Try our new research platform with insights from 80,000+ expert users

Citrix Endpoint Management vs CyberArk Identity comparison

Sponsored
 

Comparison Buyer's Guide

Executive Summary
 

Categories and Ranking

Microsoft Intune
Sponsored
Average Rating
8.2
Reviews Sentiment
7.2
Number of Reviews
210
Ranking in other categories
Configuration Management (2nd), Remote Access (1st), Enterprise Mobility Management (EMM) (1st), Unified Endpoint Management (UEM) (1st), Microsoft Security Suite (1st)
Citrix Endpoint Management
Average Rating
8.2
Reviews Sentiment
6.9
Number of Reviews
11
Ranking in other categories
Unified Endpoint Management (UEM) (9th)
CyberArk Identity
Average Rating
8.2
Number of Reviews
19
Ranking in other categories
Authentication Systems (9th), Identity Management (IM) (13th), Authorization Software (4th), Enterprise Password Managers (9th), User Entity Behavior Analytics (UEBA) (9th), Access Management (9th), Active Directory Management (11th), Cloud Resource Access Management (2nd), Customer Identity and Access Management (CIAM) (5th)
 

Mindshare comparison

Unified Endpoint Management (UEM)
Customer Identity and Access Management (CIAM)
 

Featured Reviews

Gaurav Chandola - PeerSpot reviewer
Dec 22, 2022
We can manage all aspects of our devices from a single console, easy to scale, and quick to deploy
Intune has many benefits from the Microsoft perspective. This solution can manage Windows 10 devices, app management, and provide security solutions. We don't need to worry about our network connection, and we'll be more secure with regular security patches and compliance. Since everything will be deployed through the internet and users will log in using the internet only, the risks have been mitigated. Security updates, security patching, and the application will be targeted from Intune. The location tracker will be available to track where the device is and the user's location. The user will be restricted from accessing certain applications using compliance policies. Conditional access policies will be based on the reason why the user needs access to the application. Microsoft Intune is one of the best products in the industry for managing Windows devices. The solution has more feature restrictions. The conditional access policies also eliminate the dependency on the on-prem network for the devices. The solution also manages our security settings and a lot of other beneficial features such as Microsoft Purview which gives us the compliance portion. We can manage all aspects of our device from a single console, including M365 services. This allows us to configure data classification types, such as public, private, internal, confidential, and highly confidential.
SivaKuppala - PeerSpot reviewer
Mar 12, 2024
Offers flexible application management that allows secure delivery of applications to endpoints, enabling users to operate applications on the go
VMware is also a part of our practice, but my focus is predominantly on Citrix, which constitutes about 80% of our management, with VMware covering the remaining percentage. VMware excels in server-related virtualization and is considered the best in that domain. However, for desktop virtualization, Citrix is more mature. Both offer comprehensive product support and robust security features, with extensive partnerships across hardware vendors like HP and Cisco. In terms of cons, VMware tends to be more expensive and complex, with some degree of vendor lock-in. Citrix, on the other hand, offers a better user experience and is more flexible and scalable. While both platforms have their features, Citrix has less licensing complexity compared to VMware, and support quality is comparable between the two.
Avinash Gopu. - PeerSpot reviewer
Feb 29, 2024
Allows Linux and Unix administrators to login with single password
The solution helps with auditing, and monitoring, and integrates with Splunk for log analysis. User activity logs are captured in CyberArk Identity and sent to external tools like Splunk for analysis and monitoring. It is integrated with tools like Splunk and Dynatrace for the analysis of risk behavior and user activity. The pushing teams receive automated reports to assess factors such as login times and server activity in the last 60 days. The licensing for IAM and PAM tools is based on headcount and usage. Users who are not actively utilizing the resources may have their access revoked. This approach helps manage budgeting and reduces the risk impact on the organization by implementing protocols to mitigate threats.

Quotes from Members

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
 

Pros

"The most valuable feature of Microsoft Intune is having all our devices compliant with our policies."
"Among the most valuable features are the Company Portal that is built into Intune, and the update rings so that we can manage what types of future updates the devices get."
"We have one MDM that works with Windows, iOS, and Android."
"We can manage and standardize security across your environment, identify problems, receive alerts, and so on. That's its purpose, and that's also why it's so good."
"Intune significantly simplifies application deployment, mobile application management, and policy enforcement, such as restricting user access to specific applications, thereby enhancing overall environment security."
"The ability to (somewhat) manage full Windows 10 computers including EXE-based or MSI-based application deployments using Azure Active Directory as Identity."
"Intune is effective because of the configuration management and endpoint security it provides. The graphical interface makes it easier to configure and deploy devices."
"The solution is stable."
"The MAM applications of the product are great."
"The product is capable of acting in many different ways to help secure architecture."
"A valuable feature of Citrix Endpoint Management is that it's stable. The stability is not a challenge among the move to the cloud."
"ShareFile, in particular, is valuable with its ease of sharing, and the best category security that is in the hands of users."
"Users can log in anytime, anywhere, using any device, which is a significant advantage."
"One key feature is secure application delivery, which enables the secure delivery of mobile and web applications to end-user devices. This ensures data protection and compliance with corporate policies."
"We have seen improvements in compliance management on the devices."
"The initial setup is straightforward. It takes me up to an hour and a half."
"The integration capabilities, ability to integrate CyberArk into the overall IBB strategy of our current clients."
"The solution helps with auditing, and monitoring, and integrates with Splunk for log analysis. User activity logs are captured in CyberArk Identity and sent to external tools like Splunk for analysis and monitoring."
"The user self-service program and the Office 365 provisioning service feature are the most valuable. It is a very easy and feature-rich solution that gives priority to the users and security."
"If anyone makes an error, or if an incident occurs by accident, the business will not be harmed as a result of this activity."
"The features that I personally find most effective in terms of security stem from the fact that it is easy to integrate and also the adoption is faster."
"The most valuable features of CyberArk Identity are its ability to control access to administrative staff."
"The tool is a very strong and valuable enterprise solution, particularly in ensuring the continuity of service."
 

Cons

"Integrating certain group policies can be challenging and may necessitate using on-premises systems to integrate them with Microsoft Intune."
"If we could remote into a device, it would be great. Currently, we cannot directly connect to the user device. We have to use other tools such as VMware for connecting to devices."
"It's only good for a Microsoft environment."
"There are a lot of small use cases where we realized that some technical solution was missing in Microsoft in comparison to other products. For example, it lacks something similar to sensing or location-based rules and configurations."
"It would help if administrators could pinpoint the exact location of a stolen device to help law enforcement retrieve it and apprehend the suspect."
"No option to do end-to-en macOS management. Slow implementation of policies."
"Microsoft Intune could improve by being more user-friendly and having it geared toward device management. The graphic interface is not very good."
"Microsoft Intune lags market leaders, such as Apperian, in its MAM capabilities."
"Support for inventory management of Apple devices should be added."
"The tool’s battery usage was high."
"Requires integrating with ABM before enabling some of the features."
"The support provided by Citrix needs improvement."
"Citrix often depends on other services like backend data centers, network security, and application firewalls. Issues in these areas can be misinterpreted as Citrix issues by users."
"Citrix needs to improve the architecture. They also need to strengthen the application integration. They keep referring to some things to be required as security, and they keep selling the next level and on-premise separately. They should give the customer the opportunity to decide whether they want to use the next level on-premise or on-cloud, but they should not charge additional fees if the customer wants to deploy the next level on-premise because the customer is already being charged as the end user. They should allow next level on-premise optimization without any additional charges."
"The product is not cheap, especially if you opt for an on-premise deployment requiring a complex server infrastructure. On the other hand, choosing the software as a service version simplifies infrastructure requirements but necessitates being online all the time."
"In terms of general user feedback, the more security you put in front of a user, the more they complain. So usability and the user experience are always a challenge. So there's always room for improvement."
"They can include the Mobile Device Management (MDM) feature."
"There is room for improvement in documentation. The documentation could be more specific about the changes needed to achieve specific goals."
"They could improve their UI and make everything more user-friendly."
"The user interface could be improved."
"We would like to see an improvement in the ability to manage mobile devices."
"The OpenID features could improve in CyberArk Identity."
 

Pricing and Cost Advice

"The product is offered as part of a Microsoft standard bundle. The pricing can be competitive to Airwatch, and Maas360."
"Microsoft Intune has a user-based subscription model. You can go for a monthly or a yearly payment."
"While Microsoft Intune boasts a wide range of features, its user-friendliness and bundled licensing cost are key considerations for me."
"We use Defender ATP and E5 licenses."
"Microsoft Intune is reasonably priced for large organizations that already have Microsoft Enterprise licenses, but it is less affordable for smaller businesses."
"It's monthly for us, but it's built into the license cost that we pay our IT each month. It's maybe 129 Kroner per head, which translates to £10. There are some additional costs. Our IT had to set up and configure their own server, so there is an extra cost for that, but I'm not sure what that costs."
"Microsoft Intune is expensive."
"It is average. Some of the costs are quite high depending on what the customer currently uses, but overall, it is not bad. I would not say that I would not recommend Intune based on the cost. I definitely would, but they can definitely improve on the cost. So overall, its cost is not bad."
"The licensing costs vary depending on the customer and the licensing model. We have three main types: per-user, subscription, and concurrent user licenses, plus a user-based model."
"It's not that affordable compared to Delinea or other products. They're less expensive and allow more customization. For the cost, it is expensive."
"The pricing of CyberArk Identity is competitive."
"There could be some additional costs apart from the licensing costs of the solution when you want to develop connectors in CyberArk Identity."
"In terms of pricing, BeyondTrust and CyberArk tend to be more expensive, with CyberArk receiving an eight out of ten, in this regard."
"I would rate the tool’s pricing a seven out of ten. The product’s pricing is expensive and is on a yearly basis. You will need to pay around 10,000 GBP for 500 users."
"The solution is cheap and I rate its pricing an eight out of ten."
"CyberArk Identity is an expensive solution."
"Their pricing is obviously a lot higher than many vendors in the marketplace but their service is also unmatched."
report
Use our free recommendation engine to learn which Unified Endpoint Management (UEM) solutions are best for your needs.
814,649 professionals have used our research since 2012.
 

Top Industries

By visitors reading reviews
Educational Organization
26%
Computer Software Company
11%
Financial Services Firm
7%
Government
7%
Educational Organization
57%
Computer Software Company
6%
Financial Services Firm
5%
Government
4%
Financial Services Firm
15%
Computer Software Company
14%
Manufacturing Company
9%
Insurance Company
7%
 

Company Size

By reviewers
Large Enterprise
Midsize Enterprise
Small Business
 

Questions from the Community

How does Microsoft Intune compare with VMware Workspace One?
Microsoft Intune is a great tool for managing a mobile device fleet while keeping access control. The solution makes ...
What are the pros and cons of Microsoft Intune?
Microsoft Intune is a great configuration management tool and has a lot of good things going for it. Here are some of...
How does Google Cloud Identity compare with Microsoft Intune?
Microsoft Intune offers not only an easy-to-deploy data protection and productivity management solution, but also ...
What do you like most about Citrix Endpoint Management?
One key feature is secure application delivery, which enables the secure delivery of mobile and web applications to e...
What needs improvement with Citrix Endpoint Management?
The product has matured significantly over the last five to six years, presenting few drawbacks. However, Citrix ofte...
What is your primary use case for Citrix Endpoint Management?
Citrix Endpoint Management offers a unified endpoint management solution, allowing central management of a diverse ra...
What do you like most about CyberArk Identity?
The integration capabilities, ability to integrate CyberArk into the overall IBB strategy of our current clients.
What is your experience regarding pricing and costs for CyberArk Identity?
I think it is a fairly priced tool. I rate the tool between six and seven on a scale of one to ten where one is expen...
What needs improvement with CyberArk Identity?
At the moment CyberArk needs to enrich Conjur and it needs to be made more viable so that its adoption can be made mu...
 

Also Known As

Intune, MS Intune, Microsoft Endpoint Manager
MobileManager, Zenprise, XenMobile
Idaptive
 

Overview

 

Sample Customers

Mitchells and Buzzers, Callaway
Miami Marlins, Exelon, Louisville Gas and Electric Company and Kentucky Utilities Company (LG&E and KU), Flex, Chevron Phillips Chemical Company
MLB, Citi, Pfizer, SulAmerica, GE Capital, Shiseido
Find out what your peers are saying about Microsoft, Omnissa, ManageEngine and others in Unified Endpoint Management (UEM). Updated: October 2024.
814,649 professionals have used our research since 2012.