Try our new research platform with insights from 80,000+ expert users

CyberArk Identity vs Microsoft BitLocker comparison

 

Comparison Buyer's Guide

Executive Summary

Review summaries and opinions

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
 

Categories and Ranking

CyberArk Identity
Average Rating
8.2
Reviews Sentiment
7.0
Number of Reviews
23
Ranking in other categories
Authentication Systems (8th), Identity Management (IM) (11th), Authorization Software (3rd), Enterprise Password Managers (8th), User Entity Behavior Analytics (UEBA) (9th), Access Management (6th), Active Directory Management (9th), Cloud Resource Access Management (2nd), Customer Identity and Access Management (CIAM) (6th)
Microsoft BitLocker
Average Rating
8.2
Reviews Sentiment
7.4
Number of Reviews
65
Ranking in other categories
Endpoint Encryption (1st), Mobile Data Protection (1st)
 

Mindshare comparison

CyberArk Identity and Microsoft BitLocker aren’t in the same category and serve different purposes. CyberArk Identity is designed for Customer Identity and Access Management (CIAM) and holds a mindshare of 3.8%, up 3.4% compared to last year.
Microsoft BitLocker, on the other hand, focuses on Endpoint Encryption, holds 39.1% mindshare, down 39.7% since last year.
Customer Identity and Access Management (CIAM)
Endpoint Encryption
 

Featured Reviews

Julio Montero - PeerSpot reviewer
Access management system provides strong security and effortless user authentication
The solution can be deployed on cloud or on-premises. CyberArk is more on the cloud than on local hardware. The deployment is initially quite difficult. That said, when you are doing the implementation of CyberArk, there are so many tutorials that make the learning process very easy. The only complaint could be the language barrier. It's difficult if you don't have a very good level of English. Otherwise, it is very easy. You can have it set up within three months without much difficulty. It's hard to get started, however, once you get going, it gets easier. A full deployment takes half a year or less. There is some maintenance necessary. A company is constantly hiring and letting go of employees. The access is always changing, so access must always be adjusted. Or, if we need another law of filter, we would need to add those, or even take them away. That's another aspect of maintenance.
Douglas Curry - PeerSpot reviewer
Users can easily deploy and manage it
The solution's most valuable feature is that it is simple to deploy and manage. I can't say what features of the tool I like since it is very much a deploy-and-forget product. We don't use any advanced features of the tool in my company. The tool's recovery options are good, especially since it integrates with Active Directory, making everything a simple process. The product's integration capabilities are good.

Quotes from Members

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
 

Pros

"It is very easy to use and is a trusted platform. It protects our platform, application, network, and infrastructure resources on any device."
"The initial setup is straightforward. It takes me up to an hour and a half."
"The user identification is simplified, and managing user privileges, whether adding or revoking them, is also quite straightforward when utilizing CyberArk SaaS."
"The feature that we find most valuable is the ability to integrate multiple IDs for on-premises Active Directory."
"Being able to integrate CyberArk Identity with Microsoft Defender is valuable."
"I found the solution to be stable."
"If anyone makes an error, or if an incident occurs by accident, the business will not be harmed as a result of this activity."
"The tool is a very strong and valuable enterprise solution, particularly in ensuring the continuity of service."
"Being able to encrypt an entire hard disk has been most valuable."
"It maintains security on my computer. Since I travel a lot, it gives me confidence that if, for some reason, my computer is lost, my data won't be compromised."
"It seemed easy, straightforward, and secure."
"You can do a silent remote deployment very fast."
"We have not seen any bugs or glitches, so the stability is good."
"Technical support is excellent."
"BitLocker is completely stable."
"The best thing about it is the encryption type and the way it requires TPM when someone tries to access the drive."
 

Cons

"The tool has issues with the third-party SMS gateway. The solution has its own SMS gateway. Integration support is a challenge when we don’t use their SMS gateway. The tool also needs to improve its scalability."
"It does not have global market penetration, and sometimes, there are support issues."
"To enhance the product, they can consider improving the user interface of the software and possibly the customer support team. Sometimes, there is a delay in handling my inquiries via email, which could be addressed for better service."
"The solution's difficulty in gaining skill sets should be improved because it's a vertical product."
"I'm not sure what needs improvement. It is a good platform."
"Something they could improve is the management of multifactor authentication. When you translate the page from one language to another, it can be a difficult process."
"In terms of general user feedback, the more security you put in front of a user, the more they complain. So usability and the user experience are always a challenge. So there's always room for improvement."
"Integration or deployment is extremely difficult for CyberArk Identity."
"We recently found some stability issues with Microsoft BitLocker."
"It is not good for cross-compatibility, so our Mac users are not able to use it."
"More customization options would have been nice, such as password selection, actions when the screen is locked, etc."
"The only thing that could be slightly improved is the occasional stability issue."
"Some of the technical internal functions, such as encryption protocols or something similar, could be improved."
"I would recommend BitLocker only because of the economic side, not the technical side. If the features were included in the already existing licenses I would use it. If not, I would recommend other products."
"The deployment process regarding prerequisites and automation could be easy to understand."
"The primary aspect for improvement lies in expanding our developer base, which would accelerate the development process and bring these enhancements to fruition"
 

Pricing and Cost Advice

"Their pricing is obviously a lot higher than many vendors in the marketplace but their service is also unmatched."
"It's not that affordable compared to Delinea or other products. They're less expensive and allow more customization. For the cost, it is expensive."
"The solution is cheap and I rate its pricing an eight out of ten."
"The pricing is acceptable. It is worth considering what we are protecting with the amount charged."
"There is an initial license and then there is a subscription needed."
"We find that the pricing and licensing of this solution is adequate, as compared to the other competitors in the market."
"I would rate the tool’s pricing a seven out of ten. The product’s pricing is expensive and is on a yearly basis. You will need to pay around 10,000 GBP for 500 users."
"The pricing point is very good. I compared it with other products, and it does not require a heavy investment."
"It is a totally free solution."
"The solution is priced low. I would rate the product's pricing one out of ten."
"BitLocker is already in Windows 10 and its price has already been "paid"."
"I think it's reasonably priced because I've never heard any complaints from my company about its costs."
"The solution’s pricing is reasonable."
"We can activate the product at no cost."
"BitLocker is included in our license and doesn't cost us anything extra."
"It's not about pricing, because we are working with Enterprise companies that already have Windows Enterprise, so BitLocker comes already included as a Windows feature. It's free for Enterprise users. The price is only for deployment. The customer will pay for McAfee, however."
report
Use our free recommendation engine to learn which Customer Identity and Access Management (CIAM) solutions are best for your needs.
849,686 professionals have used our research since 2012.
 

Top Industries

By visitors reading reviews
Financial Services Firm
17%
Computer Software Company
14%
Manufacturing Company
11%
Healthcare Company
6%
Computer Software Company
12%
Government
10%
Manufacturing Company
9%
Financial Services Firm
9%
 

Company Size

By reviewers
Large Enterprise
Midsize Enterprise
Small Business
 

Questions from the Community

What do you like most about CyberArk Identity?
The integration capabilities, ability to integrate CyberArk into the overall IBB strategy of our current clients.
What is your experience regarding pricing and costs for CyberArk Identity?
The pricing point is very good. I compared it with other products, and it does not require a heavy investment.
What needs improvement with CyberArk Identity?
It does not have global market penetration, and sometimes, there are support issues. CyberArk Identity can definitely improve on the IAM rules when I create them. The stability can also be better.
What should one take into account when replacing PGP with Microsoft BitLocker?
Beware to make backup of useful data, then use reverse decryption policy from Symantec panel/McAfee ePO to decrypt the DE partitions while it is sometimes more straightforward and faster to reinsta...
Would you choose Microsoft BitLocker or McAfee Complete Data Protection?
Microsoft BitLocker is very intuitive and easy to maintain. It is basically the global standard solution for drive encryption and successfully fulfills regulatory needs in terms of data protection....
How does Microsoft BitLocker compare with Symantec Endpoint Encryption?
Microsoft BitLocker is very intuitive and easy to maintain. It is basically the global standard solution for drive encryption and it successfully fulfills regulatory needs in terms of data protecti...
 

Also Known As

Idaptive
BitLocker, MS BitLocker
 

Overview

 

Sample Customers

MLB, Citi, Pfizer, SulAmerica, GE Capital, Shiseido
ACV, Proaxis Therapy, Choice Hotels International, adnymics GmbH, Intermedia, NMBS/SNCB
Find out what your peers are saying about Auth0, Ping Identity, Omada and others in Customer Identity and Access Management (CIAM). Updated: April 2025.
849,686 professionals have used our research since 2012.