

Find out what your peers are saying about Microsoft, Okta, Cisco and others in Access Management.

| Company Size | Count |
|---|---|
| Small Business | 60 |
| Midsize Enterprise | 42 |
| Large Enterprise | 174 |
Beyond Identity offers passwordless authentication to enhance security and simplify the login experience. It integrates smoothly with existing systems, reducing password management issues and ensuring secure access to systems.
Beyond Identity provides a modern approach to identity verification, ensuring high security through passwordless authentication. Users appreciate its strong encryption, multi-factor authentication, and seamless integration. The platform aids in compliance with security standards and is noted for its reliable performance, scalability, and excellent customer support. Areas for improvement include the setup process, connection stability, and support response times, as well as occasional performance lags and confusion from frequent updates.
What are the key features?Implementation of Beyond Identity in industries such as finance, healthcare, and technology demonstrates enhanced security measures and streamlined access for users. Organizations in these sectors benefit from the platform's robust security features and compliance with industry-specific regulations, ensuring a secure and efficient authentication process.
CyberArk Privileged Access Manager safeguards privileged accounts through password management, credential rotation, and session recording. With seamless integration and real-time monitoring, it ensures robust security across platforms.
CyberArk Privileged Access Manager is recognized for its extensive capabilities in managing and securing privileged accounts. It offers vital functionalities such as automatic password rotation, real-time session monitoring, and cross-platform integration through APIs and custom connectors. Users find the flexibility in workflows and granular access controls beneficial, particularly in protecting access across cloud and on-prem infrastructures. However, improvements in its interface, installation process, plugin support, and integration with third-party tools are often suggested. Pricing is a concern for many, along with the need for better dashboard reporting, user provisioning, and enhanced documentation. Organizations leverage this tool for encrypting and monitoring critical account activities and automating password management to bolster security.
What are the key features of CyberArk Privileged Access Manager?CyberArk Privileged Access Manager finds substantial use in industries such as finance, healthcare, and technology, where the protection of privileged accounts is critical. These sectors rely on its capabilities to manage application credentials securely and provide safe access for developers, administrators, and vendors across various infrastructures.
We monitor all Access Management reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.