Try our new research platform with insights from 80,000+ expert users

Ping Identity Platform vs Unifi comparison

 

Comparison Buyer's Guide

Executive SummaryUpdated on Nov 3, 2024

Review summaries and opinions

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
 

Categories and Ranking

Ping Identity Platform
Ranking in Data Governance
8th
Average Rating
8.2
Reviews Sentiment
7.1
Number of Reviews
29
Ranking in other categories
Single Sign-On (SSO) (4th), Authentication Systems (6th), Identity and Access Management as a Service (IDaaS) (IAMaaS) (6th), Access Management (4th), Customer Identity and Access Management (CIAM) (2nd), Directory Servers (1st)
Unifi
Ranking in Data Governance
35th
Average Rating
8.0
Reviews Sentiment
6.3
Number of Reviews
2
Ranking in other categories
Data Integration (55th), Data Preparation Tools (9th)
 

Mindshare comparison

As of May 2025, in the Data Governance category, the mindshare of Ping Identity Platform is 0.3%, up from 0.1% compared to the previous year. The mindshare of Unifi is 0.2%, down from 0.3% compared to the previous year. It is calculated based on PeerSpot user engagement data.
Data Governance
 

Featured Reviews

Dilip Reddy - PeerSpot reviewer
Easy to use but requires improvements in the area of stability
In my company, we have worked on authorization, and I know that there are different types of grants. We have worked on the authorization code, client credentials, and ROPC grant. There are two types of tokens, like the JWT token and internally managed reference tokens. JWT tokens are useful for finding information related to the claim requests. Internally managed reference tokens are useful for dealing with visual data and information. For the clients to fit the user information, they need to do additional work to fit all the user info into the site, which is to define and validate the token issue and provide the request for VPNs. I worked on the key differences between the authorization code and implicit grant. In the authorization code type, you will have the authorization code issued initially to the client, and the client has to exchange it with the authorization server, like using a DAC channel to get the access token. In implicit grants, tokens are issued right away if the application is a single-page application. We can either use the authorization code or an implicit grant.
Doug Isabelle - PeerSpot reviewer
Good management and pricing but not great for enterprise environments
In a high-density location, we're running into connectivity drops. There may be too many rouge devices broadcasting, and the devices is getting interference from another channel. The only to fix this is to reboot and we need something that reboots on the fly. We also need better security for VLANs and VPNs. There are issues with certain Apple devices. Technical support is not very helpful. The initial setup, which seemed straightforward at first, had to be redone. This may not have been the fault of the product. We're not sure what went wrong.

Quotes from Members

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
 

Pros

"It is a very stable solution."
"We use the product to run different reports."
"What I like best about PingID is that it's very user-friendly. PingID is well-built as a developer tool and regularly upgrades and updates via patches. I also like that PingID has clear documents that will help you integrate it with other solutions."
"The only feature we were looking for in PingID was SSO integration with our existing web app."
"I would recommend PingFederate as an IAM solution for its no-code environment, single sign-on, multi-factor authentication, bidirectional services, and advanced features."
"I find the auto-discovery feature the most valuable. It helps us automate a lot of things using a single password across applications."
"This is a user-friendly solution."
"The mobile biometric authentication option improved user experience. It's always about security because, with two-factor authentication, it's always a separate device verifying the actual user logging in."
"The controller makes it easy to control everything from one platform. The management is easy."
"It's easy to manage and support the user, our guests, and our customers if they have a problem."
 

Cons

"Sometimes, there are issues with its stability."
"We can choose a drop-down to search for which certificate we have to create, which is difficult."
"PingID's device management portal should be more easily accessible via a link. They provide no link to the portal like they do for the service. The passwordless functionality could be more comprehensive. You can't filter based on hardware devices. Having that filtering option would be great. Device authentication would be a great feature."
"In Ping Identity, we have had some issues. We've worked with logging and troubleshooting, including some firewall and security issues."
"We had issues with the stability."
"PingAccess can only have one token provider, and you cannot enable two different token providers simultaneously."
"It has a long way to go until it is a cloud-based solution."
"We have encountered instances where it is not easy to do authentication."
"There are issues with certain Apple devices."
"It's stable, but it depends on the office and location."
 

Pricing and Cost Advice

"Ping Identity Platform is not very expensive."
"Ping Identity Platform is not an expensive solution."
"The platform's value justifies the pricing, especially considering its security features and scalability."
"Compared to some SaaS-based solutions, the platform is relatively cost-effective."
"The tool is quite affordable."
"PingID's pricing is pretty competitive."
"Ping offers flexible pricing that's not standardized."
"The product is costly."
"There is no license. The solution is free."
report
Use our free recommendation engine to learn which Data Governance solutions are best for your needs.
850,028 professionals have used our research since 2012.
 

Top Industries

By visitors reading reviews
Financial Services Firm
26%
Computer Software Company
10%
Manufacturing Company
9%
Insurance Company
6%
No data available
 

Company Size

By reviewers
Large Enterprise
Midsize Enterprise
Small Business
No data available
 

Questions from the Community

What do you like most about PingID?
The mobile biometric authentication option improved user experience. It's always about security because, with two-factor authentication, it's always a separate device verifying the actual user logg...
What is your experience regarding pricing and costs for PingID?
The pricing is neither too expensive nor too cheap.
What needs improvement with PingID?
The management console needs to be improved. PingID should revise it.
Ask a question
Earn 20 points
 

Also Known As

Ping Identity (ID), PingFederate, PingAccess, PingOne, PingDataGovernance, PingDirectory, OpenDJ
No data available
 

Overview

 

Sample Customers

Equinix, Land O'Lakes, CDPHP, Box, International SOS, Opower, VSP, Chevron, Truist, Academy of Art University, Northern Air Cargo, Repsol
Big Incites, Cloudera, Flywheel Data, Hortonworks, MapR, Platfora, Qlik, Tableau Software, zData Inc.
Find out what your peers are saying about Ping Identity Platform vs. Unifi and other solutions. Updated: April 2025.
850,028 professionals have used our research since 2012.