

Find out in this report how the two Customer Identity and Access Management (CIAM) solutions compare in terms of features, pricing, service and support, easy of deployment, and ROI.
I have seen over 30% return on investment due to the improvement in operational efficiencies through automation, which enhances productivity.
They resolved the problem immediately after I reported it, on the same day, within one hour.
They respond immediately when requests are raised, and they are always available for priority one tickets.
I received prompt responses and support, which I would rate as very good.
Support responds immediately, but I see that some engineers are new or they don't have experience collecting logs, so they take two to three days to come back.
The support side has recently become weaker compared to what it used to be with VMware.
We can use it on different phones and computers, demonstrating its scalability.
When delving deep into the concepts, there is a lot to address and learn, especially when facing real-time scenarios.
You can scale it out pretty easily, and you can implement it very small.
We no longer have our data infiltrated by unauthorized persons, and tracking actions within the system has become very easy.
When you have it in the cloud, you have CyberArk every time you need it.
With a stable network, due to the redundant data centers across the globe, it is a lot easier to use as a SaaS solution.
It would be helpful if they released a generalized document for processes such as migration.
Integration or deployment is extremely difficult for CyberArk Identity.
There's a need to enhance network performance.
Another concern is that support is getting reduced by Workspace ONE; some customers are saying there are support issues on Workspace ONE right now.
The documentation is not comprehensive compared to other VMware solutions or Microsoft documentation.
Regarding pricing, it can be quite a lot for small companies.
The pricing is acceptable.
If I am not going fully cloud, there are additional resources I will need to purchase, such as spinning more VMs or acquiring an HSM device to encrypt the vault.
It impacts zero trust security strategies. It prevents lateral movements in the organization.
The two-factor authentication is very important, but the fact that every account is being regenerated every time we use it is the most important security feature for us.
It is the most powerful access management system.
In UEM, the most helpful part of Windows Management is the baseline policy and central script; using this, you can replace all the AD GPO policy.
In terms of assessing the capability of Workspace ONE UEM in maintaining compliance across all endpoints, that's a very handy feature set.
| Product | Mindshare (%) |
|---|---|
| CyberArk Identity | 3.9% |
| Okta Platform | 15.2% |
| Auth0 Platform | 13.1% |
| Other | 67.80000000000001% |
| Product | Mindshare (%) |
|---|---|
| Workspace ONE UEM | 10.5% |
| Microsoft Intune | 22.3% |
| ManageEngine Endpoint Central | 7.7% |
| Other | 59.5% |


| Company Size | Count |
|---|---|
| Small Business | 20 |
| Midsize Enterprise | 4 |
| Large Enterprise | 10 |
| Company Size | Count |
|---|---|
| Small Business | 40 |
| Midsize Enterprise | 22 |
| Large Enterprise | 58 |
CyberArk Identity is a versatile identity management solution suitable for a wide range of enterprises. It is designed to enhance enterprise security and improve user experience. Its focus on security, compliance, and operational efficiency, combined with positive user feedback, makes it a strong contender in the identity management space.
CyberArk Identity offers a robust suite of features to manage user identities and access privileges. It focuses on securing access to resources across various environments, including cloud and on-premises applications. Its capabilities include single sign-on (SSO), multi-factor authentication (MFA), lifecycle management, and privileged access management. These features are engineered to streamline access control, enhance security, and ensure compliance with regulatory standards.
According to our user interviews, CyberArk Identity is praised for its reliability and user-friendly interface. IT professionals highlight the ease of integration with existing systems, while business executives appreciate the visibility it provides into access and identity management across the organization. Users also commend the responsive customer support, which is crucial for enterprise-level solutions.
IT Professionals found that CyberArk Identity's focus on multi-layered security significantly reduced the risk of data breaches and unauthorized access. With a centralized dashboard and automation features, you can streamline identity and access management tasks, saving time and reducing complexity. Finally, it helps meet various compliance requirements.
Workspace ONE UEM is a comprehensive platform for centralized device management offering advanced security and seamless integration. It's ideal for managing mobile and IoT devices, providing centralized administration capabilities for businesses.
Workspace ONE UEM stands out due to its user-friendly interface and extensive multi-platform support. It provides policy-driven device control, advanced application and content management, and secure remote access. Its excellent third-party integration and strong security measures make it particularly beneficial for managing devices across different platforms. The platform is tailored for businesses looking for scalable solutions that support BYOD policies, application deployment, and user authentication. While praised for stability and comprehensive features like email management, there are calls for improved integration with Active Directory and better pricing strategies.
What are the most important features?Organizations across industries implement Workspace ONE UEM for its sophisticated management strategies, critical in sectors like healthcare for secure patient data management, finance for compliance, and education for supporting diverse device policies. Its integration capabilities make it essential for sectors requiring stringent security and seamless operational workflows.
We monitor all Customer Identity and Access Management (CIAM) reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.