We performed a comparison between CyberArk Identity and Microsoft Entra ID based on real PeerSpot user reviews.
Find out in this report how the two Single Sign-On (SSO) solutions compare in terms of features, pricing, service and support, easy of deployment, and ROI."The integration capabilities, ability to integrate CyberArk into the overall IBB strategy of our current clients."
"The initial setup is straightforward. It takes me up to an hour and a half."
"The user self-service program and the Office 365 provisioning service feature are the most valuable. It is a very easy and feature-rich solution that gives priority to the users and security."
"It has machine learning and can help clients to learn the environment and understand what is happening."
"The solution helps with auditing, and monitoring, and integrates with Splunk for log analysis. User activity logs are captured in CyberArk Identity and sent to external tools like Splunk for analysis and monitoring."
"The most valuable feature of CyberArk Identity is the adaptive interface."
"The initial setup of CyberArk Identity was straightforward."
"The user identification is simplified, and managing user privileges, whether adding or revoking them, is also quite straightforward when utilizing CyberArk SaaS."
"It has given us the ability to be able to establish single sign-on identities in which we can establish credentials no matter where we are, whether it is on-premises or in the cloud, in a hybrid cloud, or in an additional connection from another cloud where we share equipment or host."
"Overall the solution functions very well, such as the ability to access it from the cloud."
"The most valuable feature of the solution is its ability to delegate roles to each individual resource, which is great."
"It's pretty easy to implement."
"It's very good at not disrupting the user experience."
"The most valuable feature is the authentication platform."
"Privileged Identity Management (PIM), managed identities, dynamic groups, and extension and security attributes are all great features."
"Two very important features in terms of security are governance and compliance through the Conditional Access policies and Azure Log Analytics."
"I'm not sure what needs improvement. It is a good platform."
"The solution could be easier to use and I found it to be very complex involving many steps."
"CyberArk Identity's GUI is an area with certain shortcomings that need improvement."
"In terms of a governance platform, it's worth noting that CyberArk doesn't offer a particularly strong one."
"There is room for improvement in documentation. The documentation could be more specific about the changes needed to achieve specific goals."
"CyberArk Identity could improve by having the ability to better manage the network, such as Cisco. There seem to be some issues in this area."
"The solution's difficulty in gaining skill sets should be improved because it's a vertical product."
"The product needs to leverage the cloud more, especially in the financial sector, where cloud adoption might be limited. Proper reporting within the cloud is essential. The tool should be more user-friendly to expedite access for users. The current agent-based system poses challenges if a user loses access to the server, making tasks difficult to perform. It should also improve technical support."
"It would be awesome to have a feature where you can see the permissions of a user in all their Azure subscriptions. Right now, you have to select a user, then you have to select the subscription to see which permissions the user has in their selected subscriptions. Sometimes, you just want to know, "Does that user have any permissions in any subscriptions?" That would be awesome if that would be available via the portal."
"The scalability of the solution is good."
"For the end users, it can be confusing if they have worked for another company that had the Authenticator app. It is tricky if they have already had the Authenticator app and then work somewhere else. If they have to download it again and use it again on their phone, it is something that gets complicated. I know how to get through it. They just need to uninstall and reinstall the application, but for them, sometimes, it is confusing."
"For example, there were some authentication features that, for security purposes, had certain limitations. Those limitations still exist, but the portal now has options so that the customers can make custom features to manage their identity."
"Many people believe that the Azure Active Directory is overly complicated and antiquated."
"There is no great solution in the cloud for Conditional Access authentication and RADIUS-type authentication."
"Everything should be in one package. There are so many different packages. They need to provide guidance because there are so many features and we don't know how to implement them in our organization."
"Azure Active Directory could improve by having an authentication service for laptops or desktop computers running Mac and Linux operating systems. They currently have authentication capabilities for Microsoft Windows. Having this capability would benefit people because in today's world everybody is working from the home environment."
CyberArk Identity is ranked 9th in Single Sign-On (SSO) with 17 reviews while Microsoft Entra ID is ranked 1st in Single Sign-On (SSO) with 190 reviews. CyberArk Identity is rated 8.2, while Microsoft Entra ID is rated 8.6. The top reviewer of CyberArk Identity writes "Allows Linux and Unix administrators to login with single password ". On the other hand, the top reviewer of Microsoft Entra ID writes "Allows users to authenticate from home and has excellent integrations in a simple, stable solution". CyberArk Identity is most compared with Microsoft Intune, CyberArk Privileged Access Manager, SailPoint IdentityIQ, PingFederate and VMware Workspace ONE, whereas Microsoft Entra ID is most compared with Microsoft Intune, Google Cloud Identity, CyberArk Privileged Access Manager, Yubico YubiKey and Cisco Duo. See our CyberArk Identity vs. Microsoft Entra ID report.
See our list of best Single Sign-On (SSO) vendors, best Identity and Access Management as a Service (IDaaS) (IAMaaS) vendors, and best Access Management vendors.
We monitor all Single Sign-On (SSO) reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.