CyberArk Identity vs Red Hat Single Sign On comparison

Cancel
You must select at least 2 products to compare!
Comparison Buyer's Guide
Executive Summary

We performed a comparison between CyberArk Identity and Red Hat Single Sign On based on real PeerSpot user reviews.

Find out what your peers are saying about Microsoft, Fortinet, Auth0 and others in Single Sign-On (SSO).
To learn more, read our detailed Single Sign-On (SSO) Report (Updated: November 2022).
655,994 professionals have used our research since 2012.
Quotes From Members
We asked business professionals to review the solutions they use.
Here are some excerpts of what they said:
Pros
"The most valuable features of CyberArk Identity are its ability to control access to administrative staff.""If anyone makes an error, or if an incident occurs by accident, the business will not be harmed as a result of this activity.""I found the solution to be stable.""The setup, via cloud, is simple.""The initial setup is straightforward. It takes me up to an hour and a half."

More CyberArk Identity Pros →

"Good support for single sign-on protocols."

More Red Hat Single Sign On Pros →

Cons
"The user interface could be improved.""They could improve their UI and make everything more user-friendly.""The solution could be easier to use and I found it to be very complex involving many steps.""CyberArk Identity could improve by having the ability to better manage the network, such as Cisco. There seem to be some issues in this area.""More integrations would be better."

More CyberArk Identity Cons →

"Security could be improved."

More Red Hat Single Sign On Cons →

Pricing and Cost Advice
  • "There is an initial license and then there is a subscription needed."
  • More CyberArk Identity Pricing and Cost Advice →

    Information Not Available
    report
    Use our free recommendation engine to learn which Single Sign-On (SSO) solutions are best for your needs.
    655,994 professionals have used our research since 2012.
    Questions from the Community
    Top Answer:The user self-service program and the Office 365 provisioning service feature are the most valuable. It is a very easy and feature-rich solution that gives priority to the users and security.
    Top Answer:They can include the Mobile Device Management (MDM) feature.
    Top Answer:We sell as well as use this solution for our IT operations. We are using it for single sign-on. We are a small company, and we have a few users of this solution.
    Top Answer:Good support for single sign-on protocols.
    Top Answer:I think they could provide additional features in terms of users trying to manipulate the system with regard to security. Some of the paid systems on cloud offer many of the similar features in terms… more »
    Top Answer:The primary use case of this solution is for single sign-on for a set of applications that we had developed. I'm a solutions architect.
    Ranking
    5th
    Views
    2,223
    Comparisons
    1,814
    Reviews
    6
    Average Words per Review
    319
    Rating
    9.0
    14th
    Views
    1,776
    Comparisons
    846
    Reviews
    1
    Average Words per Review
    271
    Rating
    7.0
    Comparisons
    Also Known As
    Idaptive
    Red Hat Single Sign-On, Red Hat SSO, RH SSO, RH-SSO
    Learn More
    Overview

    GRANT ACCESS TO YOUR WORKFORCE. GIVE NOTHING TO ATTACKERS.
    Your users need quick access to a variety of business resources. You need confidence it’s them knocking – not an attacker. With CyberArk Workforce Identity, you can empower your workforce while keeping threats out.

    Frictionless Sign On
    Keep workers working, not logging in and out.

    Adaptive Authentication
    Make intelligent access decisions based on AI-powered analytics.

    Secure Everywhere
    Enable access across any device, anywhere at just the right time.

    Red Hat is the world’s leading provider of enterprise open source solutions, using a community-powered approach to deliver high-performing Linux, cloud, container, and Kubernetes technologies.

    Offer
    Learn more about CyberArk Identity
    Learn more about Red Hat Single Sign On
    Sample Customers
    MLB, Citi, Pfizer, SulAmerica, GE Capital, Shiseido
    Information Not Available
    Top Industries
    VISITORS READING REVIEWS
    Computer Software Company21%
    Financial Services Firm12%
    Government10%
    Energy/Utilities Company7%
    VISITORS READING REVIEWS
    Computer Software Company20%
    Comms Service Provider14%
    Government13%
    Financial Services Firm10%
    Company Size
    REVIEWERS
    Small Business38%
    Midsize Enterprise13%
    Large Enterprise50%
    VISITORS READING REVIEWS
    Small Business19%
    Midsize Enterprise14%
    Large Enterprise68%
    VISITORS READING REVIEWS
    Small Business17%
    Midsize Enterprise20%
    Large Enterprise63%
    Buyer's Guide
    Single Sign-On (SSO)
    November 2022
    Find out what your peers are saying about Microsoft, Fortinet, Auth0 and others in Single Sign-On (SSO). Updated: November 2022.
    655,994 professionals have used our research since 2012.

    CyberArk Identity is ranked 5th in Single Sign-On (SSO) with 6 reviews while Red Hat Single Sign On is ranked 14th in Single Sign-On (SSO) with 1 review. CyberArk Identity is rated 9.0, while Red Hat Single Sign On is rated 7.0. The top reviewer of CyberArk Identity writes "Easy to set up with powerful features and good reliability". On the other hand, the top reviewer of Red Hat Single Sign On writes "Good support for latest protocols and extensible; security could be improved". CyberArk Identity is most compared with Microsoft Intune, Azure Active Directory (Azure AD), Okta Workforce Identity, SailPoint IdentityIQ and F5 BIG-IP Access Policy Manager (APM), whereas Red Hat Single Sign On is most compared with Auth0, Okta Workforce Identity, Azure Active Directory (Azure AD), PingFederate and Symantec Siteminder.

    See our list of best Single Sign-On (SSO) vendors.

    We monitor all Single Sign-On (SSO) reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.