

CyberArk Privileged Access Manager and Okta Platform are key competitors in the PAM and identity management category. CyberArk appears to have the upper hand in session and password management due to its stability and integration capabilities, whereas Okta shines with its robust SSO and identity management features.
Features: CyberArk Privileged Access Manager offers seamless device integrations, recording sessions, and SSH key lifecycle management. It provides automatic password rotations and a clientless architecture for high customization. Okta Platform, in contrast, features dynamic assignments and adaptive MFA, enhancing its SSO capabilities and efficient user access across applications.
Room for Improvement: CyberArk could improve in account discovery, user experience, and native client connections. Enhancing its user interface and providing a single management interface would be beneficial. Okta Platform needs better downtime management and UI simplification to enhance integration with SIEMs. Addressing user experience by streamlining prompt management would also be helpful.
Ease of Deployment and Customer Service: CyberArk supports both on-premises and hybrid cloud deployments, though it requires skilled technical support due to deployment complexity. Okta, leveraging its SaaS nature, allows for easier cloud-based deployments but may not be ideal for those preferring on-premises solutions. While CyberArk's customer service is mostly effective, support for Okta generally provides reliable assistance.
Pricing and ROI: CyberArk tends to be priced higher, well-suited for larger enterprises due to its comprehensive feature set, though it reduces security risks and assures compliance, offering significant ROI. Okta's pricing is more competitive for cloud-centric deployments with straightforward user-based licensing, achieving ROI through improved security and access management efficiencies, favorable for medium to large enterprises.
The return on investment lies in improved security infrastructure, addressing over-privileged access, and reducing the risk of credential compromise, which is a major source of data breaches.
The end users have the authority to reconcile the password or verify it before using session isolation, which is one of the unique features that can be enabled through Privileged Session Manager, preventing any attacks from happening within the organization when connected with sessions through CyberArk Privileged Access Manager.
CyberArk Privileged Access Manager has helped customers save on costs primarily by reducing the number of engineering and information security personnel.
With Single Sign-On and automated identity management, employees can access applications faster while IT teams spend less time handling authentication issues.
Employee onboarding used to be a major pain point, but the automation Okta Platform provides for creating user accounts across various apps or SaaS tools has made our life much easier.
We have our dashboard to log in via Okta Workforce Identity.
CyberArk has been exceptional in coming back to us with immediate responses.
It could be forever until you talk to someone who knows what they are doing.
Based on the issue resolution and support quality, I rate the support 10 out of 10.
By offering a system to set varying priority levels on support tickets, urgent issues could receive quicker attention, benefiting business continuity and customer satisfaction.
They are very supportive; they just open a ticket, and they support us very professionally.
We had an issue a couple of years ago that was swiftly resolved by the support team, showing their efficiency.
The CPM can reportedly handle up to 50,000 accounts independently without issue.
I would rate it a ten out of ten for scalability.
They had 40,000 passwords in this one safe, and it was saving the last ten iterations of each password object. That means they had 400,000 password objects in this safe. They exceeded the limit.
The scalability of Okta Platform is impressive, but its effectiveness relies on how integrations are designed, rate limits are handled, and day-to-day operations are managed.
It is secure, providing needed scalability without impacting performance.
Clients can scale their API access requests beyond default limits, which is adaptable according to requirements without impacting performance or deployment.
Proper fine-tuning and expertise ensure the product performs well.
Overall, the stability of the solution is high.
It has a large customer base and positive feedback within my network.
This ensures immediate action upon changes applied within Okta Platform, stabilizing operations in managing user accounts, identities, logins, and user profiles.
Okta Workforce Identity is a stable product.
There are no doubts regarding the stability of Okta Customer Identity.
They want everything to be on the cloud, but even in the SaaS version of CyberArk Privileged Access Manager, they need to deploy some servers on-premises.
We cannot generate a plug-in for web-based applications.
If they want clients to move to the cloud, they need to support them in real-time.
If there was a fingerprint option, then only the person who has already added their fingerprint on their mobile phone could access it.
Improvements could be made by simplifying integrations and providing more intuitive configuration options for administrators.
If someone is a beginner with Okta Platform, the UI should be simplified, and the language used should make it easier for them to understand the concepts and what they are trying to do.
CyberArk is expensive compared to other products I know.
CyberArk is comparatively expensive compared to other PAM solutions, such as Delinea, especially during renewal.
CyberArk's SaaS solution is particularly expensive.
Despite the cost, it's cheaper than the potential financial loss from a security breach.
It is certainly not cheap, but the features that you get, the functionality that you get, and whatever use cases that you have, it definitely satisfies those.
The pricing per-user list drops when user counts rise and with multi-year commitments.
CyberArk Privileged Access Manager helps ensure data privacy because we now know who is using which credentials and at what time.
It keeps a record of activities, allowing me to easily fetch screen recordings to detect any misuse and see who did what and what happened.
It can integrate with Splunk, SNMP, and other solutions and technologies.
One of its most valuable features is its easy integration with various applications through its extensive application directory, offering hundreds or thousands of applications ready to configure.
It offers around eight thousand five hundred out-of-the-box connectors, providing an edge over other tools.
For the end user, it is beneficial as they do not have to remember a password or keep the password on a post-it for different applications; they just authenticate once to access several services and service providers.
| Product | Mindshare (%) |
|---|---|
| CyberArk Privileged Access Manager | 10.4% |
| Okta Platform | 3.3% |
| Other | 86.3% |


| Company Size | Count |
|---|---|
| Small Business | 59 |
| Midsize Enterprise | 42 |
| Large Enterprise | 174 |
| Company Size | Count |
|---|---|
| Small Business | 47 |
| Midsize Enterprise | 22 |
| Large Enterprise | 55 |
CyberArk Privileged Access Manager safeguards privileged accounts through password management, credential rotation, and session recording. With seamless integration and real-time monitoring, it ensures robust security across platforms.
CyberArk Privileged Access Manager is recognized for its extensive capabilities in managing and securing privileged accounts. It offers vital functionalities such as automatic password rotation, real-time session monitoring, and cross-platform integration through APIs and custom connectors. Users find the flexibility in workflows and granular access controls beneficial, particularly in protecting access across cloud and on-prem infrastructures. However, improvements in its interface, installation process, plugin support, and integration with third-party tools are often suggested. Pricing is a concern for many, along with the need for better dashboard reporting, user provisioning, and enhanced documentation. Organizations leverage this tool for encrypting and monitoring critical account activities and automating password management to bolster security.
What are the key features of CyberArk Privileged Access Manager?CyberArk Privileged Access Manager finds substantial use in industries such as finance, healthcare, and technology, where the protection of privileged accounts is critical. These sectors rely on its capabilities to manage application credentials securely and provide safe access for developers, administrators, and vendors across various infrastructures.
Okta Platform provides comprehensive identity and access management, featuring Active Directory Sync, user management, and app auto-provisioning. It ensures security through single sign-on and adaptive multi-factor authentication.
Okta Platform offers advanced integration capabilities, allowing seamless connection with in-house and cloud applications. Security features are robust, incorporating multi-factor authentication and SSO to prevent unauthorized access. Users benefit from its ease of use and the ability to integrate and manage numerous applications effectively. While generally praised, users note areas for improvement, such as high costs and complex setups. Better integrations with on-premises systems and third-party tools are desired along with enhanced error logging and reporting features.
What are Okta's key features?Companies across industries implement Okta to secure user authentication and streamline onboarding processes. It supports access management for both on-premises and cloud applications, synchronizing directories and facilitating SaaS services. Organizations benefit from reduced credential management complexity and improved IT infrastructure compliance.
We monitor all Privileged Access Management (PAM) reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.