

CyberArk Identity and Azure Key Vault compete in security and identity management solutions. Based on the data, CyberArk Identity has an advantage with its strong identity management and PAM capabilities, while Azure Key Vault excels in key management and integration with Azure services.
Features: CyberArk Identity offers password rotation, strong SSO and MFA capabilities, and privileged account security. Azure Key Vault provides secret storage, key management, and seamless integration with Azure services.
Room for Improvement: CyberArk Identity needs enhancements in Mobile Device Management, user interface, and third-party SMS gateway integration. Azure Key Vault could improve its pricing models, initial setup, and cross-platform integration capabilities.
Ease of Deployment and Customer Service: CyberArk Identity offers deployment flexibility across public and private clouds but requires significant configuration. Customer service feedback suggests mixed reviews. Azure Key Vault focuses on public cloud deployments with seamless Azure integration and generally receives favorable customer feedback, with room to improve support response time.
Pricing and ROI: CyberArk Identity is viewed as expensive, aimed at enterprise-level usage, but offers a high ROI through security value. Azure Key Vault is more affordable, especially for existing Azure customers, with a pay-as-you-go model, but transaction-based costs can increase expenses.
I have seen over 30% return on investment due to the improvement in operational efficiencies through automation, which enhances productivity.
Technical support from Azure responds as quickly as possible without any delay.
I have a strong relationship with Microsoft since we are one of their best clients in Spain.
The skill level of the support staff is also questionable.
They resolved the problem immediately after I reported it, on the same day, within one hour.
They respond immediately when requests are raised, and they are always available for priority one tickets.
I received prompt responses and support, which I would rate as very good.
We can use it on different phones and computers, demonstrating its scalability.
When delving deep into the concepts, there is a lot to address and learn, especially when facing real-time scenarios.
You can scale it out pretty easily, and you can implement it very small.
We no longer have our data infiltrated by unauthorized persons, and tracking actions within the system has become very easy.
When you have it in the cloud, you have CyberArk every time you need it.
With a stable network, due to the redundant data centers across the globe, it is a lot easier to use as a SaaS solution.
My security area wants to rotate passwords every day, every week, or every month, depending on the services.
One of our certificates was not getting deployed, and during that time, the support team was unsure and had to connect with the back-end team for assistance.
The skill level of the support staff is also questionable.
It would be helpful if they released a generalized document for processes such as migration.
Integration or deployment is extremely difficult for CyberArk Identity.
There's a need to enhance network performance.
I would classify it as low priced.
The pricing of Azure Key Vault is nominal, not that expensive.
We are planning to buy protection for Entra.
Regarding pricing, it can be quite a lot for small companies.
The pricing is acceptable.
If I am not going fully cloud, there are additional resources I will need to purchase, such as spinning more VMs or acquiring an HSM device to encrypt the vault.
All secrets are in the Key Vault, and access is managed by the integrated management in ITT, which Azure provides to the services.
It also helps me increase my security posture and assists with regulatory and compliance requirements.
Since implementing Azure Key Vault, I have observed that instead of storing plain values, we can store them securely as and when required.
It impacts zero trust security strategies. It prevents lateral movements in the organization.
The two-factor authentication is very important, but the fact that every account is being regenerated every time we use it is the most important security feature for us.
It is the most powerful access management system.
| Product | Market Share (%) |
|---|---|
| Azure Key Vault | 18.0% |
| CyberArk Identity | 1.1% |
| Other | 80.9% |


| Company Size | Count |
|---|---|
| Small Business | 15 |
| Midsize Enterprise | 11 |
| Large Enterprise | 27 |
| Company Size | Count |
|---|---|
| Small Business | 20 |
| Midsize Enterprise | 4 |
| Large Enterprise | 10 |
Microsoft Azure Key Vault is a cloud-based data security and storage service that allows users to keep their secrets safe from bad actors.
Benefits of Microsoft Azure Key Vault
Some of the benefits of using Microsoft Azure Key Vault include:
Reviews from Real Users
Microsoft Azure Key Vault stands out among their competitors for a number of reasons. Two major ones are the overall robustness of the solution and its ability to protect and manage many different digital asset types. The many features that the solution offers allows users to tailor their experience to meet their specific needs. Its flexibility enables users to accomplish a wide variety of security and identity management related tasks. It empowers users to secure a wide array of assets. Users can keep many different types of secrets away from bad actors.
A cloud architect at a marketing services firm writes, “All its features are really valuable. It's really well thought-out. It's a complete turnkey solution that has all the concerns taken care of, such as access control and management. You can use it in infrastructure as code to create key vaults, APIs, PowerShells, CLIs, even Terraform. You can also use it in different services across the board. If you have app services, or virtual machines, Kubernetes, or Databricks, they can all use Key Vault effectively. In my opinion, in a DevSecOps, DevOps, or even in a modern Azure implementation, you have to use Azure Key Vault to make sure you're addressing security and identity management concerns. By "identity" I mean usernames, passwords, cryptography, etcetera. It's a full-blown solution and it supports most breeds of key management: how you store keys and certify.”
Roger L., the managing director of Cybersecurity Architecture at Peloton Systems, says, “The most valuable aspect of the product is its ability to keep our admin password accounts for keys and a lot of our high-value assets. It can manage those types of assets. So far, the product does a great job of managing keys.”
CyberArk Identity is a versatile identity management solution suitable for a wide range of enterprises. It is designed to enhance enterprise security and improve user experience. Its focus on security, compliance, and operational efficiency, combined with positive user feedback, makes it a strong contender in the identity management space.
CyberArk Identity offers a robust suite of features to manage user identities and access privileges. It focuses on securing access to resources across various environments, including cloud and on-premises applications. Its capabilities include single sign-on (SSO), multi-factor authentication (MFA), lifecycle management, and privileged access management. These features are engineered to streamline access control, enhance security, and ensure compliance with regulatory standards.
According to our user interviews, CyberArk Identity is praised for its reliability and user-friendly interface. IT professionals highlight the ease of integration with existing systems, while business executives appreciate the visibility it provides into access and identity management across the organization. Users also commend the responsive customer support, which is crucial for enterprise-level solutions.
IT Professionals found that CyberArk Identity's focus on multi-layered security significantly reduced the risk of data breaches and unauthorized access. With a centralized dashboard and automation features, you can streamline identity and access management tasks, saving time and reducing complexity. Finally, it helps meet various compliance requirements.
We monitor all Enterprise Password Managers reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.