No more typing reviews! Try our Samantha, our new voice AI agent.

CyberArk Identity vs Teleport comparison

 

Comparison Buyer's Guide

Executive Summary

Review summaries and opinions

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
 

Categories and Ranking

CyberArk Identity
Average Rating
8.2
Reviews Sentiment
6.7
Number of Reviews
29
Ranking in other categories
Authentication Systems (9th), Identity Management (IM) (8th), Authorization Software (3rd), Enterprise Password Managers (9th), User Entity Behavior Analytics (UEBA) (9th), Access Management (7th), Active Directory Management (6th), Cloud Resource Access Management (3rd), Customer Identity and Access Management (CIAM) (7th)
Teleport
Average Rating
8.4
Reviews Sentiment
5.4
Number of Reviews
8
Ranking in other categories
Privileged Access Management (PAM) (6th), Identity and Access Management as a Service (IDaaS) (IAMaaS) (13th), Identity Security and Posture Management (ISPM) (2nd)
 

Mindshare comparison

While both are Security Software solutions, they serve different purposes. CyberArk Identity is designed for Customer Identity and Access Management (CIAM) and holds a mindshare of 3.5%, down 3.8% compared to last year.
Teleport, on the other hand, focuses on Identity Security and Posture Management (ISPM), holds 9.8% mindshare, down 12.3% since last year.
Customer Identity and Access Management (CIAM) Mindshare Distribution
ProductMindshare (%)
CyberArk Identity3.5%
Okta Platform15.3%
Auth0 Platform13.3%
Other67.9%
Customer Identity and Access Management (CIAM)
Identity Security and Posture Management (ISPM) Mindshare Distribution
ProductMindshare (%)
Teleport9.8%
Saviynt Identity Cloud26.2%
Veza22.4%
Other41.6%
Identity Security and Posture Management (ISPM)
 

Featured Reviews

Hariharan Thangasamy - PeerSpot reviewer
Cybersecurity Delivery Analyst at Accenture
Has strengthened privileged access control and improved audit visibility through session monitoring and password rotation
On the identity product side, it is awesome. However, they can improve in the documentation parts. For example, if there is a migration process, I can see the maximum customers are moving from self-hosted to on-premises or from on-premises to the cloud. It would be helpful if they released a generalized document for processes such as migration. A clear overview document would assist us in understanding more about the tool, configurations, and automations to enhance our security. Regarding the initial setup of CyberArk Identity, I faced some challenges. At some points, I could not find proper documentation for deploying, enhancing, or integrating with other components. I could not find the proper documentation in the community portal.
reviewer2804436 - PeerSpot reviewer
Sre at a tech vendor with 5,001-10,000 employees
Centralized access has strengthened security and simplified day-to-day infrastructure operations
Teleport has been a solid and secure access management solution, but there are a few areas that could be improved, particularly around the initial setup and RBAC configuration. Beyond onboarding and RBAC complexity, there are areas that could be enhanced from an integration perspective. While SSO integration works well, deeper out-of-the-box integrations with SIEM and monitoring tools would be beneficial.

Quotes from Members

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
 

Pros

"The best features in CyberArk Identity that I appreciate most are the recent updates that have added features in the cloud privilege environment."
"The feature that we find most valuable is the ability to integrate multiple IDs for on-premises Active Directory."
"The support of CyberArk Identity is really good."
"Identity is the tool that offers the most seamless integration with UiPath Orchestrator and the most utility from an automation perspective."
"The solution helps with auditing, and monitoring, and integrates with Splunk for log analysis. User activity logs are captured in CyberArk Identity and sent to external tools like Splunk for analysis and monitoring."
"The features are really powerful, providing really good SSO and MFA features and implementation capability, plus an MDM solution, and the cloud-based setup is simple and scalable."
"Overall, I would rate CyberArk Identity a nine out of ten."
"The most valuable features of CyberArk Identity are its ability to control access to administrative staff."
"Teleport definitely reduced the risks; we are no longer exposing root-level accounts for people that are meant to have an elevated account."
"I would definitely advise others looking into using Teleport to try it out if they are seeking a tunneling or proxying solution to streamline obtaining access without dealing with DNS or SSH, as it is straightforward to install, can be tested in various environments, and is a truly exceptional product that is easy to use."
"Teleport changed our workflow by centralizing access control and reducing manual SSH key management."
"The best features include its main capabilities such as collecting actions and showing others what you did on the server, an easy way to connect to any bare-metal servers, and the ability to describe which servers you can use and who can connect to these servers."
"Teleport has replaced earlier methods like a bastion server or a jump server, which required connecting to physical servers."
"Teleport changed our workflow by centralizing access control and reducing manual SSH key management."
"I recommend it for its straightforward setup and strong security features."
"Teleport has positively impacted my organization by being very helpful for productivity and team collaboration, especially since the old tool we used took a lot of time to get approvals."
 

Cons

"Integration or deployment is extremely difficult for CyberArk Identity."
"Room for improvement for CyberArk Identity might be on the support side, as they constantly improve with new features and remove redundant ones, integrating multiple steps into a single one for easier use; however, this is not just CyberArk Identity, as many vendors start with basic troubleshooting services without recognizing that knowledgeable users often reach out after exhausting those options."
"It was pretty complex to implement CyberArk Identity. We had some help from a partner, and that helped a lot. But even for the partner, it was really difficult to streamline the process of implementing."
"CyberArk Identity's GUI is an area with certain shortcomings that need improvement."
"I faced some challenges during the initial setup of CyberArk Identity. At some points, I could not find proper documentation for deploying, enhancing, or integrating with other components."
"They could improve their UI and make everything more user-friendly."
"Room for improvement for CyberArk Identity might be on the support side, as they constantly improve with new features and remove redundant ones, integrating multiple steps into a single one for easier use; however, this is not just CyberArk Identity, as many vendors start with basic troubleshooting services without recognizing that knowledgeable users often reach out after exhausting those options."
"They can include the Mobile Device Management (MDM) feature."
"I rate it a seven because, as I mentioned, there is a security threat regarding clipboard access."
"Teleport is simple to use, but sometimes it requires extra research for more unique tasks, which slightly detracts from its overall quality."
"Managing 700 to 800 services is not easy."
"I cannot download or share session recordings directly with others, which would be useful for documentation or reviews."
"Teleport has been a solid and secure access management solution, but there are a few areas that could be improved, particularly around the initial setup and RBAC configuration."
"I cannot download or share session recordings directly with others, which would be useful for documentation or reviews."
"Sometimes our devices do not reflect the error, and then we work on why it is not showing any alarm or issue, even though we experience distortion or issues on the TS."
"I think it should have less complexity to set up on self-hosted because it is still a difficult process and I spend a lot of time using it on self-host."
 

Pricing and Cost Advice

"The pricing of CyberArk Identity is competitive."
"In terms of pricing, BeyondTrust and CyberArk tend to be more expensive, with CyberArk receiving an eight out of ten, in this regard."
"I think it is a fairly priced tool. I rate the tool between six and seven on a scale of one to ten where one is expensive, and ten is cheap."
"It's not that affordable compared to Delinea or other products. They're less expensive and allow more customization. For the cost, it is expensive."
"There is an initial license and then there is a subscription needed."
"I would rate the tool’s pricing a seven out of ten. The product’s pricing is expensive and is on a yearly basis. You will need to pay around 10,000 GBP for 500 users."
"We find that the pricing and licensing of this solution is adequate, as compared to the other competitors in the market."
"The pricing is acceptable. It is worth considering what we are protecting with the amount charged."
Information not available
report
Use our free recommendation engine to learn which Customer Identity and Access Management (CIAM) solutions are best for your needs.
892,287 professionals have used our research since 2012.
 

Top Industries

By visitors reading reviews
Financial Services Firm
15%
Manufacturing Company
10%
Computer Software Company
8%
Construction Company
6%
Comms Service Provider
13%
Financial Services Firm
12%
Computer Software Company
11%
Manufacturing Company
7%
 

Company Size

By reviewers
Large Enterprise
Midsize Enterprise
Small Business
By reviewers
Company SizeCount
Small Business20
Midsize Enterprise4
Large Enterprise10
By reviewers
Company SizeCount
Small Business1
Midsize Enterprise2
Large Enterprise6
 

Questions from the Community

What is your experience regarding pricing and costs for CyberArk Identity?
I am not certain about CyberArk Identity's exact pricing model. For comparison, Okta was around five dollars per user. CyberArk Identity offers good discounts to some clients, which influences thei...
What needs improvement with CyberArk Identity?
We do not specifically use the password vaulting feature of CyberArk Identity. The centralized user dashboard of CyberArk Identity has not been that important for us. If it would be possible to sha...
What is your primary use case for CyberArk Identity?
It's not being purchased through AWS, but we're using CyberArk Identity as a SaaS solution. I think it's running on AWS, but we bought it directly from CyberArk.
What needs improvement with Teleport?
Teleport has been a solid and secure access management solution, but there are a few areas that could be improved, particularly around the initial setup and RBAC configuration. Beyond onboarding an...
What is your primary use case for Teleport?
Teleport serves as our centralized and secure SSH access management solution across our infrastructure. Instead of distributing static SSH keys to engineers, we integrated Teleport with our SSO pro...
What advice do you have for others considering Teleport?
My main advice would be to clearly define your access control requirements before implementation, since Teleport is powerful and its flexibility around RBAC and policy design means you will get the...
 

Also Known As

Idaptive
No data available
 

Overview

 

Sample Customers

MLB, Citi, Pfizer, SulAmerica, GE Capital, Shiseido
Information Not Available
Find out what your peers are saying about Okta, Ping Identity, Microsoft and others in Customer Identity and Access Management (CIAM). Updated: April 2026.
892,287 professionals have used our research since 2012.