Try our new research platform with insights from 80,000+ expert users

CyberArk Secrets Management vs Ping Identity Platform comparison

 

Comparison Buyer's Guide

Executive SummaryUpdated on Mar 9, 2025

Review summaries and opinions

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
 

Categories and Ranking

CyberArk Secrets Management
Ranking in Access Management
17th
Average Rating
7.4
Reviews Sentiment
8.0
Number of Reviews
3
Ranking in other categories
Enterprise Password Managers (15th)
Ping Identity Platform
Ranking in Access Management
4th
Average Rating
8.2
Reviews Sentiment
7.1
Number of Reviews
29
Ranking in other categories
Single Sign-On (SSO) (4th), Authentication Systems (6th), Data Governance (8th), Identity and Access Management as a Service (IDaaS) (IAMaaS) (6th), Customer Identity and Access Management (CIAM) (2nd), Directory Servers (1st)
 

Featured Reviews

RJ
Helps with compliance and improves operational flexibility
We have had both on-premises and SaaS models. The on-premise setup was a little difficult, but now that it has been moved to the SaaS model, everything is controlled by CyberArk. We just go and do our work. The initial on-premises setup took two weeks because it was an integrated effort. I had to spin up the servers and bring in the CyberArk Secrets Management resource to deploy the scripts. I then had to open networks and firewalls between CyberArk Secrets Management's on-premise servers and the application server. In the initial phase, it took two to three weeks, but it became easier when moving to the SaaS model. In terms of maintenance, it requires patching or upgrades, which happens one day in a month. If there is a failure, we have to roll back and try once again, which takes more time, but if everything goes smoothly, there is three to five hours of downtime.
Dilip Reddy - PeerSpot reviewer
Easy to use but requires improvements in the area of stability
In my company, we have worked on authorization, and I know that there are different types of grants. We have worked on the authorization code, client credentials, and ROPC grant. There are two types of tokens, like the JWT token and internally managed reference tokens. JWT tokens are useful for finding information related to the claim requests. Internally managed reference tokens are useful for dealing with visual data and information. For the clients to fit the user information, they need to do additional work to fit all the user info into the site, which is to define and validate the token issue and provide the request for VPNs. I worked on the key differences between the authorization code and implicit grant. In the authorization code type, you will have the authorization code issued initially to the client, and the client has to exchange it with the authorization server, like using a DAC channel to get the access token. In implicit grants, tokens are issued right away if the application is a single-page application. We can either use the authorization code or an implicit grant.

Quotes from Members

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
 

Pros

"With CyberArk Secrets Management, we were able to resolve the automatic change of the passwords based on timelines. We were also able to retrieve the passwords in an encrypted format by utilizing the CyberArk platform, which was not provided to us by UiPath."
"One of the most important features for us is the system's performance, particularly its speed of retrieving secrets."
"It's vital for effectively managing and securing my credentials."
"CyberArk Secrets Management is a critical solution for strengthening our security posture."
"CyberArk's support team is knowledgeable and helpful, consistently responding on time."
"The automatic rotation of the password is the top feature."
"The most valuable feature is multifactor authentication."
"Setting up the infrastructure with Ping Identity Platform is very easy compared to other IAM products."
"It's convenient for users to log in through Ping using the Kerberos adapter because it doesn't require them to authenticate again."
"I like the self-service feature. The 502 and UBP systems are also excellent. PingID's ability to authenticate with SSH, RDP, and Windows login is pretty handy. It covers the entire spectrum of use."
"This is a user-friendly solution."
"I like PingFederate."
"What I like best about PingID is that it's very user-friendly. PingID is well-built as a developer tool and regularly upgrades and updates via patches. I also like that PingID has clear documents that will help you integrate it with other solutions."
"The solution is stable. We haven't experienced any bugs or glitches."
 

Cons

"Implementing it and ensuring seamless password rotations present challenges."
"The password search feature and integration between different vaults could be enhanced. For instance, when updating passwords in both lower and higher environment vaults, improvement is required in search and upgrade functions."
"Implementation was complex and required professional services."
"Improvements for CyberArk Secrets Management include enhanced documentation with more use cases and step-by-step integration guides."
"We did not have a good experience with technical support because their numerous processes caused delays in engaging, leading to project delays or issues with production."
"We occasionally experience incidents that delay password injection back into the script."
"We have encountered instances where it is not easy to do authentication."
"The product is not customizable."
"Notifications and monitoring are two areas with shortcomings in the solution that need improvement."
"PingAccess can only have one token provider, and you cannot enable two different token providers simultaneously."
"Some colleagues have mentioned API connectivity, data security, and privacy issues."
"They could enhance the product's device tracking for better zero-trust security would be beneficial. Currently, it tracks IPs well but lacks detailed device information, which is crucial from a security standpoint."
"PingFederate's UI could be streamlined. They have recently made several improvements, but it's still too complex. It's a common complaint. The configuration should be simplified because the learning curve is too steep."
"The timing of the token validity, if it could be extended, would be great. I'm not sure if there is even an option to configure these types of settings."
 

Pricing and Cost Advice

"CyberArk Secrets Management has a moderate pricing structure based on a per-tenant licensing model rather than a per-user account model like their PAM solution."
"It is in the middle. It is neither very cheap nor very expensive, so I would place it in the middle."
"Ping offers flexible pricing that's not standardized."
"The tool is quite affordable."
"The platform's value justifies the pricing, especially considering its security features and scalability."
"PingID pricing is a ten out of ten because it's a little bit cheaper than other tools, such as Okta and ForgeRock, and supports multiple tools."
"The product is costly."
"Ping Identity Platform is not an expensive solution."
"The pricing is neither too expensive nor too cheap."
"PingID's pricing is pretty competitive."
report
Use our free recommendation engine to learn which Access Management solutions are best for your needs.
850,028 professionals have used our research since 2012.
 

Top Industries

By visitors reading reviews
No data available
Financial Services Firm
26%
Computer Software Company
10%
Manufacturing Company
9%
Insurance Company
6%
 

Company Size

By reviewers
Large Enterprise
Midsize Enterprise
Small Business
No data available
 

Questions from the Community

What is your experience regarding pricing and costs for CyberArk Secrets Management?
It is in the middle. It is neither very cheap nor very expensive, so I would place it in the middle.
What needs improvement with CyberArk Secrets Management?
The user interface can be improved, and with new platforms emerging, CyberArk Secrets Management could integrate with them. The password search feature and integration between different vaults coul...
What is your primary use case for CyberArk Secrets Management?
We own a robotic process automation platform called UiPath. We use CyberArk Secrets Management to bring the credentials into robotic process automation for the bots during runtime.
What do you like most about PingID?
The mobile biometric authentication option improved user experience. It's always about security because, with two-factor authentication, it's always a separate device verifying the actual user logg...
What is your experience regarding pricing and costs for PingID?
The pricing is neither too expensive nor too cheap.
What needs improvement with PingID?
The management console needs to be improved. PingID should revise it.
 

Also Known As

No data available
Ping Identity (ID), PingFederate, PingAccess, PingOne, PingDataGovernance, PingDirectory, OpenDJ
 

Overview

 

Sample Customers

Information Not Available
Equinix, Land O'Lakes, CDPHP, Box, International SOS, Opower, VSP, Chevron, Truist, Academy of Art University, Northern Air Cargo, Repsol
Find out what your peers are saying about CyberArk Secrets Management vs. Ping Identity Platform and other solutions. Updated: April 2025.
850,028 professionals have used our research since 2012.