Try our new research platform with insights from 80,000+ expert users

Cisco Duo vs CyberArk Identity comparison

 

Comparison Buyer's Guide

Executive SummaryUpdated on Nov 24, 2024
 

Categories and Ranking

Cisco Duo
Ranking in Authentication Systems
2nd
Average Rating
8.8
Reviews Sentiment
7.8
Number of Reviews
58
Ranking in other categories
Single Sign-On (SSO) (3rd), ZTNA as a Service (6th), Cisco Security Portfolio (6th), Multi-Factor Authentication (MFA) (1st)
CyberArk Identity
Ranking in Authentication Systems
9th
Average Rating
8.2
Reviews Sentiment
7.6
Number of Reviews
19
Ranking in other categories
Identity Management (IM) (13th), Authorization Software (4th), Enterprise Password Managers (9th), User Entity Behavior Analytics (UEBA) (9th), Access Management (9th), Active Directory Management (11th), Cloud Resource Access Management (2nd), Customer Identity and Access Management (CIAM) (5th)
 

Featured Reviews

RyanDeppe - PeerSpot reviewer
Helps reduce the risk of a breach and is easy to deploy and onboard
For our customers, Duo Security is a significant advantage because it provides them with a straightforward method to implement MFA across their entire environment. Moreover, once we delve into the more advanced features of Duo Security, it enables us as a partner to engage in ongoing discussions regarding security strategies with our customers. Initially, we may only introduce them to MFA during the onboarding process. However, as their security strategy evolves, we can leverage Duo to perform additional tasks such as risk-based assessments and deployments, thereby assisting in the development of their security measures. Duo Security helps secure our infrastructure. It serves as our gateway layer of protection, allowing us to understand who is logging in and why. We conduct risk-based assessments on each user to determine whether their actions are appropriate or not. Duo Security is not a comprehensive security solution, but it is undoubtedly a crucial component, a critical layer of security. This aspect resonates with our customers consistently. Their ability to reduce the risk of a breach is of utmost importance. It serves as the primary line of defense. Currently, credential gathering and leaks are widespread in the market. By implementing an MFA solution like Duo Security, we can effectively prevent these issues. When we put a stop to credential harvesting, it becomes much harder for attackers to infiltrate and navigate our network. Therefore, Duo Security acts as an excellent first line of defense. User authentication and device verification are the methods through which we envision our customers navigating in order to prevent identity-based attacks. Initially, when we employ Duo Security, it is a straightforward implementation of multi-factor authentication. As we progress, we enhance security measures by incorporating device risk assessment and potentially even regional assessment. This includes considerations such as whether the login is being attempted from a specific IP address. These gradual enhancements contribute to the establishment of an additional layer of protection. Thus, it is not necessary to implement a completely disruptive strategy right from the start. Instead, it is possible to gradually adopt and integrate this approach, following a crawl, walk, or run methodology. The Duo Security self-service portal helps free up our customers' IT staff time, allowing them to focus on other projects. As a Cisco partner, we have received feedback from our customers that the portal is highly interactive, enabling them to easily navigate and resolve issues. After setting up their Duo environment, we rarely receive callbacks for assistance, as the portal is intuitive and empowers users to handle everything they need on their own. The appealing aspect of Duo Security is its ability to establish trust for every access request, regardless of its origin. It is a cloud-based solution with excellent API integrations. It doesn't matter where or how a user logs in; Duo will be there to protect the user, whether it's through MFA, risk assessment, or similar methods. It is extremely beneficial to our customers that Duo Security considers all resources as external. Our customers frequently inquire about a zero-trust model, and this is a key component of it. Unfortunately, I would love to say that there is a simple solution for zero trust where we can just deploy this solution and be done with it. But that's not the case. It requires a layered approach, and that's what we convey to our customers. Duo Security is definitely a part of that. Duo Security has helped improve our customers' cybersecurity resilience. Internally, it protects our users from accessing sales operations-based environments. Additionally, our customers use it regularly to protect business-critical applications.
Avinash Gopu. - PeerSpot reviewer
Allows Linux and Unix administrators to login with single password
The solution helps with auditing, and monitoring, and integrates with Splunk for log analysis. User activity logs are captured in CyberArk Identity and sent to external tools like Splunk for analysis and monitoring. It is integrated with tools like Splunk and Dynatrace for the analysis of risk behavior and user activity. The pushing teams receive automated reports to assess factors such as login times and server activity in the last 60 days. The licensing for IAM and PAM tools is based on headcount and usage. Users who are not actively utilizing the resources may have their access revoked. This approach helps manage budgeting and reduces the risk impact on the organization by implementing protocols to mitigate threats.

Quotes from Members

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
 

Pros

"Cisco is the perfect product for our current size, and I don't think we'll have problems with scalability as we grow."
"Documentation is the most valuable feature, and if you ever have to reach out to them with a question, their support is also fantastic."
"It has continuously evolved by introducing new solutions and products to address emerging security threats in our industry, demonstrating its commitment to staying ahead of evolving security challenges."
"The anti-phishing feature is the most valuable."
"At the moment, the ease of use is what is the best feature for me. Once it has been set up and the security can hoc to my mobile device, it's very simple to use my single sign-on, get prompted for a Duo Security, push, go to my phone, accept the push, and I'm done. It's a very simple process."
"We're working remotely. It helps us keep people more safe. Its adoption has been fine. I like the fact that you can bypass it if you need to because there are situations where the internet doesn't work, etc."
"If you have to log in to something, you must go to Duo Security to confirm that you're who you are on your phone."
"It meets our security needs very well. It is easy to use, and documentation is also available. It is also very stable and scalable, and its support is also very good. We are satisfied with this solution."
"The user identification is simplified, and managing user privileges, whether adding or revoking them, is also quite straightforward when utilizing CyberArk SaaS."
"The initial setup of CyberArk Identity was straightforward."
"The initial setup is straightforward. It takes me up to an hour and a half."
"The tool helps with authentication. It acts as an MFA for any kind of privileged access that occurs in our organization."
"The feature that we find most valuable is the ability to integrate multiple IDs for on-premises Active Directory."
"It has machine learning and can help clients to learn the environment and understand what is happening."
"The user self-service program and the Office 365 provisioning service feature are the most valuable. It is a very easy and feature-rich solution that gives priority to the users and security."
"I found the solution to be stable."
 

Cons

"I'm not a big fan of relicensing products every year or two years, but that's the model at the moment. I prefer to go back to licensing perpetually or permanent licensing."
"Reducing or eliminating the "telephony credits" system used by Duo would be great."
"It already integrates with lots of products, but it can integrate with more products. There should be easy integration with Cisco products because sometimes, it can be quite complicated."
"Technical support could be improved. I don't think all support should have to go through an agreement."
"Integration with a product such as Microsoft Sentinel would be great. As the product continually improves, I'm unsure if this feature is available."
"Its documentation must be in French because we are a French-speaking country. They should also provide more training documentation. Its management interface should also be improved. They should also improve its update period. If I compare its update period with other products such as Palo Alto firewalls, this solution is really slow in updates."
"We first deployed Duo Security for our company with the VPN, and afterward, about a year later, we implemented it for a customer of ours where we offered infrastructure as a service. When I tried to establish a VPN connection through Duo Security, it did not function well on that version, which was the latest one at the time. So, I had to make a copy of the machine and then implement Duo Security with the VPN because it did not function well with the newer version."
"I would appreciate it if Duo Security could improve its integrations with Windows Hello."
"They can include the Mobile Device Management (MDM) feature."
"They could improve their UI and make everything more user-friendly."
"CyberArk Identity's GUI is an area with certain shortcomings that need improvement."
"We would like to see an improvement in the ability to manage mobile devices."
"In terms of general user feedback, the more security you put in front of a user, the more they complain. So usability and the user experience are always a challenge. So there's always room for improvement."
"The user interface could be improved."
"The solution's difficulty in gaining skill sets should be improved because it's a vertical product."
"CyberArk Identity could improve by having the ability to better manage the network, such as Cisco. There seem to be some issues in this area."
 

Pricing and Cost Advice

"From a business perspective, it is a little bit costly. The licensing is on a per-user basis."
"It is affordable for what's coming to the table with it, but in this day and age, the cost is looked at under a microscope, and companies need to very finely define what is needed versus what is critical. In some cases, it might not be cost-effective for a company to have it. In a lot of other cases, it is the cost of doing business."
"It was very reasonable."
"Cisco has the most expensive products because market leaders tend to charge a lot."
"It's very simple. Its price is fair. We use the hardware tokens as well. You get what you pay for. In terms of licensing, Cisco has very complicated products, but Duo Security was surprisingly easy."
"Price wise, it's not cheap, but it's not expensive at all either. It's in the middle."
"I haven't seen it in a while, but it's at par with everything else licensing-wise."
"I am not aware of the pricing. There are two departments, and I don't have any information about them."
"It's not that affordable compared to Delinea or other products. They're less expensive and allow more customization. For the cost, it is expensive."
"CyberArk Identity is an expensive solution."
"In terms of pricing, BeyondTrust and CyberArk tend to be more expensive, with CyberArk receiving an eight out of ten, in this regard."
"There is an initial license and then there is a subscription needed."
"We find that the pricing and licensing of this solution is adequate, as compared to the other competitors in the market."
"The solution is cheap and I rate its pricing an eight out of ten."
"There could be some additional costs apart from the licensing costs of the solution when you want to develop connectors in CyberArk Identity."
"I think it is a fairly priced tool. I rate the tool between six and seven on a scale of one to ten where one is expensive, and ten is cheap."
report
Use our free recommendation engine to learn which Authentication Systems solutions are best for your needs.
817,354 professionals have used our research since 2012.
 

Top Industries

By visitors reading reviews
Computer Software Company
25%
Manufacturing Company
8%
Government
7%
Financial Services Firm
6%
Financial Services Firm
15%
Computer Software Company
13%
Manufacturing Company
11%
Insurance Company
7%
 

Company Size

By reviewers
Large Enterprise
Midsize Enterprise
Small Business
 

Questions from the Community

How does Duo Security compare with Microsoft Authenticator?
We switched to Duo Security for identity verification. We’d been using a competitor but got the chance to evaluate Duo for 30 days, and we could not be happier. Duo Security is easy to configure a...
What do you like most about Duo Security?
They are users who, as mentioned before, utilize RDPAP and MDPAP. It includes functionalities related to finance, specifically in single sign-on.
What is your experience regarding pricing and costs for Duo Security?
I would rate the pricing of Cisco Duo as a seven on a scale of one to ten, which means it is quite expensive.
What do you like most about CyberArk Identity?
The integration capabilities, ability to integrate CyberArk into the overall IBB strategy of our current clients.
What is your experience regarding pricing and costs for CyberArk Identity?
I think it is a fairly priced tool. I rate the tool between six and seven on a scale of one to ten where one is expensive, and ten is cheap.
What needs improvement with CyberArk Identity?
At the moment CyberArk needs to enrich Conjur and it needs to be made more viable so that its adoption can be made much faster.
 

Also Known As

Duo Security
Idaptive
 

Learn More

 

Overview

 

Sample Customers

Information Not Available
MLB, Citi, Pfizer, SulAmerica, GE Capital, Shiseido
Find out what your peers are saying about Cisco Duo vs. CyberArk Identity and other solutions. Updated: December 2024.
817,354 professionals have used our research since 2012.