CyberArk Privileged Access Manager vs SailPoint Identity Security Cloud comparison

Cancel
You must select at least 2 products to compare!
Comparison Buyer's Guide
Executive Summary
Updated on Apr 3, 2022

We performed a comparison between CyberArk Privileged Access Manager and SailPoint IdentityIQ based on our users’ reviews in five categories. After reading all of the collected data, you can find our conclusion below.

  • Ease of Deployment: Users of both solutions say that for the most part their initial setup is complex and requires technical expertise.
  • Features: Users of both products are happy with their performance, stability, and scalability. CyberArk Privileged Access Manager reviewers say it provides them with excellent security, password protection, and monitoring tools. A couple of users mentioned that it lacks flexibility. SailPoint IdentityIQ reviewers say it is reliable and easy to use but they would like to see improvements to the user interface and reporting abilities.
  • Pricing: Reviewers of both solutions feel that their prices are high.

  • ROI: Reviewers of both solutions report seeing an ROI.

  • Service and Support: Most users of both solutions report being satisfied with the level of support they receive.

Comparison Results: Both solutions received high marks from users. CyberArk Privileged Access Manager has an edge over SailPoint IdentityIQ due to its advanced monitoring and reporting abilities.


To learn more, read our detailed Privileged Access Management (PAM) Report (Updated: June 2024).
772,649 professionals have used our research since 2012.
Featured Review
Quotes From Members
We asked business professionals to review the solutions they use.
Here are some excerpts of what they said:
Pros
"CyberArk has allowed us to get the credentials and passwords out of hard-coded property files.""We've written over a hundred custom connectors ourselves that allow us to do all types of privileged session management for various applications. On top of that, the rest of the API-based central credential providers allow us to get away from credentials that may be hard-coded in the script or some application.""CyberArk is a very stable product and it's a stable product because it has a simple design and a simple architecture that allows you to leverage the economies of scale across the base of your infrastructure that you already have implemented. It doesn't really introduce any new complex pieces of infrastructure that would make it that much more difficult to scale.""We found the initial setup to be easy.""It has helped from an auditing perspective identify who has access to privileged accounts.""On the EBB user side, we were able to secure all the server root passwords and admin for Windows. This was a big win for us.""The product is an important security measure against credential theft. It ensures session isolation and password rotation including pushing passwords to the endpoints.""It is a central repository. Therefore, if someone needs to access a server, then they go through CyberArk PAM. It provides a secure way to do this and CyberArk PAM records everything. For example, if you are connecting to a Linux server, then once you get into the Linux server and if it is integrated with CyberArk, it will automatically start recording everything that is being done. In most banks, seeing the recordings is very useful. If there are any gaps or something has happened which shouldn't have happened, then we can check the logs and videos. So, it gives security, in a robust manner, to the organization."

More CyberArk Privileged Access Manager Pros →

"SailPoint IdentityIQ has more enriched out-of-box connectors than the others.""The level of customization for data imports and role modeling, because it helps to integrate faster, support easier and let it reuse the organization role structure.""SailPoint IdentityIQ has a good and straightforward user interface. They also have a lot of resources and documentation available to understand the process.""Provides good authorization and authentication system functionality.""It is a scalable product.""The solution’s stability and performance are good.""We are happy with the SailPoint IdentityIQ’s stability.""​The Certification and Provisioning features are most valuable."

More SailPoint Identity Security Cloud Pros →

Cons
"Having a centralized place to manage the solution has been something that I have always wanted, and they are starting to understand that and bring things back together.""Initial setup is complex. Lots of architecture, lots of planning, and lots of education and training are needed.""I'm not a fan of technical support with CyberArk. It's like jumping through red tape and hoops. Quite frankly, it's almost like when you call CyberArk you get the Help Desk or the level-one. I'm a level-one. I got the CCD, I know how to do the initial troubleshooting. When I call CyberArk it's because I can't figure the problem out. So I need a level-two, three, four. I don't need you to tell me, "Hey, open a ticket and then give me logs."""They need to provide better training for the System Integrator.""The tool’s pricing and scalability can be better.""One thing that could be improved is to create of a better alternative for fixing group policy fees. We currently use Microsoft, but they have introduced new policies that may not be compatible.""There is a lot of room for improvement in the report section. I also work on other tools, such as Thycotic, which allows you to create customized reports for your organization's needs. In CyberArk, there are limited reports, whereas in Thycotic or some of the other PAM tools, because the database is different, you can customize the report based on your needs through SQL queries.""It is web-based, but other competitors have apps. We need to get there. It is just smoother to have an app. You don't have all the bugs from having a browser, and people like them better, since you can get to them via mobile."

More CyberArk Privileged Access Manager Cons →

"Compared to at least one other product some of the administrative tasks could be easier or more intuitive.""One needs to understand that SailPoint is into full-fledged IAM practice with a long-term vision, and customers will get a quick ROI with best practices implementation.""The mover process for this solution could be improved.""The connectors should be improved.""SailPoint IdentityIQ needs to improve its customization. It should also incorporate some standardized tools for implementation.""Scalability is hard, especially when you are doing it in real time.""I would like for the next release to have a more user-friendly interface.""Some setups should be done in the interface and in the code, and could be made simpler."

More SailPoint Identity Security Cloud Cons →

Pricing and Cost Advice
  • "Pricing and licensing depend on the environment."
  • "It is not a cheap solution. It is expensive as compared with other solutions. However, it is one of the best solutions in their domain."
  • "It can be an expensive product."
  • "Cost efficiency is the number one thing that can be improved in my mind. This would change lots of companies minds on purchasing the product."
  • "The cost is high compared to other products."
  • "CyberArk provides all the features bundled. This is compared to other vendors who provide them as a different license for each functionality."
  • "Our risk is definitely significantly lower. Also, our resources are low."
  • "If you are looking at implementing this solution, buy the training and go to it."
  • More CyberArk Privileged Access Manager Pricing and Cost Advice →

  • "SailPoint IIQ is the best of best. That is reflected in the pricing of the solution. The pricing is based on the number of identities."
  • "They are expensive."
  • "The licensing fees are on a yearly basis."
  • "SailPoint is higher in price as compared to Saviynt. The initial cost of SailPoint is very high. There are additional costs to the standard licensing fees."
  • "Its price is okay. It provides good value for money. It is subscription-based. You can go for a one-year or three-year subscription."
  • "The price of the solution could improve, it is not priced well for smaller businesses to afford."
  • "It is a costly solution. Its cost, for sure, should be reduced."
  • "You do pay one price for the license but that price depends on what you choose to include as far as the optional modules go."
  • More SailPoint Identity Security Cloud Pricing and Cost Advice →

    report
    Use our free recommendation engine to learn which Privileged Access Management (PAM) solutions are best for your needs.
    772,649 professionals have used our research since 2012.
    Answers from the Community
    Netanya Carmi
    reviewer02755566 - PeerSpot reviewerreviewer02755566
    Real User

    The two products are actually complimentary. Both companies have been very good about staying in their lanes and are their respective market leaders.


    CyberArk's PAM solution is aimed at protecting privileged accounts by providing features like vaulting, credential rotation, session monitoring and recording. They also have solutions for DevOps and Secrets management.


    SailPoint is an Identity Governance solution and actually manages CyberArk as an application the same way it manages accounts and privileges in SAP, AD, AAD and over 100 more applications. For CyberArk, it can add/change/delete users as well as create safes and assign users to those safes. At a user account certification time, it will show the CyberArk users and their associated privileges and allow the user's manager or other appropriate people to approve or revoke the privileged access. 


    SailPoint creates an Identity warehouse so that a user's accounts and entitlements are gathered, managed and reported on in a centralized manner. See Youtube for a quick explanation - SailPoint Identity Governance Integrates with CyberAek Privileged Access Security. 

    SailPoint does not provide the vault and session management functions that CyberArk does.

    Questions from the Community
    Top Answer:We evaluated Sailpoint IdentityIQ before ultimately choosing CyberArk. Sailpoint Identity Platform is a solution to manage risks in cloud enterprise environments. It automates and streamlines the… more »
    Top Answer:The most valuable features of the solution are control and analytics.
    Top Answer:The product is expensive. I rate the product’s pricing a seven out of ten, where one is cheap and ten is expensive.
    Top Answer:The first valuable feature of the solution is its interface. The second feature of the solution is the level of flexibility it provides.
    Top Answer:The product is expensive. People need to opt for a licensing plan for one year or three years.
    Top Answer:Regarding the scope for improvement in the solution, reporting is an area that can be a bit more UI-oriented. Apart from that, it's a very good product, and I do not have any complaints about it.
    Ranking
    Views
    10,944
    Comparisons
    6,238
    Reviews
    33
    Average Words per Review
    626
    Rating
    8.9
    Views
    5,149
    Comparisons
    3,438
    Reviews
    24
    Average Words per Review
    516
    Rating
    8.4
    Comparisons
    Also Known As
    CyberArk Privileged Access Security
    IdentityIQ, IdentityNow, Cloud Infrastructure Entitlement Management
    Learn More
    Overview

    CyberArk Privileged Access Manager is a next-generation solution that allows users to secure both their applications and their confidential corporate information. It is extremely flexible and can be implemented across a variety of environments. This program runs with equal efficiency in a fully cloud-based, hybrid, or on-premises environment. Users can now protect their critical infrastructure and access it in any way that best meets their needs.

    CyberArk Privileged Access Manager possesses a simplified and unified user interface. Users are able to manage the solution from one place. The UI allows users to view and manage all of the information and controls that administrators need to be able to easily access. Very often, management UIs do not have all of the controls and information streamlined in a single location. This platform provides a level of visibility that ensures users will be able to view all of their system’s most critical information at any time that they wish.

    Benefits of CyberArk Privileged Access Manager

    Some of CyberArk Privileged Access Manager’s benefits include:

    • The ability to manage IDs and permissions across a cloud environment. In a world where being able to work remotely is becoming increasingly important, CyberArk Privileged Access Manager is a very valuable tool. Administrators do not need to worry about infrastructure security when they are away from the office. They can assign and manage security credentials from anywhere in the world.
    • The ability to manage the program from a single centralized UI. CyberArk Privileged Access Manager’s UI contains all of the system controls and information. Users now have the ability to view and use all of their system’s most critical information and controls from one place.
    • The ability to automate user management tasks. Administrators can save valuable time by assigning certain management tasks to be fulfilled by the system itself. Users can now reserve their time for tasks that are most pressing. It can also allow for the system to simplify the management process by having the platform perform the most complex functions.

    Reviews from Real Users

    CyberArk Privileged Access Manager’s software stands out among its competitors for one very fundamental reason. CyberArk Privileged Access Manager is an all-in-one solution. Users are given the ability to accomplish with a single platform what might usually only be accomplished with multiple solutions.

    PeerSpot users note the truly all-in-one nature of this solution. Mateusz K., IT Manager at a financial services firm, wrote, "It improves security in our company. We have more than 10,000 accounts that we manage in CyberArk. We use these accounts for SQLs, Windows Server, and Unix. Therefore, keeping these passwords up-to-date in another solution or software would be impossible. Now, we have some sort of a platform to manage passwords, distribute the inflow, and manage IT teams as well as making regular changes to it according to the internal security policies in our bank."

    Hichem T.-B., CDO & Co-Founder at ELYTIK, noted that “This is a complete solution that can detect cyber attacks well. I have found the proxy features most valuable for fast password web access.”

    SailPoint Identity Security Cloud is a comprehensive identity security solution designed to manage and govern user access in cloud, hybrid, and on-premises environments. It enables organizations to automate identity processes and enforce access policies, ensuring compliance and mitigating risks associated with unauthorized access.

    The SailPoint Identity Security Cloud solution offers robust identity governance capabilities, including user provisioning, access request management, and access certification. It provides advanced analytics and AI-driven insights to help organizations detect and respond to potential security threats. The solution integrates seamlessly with various applications and platforms, supporting a wide range of IT environments and enabling organizations to streamline identity management processes. SailPoint IdentityIQ, a key product within this suite, focuses on on-premises identity governance, offering similar capabilities tailored for complex enterprise environments. IdentityIQ provides extensive configurability and customization, making it suitable for organizations with intricate identity management needs.

    What are the valuable features of SailPoint Identity Security Cloud?

    • User Provisioning and Lifecycle Management: Automates the process of creating, managing, and disabling user accounts across various systems.
    • Access Request Management: Simplifies how users request and obtain access to resources, ensuring that access approvals are in line with compliance policies.
    • Access Certification: Periodically reviews and certifies user access to ensure compliance and security.
    • Advanced Analytics and AI: Uses machine learning to identify risky behaviors and automate responses to potential security threats.
    • Integration Capabilities: Seamlessly connects with a wide range of applications and IT systems, enhancing the flexibility and scalability of identity management.

    What benefits should users look for in reviews when evaluating SailPoint Identity Security Cloud?

    • Enhanced Security: Reviews often highlight how the solution improves overall security by automating identity processes and enforcing stringent access controls.
    • Regulatory Compliance: Users frequently note the ease of meeting compliance requirements through automated access certifications and audits.
    • Operational Efficiency: Many users appreciate the reduction in manual tasks and errors, thanks to automated provisioning and access management.

    In specific industries like healthcare, financial services, and government, SailPoint Identity Security Cloud is implemented to ensure strict compliance with industry regulations, protect sensitive data, and streamline identity management processes. For example, in healthcare, the solution helps manage access to patient records while complying with HIPAA regulations.

    SailPoint Identity Security Cloud and IdentityIQ offer powerful identity governance solutions that enhance security, ensure compliance, and improve operational efficiency across various IT environments.

    Sample Customers
    Rockwell Automation
    Adobe, AXA Technology Services, Cuna Mutual Group, Equifax, ING Direct, Orrstown Bank, Rockwell Automation, SallieMae, Spirit Aerosystems, TEL
    Top Industries
    REVIEWERS
    Financial Services Firm23%
    Insurance Company13%
    Computer Software Company13%
    Healthcare Company9%
    VISITORS READING REVIEWS
    Educational Organization30%
    Computer Software Company12%
    Financial Services Firm10%
    Manufacturing Company5%
    REVIEWERS
    Financial Services Firm33%
    Computer Software Company20%
    University10%
    Energy/Utilities Company10%
    VISITORS READING REVIEWS
    Financial Services Firm17%
    Computer Software Company14%
    Manufacturing Company9%
    Insurance Company6%
    Company Size
    REVIEWERS
    Small Business21%
    Midsize Enterprise13%
    Large Enterprise66%
    VISITORS READING REVIEWS
    Small Business15%
    Midsize Enterprise38%
    Large Enterprise47%
    REVIEWERS
    Small Business33%
    Midsize Enterprise11%
    Large Enterprise56%
    VISITORS READING REVIEWS
    Small Business18%
    Midsize Enterprise12%
    Large Enterprise70%
    Buyer's Guide
    Privileged Access Management (PAM)
    June 2024
    Find out what your peers are saying about CyberArk, Delinea, BeyondTrust and others in Privileged Access Management (PAM). Updated: June 2024.
    772,649 professionals have used our research since 2012.

    CyberArk Privileged Access Manager is ranked 1st in Privileged Access Management (PAM) with 144 reviews while SailPoint Identity Security Cloud is ranked 1st in User Provisioning Software with 62 reviews. CyberArk Privileged Access Manager is rated 8.8, while SailPoint Identity Security Cloud is rated 8.2. The top reviewer of CyberArk Privileged Access Manager writes "Lets you ensure relevant, compliant access in good time and with an audit trail, yet lacks clarity on MITRE ATT&CK". On the other hand, the top reviewer of SailPoint Identity Security Cloud writes "Flexible, easy to customize, and not too difficult to set up". CyberArk Privileged Access Manager is most compared with Cisco ISE (Identity Services Engine), Microsoft Entra ID, Delinea Secret Server, WALLIX Bastion and ARCON Privileged Access Management, whereas SailPoint Identity Security Cloud is most compared with Saviynt, One Identity Manager, Microsoft Entra ID, ForgeRock and Omada Identity.

    We monitor all Privileged Access Management (PAM) reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.