Try our new research platform with insights from 80,000+ expert users

CyberArk Identity vs Microsoft Intune comparison

 

Comparison Buyer's Guide

Executive Summary

Review summaries and opinions

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
 

ROI

Sentiment score
5.2
CyberArk Identity offers time and cost savings, enhancing protection and enabling strategic focus, though financial impact opinions vary.
Sentiment score
5.7
Microsoft Intune boosts cost savings and efficiency by streamlining device management, reducing infrastructure costs, and enhancing security measures.
I have seen over 30% return on investment due to the improvement in operational efficiencies through automation, which enhances productivity.
Everything we've gained from it makes my job easier day after day, and I see value in it as an engineer.
Microsoft Intune not only saves costs by reducing the number of personnel needed but also offers a comprehensive solution for managing laptops, applications, security, individual access, and enrollment.
Importantly, when someone leaves the company, it helps protect document access on their devices.
 

Customer Service

Sentiment score
6.9
CyberArk Identity's support is praised for expertise and quick resolution, despite some concerns about response times and product knowledge.
Sentiment score
5.5
Microsoft Intune support feedback is mixed, with faster resolutions at premium levels but slow response at basic tiers.
They resolved the problem immediately after I reported it, on the same day, within one hour.
They respond immediately when requests are raised, and they are always available for priority one tickets.
They charge reasonable money for the features they provide.
When a support ticket is submitted, it directly reaches someone with Intune support expertise.
When I contacted Microsoft, they had the same expertise, if not more, which is phenomenal because I felt heard and my problem was solved.
Sometimes, the support provided is excellent, and the representative is knowledgeable, while other times, the service needs improvement.
 

Scalability Issues

Sentiment score
7.2
CyberArk Identity offers scalable and adaptable solutions, but some users face challenges with extensive architectural scaling and performance when scaled.
Sentiment score
6.7
Microsoft Intune excels in scalability, efficiently managing thousands of users and devices across diverse environments, supporting seamless expansion.
We can use it on different phones and computers, demonstrating its scalability.
CyberArk Identity is scalable, especially for organizations that are in a cloud environment or organizations using Okta, which is a similar platform.
CyberArk Identity is definitely a scalable solution; it all depends on the money that you have, as with anything else.
The scalability of Microsoft Intune is ten out of ten.
Ideally, we want to automatically segregate devices based on user properties like primary use, but currently, dynamic groups seem limited to device properties.
It supports organizations with 200 endpoints and those with more than 15,000 endpoints.
 

Stability Issues

Sentiment score
7.7
CyberArk Identity is highly reliable, stable, with rare incidents and no downtime, boasting a 99.9% Service Level Agreement.
Sentiment score
6.6
Microsoft Intune is stable and reliable, with users rating its performance highly despite occasional update or sync issues.
We no longer have our data infiltrated by unauthorized persons, and tracking actions within the system has become very easy.
When you have it in the cloud, you have CyberArk every time you need it.
With a stable network, due to the redundant data centers across the globe, it is a lot easier to use as a SaaS solution.
We have not experienced downtime, bugs, or glitches.
Microsoft Intune has been very stable.
A couple of years ago, the performance was not as good as it is now, but there are noticeable backend improvements.
 

Room For Improvement

CyberArk Identity requires enhancements in integration, scalability, usability, and support, focusing on mobile management, interface, and multifactor authentication.
Microsoft Intune needs better application deployment, reporting, macOS/Linux support, platform integration, user-friendliness, remote desktop, and competitive pricing.
Integration or deployment is extremely difficult for CyberArk Identity.
There's a need to enhance network performance.
For CyberArk Identity, you need knowledge of their scripting language to pull different sets of reports.
Features like unlocking devices sometimes fail, and the support offered for other operating systems is insufficient.
There are communication issues, so you might start working with a feature without knowing if it will be deprecated six months from now.
Many third-party companies offer single-pane-of-glass reporting that shows you what your update environment looks like, how your patch is doing, application status, etc., but Intune's reporting is not intuitive.
 

Setup Cost

Enterprise buyers find CyberArk Identity's pricing expensive but justified by comprehensive features and unmatched service for large organizations.
Microsoft Intune offers cost-effective prices with Microsoft 365 bundles, flexible licensing, and discounts for large volumes or specific sectors.
Regarding pricing, it can be quite a lot for small companies.
The pricing is acceptable.
If I am not going fully cloud, there are additional resources I will need to purchase, such as spinning more VMs or acquiring an HSM device to encrypt the vault.
Introductory professional services, like a fast-track service, were included with our E5 membership, and there have been no additional costs.
The Intune suite and add-ons, such as batch management and remote help, are costly.
It costs approximately forty euros per user per month.
 

Valuable Features

CyberArk Identity enhances security and operational efficiency with SSO, MFA, and privileged access control, favored by enterprises.
Microsoft Intune offers seamless integration, robust management, and security features, enhancing remote device management and compliance with a user-friendly interface.
It impacts zero trust security strategies. It prevents lateral movements in the organization.
It is the most powerful access management system.
Being able to integrate CyberArk Identity with Microsoft Defender is valuable.
Intune excels in configuration and compliance management for Windows 10, ensuring devices receive timely updates and adhere to organizational standards.
Dynamic groups allow us to set conditions for automatic membership, eliminating the need for user intervention or manual review and ensuring a seamless workflow.
Windows Autopatch is the most valuable because it removes the burden of patch management.
 

Categories and Ranking

CyberArk Identity
Average Rating
8.2
Reviews Sentiment
6.7
Number of Reviews
28
Ranking in other categories
Authentication Systems (10th), Identity Management (IM) (9th), Authorization Software (3rd), Enterprise Password Managers (8th), User Entity Behavior Analytics (UEBA) (9th), Access Management (5th), Active Directory Management (6th), Cloud Resource Access Management (3rd), Customer Identity and Access Management (CIAM) (6th)
Microsoft Intune
Average Rating
8.2
Reviews Sentiment
6.7
Number of Reviews
301
Ranking in other categories
Configuration Management (2nd), Remote Access (1st), Enterprise Mobility Management (EMM) (1st), Unified Endpoint Management (UEM) (1st), Microsoft Security Suite (1st)
 

Mindshare comparison

While both are Security Software solutions, they serve different purposes. CyberArk Identity is designed for Customer Identity and Access Management (CIAM) and holds a mindshare of 3.8%, down 3.9% compared to last year.
Microsoft Intune, on the other hand, focuses on Unified Endpoint Management (UEM), holds 33.0% mindshare, down 39.7% since last year.
Customer Identity and Access Management (CIAM) Market Share Distribution
ProductMarket Share (%)
CyberArk Identity3.8%
Auth019.8%
Ping Identity Platform11.9%
Other64.5%
Customer Identity and Access Management (CIAM)
Unified Endpoint Management (UEM) Market Share Distribution
ProductMarket Share (%)
Microsoft Intune33.0%
Workspace ONE UEM14.1%
ManageEngine Endpoint Central10.7%
Other42.2%
Unified Endpoint Management (UEM)
 

Featured Reviews

Julio Montero - PeerSpot reviewer
Access management system provides strong security and effortless user authentication
The solution can be deployed on cloud or on-premises. CyberArk is more on the cloud than on local hardware. The deployment is initially quite difficult. That said, when you are doing the implementation of CyberArk, there are so many tutorials that make the learning process very easy. The only complaint could be the language barrier. It's difficult if you don't have a very good level of English. Otherwise, it is very easy. You can have it set up within three months without much difficulty. It's hard to get started, however, once you get going, it gets easier. A full deployment takes half a year or less. There is some maintenance necessary. A company is constantly hiring and letting go of employees. The access is always changing, so access must always be adjusted. Or, if we need another law of filter, we would need to add those, or even take them away. That's another aspect of maintenance.
AkashKamble - PeerSpot reviewer
Enables management of multiple operating systems with a single license
The best feature is that it's a Microsoft product, so if anything goes wrong, we get quick support for anything required. Remote system functionality allows us to sit anywhere and take control of any device via remote management. We can enhance security for clients' laptops with built-in Microsoft Defender, which is available with the Microsoft Intune license. We use it for reporting purposes through endpoint analytics. When pushing scripting, there are two types available: remediation script and reservation script. Through endpoint analytics, you can push defender policies to clients. It helps with reporting, inventory updates, and monitoring tenant status health.
report
Use our free recommendation engine to learn which Customer Identity and Access Management (CIAM) solutions are best for your needs.
867,370 professionals have used our research since 2012.
 

Top Industries

By visitors reading reviews
Financial Services Firm
14%
Computer Software Company
12%
Manufacturing Company
11%
Healthcare Company
6%
Computer Software Company
12%
Financial Services Firm
9%
Manufacturing Company
9%
Government
8%
 

Company Size

By reviewers
Large Enterprise
Midsize Enterprise
Small Business
By reviewers
Company SizeCount
Small Business19
Midsize Enterprise4
Large Enterprise9
By reviewers
Company SizeCount
Small Business116
Midsize Enterprise45
Large Enterprise151
 

Questions from the Community

What do you like most about CyberArk Identity?
The integration capabilities, ability to integrate CyberArk into the overall IBB strategy of our current clients.
What needs improvement with CyberArk Identity?
One area for improvement is the complexity of learning how to use the software for new users. It requires training.
How does Microsoft Intune compare with VMware Workspace One?
Microsoft Intune is a great tool for managing a mobile device fleet while keeping access control. The solution makes it easy to control security and manage the usage of mobile apps when you have a ...
What are the pros and cons of Microsoft Intune?
Microsoft Intune is a great configuration management tool and has a lot of good things going for it. Here are some of the things I like about it: Pros: Protected productivity: Intune gives you th...
How does Google Cloud Identity compare with Microsoft Intune?
Microsoft Intune offers not only an easy-to-deploy data protection and productivity management solution, but also access to both Microsoft’s user community as well as around-the-clock customer s...
 

Also Known As

Idaptive
Intune, MS Intune, Microsoft Endpoint Manager
 

Overview

 

Sample Customers

MLB, Citi, Pfizer, SulAmerica, GE Capital, Shiseido
Mitchells and Buzzers, Callaway
Find out what your peers are saying about Auth0, Ping Identity, Omada and others in Customer Identity and Access Management (CIAM). Updated: August 2025.
867,370 professionals have used our research since 2012.