User Reviews of CyberArk Identity & PingFederate

Updated March 2024

Would you like to learn about products from people using them now? Simplify your research with trusted advice from people like you.

Download our FREE report comparing CyberArk Identity and PingFederate based on reviews, features, and more!

Where should we email your report?






CyberArk Identity review

Avinash Gopu.
Avinash Gopu.
Associate VP & Cyber Security Specialist at US Bank
Allows Linux and Unix administrators to login with single password
The solution helps with auditing, and monitoring, and integrates with Splunk for log analysis. User activity logs are captured in CyberArk Identity and sent to external tools like Splunk for analysis and monitoring. It is integrated with tools like Splunk and Dynatrace for the analysis of risk behavior and user activity. The pushing teams...
PingFederate review

Artsiom Mkrtychan
Artsiom Mkrtychan
Senior Software Engineer at EPAM Systems
A highly stable tool offering extremely helpful technical support to its users
It's a very scalable tool because it allows those working on it to work with clusters, especially if we discuss PingFederate's horizontal scalability. One can use any number of nodes needed, but usually, two or three nodes are enough during the production phase. For how the solution has been set up and programmed, I rate the solution's...

Since 2012, we've had 768,740 professionals use our research.

As seen in