Find out in this report how the two Customer Identity and Access Management (CIAM) solutions compare in terms of features, pricing, service and support, easy of deployment, and ROI.
I have seen over 30% return on investment due to the improvement in operational efficiencies through automation, which enhances productivity.
They resolved the problem immediately after I reported it, on the same day, within one hour.
They respond immediately when requests are raised, and they are always available for priority one tickets.
They charge reasonable money for the features they provide.
Support responds immediately, but I see that some engineers are new or they don't have experience collecting logs, so they take two to three days to come back.
The support side has recently become weaker compared to what it used to be with VMware.
We can use it on different phones and computers, demonstrating its scalability.
CyberArk Identity is scalable, especially for organizations that are in a cloud environment or organizations using Okta, which is a similar platform.
CyberArk Identity is definitely a scalable solution; it all depends on the money that you have, as with anything else.
We no longer have our data infiltrated by unauthorized persons, and tracking actions within the system has become very easy.
When you have it in the cloud, you have CyberArk every time you need it.
With a stable network, due to the redundant data centers across the globe, it is a lot easier to use as a SaaS solution.
Integration or deployment is extremely difficult for CyberArk Identity.
There's a need to enhance network performance.
For CyberArk Identity, you need knowledge of their scripting language to pull different sets of reports.
Another concern is that support is getting reduced by Workspace ONE; some customers are saying there are support issues on Workspace ONE right now.
The documentation is not comprehensive compared to other VMware solutions or Microsoft documentation.
Regarding pricing, it can be quite a lot for small companies.
The pricing is acceptable.
If I am not going fully cloud, there are additional resources I will need to purchase, such as spinning more VMs or acquiring an HSM device to encrypt the vault.
It impacts zero trust security strategies. It prevents lateral movements in the organization.
It is the most powerful access management system.
Being able to integrate CyberArk Identity with Microsoft Defender is valuable.
In UEM, the most helpful part of Windows Management is the baseline policy and central script; using this, you can replace all the AD GPO policy.
In terms of assessing the capability of Workspace ONE UEM in maintaining compliance across all endpoints, that's a very handy feature set.
Product | Market Share (%) |
---|---|
CyberArk Identity | 3.8% |
Auth0 | 19.8% |
Ping Identity Platform | 11.9% |
Other | 64.5% |
Product | Market Share (%) |
---|---|
Workspace ONE UEM | 14.1% |
Microsoft Intune | 33.0% |
ManageEngine Endpoint Central | 10.7% |
Other | 42.2% |
Company Size | Count |
---|---|
Small Business | 20 |
Midsize Enterprise | 4 |
Large Enterprise | 9 |
Company Size | Count |
---|---|
Small Business | 41 |
Midsize Enterprise | 21 |
Large Enterprise | 57 |
CyberArk Identity is a versatile identity management solution suitable for a wide range of enterprises. It is designed to enhance enterprise security and improve user experience. Its focus on security, compliance, and operational efficiency, combined with positive user feedback, makes it a strong contender in the identity management space.
CyberArk Identity offers a robust suite of features to manage user identities and access privileges. It focuses on securing access to resources across various environments, including cloud and on-premises applications. Its capabilities include single sign-on (SSO), multi-factor authentication (MFA), lifecycle management, and privileged access management. These features are engineered to streamline access control, enhance security, and ensure compliance with regulatory standards.
According to our user interviews, CyberArk Identity is praised for its reliability and user-friendly interface. IT professionals highlight the ease of integration with existing systems, while business executives appreciate the visibility it provides into access and identity management across the organization. Users also commend the responsive customer support, which is crucial for enterprise-level solutions.
IT Professionals found that CyberArk Identity's focus on multi-layered security significantly reduced the risk of data breaches and unauthorized access. With a centralized dashboard and automation features, you can streamline identity and access management tasks, saving time and reducing complexity. Finally, it helps meet various compliance requirements.
VMware Workspace ONE is an intelligence-driven digital workspace platform that delivers any app on any device. It integrates access control, multi-platform endpoint management, and application management. With the VMware Workspace ONE platform, IT teams can deliver a digital workspace that includes the devices and apps of the company’s choice, but with security and control.
VMware Workspace ONE is available:
VMware Workspace ONE Key Features
VMware Workspace ONE Benefits
Some of the benefits of using VMware Workspace ONE include:
Workspace ONE Components
Reviews from Real Users
Below is some feedback from our PeerSpot users who are currently using the solution:
PeerSpot user Patrick B., Cybersecurity Architect at a tech services company, says, "Its UI is extremely easy to use whether you're an advanced user or a novice user. When I first opened it up and had to learn the product, I was easily a novice. By the end of the third month, I was digging into the backend of the system and using it as a highly advanced user to accomplish what I needed to accomplish, and I was able to do it through the UI mostly."
Roshan T., Partner Manager North America at a tech company, mentions how satisfied he is with the product, saying, "You can put all your applications on a mobile device, be it a phone or tablet. It is secure and easy to use. Because it is centrally managed, you don't have to do any configuration on the phone. I just got the phone and connected to the central applications. I just downloaded one thing and everything got rolled out. Email, calendar, and other things were deployed centrally. If you don't have AirWatch, you have to configure your phone manually. For example, you need to deploy and configure your email manually and then synchronize everything. It is much simpler when a mobile device is centrally managed."
We monitor all Customer Identity and Access Management (CIAM) reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.