CyberArk Identity and JumpCloud compete in the identity and access management category. CyberArk has an upper hand in security features, while JumpCloud offers more flexible integration at a lower cost.
Features: CyberArk Identity is known for its strong SSO and MFA capabilities, password rotation, and integration with tools like UiPath Orchestrator and Microsoft Defender. It has robust security with privileged account protection. JumpCloud offers a single sign-on feature, extensive policy management for device and user control, and integrates a wide range of applications. It provides cloud-based identity solutions that simplify IT management.
Room for Improvement: CyberArk Identity can improve its federation capabilities and simplify its user interface. It also needs enhancements in network management and technical support processes. JumpCloud requires better MDM features, improved group syncing, and more reliable APIs along with integration with additional cloud services.
Ease of Deployment and Customer Service: CyberArk Identity offers flexible deployment options including on-premises, public cloud, and hybrid setups, although better support during deployment is needed. JumpCloud focuses on public cloud deployment, praised for its simplicity, but may have higher costs. While its ease of management is noted, support could be enhanced for complex scenarios.
Pricing and ROI: CyberArk Identity is expensive but offers a good ROI with its comprehensive features, especially for large enterprises. It may require additional resources for deployment. JumpCloud is more cost-effective for smaller companies with transparent pricing plans, offering good ROI by simplifying IT management, though high user counts can increase costs.
I have seen over 30% return on investment due to the improvement in operational efficiencies through automation, which enhances productivity.
We do not contact their technical support directly because we have a service agreement already in place with them with some dedicated and some non-dedicated resources.
first-level support lacks expertise
They always respond on time and offer 24/7 support.
They resolved the problem immediately after I reported it, on the same day, within one hour.
They respond immediately when requests are raised, and they are always available for priority one tickets.
I have not needed to contact JumpCloud's technical support since the setup and usage are quite straightforward and well-documented.
The scalability of Omada Identity is excellent; they offer flexible pricing for licenses, accommodating both full accounts and lighter identities, which makes it truly scalable.
We can use it on different phones and computers, demonstrating its scalability.
For scalability and reliability, it rates a perfect 10 out of 10.
When delving deep into the concepts, there is a lot to address and learn, especially when facing real-time scenarios.
With AWS SSO, it is ten out of ten.
In terms of stability, I rate Omada Identity a nine out of ten.
We no longer have our data infiltrated by unauthorized persons, and tracking actions within the system has become very easy.
When you have it in the cloud, you have CyberArk every time you need it.
With a stable network, due to the redundant data centers across the globe, it is a lot easier to use as a SaaS solution.
I rate the stability of JumpCloud ten out of ten.
The biggest issue, which is the reason why we are transitioning from their product to SailPoint, is the overall user experience.
There is room for improvement in Omada Identity, primarily in customization for administrators; many custom tasks require contacting providers even for simple changes.
It would be helpful if they released a generalized document for processes such as migration.
Integration or deployment is extremely difficult for CyberArk Identity.
There's a need to enhance network performance.
This would be helpful, especially for AWS users, by providing broader support for different cloud platforms and private cloud environments.
They are lower than some of their competitors.
the product itself is said to have a good price, although the support can be expensive.
Regarding pricing, it can be quite a lot for small companies.
The pricing is acceptable.
If I am not going fully cloud, there are additional resources I will need to purchase, such as spinning more VMs or acquiring an HSM device to encrypt the vault.
AWS charges per user, which can be costly if I have more than ten users.
Omada Identity helps automate reviews of access requests and reroutes them to appropriate people, which is what it should do; it really assists in reducing the workload time.
Technically, the product does everything one would expect from an identity and access management platform.
It impacts zero trust security strategies. It prevents lateral movements in the organization.
The two-factor authentication is very important, but the fact that every account is being regenerated every time we use it is the most important security feature for us.
It is the most powerful access management system.
The most impactful feature of JumpCloud is that it allows me to use one credential for all platforms or accounts, reducing the need to remember multiple credentials.
Product | Market Share (%) |
---|---|
Omada Identity | 3.1% |
CyberArk Identity | 2.2% |
JumpCloud | 1.1% |
Other | 93.6% |
Company Size | Count |
---|---|
Small Business | 8 |
Midsize Enterprise | 3 |
Large Enterprise | 41 |
Company Size | Count |
---|---|
Small Business | 20 |
Midsize Enterprise | 4 |
Large Enterprise | 10 |
Company Size | Count |
---|---|
Small Business | 13 |
Midsize Enterprise | 2 |
Large Enterprise | 3 |
Omada Identity is an identity governance and administration (IGA) solution designed to help organizations manage and secure digital identities and access across their IT environments. It focuses on enhancing security, compliance, and efficiency by automating identity management processes.
Omada Identity offers a robust set of features that streamline identity lifecycle management, access governance, and compliance reporting. It integrates with a wide range of IT systems, applications, and data sources, providing a centralized platform for managing user identities and access rights. The solution enables organizations to enforce security policies, ensure regulatory compliance, and reduce the risk of unauthorized access.
What are the critical features of Omada Identity?
What benefits or ROI items should users look for in the reviews when evaluating Omada Identity?
Omada Identity is widely adopted across various industries, including healthcare, finance, and manufacturing. In healthcare, it helps protect patient data and comply with regulations like HIPAA. In finance, it ensures compliance with SOX and other financial regulations. In manufacturing, it secures access to sensitive production data and intellectual property.
Pricing and licensing for Omada Identity are typically based on the number of users and the specific features required. Customer support is available through various channels, including online resources, support tickets, and professional services for implementation and customization.
In summary, Omada Identity is a comprehensive IGA solution that enhances security, compliance, and efficiency in managing digital identities and access.
CyberArk Identity is a versatile identity management solution suitable for a wide range of enterprises. It is designed to enhance enterprise security and improve user experience. Its focus on security, compliance, and operational efficiency, combined with positive user feedback, makes it a strong contender in the identity management space.
CyberArk Identity offers a robust suite of features to manage user identities and access privileges. It focuses on securing access to resources across various environments, including cloud and on-premises applications. Its capabilities include single sign-on (SSO), multi-factor authentication (MFA), lifecycle management, and privileged access management. These features are engineered to streamline access control, enhance security, and ensure compliance with regulatory standards.
According to our user interviews, CyberArk Identity is praised for its reliability and user-friendly interface. IT professionals highlight the ease of integration with existing systems, while business executives appreciate the visibility it provides into access and identity management across the organization. Users also commend the responsive customer support, which is crucial for enterprise-level solutions.
IT Professionals found that CyberArk Identity's focus on multi-layered security significantly reduced the risk of data breaches and unauthorized access. With a centralized dashboard and automation features, you can streamline identity and access management tasks, saving time and reducing complexity. Finally, it helps meet various compliance requirements.
JumpCloud offers efficient device management, single sign-on, and integration capabilities. It integrates seamlessly with Microsoft 365 and Google Workspace, streamlining user management across diverse environments.
JumpCloud delivers device, user, and application management across platforms like Windows, Mac, Linux, and cloud services such as AWS and Azure. Acting as a cloud-based directory, it facilitates single sign-on and identity access management, making it an attractive replacement for Active Directory and LDAP directories. Its policy management and centralized directory simplify user and device administration, offering a user-friendly interface with flexible access control and remote management. Organizations can experience streamlined onboarding and offboarding processes, robust authentication, and scalability. Despite being powerful, room for improvement is noted in alert capabilities, comprehensive MDM for Windows, multi-tenant features, and API reliability.
What are the key features of JumpCloud?Companies across industries utilize JumpCloud for comprehensive management of devices and user identities. It is especially beneficial in technology-driven sectors where centralized directory services replace traditional Active Directory and LDAP models. Organizations employing platforms like AWS and Azure find it essential for maintaining efficient and secure access management.
We monitor all Identity Management (IM) reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.