Find out what your peers are saying about Microsoft, Okta, Ping Identity and others in Single Sign-On (SSO).
I have seen over 30% return on investment due to the improvement in operational efficiencies through automation, which enhances productivity.
From a pricing perspective, although it was more expensive than the competition, the price-performance ratio was perfect for our business needs.
The support staff are engineers, not just frontline personnel, ensuring expert assistance.
Their support is excellent.
They resolved the problem immediately after I reported it, on the same day, within one hour.
They charge reasonable money for the features they provide.
There are times when there is a delay in handling my inquiries via email.
It was perfect, and I had no reason to complain.
The tool is very scalable and meets our customers' needs.
We can use it on different phones and computers, demonstrating its scalability.
We no longer have our data infiltrated by unauthorized persons, and tracking actions within the system has become very easy.
When you have it in the cloud, you have CyberArk every time you need it.
With respect to stability, I find that stability is very good.
By default, the user profile does not contain the name, first name, or address, which I would expect.
A reduction of 20-25% would be great.
Integration or deployment is extremely difficult for CyberArk Identity.
There's a need to enhance network performance.
Something they could improve is the management of multifactor authentication.
The cost of the solution itself was cost-effective enough that I didn't even need to compare it with EntraID.
Regarding pricing, it can be quite a lot for small companies.
The pricing is acceptable.
If I am not going fully cloud, there are additional resources I will need to purchase, such as spinning more VMs or acquiring an HSM device to encrypt the vault.
The solution was more expensive than the competition, but considering our business needs, it was perfectly aligned with the price-performance aspect.
The most important feature for me was the ease of use, as it needed to be easy to integrate into my platform.
The most valuable feature of Auth0 is its customizability.
It impacts zero trust security strategies. It prevents lateral movements in the organization.
It is the most powerful access management system.
Being able to integrate CyberArk Identity with Microsoft Defender is valuable.
The ability to share credentials easily and securely was a big improvement.
Auth0 is a comprehensive identity management solution that securely authenticates and authorizes users on different platforms and applications. It offers seamless integration, easy configuration, and reliable performance for managing identity and access. Users appreciate its flexibility, scalability, and support for multi-factor authentication.
With robust documentation and excellent customer service, Auth0 enables developers to efficiently implement authentication and authorization processes. Its valuable features include easy integration, robust security, seamless single sign-on, and customizable authentication options. Auth0 also enhances organizational operations and productivity by streamlining processes, improving collaboration and communication, reducing errors, and facilitating seamless integration with existing systems.
CyberArk Identity is a versatile identity management solution suitable for a wide range of enterprises. It is designed to enhance enterprise security and improve user experience. Its focus on security, compliance, and operational efficiency, combined with positive user feedback, makes it a strong contender in the identity management space.
CyberArk Identity offers a robust suite of features to manage user identities and access privileges. It focuses on securing access to resources across various environments, including cloud and on-premises applications. Its capabilities include single sign-on (SSO), multi-factor authentication (MFA), lifecycle management, and privileged access management. These features are engineered to streamline access control, enhance security, and ensure compliance with regulatory standards.
According to our user interviews, CyberArk Identity is praised for its reliability and user-friendly interface. IT professionals highlight the ease of integration with existing systems, while business executives appreciate the visibility it provides into access and identity management across the organization. Users also commend the responsive customer support, which is crucial for enterprise-level solutions.
IT Professionals found that CyberArk Identity's focus on multi-layered security significantly reduced the risk of data breaches and unauthorized access. With a centralized dashboard and automation features, you can streamline identity and access management tasks, saving time and reducing complexity. Finally, it helps meet various compliance requirements.
Keeper Enterprise Password Manager provides robust security across devices with two-factor authentication and seamless password sharing for users seeking ease of use and strong encryption.
Keeper Enterprise Password Manager offers a comprehensive solution for managing sensitive information with features like cross-platform compatibility, multi-device access, and complex password generation. Businesses appreciate its user-friendly interfaces and mobile-friendly design that enhances productivity. Keeper supports secure credential management with AES 256 encryption, browser extensions, and cloud storage, catering to both personal and professional needs. Advanced features such as autofill, folder organization, and fingerprint login ensure streamlined operations for individuals and teams.
What features make Keeper Enterprise Password Manager stand out?In industries like finance, healthcare, and education, Keeper Enterprise Password Manager is crucial for securing access credentials and sensitive information. Organizations leverage its features to manage passwords efficiently, ensuring compliance and streamlined operations. Teams benefit from enhanced security protocols and data synchronization across all devices, making it a favored choice in sectors requiring stringent data protection measures.