Try our new research platform with insights from 80,000+ expert users

CyberArk Identity vs Microsoft BitLocker comparison

 

Comparison Buyer's Guide

Executive Summary

Review summaries and opinions

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
 

ROI

Sentiment score
7.7
Users praised CyberArk Identity for its long-term value, cost savings, and contribution to a secure environment.
Sentiment score
7.4
Microsoft BitLocker provides ROI by enhancing data security through encryption, aligning with GDPR, and simplifying adoption within Windows 10.
 

Customer Service

Sentiment score
6.3
CyberArk Identity support is praised for resolution speed but criticized for slow responses and limited staff product knowledge.
Sentiment score
6.5
Users appreciate responsive Microsoft support, though experiences vary; Premier contracts generally enhance satisfaction despite occasional speed and expertise issues.
They resolved the problem immediately after I reported it, on the same day, within one hour.
They charge reasonable money for the features they provide.
There are times when there is a delay in handling my inquiries via email.
They are very responsive and very good.
 

Scalability Issues

Sentiment score
7.6
CyberArk Identity offers strong scalability for diverse enterprises, with successful implementations; some users experience performance issues at higher scales.
Sentiment score
7.4
Microsoft BitLocker scales well from small to large organizations with minimal infrastructure and centralized management, despite device-specific limitations.
We can use it on different phones and computers, demonstrating its scalability.
 

Stability Issues

Sentiment score
7.9
CyberArk Identity is praised for high stability and reliability, with a 99.9% SLA ensuring minimal disruptions and strong support.
Sentiment score
8.0
Microsoft BitLocker is stable and highly rated, with minor TPM issues resolved easily and no significant performance impact.
When you have it in the cloud, you have CyberArk every time you need it.
With respect to stability, I find that stability is very good.
 

Room For Improvement

CyberArk Identity requires enhancements in mobile management, scalability, integration, usability, governance, translation, multifactor authentication, support, and reporting.
Users seek Microsoft BitLocker improvements in compatibility, speed, customization, integration, UI, setup, support, authentication, management, reporting, and pricing.
There's a need to enhance network performance.
Integration or deployment is extremely difficult for CyberArk Identity.
To enhance the product, they can consider improving the user interface of the software.
I recommend Microsoft BitLocker for people who do not have the money for other solutions, such as Kaspersky.
 

Setup Cost

CyberArk Identity is costly but offers value with flexible licensing, appealing to enterprises despite potential setup costs.
Microsoft BitLocker is cost-effective for enterprises as it's included in Microsoft licenses, reducing additional encryption solution costs.
Regarding pricing, it can be quite a lot for small companies.
If I am not going fully cloud, there are additional resources I will need to purchase, such as spinning more VMs or acquiring an HSM device to encrypt the vault.
The pricing is acceptable.
I think the price for Microsoft BitLocker is very good based on our experience with our customers.
 

Valuable Features

CyberArk Identity integrates diverse IDs with Active Directory, enhancing security with features like MFA, SSO, and compliance tracking.
Microsoft BitLocker provides robust, cost-effective disk encryption with seamless Windows integration, offering strong security features and manageability.
It impacts zero trust security strategies. It prevents lateral movements in the organization.
Being able to integrate CyberArk Identity with Microsoft Defender is valuable.
CyberArk Identity provides an easy identity portal, single console, log capture for GRC compliance, and efficiently rotates passwords unknown to users, enhancing security.
When a user asks for a recovery key, it consists of 32 numbers to unlock their PC.
 

Categories and Ranking

CyberArk Identity
Average Rating
8.2
Reviews Sentiment
7.0
Number of Reviews
23
Ranking in other categories
Authentication Systems (9th), Identity Management (IM) (10th), Authorization Software (3rd), Enterprise Password Managers (8th), User Entity Behavior Analytics (UEBA) (9th), Access Management (6th), Active Directory Management (8th), Cloud Resource Access Management (2nd), Customer Identity and Access Management (CIAM) (8th)
Microsoft BitLocker
Average Rating
8.2
Reviews Sentiment
7.4
Number of Reviews
66
Ranking in other categories
Endpoint Encryption (1st), Mobile Data Protection (1st)
 

Mindshare comparison

CyberArk Identity and Microsoft BitLocker aren’t in the same category and serve different purposes. CyberArk Identity is designed for Customer Identity and Access Management (CIAM) and holds a mindshare of 3.7%, up 3.4% compared to last year.
Microsoft BitLocker, on the other hand, focuses on Endpoint Encryption, holds 38.2% mindshare, down 40.1% since last year.
Customer Identity and Access Management (CIAM)
Endpoint Encryption
 

Featured Reviews

Julio Montero - PeerSpot reviewer
Access management system provides strong security and effortless user authentication
The solution can be deployed on cloud or on-premises. CyberArk is more on the cloud than on local hardware. The deployment is initially quite difficult. That said, when you are doing the implementation of CyberArk, there are so many tutorials that make the learning process very easy. The only complaint could be the language barrier. It's difficult if you don't have a very good level of English. Otherwise, it is very easy. You can have it set up within three months without much difficulty. It's hard to get started, however, once you get going, it gets easier. A full deployment takes half a year or less. There is some maintenance necessary. A company is constantly hiring and letting go of employees. The access is always changing, so access must always be adjusted. Or, if we need another law of filter, we would need to add those, or even take them away. That's another aspect of maintenance.
Ibrahin Gamal - PeerSpot reviewer
Data protection improves while users adapt to user access complexities
Recovery options are useful with Microsoft BitLocker. When we get the recovery key from Microsoft, people who we show how BitLocker works did not know the facts about BitLocker. When we tell them about recovery keys, it is very difficult for them to get to the users who have issues in their PCs and do not have the knowledge. When IT asked about the scenario, it was difficult for them. They needed something where they could go to the administration portal to unlock the PC for the user, but we tell them that when a user asks for a recovery key, it consists of 32 numbers to unlock their PC. They observed cost savings after implementing Microsoft BitLocker because they requested BitLocker with System Center. They found that it did not have a high cost, as it is a built-in feature in Windows. When they asked about other solutions, it was very expensive for large numbers in other corporates or organizations. They were very satisfied with Microsoft BitLocker with System Center Configuration Manager.
report
Use our free recommendation engine to learn which Customer Identity and Access Management (CIAM) solutions are best for your needs.
857,028 professionals have used our research since 2012.
 

Top Industries

By visitors reading reviews
Financial Services Firm
18%
Computer Software Company
13%
Manufacturing Company
10%
Healthcare Company
6%
Computer Software Company
11%
Government
10%
Manufacturing Company
9%
Financial Services Firm
9%
 

Company Size

By reviewers
Large Enterprise
Midsize Enterprise
Small Business
 

Questions from the Community

What do you like most about CyberArk Identity?
The integration capabilities, ability to integrate CyberArk into the overall IBB strategy of our current clients.
What is your experience regarding pricing and costs for CyberArk Identity?
The pricing is acceptable. It is worth considering what we are protecting with the amount charged.
What needs improvement with CyberArk Identity?
To enhance the product, they can consider improving the user interface of the software and possibly the customer support team. Sometimes, there is a delay in handling my inquiries via email, which ...
What should one take into account when replacing PGP with Microsoft BitLocker?
Beware to make backup of useful data, then use reverse decryption policy from Symantec panel/McAfee ePO to decrypt the DE partitions while it is sometimes more straightforward and faster to reinsta...
Would you choose Microsoft BitLocker or McAfee Complete Data Protection?
Microsoft BitLocker is very intuitive and easy to maintain. It is basically the global standard solution for drive encryption and successfully fulfills regulatory needs in terms of data protection....
How does Microsoft BitLocker compare with Symantec Endpoint Encryption?
Microsoft BitLocker is very intuitive and easy to maintain. It is basically the global standard solution for drive encryption and it successfully fulfills regulatory needs in terms of data protecti...
 

Also Known As

Idaptive
BitLocker, MS BitLocker
 

Overview

 

Sample Customers

MLB, Citi, Pfizer, SulAmerica, GE Capital, Shiseido
ACV, Proaxis Therapy, Choice Hotels International, adnymics GmbH, Intermedia, NMBS/SNCB
Find out what your peers are saying about Auth0, Ping Identity, Okta and others in Customer Identity and Access Management (CIAM). Updated: June 2025.
857,028 professionals have used our research since 2012.