We performed a comparison between CyberArk Identity and Entrust Identity Enterprise based on real PeerSpot user reviews.
Find out in this report how the two Identity and Access Management as a Service (IDaaS) (IAMaaS) solutions compare in terms of features, pricing, service and support, easy of deployment, and ROI."The most valuable features of CyberArk Identity are its ability to control access to administrative staff."
"The setup, via cloud, is simple."
"CyberArk Identity is a mature product."
"The initial setup of CyberArk Identity was straightforward."
"I like the RBAC (Role-Based Access Control). It basically involves defining various roles, and then simply assigning those roles to users."
"It has machine learning and can help clients to learn the environment and understand what is happening."
"The integration capabilities, ability to integrate CyberArk into the overall IBB strategy of our current clients."
"If anyone makes an error, or if an incident occurs by accident, the business will not be harmed as a result of this activity."
"Entrust is an enterprise account, and they have a support system. Their training is also top-notch, and they are willing to share their knowledge with their partners."
"I am impressed with Entrust because they are one of the most advanced identity access management companies. Their portfolio of products is well aligned with the CISA zero trust framework. If you compare the features of Entrust products with the CISA pillars of zero trust, you'll see that they're perfectly matched with CISA requirements."
"This solution is flexible and easy to use for our clients. We use it with different kinds of applications and integrate it with different processes."
"It is a scalable solution. You can add users and credentials without problems."
"The integration matrix of the solution is huge compared to others."
"They can include the Mobile Device Management (MDM) feature."
"More integrations would be better."
"We would like to see an improvement in the ability to manage mobile devices."
"The solution's difficulty in gaining skill sets should be improved because it's a vertical product."
"The tool has issues with the third-party SMS gateway. The solution has its own SMS gateway. Integration support is a challenge when we don’t use their SMS gateway. The tool also needs to improve its scalability."
"The solution could be easier to use and I found it to be very complex involving many steps."
"They could improve their UI and make everything more user-friendly."
"In terms of a governance platform, it's worth noting that CyberArk doesn't offer a particularly strong one."
"We are introducing new processes and are migrating to a new version. Once we explore new functionalities, we'll be able to assess what could be improved."
"The product is very costly compared to other alternative solutions."
"I would like to improve the tool's implementation and pricing."
"It functions well on-premises, but integrating it with cloud services like AWS or Azure could be challenging. There are issues with cloud integrations, such as Azure, AWS, and GCP."
CyberArk Identity is ranked 7th in Identity and Access Management as a Service (IDaaS) (IAMaaS) with 17 reviews while Entrust Identity Enterprise is ranked 8th in Identity and Access Management as a Service (IDaaS) (IAMaaS) with 7 reviews. CyberArk Identity is rated 8.2, while Entrust Identity Enterprise is rated 8.8. The top reviewer of CyberArk Identity writes "Allows Linux and Unix administrators to login with single password ". On the other hand, the top reviewer of Entrust Identity Enterprise writes "Provides strong authentication feature, which requires users to enter a one-time password (OTP) ". CyberArk Identity is most compared with Microsoft Intune, CyberArk Privileged Access Manager, Microsoft Entra ID, SailPoint IdentityIQ and PingFederate, whereas Entrust Identity Enterprise is most compared with Microsoft Entra ID, DigiCert PKI Platform, Cisco Duo, Fortinet FortiAuthenticator and RSA Authentication Manager. See our CyberArk Identity vs. Entrust Identity Enterprise report.
See our list of best Identity and Access Management as a Service (IDaaS) (IAMaaS) vendors.
We monitor all Identity and Access Management as a Service (IDaaS) (IAMaaS) reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.