We performed a comparison between CyberArk Privileged Access Manager and SAP Identity Management based on real PeerSpot user reviews.
Find out what your peers are saying about CyberArk, Delinea, BeyondTrust and others in Privileged Access Management (PAM)."You can easily manage more than 4000 accounts with one PSM."
"It gives us the capability to rotate passwords."
"The automatic password management is the most important feature. The second most important feature is the ability to enforce dual control on the release of those passwords. The combination of these two features is the most important thing for us because we can show that we're in control of who uses any non-personal account, and when they do so."
"You can write different types of policies for custom business needs or any developer needs. If they need certain functions allocated, they can be customized easily."
"The most valuable feature is that it always provides flexibility, password quality and one-time user check-in and check-out."
"The password vault and session monitoring are useful."
"The automatic rotation of credentials is probably the most useful feature."
"It's secure and reliable. I especially appreciate that it's locked down and only allows access to authorized components."
"The most valuable features of SAP Identity Management are business roles and automated user provisioning."
"It provides basic automatic user administration and role provisioning to save time."
"Rather than implement a basic SSO, this solution assisted us with setting up two-factor authentication."
"The setup process is straightforward."
"What's most valuable in SAP Identity Management is that it's easily an out-of-the-box solution for connectivity with SAP applications. We do not have to do any customizations, and this makes the solution very compatible with most SAP applications. SAP Identity Management is also very user-friendly."
"The most valuable feature is the user experience for managing information."
"What I like about SAP Identity Management is that it's stable for experienced users and suitable for access management, not just for SAP accounts, but for Active Directory, including file sharing and process sharing."
"The tool's most valuable features are its access control and approval of access requests. The self-service password reset feature is efficient. Role management capabilities streamline user access by assigning and revoking roles."
"The initial setup has room for improvement to be more straightforward."
"They need to provide better training for the System Integrator."
"The current interface is not very intuitive."
"When I was a component owner for PAM's Privileged Threat Analytics (PTA) component, what I wanted was a clear mapping to the MITRE ATT&CK framework, a framework which has a comprehensive list of use cases. We reached out to the vendor and asked them how much coverage they have of the uses cases found on MITRE, which would have given us a better view of things while I was the product owner. Unfortunately they did not have the capability of mapping onto MITRE's framework at that time."
"The PTA could be improved. Currently, companies often have multiple domains and sometimes it's difficult to implement CyberArk in this kind of infrastructure. For example, you can add CPM (Central Policy Manager) and PSM (Privileged Session Manager and PVWA (Password Vault Web Access) for access, but if you want to add PTA (Privileged Threat Analysis) to scan Vault logs, it is difficult because this component may be adding multiple domain environments."
"Report creation could be improved. The policies could be more customized."
"What could be improved in CyberArk Privileged Access Manager is the licensing model. It should be more flexible in terms of the users. Currently, it's based on the number of users, but many users only log in once in four months or once in five months. It would be great if the licensing model could be modified based on user needs. We even have users who have not logged in even once."
"Currently, in Secure Connect, an end user is required to enter account information manually, and cannot save any of this information for future use."
"It needs to have the SSO for the HANA modules that SAP is releasing."
"Research and marketing need to be improved."
"The pricing could be better."
"A lack of startup connectors to different systems, and could have better connectors for SAP IDM."
"I find SAP Identity Management complicated to use. Maintaining it is also complex."
"SAP Identity Management can improve risk analysis and authority checks."
"One of the areas for improvement in the solution is its user interface which needs to be up-to-date and fancier, in particular, have better visualization in terms of the tabs and buttons. The user interface of SAP Identity Management should be improved based on the latest trends."
"I have encountered issues with the host authentication feature."
More CyberArk Privileged Access Manager Pricing and Cost Advice →
CyberArk Privileged Access Manager is ranked 1st in Privileged Access Management (PAM) with 143 reviews while SAP Identity Management is ranked 12th in Identity Management (IM) with 13 reviews. CyberArk Privileged Access Manager is rated 8.8, while SAP Identity Management is rated 7.8. The top reviewer of CyberArk Privileged Access Manager writes "Lets you ensure relevant, compliant access in good time and with an audit trail, yet lacks clarity on MITRE ATT&CK". On the other hand, the top reviewer of SAP Identity Management writes "Allows for seamless integration and provides a unified login experience ". CyberArk Privileged Access Manager is most compared with Cisco ISE (Identity Services Engine), Microsoft Entra ID, Delinea Secret Server, WALLIX Bastion and One Identity Safeguard, whereas SAP Identity Management is most compared with SailPoint IdentityIQ, Microsoft Identity Manager, SAP Customer Data Cloud, Saviynt and One Identity Manager.
We monitor all Privileged Access Management (PAM) reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.