Try our new research platform with insights from 80,000+ expert users

Citrix Endpoint Management vs CyberArk Identity comparison

Sponsored
 

Comparison Buyer's Guide

Executive Summary

Review summaries and opinions

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
 

Categories and Ranking

Microsoft Intune
Sponsored
Average Rating
8.2
Reviews Sentiment
7.3
Number of Reviews
240
Ranking in other categories
Configuration Management (2nd), Remote Access (1st), Enterprise Mobility Management (EMM) (1st), Unified Endpoint Management (UEM) (1st), Microsoft Security Suite (1st)
Citrix Endpoint Management
Average Rating
8.0
Reviews Sentiment
7.1
Number of Reviews
12
Ranking in other categories
Unified Endpoint Management (UEM) (9th)
CyberArk Identity
Average Rating
8.2
Reviews Sentiment
7.0
Number of Reviews
21
Ranking in other categories
Authentication Systems (9th), Identity Management (IM) (10th), Authorization Software (3rd), Enterprise Password Managers (8th), User Entity Behavior Analytics (UEBA) (9th), Access Management (7th), Active Directory Management (11th), Cloud Resource Access Management (2nd), Customer Identity and Access Management (CIAM) (6th)
 

Mindshare comparison

Unified Endpoint Management (UEM)
Customer Identity and Access Management (CIAM)
 

Featured Reviews

Joseph Merusi - PeerSpot reviewer
Everything has worked better since we started using it
Sometimes the syncing is inconsistent. I'm confident that the devices are checking in every eight hours, but sometimes the devices aren't picking up the settings as quickly as I would expect. Some features haven't been updated in a while, and Microsoft doesn't seem interested in developing them. Unless you talk to an engineer, you don't know whether there will be an update. There are communication issues, so you might start working with a feature without knowing if it will be deprecated six months from now. Some reporting areas still need development. For example, I noticed that the reporting for driver updates is still confusing.
SivaKuppala - PeerSpot reviewer
Offers flexible application management that allows secure delivery of applications to endpoints, enabling users to operate applications on the go
VMware is also a part of our practice, but my focus is predominantly on Citrix, which constitutes about 80% of our management, with VMware covering the remaining percentage. VMware excels in server-related virtualization and is considered the best in that domain. However, for desktop virtualization, Citrix is more mature. Both offer comprehensive product support and robust security features, with extensive partnerships across hardware vendors like HP and Cisco. In terms of cons, VMware tends to be more expensive and complex, with some degree of vendor lock-in. Citrix, on the other hand, offers a better user experience and is more flexible and scalable. While both platforms have their features, Citrix has less licensing complexity compared to VMware, and support quality is comparable between the two.
Julio Montero - PeerSpot reviewer
Access management system provides strong security and effortless user authentication
The solution can be deployed on cloud or on-premises. CyberArk is more on the cloud than on local hardware. The deployment is initially quite difficult. That said, when you are doing the implementation of CyberArk, there are so many tutorials that make the learning process very easy. The only complaint could be the language barrier. It's difficult if you don't have a very good level of English. Otherwise, it is very easy. You can have it set up within three months without much difficulty. It's hard to get started, however, once you get going, it gets easier. A full deployment takes half a year or less. There is some maintenance necessary. A company is constantly hiring and letting go of employees. The access is always changing, so access must always be adjusted. Or, if we need another law of filter, we would need to add those, or even take them away. That's another aspect of maintenance.

Quotes from Members

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
 

Pros

"The most important thing for me is the autopilot feature."
"I can reach devices or computers over the internet. I don't need to worry about the network connectivity between the offices. I can manage any device. That is the most important part."
"Stable product that's easy to set up compared to other MDM products."
"Intune makes our organization more secure and flexible."
"The main advantage is that Intune performs its intended functions effectively."
"There are so many features, but Windows Autopilot is one of the features that are very valuable for most customers."
"Intune has automated the deployment of patches and applications, which is more efficient and easier. It allows us to deploy applications, packages, Windows updates, and security updates like BitLocker encryption more efficiently and easily."
"The most valuable features in Microsoft Intune for me are application deployment, Defender deployment, and asset management."
"One key feature is secure application delivery, which enables the secure delivery of mobile and web applications to end-user devices. This ensures data protection and compliance with corporate policies."
"ShareFile, in particular, is valuable with its ease of sharing, and the best category security that is in the hands of users."
"We have found the ability to manage user accounts on shared devices valuable as it reduces the need for multiple licenses, which saves costs."
"Users can log in anytime, anywhere, using any device, which is a significant advantage."
"A valuable feature of Citrix Endpoint Management is that it's stable. The stability is not a challenge among the move to the cloud."
"The MAM applications of the product are great."
"The product is capable of acting in many different ways to help secure architecture."
"We have seen improvements in compliance management on the devices."
"It has machine learning and can help clients to learn the environment and understand what is happening."
"CyberArk Identity is a mature product."
"Overall, I would rate CyberArk Identity a nine out of ten."
"The solution helps with auditing, and monitoring, and integrates with Splunk for log analysis. User activity logs are captured in CyberArk Identity and sent to external tools like Splunk for analysis and monitoring."
"I like the RBAC (Role-Based Access Control). It basically involves defining various roles, and then simply assigning those roles to users."
"The feature that we find most valuable is the ability to integrate multiple IDs for on-premises Active Directory."
"I had one machine that I could not use due to an invalid token. They resolved the problem immediately after I reported it, on the same day, within one hour. It is a very good experience."
"What I like most about CyberArk Identity is the model that is in place."
 

Cons

"The worst aspect is the reporting."
"The reporting causes problems because we're trying to gather data to present to the management, but we can't get the data they request. If a user has removed an application from his device, but it won't report it at exactly the right time. It takes time to sync from the device to the portal. Let's say we are preparing a list or deck for the number of compliant devices that meet all of the organization's requirements. In a real-time scenario, that device could be compliant, but it is showing as non-compliant on the portal. It sometimes hampers the overall decisions that we make on our end."
"There could be more wizard-driven policy development or creation. Some of the policies can get quite complex. If they have a wizard that assists the administrators in creating the policy, that will be a great job."
"Sometimes, updating a client policy is very difficult. This needs to be improved."
"Reporting could be improved. It needs to be more expensive and robust."
"The interface is not as modern as some competitors in terms of single pane of glass visibility across the entire landscape. It has a very Azure vibe and may not be as graphically appealing as other products."
"Microsoft Intune could improve by being more user-friendly and having it geared toward device management. The graphic interface is not very good."
"There were several bugs with stability."
"Support for inventory management of Apple devices should be added."
"The support provided by Citrix needs improvement."
"Citrix needs to improve the architecture. They also need to strengthen the application integration. They keep referring to some things to be required as security, and they keep selling the next level and on-premise separately. They should give the customer the opportunity to decide whether they want to use the next level on-premise or on-cloud, but they should not charge additional fees if the customer wants to deploy the next level on-premise because the customer is already being charged as the end user. They should allow next level on-premise optimization without any additional charges."
"The iOS version updates do not work as well as I would like."
"Citrix often depends on other services like backend data centers, network security, and application firewalls. Issues in these areas can be misinterpreted as Citrix issues by users."
"Requires integrating with ABM before enabling some of the features."
"The iOS version updates do not work as well as I would like."
"The tool’s battery usage was high."
"The OpenID features could improve in CyberArk Identity."
"CyberArk Identity could improve by having the ability to better manage the network, such as Cisco. There seem to be some issues in this area."
"The product needs to leverage the cloud more, especially in the financial sector, where cloud adoption might be limited. Proper reporting within the cloud is essential. The tool should be more user-friendly to expedite access for users. The current agent-based system poses challenges if a user loses access to the server, making tasks difficult to perform. It should also improve technical support."
"CyberArk Identity's GUI is an area with certain shortcomings that need improvement."
"They can include the Mobile Device Management (MDM) feature."
"The tool has issues with the third-party SMS gateway. The solution has its own SMS gateway. Integration support is a challenge when we don’t use their SMS gateway. The tool also needs to improve its scalability."
"At the moment CyberArk needs to enrich Conjur and it needs to be made more viable so that its adoption can be made much faster."
"The product is not cheap, especially if you opt for an on-premise deployment requiring a complex server infrastructure. On the other hand, choosing the software as a service version simplifies infrastructure requirements but necessitates being online all the time."
 

Pricing and Cost Advice

"Any bundle package, such as Security E3, covers multiple things, such as AAP, BitLocker, etc. If you go for them individually, they would be more expensive. Bundling makes the price more attractive and competitive."
"The price of Intune is often included as part of a bundle with other Microsoft licenses, which makes it somewhat cheaper."
"With our standard E5 agreement with Microsoft, there have been no pricing concerns. Introductory professional services, like a fast-track service, were included with our E5 membership, and there have been no additional costs."
"The product is offered as part of a Microsoft standard bundle. The pricing can be competitive to Airwatch, and Maas360."
"Microsoft licenses are costly."
"Microsoft Intune is included in the E5 license at no additional cost."
"It is not expensive."
"The price is very reasonable."
"The licensing costs vary depending on the customer and the licensing model. We have three main types: per-user, subscription, and concurrent user licenses, plus a user-based model."
"CyberArk Identity is an expensive solution."
"There is an initial license and then there is a subscription needed."
"Their pricing is obviously a lot higher than many vendors in the marketplace but their service is also unmatched."
"The pricing of CyberArk Identity is competitive."
"It's not that affordable compared to Delinea or other products. They're less expensive and allow more customization. For the cost, it is expensive."
"The pricing is acceptable. It is worth considering what we are protecting with the amount charged."
"In terms of pricing, BeyondTrust and CyberArk tend to be more expensive, with CyberArk receiving an eight out of ten, in this regard."
"There could be some additional costs apart from the licensing costs of the solution when you want to develop connectors in CyberArk Identity."
report
Use our free recommendation engine to learn which Unified Endpoint Management (UEM) solutions are best for your needs.
841,004 professionals have used our research since 2012.
 

Top Industries

By visitors reading reviews
Educational Organization
26%
Computer Software Company
11%
Financial Services Firm
7%
Manufacturing Company
6%
Educational Organization
57%
Computer Software Company
6%
Financial Services Firm
6%
Government
4%
Financial Services Firm
17%
Computer Software Company
13%
Manufacturing Company
11%
Insurance Company
6%
 

Company Size

By reviewers
Large Enterprise
Midsize Enterprise
Small Business
 

Questions from the Community

How does Microsoft Intune compare with VMware Workspace One?
Microsoft Intune is a great tool for managing a mobile device fleet while keeping access control. The solution makes ...
What are the pros and cons of Microsoft Intune?
Microsoft Intune is a great configuration management tool and has a lot of good things going for it. Here are some of...
How does Google Cloud Identity compare with Microsoft Intune?
Microsoft Intune offers not only an easy-to-deploy data protection and productivity management solution, but also ...
What do you like most about Citrix Endpoint Management?
One key feature is secure application delivery, which enables the secure delivery of mobile and web applications to e...
What needs improvement with Citrix Endpoint Management?
The support provided by Citrix needs improvement. The support should be more proactive, especially in critical sector...
What is your primary use case for Citrix Endpoint Management?
We work extensively with Citrix, specializing in Citrix utilization, Citrix networking, and Citrix mobility MDM. Our ...
What do you like most about CyberArk Identity?
The integration capabilities, ability to integrate CyberArk into the overall IBB strategy of our current clients.
What is your experience regarding pricing and costs for CyberArk Identity?
Regarding pricing, it can be quite a lot for small companies. For national companies, like a medium-sized company wit...
What needs improvement with CyberArk Identity?
Something they could improve is the management of multifactor authentication. When you translate the page from one la...
 

Also Known As

Intune, MS Intune, Microsoft Endpoint Manager
MobileManager, Zenprise, XenMobile
Idaptive
 

Overview

 

Sample Customers

Mitchells and Buzzers, Callaway
Miami Marlins, Exelon, Louisville Gas and Electric Company and Kentucky Utilities Company (LG&E and KU), Flex, Chevron Phillips Chemical Company
MLB, Citi, Pfizer, SulAmerica, GE Capital, Shiseido
Find out what your peers are saying about Microsoft, Omnissa, ManageEngine and others in Unified Endpoint Management (UEM). Updated: February 2025.
841,004 professionals have used our research since 2012.