Find out what your peers are saying about Auth0, Ping Identity, Omada and others in Customer Identity and Access Management (CIAM).
They resolved the problem immediately after I reported it, on the same day, within one hour.
They charge reasonable money for the features they provide.
There are times when there is a delay in handling my inquiries via email.
They are very supportive; they just open a ticket, and they support us very professionally.
We had an issue with the Okta Workforce Identity dashboard once in 2023 when we had an outage, but it recovered in a few minutes.
Support responds immediately, but I see that some engineers are new or they don't have experience collecting logs, so they take two to three days to come back.
We can use it on different phones and computers, demonstrating its scalability.
When you have it in the cloud, you have CyberArk every time you need it.
With respect to stability, I find that stability is very good.
Okta Workforce Identity is a stable product.
Integration or deployment is extremely difficult for CyberArk Identity.
There's a need to enhance network performance.
Something they could improve is the management of multifactor authentication.
It could improve in the governance part, particularly regarding better role management and workflow, as I feel it is tedious on Okta.
Okta should have at least a local peering partner for countries that align with or comply with GDPR, so there are no compliance or audit questions.
I believe that if we integrate the workflows section into the main Okta Workforce Identity dashboard, it can be very useful.
Another concern is that support is getting reduced by Workspace ONE; some customers are saying there are support issues on Workspace ONE right now.
Regarding pricing, it can be quite a lot for small companies.
The pricing is acceptable.
If I am not going fully cloud, there are additional resources I will need to purchase, such as spinning more VMs or acquiring an HSM device to encrypt the vault.
It impacts zero trust security strategies. It prevents lateral movements in the organization.
It is the most powerful access management system.
Being able to integrate CyberArk Identity with Microsoft Defender is valuable.
For the end user, it is beneficial as they do not have to remember a password or keep the password on a post-it for different applications; they just authenticate once to access several services and service providers.
You can only log in if you have the access, which protects the applications by avoiding cross-site scripting.
Okta enables multi-factor authentication, which enhances security, especially for SaaS applications.
In UEM, the most helpful part of Windows Management is the baseline policy and central script; using this, you can replace all the AD GPO policy.
CyberArk Identity is a versatile identity management solution suitable for a wide range of enterprises. It is designed to enhance enterprise security and improve user experience. Its focus on security, compliance, and operational efficiency, combined with positive user feedback, makes it a strong contender in the identity management space.
CyberArk Identity offers a robust suite of features to manage user identities and access privileges. It focuses on securing access to resources across various environments, including cloud and on-premises applications. Its capabilities include single sign-on (SSO), multi-factor authentication (MFA), lifecycle management, and privileged access management. These features are engineered to streamline access control, enhance security, and ensure compliance with regulatory standards.
According to our user interviews, CyberArk Identity is praised for its reliability and user-friendly interface. IT professionals highlight the ease of integration with existing systems, while business executives appreciate the visibility it provides into access and identity management across the organization. Users also commend the responsive customer support, which is crucial for enterprise-level solutions.
IT Professionals found that CyberArk Identity's focus on multi-layered security significantly reduced the risk of data breaches and unauthorized access. With a centralized dashboard and automation features, you can streamline identity and access management tasks, saving time and reducing complexity. Finally, it helps meet various compliance requirements.
Okta Workforce Identity is a comprehensive identity and access management (IAM) solution designed to enhance security and streamline user experiences for businesses of all sizes. As a cloud-based platform, it offers a suite of tools that simplify user authentication, authorization, and management across a variety of applications and services.
Core Features
PeerSpot users often praise Okta Workforce Identity for its ease of use and robust security features. IT professionals appreciate the streamlined integration with numerous applications and the flexibility in configuring access policies. Business executives value the enhanced security posture and the ability to enforce compliance across their digital assets.
For IT professionals, Okta Workforce Identity offers a scalable and efficient solution to manage user identities and access rights. The ability to automate routine tasks like user provisioning and deactivation significantly reduces administrative overhead, allowing IT teams to focus on more strategic initiatives. Furthermore, the platform's comprehensive reporting capabilities aid in monitoring and auditing access, which is critical for maintaining security and compliance.
Business executives will find that Okta Workforce Identity aligns with broader organizational goals of operational efficiency and risk management. Its intuitive user experience minimizes disruptions to workforce productivity, while advanced security features like adaptive MFA help mitigate the risk of data breaches. The platform's cloud-based nature ensures scalability and agility, enabling businesses to adapt quickly to changing market conditions and workforce dynamics.
Okta Workforce Identity stands out as a versatile and secure IAM solution, adept at meeting the complex needs of modern enterprises. Its combination of user-friendly features and robust security measures makes it a top choice for organizations aiming to streamline their identity management processes while bolstering their cybersecurity defenses.
VMware Workspace ONE is an intelligence-driven digital workspace platform that delivers any app on any device. It integrates access control, multi-platform endpoint management, and application management. With the VMware Workspace ONE platform, IT teams can deliver a digital workspace that includes the devices and apps of the company’s choice, but with security and control.
VMware Workspace ONE is available:
VMware Workspace ONE Key Features
VMware Workspace ONE Benefits
Some of the benefits of using VMware Workspace ONE include:
Workspace ONE Components
Reviews from Real Users
Below is some feedback from our PeerSpot users who are currently using the solution:
PeerSpot user Patrick B., Cybersecurity Architect at a tech services company, says, "Its UI is extremely easy to use whether you're an advanced user or a novice user. When I first opened it up and had to learn the product, I was easily a novice. By the end of the third month, I was digging into the backend of the system and using it as a highly advanced user to accomplish what I needed to accomplish, and I was able to do it through the UI mostly."
Roshan T., Partner Manager North America at a tech company, mentions how satisfied he is with the product, saying, "You can put all your applications on a mobile device, be it a phone or tablet. It is secure and easy to use. Because it is centrally managed, you don't have to do any configuration on the phone. I just got the phone and connected to the central applications. I just downloaded one thing and everything got rolled out. Email, calendar, and other things were deployed centrally. If you don't have AirWatch, you have to configure your phone manually. For example, you need to deploy and configure your email manually and then synchronize everything. It is much simpler when a mobile device is centrally managed."