) Mindshare Distribution
ProductMindshare (%)
CyberArk Privileged Access Manager10.4%
Delinea Secret Server4.5%
One Identity Safeguard4.4%
Other80.7%
Privileged Access Management (PAM)
Identity Management (IM) Mindshare Distribution
ProductMindshare (%)
RSA Identity Governance and Lifecycle1.1%
SailPoint Identity Security Cloud10.0%
Microsoft Entra ID6.9%
Other82.0%
Identity Management (IM)
 

Featured Reviews

Atul-Gujar - PeerSpot reviewer
CyberArk manager at a comms service provider with 10,001+ employees
Secures critical infrastructures with essential user session audit records
A potential area for improvement is enhancing support for cluster environments and distributed Vaults. Clients in multiple countries that need central access have different challenges that require better solutions from CyberArk. For financial services, CyberArk can improve incident response by ensuring fast support for critical priority tickets to meet compliance requirements. Providing more documentation on CyberArk is recommended for new team members to enhance their troubleshooting capabilities. I understand it's up to the client, but 99% fail to change the demo key, so it's crucial for CyberArk to emphasize changing the key and documenting it as part of the installation process.
Harshul Nayak - PeerSpot reviewer
Senior Project Manager at a consultancy with 10,001+ employees
Streamline identity lifecycle management with intuitive interfaces and robust policy features
The functions of RSA Identity Governance and Lifecycle, especially the IGA, are quite strong with their custom forms and workflows integrated. The user interface is very friendly and easy to use, making it a good product overall. However, it still has to be on-premise and the cloud version is not easily accessible, as dedicated instances are required and machines cannot be shared as multi-tenant for various customers. The advanced policy features of RSA definitely help in defining certain policies such as segregation of duties. That's particularly useful along with creating different access reviews. Regarding access control in simplifying access management, RSA Identity Governance and Lifecycle has strong foundations of groups and roles, which help in defining all policies very easily. This makes it very easy to integrate with other access management tools or privileged access management tools.

Quotes from Members

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
 

Pros

"We are able to centrally manage credentials, touch applications, and rotate passwords."
"It takes away all ambiguity around "known" admin accounts."
"I appreciate CyberArk's real-time capabilities. I can secure critical sessions, such as SSH or database sessions."
"All the high privileged accounts are managed by CyberArk at a regular frequency."
"The most valuable feature I find in CyberArk Privileged Access Manager is that we can record the sessions. It provides flexible workflows. I can change the workflow to specify if it needs one approval or two approvals, and I can approve my peer."
"It supports lots of requirements in the privileged access management area."
"Provides improved security around having your credentials locked down and rotated regularly."
"It's user-friendly and very configurable. We can do many things with it, especially with password management."
"It improved security."
"The data collection is excellent and easy to do. It does not require a lot of configuration nor does it require rules to be written like other competitors do."
"The user interface is very friendly and easy to use, making it a good product overall."
"With the tool in place, you need to hire fewer people to provide access, and you have control over your processes."
"Soft and hard tokens for two factor authentication has been introduced."
"Never - one thing I can say about RSA is that the boxes are stable and solid."
"All of the features in this product are good and this is a product that I recommend."
"The most valuable feature is the security, in particular, the One Time Password support."
 

Cons

"I would prefer that this is a fully-managed service, rather than have to manage the software ourselves and keep it up to date."
"CyberArk Enterprise Password Vault must incorporate connectors for password and session managers in the marketplace."
"We're still struggling with the use of RDP through PSMs."
"The initial setup of CyberArk is a challenge if you do not have prior experience with it."
"There is a lot of room for improvement in the report section."
"We found a lot of errors during the initial setup. They should work to improve the implementation experience and to remove errors from the process."
"As we have not yet moved to the core licensing model, we don't have the benefit of PSM and a few other things that were not previously included."
"It should be easy to use for non-technical people. Its interface can be a bit difficult. Some parts of its interface are not very intuitive. Some of the controls are hidden, and instead of having a screen with all the controls for that account on it, you have to use menus and other similar things."
"If you use the appliance version then it won't handle a huge database volume."
"This product is missing a lot of features which other competitors are providing. One of the key features that are missing right now is risk scoring."
"The stability of RSA Identity Governance and Lifecycle could improve; it has some bugs that need to be fixed."
"Technical support in Pakistan can be improved."
"Every connector that you have in the product needs to be custom-built, so there are not a lot of standard connectors available in the product, because of which there are a lot of hidden consultancy costs."
"It could be a little more flexible with the installation of the product."
"RSA Identity Governance and Lifecycle could improve out-of-the-box customization."
"The user interface and workflow need improvement, and more connectors would help."
 

Pricing and Cost Advice

"This solution is considered to be more expensive than others out there on the market today."
"The pricing for CyberArk Privileged Access Manager is quite expensive, and the pricing varies from region to region. In APAC, CyberArk Privileged Access Manager can be obtained for less than in North America, according to my understanding."
"The solution is costly but we get what we pay for."
"It can be an expensive product."
"Payments have to be made on a yearly basis toward the licensing costs of the solution."
"If you want a Ferrari, it will cost you. The solution is really nice, so it costs the client, but in the long run, it is very good. If you buy a solution that costs a lot to maintain because it is not stable, and you are frequently asking for consultant support, it costs more."
"Network and security licenses are currently being managed by other outsource vendors, so they are facing some type of problems in the digital aspect."
"I'm aware that the organization had purchased licensing for almost all of CyberArk's solutions including licensing for PTA, EPM, and the Application Identity Manager. But when it comes to PSM, this is one of the components where there's an additional charge for any extra PSMs that you want to deploy. I believe that there's some rider where the vendor has a bit of leeway to, at times, charge a premium on whatever additional services you may require above the board."
"Pricing varies based on user count/number of modules you need."
"We are using the cloud platform, but we don't find it compatible to be served as a multi-tenant platform. This is a large drawback. It becomes expensive because it is then an all-dedicated solution. You have to have a separate tenant for each client, which increases the cost. The overall unit pricing can be less expensive than how it is right now."
"I rate the product's price a five on a scale of one to ten, where one is cheap, and ten is expensive."
report
Use our free recommendation engine to learn which Privileged Access Management (PAM) solutions are best for your needs.
893,311 professionals have used our research since 2012.
 

Top Industries

By visitors reading reviews
Financial Services Firm
13%
Manufacturing Company
11%
Computer Software Company
7%
Comms Service Provider
6%
Comms Service Provider
13%
Financial Services Firm
11%
Computer Software Company
8%
Construction Company
8%
 

Company Size

By reviewers
Large Enterprise
Midsize Enterprise
Small Business
By reviewers
Company SizeCount
Small Business59
Midsize Enterprise42
Large Enterprise174
By reviewers
Company SizeCount
Small Business2
Midsize Enterprise2
Large Enterprise6
 

Questions from the Community

How does Sailpoint IdentityIQ compare with CyberArk PAM?
We evaluated Sailpoint IdentityIQ before ultimately choosing CyberArk. Sailpoint Identity Platform is a solution to manage risks in cloud enterprise environments. It automates and streamlines the m...
What do you like most about CyberArk Privileged Access Manager?
The most valuable features of the solution are control and analytics.
What is your experience regarding pricing and costs for CyberArk Privileged Access Manager?
My thoughts on the pricing of CyberArk Privileged Access Manager depend entirely on the vendors' requirements. If they want their things to be secure, they have to spend accordingly. We have four t...
What needs improvement with RSA Identity Governance and Lifecycle?
There is room for improvement with RSA Identity Governance and Lifecycle. As the size becomes larger, the collections and unifications of the IDs process become quite slow, which can be improved fu...
What is your primary use case for RSA Identity Governance and Lifecycle?
We provide RSA Identity Governance and Lifecycle as a service, mainly to oversee the digital identity lifecycle, from the initiation to the off-boarding at the end of that digital identity. Our cli...
What advice do you have for others considering RSA Identity Governance and Lifecycle?
Overall, I would rate RSA Identity Governance and Lifecycle at an eight out of ten.
 

Also Known As

CyberArk Privileged Access Security, CyberArk Enterprise Password Vault
SecurID
 

Overview

 

Sample Customers

Rockwell Automation
NTT Com Asia, Virgin Blue, Bank of Uganda, EMEA Telecommunications Company, LAit (Lazio Innovazione Tecnologica), NyNet, OTP Bank, Red Bull Racing, Rupert House School, Signify, UK Local Authority, Bancolombia, Banco Popular de Puerto Rico (BPPR), TIVIT, Array Services, International Computerware, KPMG LLP, Moffitt Cancer Center
Find out what your peers are saying about CyberArk, One Identity, Okta and others in Privileged Access Management (PAM). Updated: April 2026.
893,311 professionals have used our research since 2012.