Try our new research platform with insights from 80,000+ expert users

CyberArk Privileged Access Manager vs Ping Identity Platform comparison

 

Comparison Buyer's Guide

Executive Summary

Review summaries and opinions

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
 

ROI

Sentiment score
7.0
CyberArk Privileged Access Manager offers improved security, compliance, and efficiency, reducing risks and manual efforts, enhancing investment value.
Sentiment score
7.4
Ping Identity Platform simplifies identity management, lowers IT overhead, enhances security, improves efficiency, boosts satisfaction, and offers scalability.
The return on investment lies in improved security infrastructure, addressing over-privileged access, and reducing the risk of credential compromise, which is a major source of data breaches.
During our quantitative analysis, we estimated potential savings of one to ten million dollars a year by using a PAM solution.
With other tools such as Okta where you have self-service for resetting your own passwords and things like that, the average savings is 12 minutes, which is six dollars for a password reset, and you can extrapolate that over your organization.
 

Customer Service

Sentiment score
6.5
CyberArk support is praised for dedication and competence, but criticized for slow responses and lengthy issue escalation.
Sentiment score
6.6
Ping Identity Platform's customer service is timely and knowledgeable, though occasionally slow for complex issues; self-help resources are commended.
CyberArk has been exceptional in coming back to us with immediate responses.
It could be forever until you talk to someone who knows what they are doing.
They are helpful, but complex issues can take a long time to resolve, which can delay solutions for urgent customer issues.
I have reached out to technical support for troubleshooting SAML certificate mismatches and federated errors between Ping and enterprise apps.
 

Scalability Issues

Sentiment score
7.7
CyberArk Privileged Access Manager efficiently scales for large users, adaptable for cloud/on-premises, though licensing can be challenging.
Sentiment score
7.5
Ping Identity Platform offers adaptable scalability and performance, varying by configuration, environment, and server setup for different user needs.
The CPM can reportedly handle up to 50,000 accounts independently without issue.
I would rate it a ten out of ten for scalability.
They had 40,000 passwords in this one safe, and it was saving the last ten iterations of each password object. That means they had 400,000 password objects in this safe. They exceeded the limit.
 

Stability Issues

Sentiment score
7.8
CyberArk Privileged Access Manager is stable, with minor issues often due to user errors, and benefits from strong ongoing support.
Sentiment score
7.9
Ping Identity Platform is stable and reliable, with minor integration challenges and manageable issues, rated 8-10 for stability.
Proper fine-tuning and expertise ensure the product performs well.
Overall, the stability of the solution is high.
It has a large customer base and positive feedback within my network.
 

Room For Improvement

CyberArk needs UI improvements, better integrations, customizable reporting, optimized performance, flexible licensing, and enhanced support.
Ping Identity Platform needs enhanced authentication, integration, and user interface improvements for better security and user adoption.
They want everything to be on the cloud, but even in the SaaS version of CyberArk Privileged Access Manager, they need to deploy some servers on-premises.
We cannot generate a plug-in for web-based applications.
If they want clients to move to the cloud, they need to support them in real-time.
I would like to enable ServiceNow Generative AI for auto-diagnosing PingFederate SSO failures and suggest remediation steps.
 

Setup Cost

CyberArk offers comprehensive features and stability, with complex pricing; scaling gradually and strategic planning can manage high costs.
Ping Identity Platform offers flexible annual pricing, appealing for large enterprises, valued for security and efficiency over competitors.
CyberArk is expensive compared to other products I know.
CyberArk is comparatively expensive compared to other PAM solutions, such as Delinea, especially during renewal.
CyberArk's SaaS solution is particularly expensive.
 

Valuable Features

CyberArk Privileged Access Manager enhances security and efficiency through automation, integration, and modular support, improving compliance and credential management.
Ping Identity Platform offers robust security with multi-factor authentication, seamless integrations, and customizable single sign-on for enhanced connectivity.
CyberArk Privileged Access Manager helps ensure data privacy because we now know who is using which credentials and at what time.
It keeps a record of activities, allowing me to easily fetch screen recordings to detect any misuse and see who did what and what happened.
It can integrate with Splunk, SNMP, and other solutions and technologies.
The platform enhances security measures by analyzing multi-factor authentication attempts, highlighting suspicious patterns, and generating compliance reports.
 

Categories and Ranking

CyberArk Privileged Access ...
Average Rating
8.6
Reviews Sentiment
6.9
Number of Reviews
221
Ranking in other categories
User Activity Monitoring (1st), Enterprise Password Managers (2nd), Privileged Access Management (PAM) (1st), Mainframe Security (2nd), Operational Technology (OT) Security (3rd)
Ping Identity Platform
Average Rating
8.2
Reviews Sentiment
7.1
Number of Reviews
29
Ranking in other categories
Single Sign-On (SSO) (4th), Authentication Systems (6th), Data Governance (8th), Identity and Access Management as a Service (IDaaS) (IAMaaS) (6th), Access Management (4th), Customer Identity and Access Management (CIAM) (2nd), Directory Servers (1st)
 

Featured Reviews

Lasantha Wijesinghe - PeerSpot reviewer
We have visibility and control through real-time user behavior analytics
It took us some time to realize its benefits because there was a learning curve for us. It took us about a year to get our heads around this product and start effectively using it. It is a journey. It takes at least five years for any company to make this product very useful and reach maturity. It is not only the product's fault. The company needs to have a vision, and the company culture needs to go with it. Senior leadership needs to support the vision. You need to have lots of ingredients for success. If everything is in place, you will see success after one year. In the first year, it is a struggle for everybody. My company was bought by a bigger company, and they were very new to privileged access management. Everybody was struggling. The advice I would give is to have a good vision for privileged access management. You need dedicated teams, senior management support, and proper company policies and standards before implementing the solution. Start building knowledge slowly and avoid jumping into the deep end without preparation. I would rate CyberArk Privileged Access Manager a nine out of ten.
Dilip Reddy - PeerSpot reviewer
Easy to use but requires improvements in the area of stability
In my company, we have worked on authorization, and I know that there are different types of grants. We have worked on the authorization code, client credentials, and ROPC grant. There are two types of tokens, like the JWT token and internally managed reference tokens. JWT tokens are useful for finding information related to the claim requests. Internally managed reference tokens are useful for dealing with visual data and information. For the clients to fit the user information, they need to do additional work to fit all the user info into the site, which is to define and validate the token issue and provide the request for VPNs. I worked on the key differences between the authorization code and implicit grant. In the authorization code type, you will have the authorization code issued initially to the client, and the client has to exchange it with the authorization server, like using a DAC channel to get the access token. In implicit grants, tokens are issued right away if the application is a single-page application. We can either use the authorization code or an implicit grant.
report
Use our free recommendation engine to learn which Access Management solutions are best for your needs.
849,963 professionals have used our research since 2012.
 

Top Industries

By visitors reading reviews
Educational Organization
33%
Financial Services Firm
12%
Computer Software Company
11%
Manufacturing Company
6%
Financial Services Firm
26%
Computer Software Company
10%
Manufacturing Company
9%
Insurance Company
6%
 

Company Size

By reviewers
Large Enterprise
Midsize Enterprise
Small Business
 

Questions from the Community

How does Sailpoint IdentityIQ compare with CyberArk PAM?
We evaluated Sailpoint IdentityIQ before ultimately choosing CyberArk. Sailpoint Identity Platform is a solution to manage risks in cloud enterprise environments. It automates and streamlines the m...
What do you like most about CyberArk Privileged Access Manager?
The most valuable features of the solution are control and analytics.
What is your experience regarding pricing and costs for CyberArk Privileged Access Manager?
With the current model of licensing, for my use cases, sometimes it's hard to convince the management and get budget approvals for it. It's expensive and you're not getting anything new. It's just ...
What do you like most about PingID?
The mobile biometric authentication option improved user experience. It's always about security because, with two-factor authentication, it's always a separate device verifying the actual user logg...
What is your experience regarding pricing and costs for PingID?
The pricing is neither too expensive nor too cheap.
What needs improvement with PingID?
The management console needs to be improved. PingID should revise it.
 

Also Known As

CyberArk Privileged Access Security, CyberArk Enterprise Password Vault
Ping Identity (ID), PingFederate, PingAccess, PingOne, PingDataGovernance, PingDirectory, OpenDJ
 

Overview

 

Sample Customers

Rockwell Automation
Equinix, Land O'Lakes, CDPHP, Box, International SOS, Opower, VSP, Chevron, Truist, Academy of Art University, Northern Air Cargo, Repsol
Find out what your peers are saying about CyberArk Privileged Access Manager vs. Ping Identity Platform and other solutions. Updated: April 2025.
849,963 professionals have used our research since 2012.