We performed a comparison between CyberArk Privileged Access Manager and NetIQ Identity Manager based on real PeerSpot user reviews.
Find out what your peers are saying about CyberArk, Delinea, BeyondTrust and others in Privileged Access Management (PAM)."It is an extremely scalable solution."
"We have demoted a lot of domain admins and taken a lot of that away from people, giving it a shared account structure."
"The password management feature is valuable."
"It takes people out of the machine work of ensuring credentials remain up-to-date, and handles connection brokering such that human usage and credential management remain independent."
"Provides improved security around having your credentials locked down and rotated regularly."
"The most valuable features of the solution are control and analytics."
"It allows users to self-provision access to the accounts that they need."
"PSM (Privilege Session Manager."
"The most valuable features are Password Reset Alerts, Password Sync, and SQL connectors."
"The most valuable feature of NetIQ Identity Manager for identity synchronization is the ability to provide users with all necessary access on day one through automated provisioning, facilitated by approval workflows."
"The most valuable features of NetIQ Identity Manager are the synchronization of different directories, such as Active Directory. We have many Active Directory systems, not only one."
"The main value lies in the simplicity of implementation, as well as its customized look and feel."
"The access request management has improved significantly in terms of its user interface. What sets it apart from competitors like SailPoint is that it's an event-based solution rather than schedule-based. That's a key differentiator."
"The most valuable feature of this solution has been the ability for us to integrate a lot of external systems, and the automatic transfer of a lot of identity information. Additionally, the customization is very good."
"It's a very flexible tool, so you can synchronize multiple sources of data and you have multiple connections to various kinds of systems."
"I like the eDirectory feature."
"More additional features as far as the REST is concerned, because we have something which was the predecessor to REST. A lot of the features which were in the predecessor have not necessarily been ported over to REST yet."
"There is room for improvement in the availability of custom connectors on the marketplace for this solution. Additionally, their services for the CICD pipeline and ease of integration could be improved."
"The current interface doesn't scale that well, and has some screens still in the old layout."
"It should be easier to install. It is a comprehensive product, which makes it difficult to install. You need to have their consulting services in order to get it all installed and set up correctly because there is so much going on. It would be nice if there were an easier way to do the installation without professional services. I suspect they get a fair amount of their money from professional services. So, there is not a huge incentive."
"For users to access a system via CyberArk Privileged Session Manager, a universal connector needs to be coded in a language called AutoIT and its support for web browsers is so-so. Other products like Centrify have browser plugins that can help automate the process when using their products."
"The tool’s pricing and scalability can be better."
"There is a lot of room for improvement in the report section. I also work on other tools, such as Thycotic, which allows you to create customized reports for your organization's needs. In CyberArk, there are limited reports, whereas in Thycotic or some of the other PAM tools, because the database is different, you can customize the report based on your needs through SQL queries."
"We would like to expand the usage of the auto discovery accounts feed, then on our end, tie in the REST API for automation."
"If it could be operated in such a way that anybody could use it, with just the user interface, and there's no need for programming, then that would be a great improvement."
"NetIQ Identity Manager could improve by updating the user portal, it is out of date."
"It needs some modern features. They should improve and modernize their management interface. It has been created over years and by different persons. You can see different applications, different management consoles for different things. There should be an integrated interface."
"We have another system that is using the SAML system, and we also integrate with Active Directory only. If NetIQ Identity Manager can integrate directly, we would not need to use the Active Directory directory."
"The integrations must be made easier."
"The interface is old and outdated, and the design software seems archaic."
"The solution architecture is somewhat complex. For some components, the necessary resilience is not inherent."
"Areas for improvement are further enhancing the access granting process to reduce time and improve accuracy."
More CyberArk Privileged Access Manager Pricing and Cost Advice →
CyberArk Privileged Access Manager is ranked 1st in Privileged Access Management (PAM) with 144 reviews while NetIQ Identity Manager is ranked 8th in User Provisioning Software with 17 reviews. CyberArk Privileged Access Manager is rated 8.8, while NetIQ Identity Manager is rated 7.8. The top reviewer of CyberArk Privileged Access Manager writes "Lets you ensure relevant, compliant access in good time and with an audit trail, yet lacks clarity on MITRE ATT&CK". On the other hand, the top reviewer of NetIQ Identity Manager writes "If it works, Designer is a charm, but it can be a pain to keep updated". CyberArk Privileged Access Manager is most compared with Cisco ISE (Identity Services Engine), Microsoft Entra ID, Delinea Secret Server, WALLIX Bastion and One Identity Safeguard, whereas NetIQ Identity Manager is most compared with SailPoint Identity Security Cloud, Microsoft Identity Manager, Microsoft Entra ID, One Identity Manager and ForgeRock.
We monitor all Privileged Access Management (PAM) reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.