Try our new research platform with insights from 80,000+ expert users

CyberArk Identity vs WatchGuard AuthPoint MFA comparison

 

Comparison Buyer's Guide

Executive SummaryUpdated on Oct 26, 2025

Review summaries and opinions

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
 

Categories and Ranking

CyberArk Identity
Ranking in Authorization Software
3rd
Average Rating
8.2
Reviews Sentiment
6.7
Number of Reviews
29
Ranking in other categories
Authentication Systems (9th), Identity Management (IM) (9th), Enterprise Password Managers (7th), User Entity Behavior Analytics (UEBA) (9th), Access Management (7th), Active Directory Management (6th), Cloud Resource Access Management (2nd), Customer Identity and Access Management (CIAM) (6th)
WatchGuard AuthPoint MFA
Ranking in Authorization Software
4th
Average Rating
8.6
Reviews Sentiment
7.9
Number of Reviews
7
Ranking in other categories
Multi-Factor Authentication (MFA) (6th)
 

Mindshare comparison

As of January 2026, in the Authorization Software category, the mindshare of CyberArk Identity is 4.9%, up from 4.4% compared to the previous year. The mindshare of WatchGuard AuthPoint MFA is 7.6%, up from 1.9% compared to the previous year. It is calculated based on PeerSpot user engagement data.
Authorization Software Market Share Distribution
ProductMarket Share (%)
CyberArk Identity4.9%
WatchGuard AuthPoint MFA7.6%
Other87.5%
Authorization Software
 

Featured Reviews

Hariharan Thangasamy - PeerSpot reviewer
Cybersecurity Delivery Analyst at Accenture
Has strengthened privileged access control and improved audit visibility through session monitoring and password rotation
On the identity product side, it is awesome. However, they can improve in the documentation parts. For example, if there is a migration process, I can see the maximum customers are moving from self-hosted to on-premises or from on-premises to the cloud. It would be helpful if they released a generalized document for processes such as migration. A clear overview document would assist us in understanding more about the tool, configurations, and automations to enhance our security. Regarding the initial setup of CyberArk Identity, I faced some challenges. At some points, I could not find proper documentation for deploying, enhancing, or integrating with other components. I could not find the proper documentation in the community portal.
reviewer2245134 - PeerSpot reviewer
IT Manager at a financial services firm with 1,001-5,000 employees
Includes many security features and provides push notification feature
Technical support needs more people who have good technical skills and knowledge instead of just sharing documentation. We can refer to the documentation from our end. It will be easy for us to troubleshoot if they have someone with knowledge of how these boxes work. We contact technical support when we can't find the issue after referring to the documentation. So, when they offer us documentation, it makes no sense. We need someone with that knowledge level to understand the issue and at least recommend what needs to be done. Documentation sharing is something I can agree with. However, they share the document for any issue and ask us to refer to it. Having a TAC in place doesn't make sense if they don't want to resolve something in real time.

Quotes from Members

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
 

Pros

"CyberArk Identity is a mature product."
"The setup, via cloud, is simple."
"CyberArk Identity's ability to safeguard financial services infrastructure is good."
"I find the CyberArk Identity portal quite intuitive; it has changed a lot over the last year and a half and if you think logically and understand your environment, it is easy to establish a suitable setup for yourself and all your vendors."
"The best features in CyberArk Identity that I appreciate most are the recent updates that have added features in the cloud privilege environment."
"The feature that we find most valuable is the ability to integrate multiple IDs for on-premises Active Directory."
"It has aided in troubleshooting by allowing logs to be extracted and sent to a correlation engine, such as QRadar, for notifications or alerts."
"As soon as it is implemented, it fundamentally changes how users access systems, providing immediate security benefits."
"The integrations are good."
"Personal notifications are very easy to use."
"The approvals feature of this solution is very good; it is operated by just one button, and can be controlled from a mobile device if needed."
"The initial setup is very simple."
"The WatchGuard firewall includes many security features, such as UDP, block filters, web filtering, and GeoBlock."
"It can be implemented as an app on the phone, rather than with a hardware token."
"The token-based two-factor verification (2FA) for user logins is valuable. It's the primary reason we use AuthPoint, and I find it very effective."
 

Cons

"They could improve their UI and make everything more user-friendly."
"Integration or deployment is extremely difficult for CyberArk Identity."
"Some areas experience slowness based on the workload. There's a need to enhance network performance despite the good user experience with access management."
"To enhance the product, they can consider improving the user interface of the software and possibly the customer support team. Sometimes, there is a delay in handling my inquiries via email, which could be addressed for better service."
"When you translate the page from one language to another, it can be a difficult process. The translation isn't always good, and it may have a completely different name. I've noticed this in the English to Spanish translation."
"The solution could be easier to use and I found it to be very complex involving many steps."
"CyberArk Identity could improve by having the ability to better manage the network, such as Cisco. There seem to be some issues in this area."
"Room for improvement for CyberArk Identity might be on the support side, as they constantly improve with new features and remove redundant ones, integrating multiple steps into a single one for easier use; however, this is not just CyberArk Identity, as many vendors start with basic troubleshooting services without recognizing that knowledgeable users often reach out after exhausting those options."
"The solution should implement a tagging process, which will provide an extra layer of security for the devices connected to the VPN."
"Locking could be enhanced to be GDPR compliant."
"It's not so simple to configure."
"My only concern is the segmentation of services, which I understand is common in SaaS."
"The product must enable administrators to restrict the privileges of remote users."
"We would like the zero trust feature of this solution to be completed, with more details added and more laptop management capability."
"It has been really great. We don't have any complaints about it at all. We've only had one or two very minor glitches, and they were just in passing."
 

Pricing and Cost Advice

"The pricing is acceptable. It is worth considering what we are protecting with the amount charged."
"I would rate the tool’s pricing a seven out of ten. The product’s pricing is expensive and is on a yearly basis. You will need to pay around 10,000 GBP for 500 users."
"There is an initial license and then there is a subscription needed."
"There could be some additional costs apart from the licensing costs of the solution when you want to develop connectors in CyberArk Identity."
"Their pricing is obviously a lot higher than many vendors in the marketplace but their service is also unmatched."
"We find that the pricing and licensing of this solution is adequate, as compared to the other competitors in the market."
"CyberArk Identity is an expensive solution."
"The solution is cheap and I rate its pricing an eight out of ten."
"The pricing, I believe, is around $3 a user a year. It is quite reasonable."
"We got the product at a low price."
report
Use our free recommendation engine to learn which Authorization Software solutions are best for your needs.
879,425 professionals have used our research since 2012.
 

Top Industries

By visitors reading reviews
Financial Services Firm
15%
Computer Software Company
12%
Manufacturing Company
12%
Healthcare Company
6%
No data available
 

Company Size

By reviewers
Large Enterprise
Midsize Enterprise
Small Business
By reviewers
Company SizeCount
Small Business20
Midsize Enterprise4
Large Enterprise10
By reviewers
Company SizeCount
Small Business8
Large Enterprise2
 

Questions from the Community

What do you like most about CyberArk Identity?
The integration capabilities, ability to integrate CyberArk into the overall IBB strategy of our current clients.
What is your experience regarding pricing and costs for CyberArk Identity?
I am not certain about CyberArk Identity's exact pricing model. For comparison, Okta was around five dollars per user. CyberArk Identity offers good discounts to some clients, which influences thei...
What needs improvement with CyberArk Identity?
We do not specifically use the password vaulting feature of CyberArk Identity. The centralized user dashboard of CyberArk Identity has not been that important for us. If it would be possible to sha...
What needs improvement with WatchGuard AuthPoint?
It's so simple to configure. We have integration with the WatchGuard firewall.
 

Also Known As

Idaptive
AuthPoint
 

Overview

 

Sample Customers

MLB, Citi, Pfizer, SulAmerica, GE Capital, Shiseido
Ellips, Mednet, Diecutstickers.com, Fletchers Solicitors
Find out what your peers are saying about CyberArk Identity vs. WatchGuard AuthPoint MFA and other solutions. Updated: December 2025.
879,425 professionals have used our research since 2012.