CyberArk Privileged Access Manager vs Ping Identity Platform comparison

 

Comparison Buyer's Guide

Executive Summary
 

Categories and Ranking

CyberArk Privileged Access ...
Average Rating
8.8
Number of Reviews
144
Ranking in other categories
User Activity Monitoring (1st), Privileged Access Management (PAM) (1st)
Ping Identity Platform
Average Rating
8.4
Number of Reviews
19
Ranking in other categories
Single Sign-On (SSO) (3rd), Authentication Systems (5th), Data Governance (6th), Identity and Access Management as a Service (IDaaS) (IAMaaS) (5th), Access Management (3rd), Customer Identity and Access Management (CIAM) (3rd), Directory Servers (1st)
 

Mindshare comparison

As of June 2024, in the Access Management category, the mindshare of CyberArk Privileged Access Manager is 12.1%, up from 9.5% compared to the previous year. The mindshare of Ping Identity Platform is 8.9%, down from 14.9% compared to the previous year. It is calculated based on PeerSpot user engagement data.
Access Management
Unique Categories:
User Activity Monitoring
22.2%
Privileged Access Management (PAM)
22.2%
Single Sign-On (SSO)
12.4%
Authentication Systems
1.3%
 

Featured Reviews

Chris V - PeerSpot reviewer
Sep 1, 2023
Great password management, API password retrieval functionality and Rest API retrieval
We primarily use the product as part of the growing security posture of the company The solution provided password management and API password retrieval functionality.  The most valuable aspects of the solution include password management and Rest API retrieval of vaulted credentials.  The…
PB
May 23, 2023
A robust cloud-based multi-factor solution with a good customer support team
I wonder if there are multi factors in improving. It's always a deterrent to productivity, naturally. Since I've been on this journey for three years, I've seen the product improve in the sense that it's less impact on productivity. In the beginning days, we had challenges with paying, finding the network, and signing its back-end service in the cloud. However, that's been drastically improved over the years. The other thing we did was allow users to manage their device profiles. So they can either go in and register on Ubiquiti or a phone directly with the user interface now or web interface, and they can also set their default device which they want to use. So they, like Ubiqui working with PingID, tend to be the default of choice. So they set their Ubiquiti to the default device. And then whenever MFA is prompted, they have the Ubiquiti or default device. So that was a great improvement. And the way we implemented PingID, it's the same user interface regardless if you're getting into VPN, the vault applications, or a laptop or desktop. So it's the same user interface to manage profiles centrally on a server. Hence if they change it for one use case, they change it for another.

Quotes from Members

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
 

Pros

"It is a robust product."
"We have demoted a lot of domain admins and taken a lot of that away from people, giving it a shared account structure."
"The established sessions on the target systems are fully isolated and the privileged account credentials are never exposed to the end-users or their client applications and devices."
"On the customer accounts side, our account managers are responsive. If you ask them, they will get you whomever you need."
"It is useful for protecting passwords. If you need to do access security management, you can first use the CyberArk console, and after that, you can connect the firewall interface or firewall command line. Similarly, if you need to do an RDP session, you need to first log in to CyberArk before connecting to the Windows RDP session. This way, the admin doesn't know the password, and that password is changed immediately. To change the password, you first discover the old password in the network, and after that, you can change the password."
"CyberArk has resulted in a massive increase in our security footprint."
"We can make a policy that affects everybody instantly."
"CyberArk is a very stable product and it's a stable product because it has a simple design and a simple architecture that allows you to leverage the economies of scale across the base of your infrastructure that you already have implemented. It doesn't really introduce any new complex pieces of infrastructure that would make it that much more difficult to scale."
"The solution is stable. We haven't experienced any bugs or glitches."
"It's pretty stable as a product."
"It provides ease of connecting all our devices."
"It gets a mobility portal in place in conjunction with Office 365. It provides very good possibilities and it's much better than other technology that we have used before which was unstable and slower."
"The solution is highly stable and scalable"
"The most valuable feature is multifactor authentication."
"I find the auto-discovery feature the most valuable. It helps us automate a lot of things using a single password across applications."
"We use the product to run different reports."
 

Cons

"The current interface doesn't scale that well, and has some screens still in the old layout."
"We would like to expand the usage of the auto discovery accounts feed, then on our end, tie in the REST API for automation."
"The turnaround time for technical support is lengthy."
"If we could have some kind of out-of-the box feature that you can simply say "no" so they don't have to go into a development mode, that would a really helpful feature."
"The major pain point that we have is the capacity of CyberArk due to the sheer volume of NPAs that we are managing. We are a large organization and we have hundreds of thousands of non-personal accounts to manage. We have already found out that there are certain capacity limitations within CyberArk that might introduce performance issues. From my perspective, something that would be valuable would be if the vault could hold more passwords and be more scalable."
"In the beginning, CyberArk Privileged Access Manager didn't have a multifactor authentication feature, so that was an area for improvement, but now it's part of the solution. Having just one console for two CyberArk products would be good, particularly for the CyberArk Privileged Access Manager and the CyberArk Endpoint Privilege Manager, with the latter being a product for endpoint management that supports the workstations and allows you to manage workstations. In the next update of CyberArk Privileged Access Manager, it would be good to have a local agent where you can manage all users and processes, and have an agent on the servers such as Linux and Windows."
"Initial setup is complex. Lots of architecture, lots of planning, and lots of education and training are needed."
"Sometimes the infrastructure team is hesitant to provide more resources."
"PingID's device management portal should be more easily accessible via a link. They provide no link to the portal like they do for the service. The passwordless functionality could be more comprehensive. You can't filter based on hardware devices. Having that filtering option would be great. Device authentication would be a great feature."
"I think that the connection with like Microsoft Word, especially for Office 365, is a weak point that could be improved."
"PingFederate's UI could be streamlined. They have recently made several improvements, but it's still too complex. It's a common complaint. The configuration should be simplified because the learning curve is too steep."
"In the beginning, the initial setup was very complex."
"PingID classifies the type of environment into internal and external, which is an area for improvement because you need to take additional steps to trust internal and external users."
"The initial setup appears to be difficult in the beginning."
"PingID should put a little more effort into making a pretty self-explanatory deck about their tech features and the services they offer."
"They could use some bio-certification. It's just more user-friendly and more convenient than entering the one time passes. That would be an improvement."
 

Pricing and Cost Advice

"Before we bought it, they were licensing each function individually, which got complicated and very expensive. When we decided to buy it, it was much more straightforward and still quite expensive, but it brings a lot of value and risk reduction to the organization."
"Network and security licenses are currently being managed by other outsource vendors, so they are facing some type of problems in the digital aspect."
"I'm aware that the organization had purchased licensing for almost all of CyberArk's solutions including licensing for PTA, EPM, and the Application Identity Manager. But when it comes to PSM, this is one of the components where there's an additional charge for any extra PSMs that you want to deploy. I believe that there's some rider where the vendor has a bit of leeway to, at times, charge a premium on whatever additional services you may require above the board."
"CyberArk DNA is free if you purchase the CyberArk solution. There is no additional charge for CyberArk DNA, which is great."
"There are additional features added to our CyberArk Privileged Access Manager license. For example, features that allow us to integrate into various kinds of platforms."
"If you are looking at implementing this solution, buy the training and go to it."
"Pricing is quite high and it could be improved."
"No, I do not have any advice on the price of the product."
"Ping offers flexible pricing that's not standardized."
"PingID's pricing is pretty competitive."
"PingID pricing is a ten out of ten because it's a little bit cheaper than other tools, such as Okta and ForgeRock, and supports multiple tools."
"The pricing is neither too expensive nor too cheap."
"The product is costly."
report
Use our free recommendation engine to learn which Access Management solutions are best for your needs.
787,779 professionals have used our research since 2012.
 

Top Industries

By visitors reading reviews
Educational Organization
31%
Computer Software Company
12%
Financial Services Firm
11%
Manufacturing Company
5%
Financial Services Firm
26%
Computer Software Company
11%
Manufacturing Company
8%
Healthcare Company
7%
 

Company Size

By reviewers
Large Enterprise
Midsize Enterprise
Small Business
 

Questions from the Community

How does Sailpoint IdentityIQ compare with CyberArk PAM?
We evaluated Sailpoint IdentityIQ before ultimately choosing CyberArk. Sailpoint Identity Platform is a solution to manage risks in cloud enterprise environments. It automates and streamlines the m...
What do you like most about CyberArk Privileged Access Manager?
The most valuable features of the solution are control and analytics.
What is your experience regarding pricing and costs for CyberArk Privileged Access Manager?
CyberArk Privileged Access Manager comes at a high cost. But the solution is worth its price.
What do you like most about PingID?
The mobile biometric authentication option improved user experience. It's always about security because, with two-factor authentication, it's always a separate device verifying the actual user logg...
What is your experience regarding pricing and costs for PingID?
The pricing is neither too expensive nor too cheap.
What needs improvement with PingID?
The management console needs to be improved. PingID should revise it.
 

Also Known As

CyberArk Privileged Access Security
Ping Identity (ID), PingFederate, PingAccess, PingOne, PingDataGovernance, PingDirectory, OpenDJ
 

Overview

 

Sample Customers

Rockwell Automation
Equinix, Land O'Lakes, CDPHP, Box, International SOS, Opower, VSP, Chevron, Truist, Academy of Art University, Northern Air Cargo, Repsol
Find out what your peers are saying about CyberArk Privileged Access Manager vs. Ping Identity Platform and other solutions. Updated: June 2024.
787,779 professionals have used our research since 2012.