Symantec Advanced Authentication and CyberArk Identity compete in identity management and multi-factor authentication. CyberArk Identity is considered superior due to its extensive features, which users feel justify the price.
What features are offered by Symantec Advanced Authentication in comparison to CyberArk Identity?Symantec Advanced Authentication is praised for its wide range of authentication methods, seamless integration with various applications, and strong security features. CyberArk Identity receives commendations for its detailed access control, identity lifecycle management, and advanced identity governance capabilities, making it more attractive for larger enterprises.
What areas of improvement can be found in Symantec Advanced Authentication in comparison to CyberArk Identity?Users of Symantec Advanced Authentication suggest enhancements in customization options, reporting functionalities, and flexibility. For CyberArk Identity, users seek improvements in the initial setup complexity, better support documentation, and streamlining the setup process.
How is the ease of deployment and customer service of Symantec Advanced Authentication in comparison to CyberArk Identity?Symantec Advanced Authentication is reported to have a straightforward deployment process and responsive customer service. In contrast, CyberArk Identity's deployment is more complex, although it benefits from comprehensive support services.
What setup costs and ROI can be seen with Symantec Advanced Authentication in comparison to CyberArk Identity?Users find Symantec Advanced Authentication to offer competitive pricing with a strong ROI, particularly for small and medium businesses. CyberArk Identity, although higher in cost, delivers significant ROI due to its extensive features. The key difference is Symantec's affordability versus CyberArk's cost-effectiveness for larger, feature-rich deployments.
CyberArk Identity is a versatile identity management solution suitable for a wide range of enterprises. It is designed to enhance enterprise security and improve user experience. Its focus on security, compliance, and operational efficiency, combined with positive user feedback, makes it a strong contender in the identity management space.
CyberArk Identity offers a robust suite of features to manage user identities and access privileges. It focuses on securing access to resources across various environments, including cloud and on-premises applications. Its capabilities include single sign-on (SSO), multi-factor authentication (MFA), lifecycle management, and privileged access management. These features are engineered to streamline access control, enhance security, and ensure compliance with regulatory standards.
According to our user interviews, CyberArk Identity is praised for its reliability and user-friendly interface. IT professionals highlight the ease of integration with existing systems, while business executives appreciate the visibility it provides into access and identity management across the organization. Users also commend the responsive customer support, which is crucial for enterprise-level solutions.
IT Professionals found that CyberArk Identity's focus on multi-layered security significantly reduced the risk of data breaches and unauthorized access. With a centralized dashboard and automation features, you can streamline identity and access management tasks, saving time and reducing complexity. Finally, it helps meet various compliance requirements.
CA Advanced Authentication provides a secure, user-convenient and cost-effective way to protect online and mobile applications. The solution consists of two components: CA Risk Authentication allows the enterprise to silently and transparently collect data and assess risk based on device identification, location and user behavior, among other factors, and CA Strong Authentication provides a wide variety of software-based, two-factor authentication credentials and technology to make passwords more secure. Together they enable an intelligent, layered security approach to protect user identities and organizational data.
We monitor all Authentication Systems reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.