


Find out what your peers are saying about Okta, Ping Identity, Microsoft and others in Customer Identity and Access Management (CIAM).
I have seen over 30% return on investment due to the improvement in operational efficiencies through automation, which enhances productivity.
From a pricing perspective, although it was more expensive than the competition, the price-performance ratio was perfect for our business needs.
The support staff are engineers, not just frontline personnel, ensuring expert assistance.
Their support is excellent.
They resolved the problem immediately after I reported it, on the same day, within one hour.
They respond immediately when requests are raised, and they are always available for priority one tickets.
I received prompt responses and support, which I would rate as very good.
It was perfect, and I had no reason to complain.
The tool is very scalable and meets our customers' needs.
We can use it on different phones and computers, demonstrating its scalability.
When delving deep into the concepts, there is a lot to address and learn, especially when facing real-time scenarios.
You can scale it out pretty easily, and you can implement it very small.
We no longer have our data infiltrated by unauthorized persons, and tracking actions within the system has become very easy.
When you have it in the cloud, you have CyberArk every time you need it.
With a stable network, due to the redundant data centers across the globe, it is a lot easier to use as a SaaS solution.
By default, the user profile does not contain the name, first name, or address, which I would expect.
Auth0 could be made more accessible to beginners.
A reduction of 20-25% would be great.
It would be helpful if they released a generalized document for processes such as migration.
Integration or deployment is extremely difficult for CyberArk Identity.
There's a need to enhance network performance.
The cost of the solution itself was cost-effective enough that I didn't even need to compare it with EntraID.
Regarding pricing, it can be quite a lot for small companies.
The pricing is acceptable.
If I am not going fully cloud, there are additional resources I will need to purchase, such as spinning more VMs or acquiring an HSM device to encrypt the vault.
The solution was more expensive than the competition, but considering our business needs, it was perfectly aligned with the price-performance aspect.
The most important feature for me was the ease of use, as it needed to be easy to integrate into my platform.
The most valuable feature of Auth0 is its customizability.
The best features Auth0 offers are its scalability and it is a better way of authenticating a user compared to just a tokenized version of authentication where the token is static and does not offer dynamic authentication compared to how Auth0 offers it.
It impacts zero trust security strategies. It prevents lateral movements in the organization.
The two-factor authentication is very important, but the fact that every account is being regenerated every time we use it is the most important security feature for us.
It is the most powerful access management system.
The ability to share credentials easily and securely was a big improvement.
| Product | Market Share (%) |
|---|---|
| Auth0 Platform | 14.6% |
| Okta Platform | 14.8% |
| Ping Identity Platform | 8.6% |
| Other | 62.0% |
| Product | Market Share (%) |
|---|---|
| CyberArk Identity | 3.3% |
| Okta Platform | 14.8% |
| Auth0 Platform | 14.6% |
| Other | 67.3% |
| Product | Market Share (%) |
|---|---|
| Keeper Enterprise Password Manager | 4.9% |
| Azure Key Vault | 17.8% |
| AWS Secrets Manager | 16.3% |
| Other | 61.0% |

| Company Size | Count |
|---|---|
| Small Business | 8 |
| Midsize Enterprise | 4 |
| Large Enterprise | 8 |
| Company Size | Count |
|---|---|
| Small Business | 20 |
| Midsize Enterprise | 4 |
| Large Enterprise | 10 |
| Company Size | Count |
|---|---|
| Small Business | 15 |
| Midsize Enterprise | 4 |
| Large Enterprise | 10 |
Auth0 Platform utilizes JWT-based authentication and supports over 30 social logins, enabling integration with various codebases. Known for robust security, compliance, and scalability, it's tailored for enterprises needing customizable, efficient authentication solutions.
Auth0 Platform is a comprehensive identity management system used for customer, business-to-business, and API authentication across cloud infrastructures like AWS, Azure, and GCP. It simplifies user logins and identity management with features like Single Sign-On, identity federation, and multi-tenancy. Enterprises rely on it for its dynamic authentication capabilities and efficient management of user roles. However, areas for enhancement include authorization features, flexible pricing for small developers, and enhanced documentation for machine-to-machine authentication. Improving multi-tenancy support and customizable login experiences could elevate its appeal.
What are the key features of Auth0 Platform?In industries deploying Auth0 Platform, such as cloud-based service providers and enterprises using API-driven architectures, its implementation focuses on secure and seamless user logins. Many leverage its readiness for scaling authentication processes and its extensibility, including support for Single Sign-On and identity federation, to create streamlined user experiences across businesses. Expanding multi-factor authentication beyond traditional methods and refining social login integrations are common approaches to address specific industry needs.
CyberArk Identity is a versatile identity management solution suitable for a wide range of enterprises. It is designed to enhance enterprise security and improve user experience. Its focus on security, compliance, and operational efficiency, combined with positive user feedback, makes it a strong contender in the identity management space.
CyberArk Identity offers a robust suite of features to manage user identities and access privileges. It focuses on securing access to resources across various environments, including cloud and on-premises applications. Its capabilities include single sign-on (SSO), multi-factor authentication (MFA), lifecycle management, and privileged access management. These features are engineered to streamline access control, enhance security, and ensure compliance with regulatory standards.
According to our user interviews, CyberArk Identity is praised for its reliability and user-friendly interface. IT professionals highlight the ease of integration with existing systems, while business executives appreciate the visibility it provides into access and identity management across the organization. Users also commend the responsive customer support, which is crucial for enterprise-level solutions.
IT Professionals found that CyberArk Identity's focus on multi-layered security significantly reduced the risk of data breaches and unauthorized access. With a centralized dashboard and automation features, you can streamline identity and access management tasks, saving time and reducing complexity. Finally, it helps meet various compliance requirements.
Keeper Enterprise Password Manager provides robust security across devices with two-factor authentication and seamless password sharing for users seeking ease of use and strong encryption.
Keeper Enterprise Password Manager offers a comprehensive solution for managing sensitive information with features like cross-platform compatibility, multi-device access, and complex password generation. Businesses appreciate its user-friendly interfaces and mobile-friendly design that enhances productivity. Keeper supports secure credential management with AES 256 encryption, browser extensions, and cloud storage, catering to both personal and professional needs. Advanced features such as autofill, folder organization, and fingerprint login ensure streamlined operations for individuals and teams.
What features make Keeper Enterprise Password Manager stand out?In industries like finance, healthcare, and education, Keeper Enterprise Password Manager is crucial for securing access credentials and sensitive information. Organizations leverage its features to manage passwords efficiently, ensuring compliance and streamlined operations. Teams benefit from enhanced security protocols and data synchronization across all devices, making it a favored choice in sectors requiring stringent data protection measures.