Find out in this report how the two Access Management solutions compare in terms of features, pricing, service and support, easy of deployment, and ROI.
I think Cisco Duo offers a good return on investment for startups, newer organizations, or those utilizing cloud-based applications.
I have not seen ROI with Cisco Duo; probably the opposite, because it impedes productivity time to be able to get into the system.
From my point of view, the biggest return on investment when using Cisco Duo is the security and the ease of setting it up.
The return on investment lies in improved security infrastructure, addressing over-privileged access, and reducing the risk of credential compromise, which is a major source of data breaches.
The end users have the authority to reconcile the password or verify it before using session isolation, which is one of the unique features that can be enabled through Privileged Session Manager, preventing any attacks from happening within the organization when connected with sessions through CyberArk Privileged Access Manager.
CyberArk Privileged Access Manager has helped customers save on costs primarily by reducing the number of engineering and information security personnel.
They got back to us quickly, were nice, and gave us what we needed.
Other support sections have failed miserably because of the lack of response time.
I would rate the technical service and customer support of Cisco Duo a ten out of ten.
CyberArk has been exceptional in coming back to us with immediate responses.
It could be forever until you talk to someone who knows what they are doing.
Based on the issue resolution and support quality, I rate the support 10 out of 10.
I believe Cisco Duo is very scalable because it is cloud-based.
We started out with just the basics, getting a token, and then we changed to push, and now, we have added the offline mode.
It scales easily because it is just tied into our identity provider, and it grows along with that.
The CPM can reportedly handle up to 50,000 accounts independently without issue.
I would rate it a ten out of ten for scalability.
They had 40,000 passwords in this one safe, and it was saving the last ten iterations of each password object. That means they had 400,000 password objects in this safe. They exceeded the limit.
When there is a bigger problem, we get notifications from Cisco Duo saying, 'Hey, we have a problem,' and that has helped us.
It is very reliable, easy to use, and I don't have too many issues with it.
There has been no downtime, crashes, or performance issues with Cisco Duo.
Proper fine-tuning and expertise ensure the product performs well.
Overall, the stability of the solution is high.
It has a large customer base and positive feedback within my network.
If you don't have internet access, you can't access your computer, only local access is available.
Cisco should allow easier integration with third-party equipment because Cisco's own equipment is expensive.
There needs to be consideration for how to launch Cisco Duo with a handheld device that is not native, where you can install the application.
They want everything to be on the cloud, but even in the SaaS version of CyberArk Privileged Access Manager, they need to deploy some servers on-premises.
We cannot generate a plug-in for web-based applications.
If they want clients to move to the cloud, they need to support them in real-time.
The approximate cost is around eighty dollars per user.
Licensing is straightforward and convenient for higher education because student populations are included.
I am pleased that the prices remained stable after Cisco acquired the solution.
CyberArk is expensive compared to other products I know.
CyberArk is comparatively expensive compared to other PAM solutions, such as Delinea, especially during renewal.
CyberArk's SaaS solution is particularly expensive.
From a management perspective, I appreciate that we can enroll or control devices on the back end for people who get a new phone and forget to handle Cisco Duo properly and need to add a new device.
The benefit of having a complete passwordless environment in our organization is that it's gotten people away from using the sticky note under their keyboard - which is a huge problem.
A valuable feature of the solution is its hybrid structure, which involves proxy agents running on-premises while other services are on the cloud.
CyberArk Privileged Access Manager helps ensure data privacy because we now know who is using which credentials and at what time.
It keeps a record of activities, allowing me to easily fetch screen recordings to detect any misuse and see who did what and what happened.
It can integrate with Splunk, SNMP, and other solutions and technologies.
Company Size | Count |
---|---|
Small Business | 27 |
Midsize Enterprise | 16 |
Large Enterprise | 36 |
Company Size | Count |
---|---|
Small Business | 59 |
Midsize Enterprise | 41 |
Large Enterprise | 171 |
Cisco Duo is a cloud-based identity security tool offering easy and wide-ranging access protection for users and devices worldwide. It assures identity-first security with clear visibility across multi-cloud, hybrid, and on-premises environments.
Cisco Duo provides robust multi-factor authentication and seamless integration capabilities with existing infrastructures. Appreciated for its stability and speed, it supports distributed workforces by securing VPN access, corporate networks, and cloud services. Duo’s comprehensive identity ecosystem supports easy deployment and management through a single-pane-of-glass management interface. It seamlessly merges with popular platforms like Active Directory and Office 365 across diverse hardware.
What are Cisco Duo’s Essential Features?
What Benefits and ROI Can Cisco Duo Users Expect?
Cisco Duo finds extensive applications across education, finance, retail, and government sectors by fortifying network and application access security. Organizations leverage it for its MFA capabilities, integrating with ERP systems, ensuring protected connectivity with VPN and cloud-based services, crucial in maintaining secure and efficient operations.
CyberArk Privileged Access Manager is a next-generation solution that allows users to secure both their applications and their confidential corporate information. It is extremely flexible and can be implemented across a variety of environments. This program runs with equal efficiency in a fully cloud-based, hybrid, or on-premises environment. Users can now protect their critical infrastructure and access it in any way that best meets their needs.
CyberArk Privileged Access Manager possesses a simplified and unified user interface. Users are able to manage the solution from one place. The UI allows users to view and manage all of the information and controls that administrators need to be able to easily access. Very often, management UIs do not have all of the controls and information streamlined in a single location. This platform provides a level of visibility that ensures users will be able to view all of their system’s most critical information at any time that they wish.
Benefits of CyberArk Privileged Access Manager
Some of CyberArk Privileged Access Manager’s benefits include:
Reviews from Real Users
CyberArk Privileged Access Manager’s software stands out among its competitors for one very fundamental reason. CyberArk Privileged Access Manager is an all-in-one solution. Users are given the ability to accomplish with a single platform what might usually only be accomplished with multiple solutions.
PeerSpot users note the truly all-in-one nature of this solution. Mateusz K., IT Manager at a financial services firm, wrote, "It improves security in our company. We have more than 10,000 accounts that we manage in CyberArk. We use these accounts for SQLs, Windows Server, and Unix. Therefore, keeping these passwords up-to-date in another solution or software would be impossible. Now, we have some sort of a platform to manage passwords, distribute the inflow, and manage IT teams as well as making regular changes to it according to the internal security policies in our bank."
Hichem T.-B., CDO & Co-Founder at ELYTIK, noted that “This is a complete solution that can detect cyber attacks well. I have found the proxy features most valuable for fast password web access.”
We monitor all Access Management reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.