No more typing reviews! Try our Samantha, our new voice AI agent.

CyberArk Identity vs WatchGuard AuthPoint MFA comparison

 

Comparison Buyer's Guide

Executive SummaryUpdated on Feb 1, 2026

Review summaries and opinions

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
 

Categories and Ranking

CyberArk Identity
Ranking in Authorization Software
3rd
Average Rating
8.2
Reviews Sentiment
6.7
Number of Reviews
29
Ranking in other categories
Authentication Systems (9th), Identity Management (IM) (9th), Enterprise Password Managers (9th), User Entity Behavior Analytics (UEBA) (9th), Access Management (8th), Active Directory Management (6th), Cloud Resource Access Management (3rd), Customer Identity and Access Management (CIAM) (7th)
WatchGuard AuthPoint MFA
Ranking in Authorization Software
4th
Average Rating
8.6
Reviews Sentiment
7.9
Number of Reviews
7
Ranking in other categories
Multi-Factor Authentication (MFA) (6th)
 

Mindshare comparison

As of April 2026, in the Authorization Software category, the mindshare of CyberArk Identity is 1.7%, down from 2.3% compared to the previous year. The mindshare of WatchGuard AuthPoint MFA is 7.8%, up from 0.6% compared to the previous year. It is calculated based on PeerSpot user engagement data.
Authorization Software Mindshare Distribution
ProductMindshare (%)
CyberArk Identity1.7%
WatchGuard AuthPoint MFA7.8%
Other90.5%
Authorization Software
 

Featured Reviews

Hariharan Thangasamy - PeerSpot reviewer
Cybersecurity Delivery Analyst at Accenture
Has strengthened privileged access control and improved audit visibility through session monitoring and password rotation
On the identity product side, it is awesome. However, they can improve in the documentation parts. For example, if there is a migration process, I can see the maximum customers are moving from self-hosted to on-premises or from on-premises to the cloud. It would be helpful if they released a generalized document for processes such as migration. A clear overview document would assist us in understanding more about the tool, configurations, and automations to enhance our security. Regarding the initial setup of CyberArk Identity, I faced some challenges. At some points, I could not find proper documentation for deploying, enhancing, or integrating with other components. I could not find the proper documentation in the community portal.
reviewer2245134 - PeerSpot reviewer
IT Manager at a financial services firm with 1,001-5,000 employees
Includes many security features and provides push notification feature
Technical support needs more people who have good technical skills and knowledge instead of just sharing documentation. We can refer to the documentation from our end. It will be easy for us to troubleshoot if they have someone with knowledge of how these boxes work. We contact technical support when we can't find the issue after referring to the documentation. So, when they offer us documentation, it makes no sense. We need someone with that knowledge level to understand the issue and at least recommend what needs to be done. Documentation sharing is something I can agree with. However, they share the document for any issue and ask us to refer to it. Having a TAC in place doesn't make sense if they don't want to resolve something in real time.

Quotes from Members

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
 

Pros

"The most valuable features of CyberArk Identity are its ability to control access to administrative staff."
"The most valuable features of CyberArk Identity are its ability to control access to administrative staff."
"The integration capabilities, ability to integrate CyberArk into the overall IBB strategy of our current clients."
"If anyone makes an error, or if an incident occurs by accident, the business will not be harmed as a result of this activity."
"I found the solution to be stable."
"The most valuable feature of CyberArk Identity is the adaptive interface."
"The solution has good technical support."
"The best feature of CyberArk Identity is the single sign-on feature that offers quick and one-click access."
"It can be implemented as an app on the phone, rather than with a hardware token."
"The integrations are good."
"Personal notifications are very easy to use."
"The approvals feature of this solution is very good; it is operated by just one button, and can be controlled from a mobile device if needed."
"The token-based two-factor verification (2FA) for user logins is valuable. It's the primary reason we use AuthPoint, and I find it very effective."
"We use well-prepared templates to integrate AWS and Office 365 so it's very, very easy to implement for our needs."
"The WatchGuard firewall includes many security features, such as UDP, block filters, web filtering, and GeoBlock."
"WatchGuard AuthPoint is the multifactor authentication solution for our VPN and is our multifactor authentication piece to connect to our VPN back into our network."
 

Cons

"At the moment CyberArk needs to enrich Conjur and it needs to be made more viable so that its adoption can be made much faster."
"The product is not cheap, especially if you opt for an on-premise deployment requiring a complex server infrastructure. On the other hand, choosing the software as a service version simplifies infrastructure requirements but necessitates being online all the time."
"One area for improvement is the complexity of the learning curve for new users."
"In terms of a governance platform, it's worth noting that CyberArk doesn't offer a particularly strong one."
"The solution could be easier to use and I found it to be very complex involving many steps."
"I'm not sure what needs improvement. It is a good platform."
"The solution could be easier to use and I found it to be very complex involving many steps."
"I faced some challenges during the initial setup of CyberArk Identity. At some points, I could not find proper documentation for deploying, enhancing, or integrating with other components."
"It has been really great. We don't have any complaints about it at all. We've only had one or two very minor glitches, and they were just in passing."
"The solution should implement a tagging process, which will provide an extra layer of security for the devices connected to the VPN."
"We would like the zero trust feature of this solution to be completed, with more details added and more laptop management capability."
"We've only had one or two very minor glitches, and they were just in passing."
"It's not so simple to configure."
"My only concern is the segmentation of services, which I understand is common in SaaS."
"Documentation on cloud could be improved."
"The product must enable administrators to restrict the privileges of remote users."
 

Pricing and Cost Advice

"There is an initial license and then there is a subscription needed."
"The pricing of CyberArk Identity is competitive."
"It's not that affordable compared to Delinea or other products. They're less expensive and allow more customization. For the cost, it is expensive."
"CyberArk Identity is an expensive solution."
"There could be some additional costs apart from the licensing costs of the solution when you want to develop connectors in CyberArk Identity."
"In terms of pricing, BeyondTrust and CyberArk tend to be more expensive, with CyberArk receiving an eight out of ten, in this regard."
"I think it is a fairly priced tool. I rate the tool between six and seven on a scale of one to ten where one is expensive, and ten is cheap."
"Their pricing is obviously a lot higher than many vendors in the marketplace but their service is also unmatched."
"The pricing, I believe, is around $3 a user a year. It is quite reasonable."
"We got the product at a low price."
report
Use our free recommendation engine to learn which Authorization Software solutions are best for your needs.
885,444 professionals have used our research since 2012.
 

Company Size

By reviewers
Large Enterprise
Midsize Enterprise
Small Business
By reviewers
Company SizeCount
Small Business20
Midsize Enterprise4
Large Enterprise10
By reviewers
Company SizeCount
Small Business8
Large Enterprise2
 

Questions from the Community

What do you like most about CyberArk Identity?
The integration capabilities, ability to integrate CyberArk into the overall IBB strategy of our current clients.
What is your experience regarding pricing and costs for CyberArk Identity?
I am not certain about CyberArk Identity's exact pricing model. For comparison, Okta was around five dollars per user. CyberArk Identity offers good discounts to some clients, which influences thei...
What needs improvement with CyberArk Identity?
We do not specifically use the password vaulting feature of CyberArk Identity. The centralized user dashboard of CyberArk Identity has not been that important for us. If it would be possible to sha...
What needs improvement with WatchGuard AuthPoint?
It's so simple to configure. We have integration with the WatchGuard firewall.
 

Also Known As

Idaptive
AuthPoint
 

Overview

 

Sample Customers

MLB, Citi, Pfizer, SulAmerica, GE Capital, Shiseido
Ellips, Mednet, Diecutstickers.com, Fletchers Solicitors
Find out what your peers are saying about CyberArk Identity vs. WatchGuard AuthPoint MFA and other solutions. Updated: March 2026.
885,444 professionals have used our research since 2012.