Try our new research platform with insights from 80,000+ expert users

CyberArk Identity vs Microsoft BitLocker comparison

 

Comparison Buyer's Guide

Executive Summary

Review summaries and opinions

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
 

Categories and Ranking

CyberArk Identity
Average Rating
8.2
Reviews Sentiment
7.0
Number of Reviews
22
Ranking in other categories
Authentication Systems (9th), Identity Management (IM) (10th), Authorization Software (3rd), Enterprise Password Managers (8th), User Entity Behavior Analytics (UEBA) (9th), Access Management (7th), Active Directory Management (11th), Cloud Resource Access Management (2nd), Customer Identity and Access Management (CIAM) (6th)
Microsoft BitLocker
Average Rating
8.2
Reviews Sentiment
7.4
Number of Reviews
65
Ranking in other categories
Endpoint Encryption (1st), Mobile Data Protection (1st)
 

Mindshare comparison

CyberArk Identity and Microsoft BitLocker aren’t in the same category and serve different purposes. CyberArk Identity is designed for Customer Identity and Access Management (CIAM) and holds a mindshare of 3.7%, up 3.4% compared to last year.
Microsoft BitLocker, on the other hand, focuses on Endpoint Encryption, holds 40.9% mindshare, up 39.9% since last year.
Customer Identity and Access Management (CIAM)
Endpoint Encryption
 

Featured Reviews

Julio Montero - PeerSpot reviewer
Access management system provides strong security and effortless user authentication
The solution can be deployed on cloud or on-premises. CyberArk is more on the cloud than on local hardware. The deployment is initially quite difficult. That said, when you are doing the implementation of CyberArk, there are so many tutorials that make the learning process very easy. The only complaint could be the language barrier. It's difficult if you don't have a very good level of English. Otherwise, it is very easy. You can have it set up within three months without much difficulty. It's hard to get started, however, once you get going, it gets easier. A full deployment takes half a year or less. There is some maintenance necessary. A company is constantly hiring and letting go of employees. The access is always changing, so access must always be adjusted. Or, if we need another law of filter, we would need to add those, or even take them away. That's another aspect of maintenance.
Douglas Curry - PeerSpot reviewer
Users can easily deploy and manage it
The solution's most valuable feature is that it is simple to deploy and manage. I can't say what features of the tool I like since it is very much a deploy-and-forget product. We don't use any advanced features of the tool in my company. The tool's recovery options are good, especially since it integrates with Active Directory, making everything a simple process. The product's integration capabilities are good.

Quotes from Members

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
 

Pros

"The tool is a very strong and valuable enterprise solution, particularly in ensuring the continuity of service."
"The feature that we find most valuable is the ability to integrate multiple IDs for on-premises Active Directory."
"The tool helps with authentication. It acts as an MFA for any kind of privileged access that occurs in our organization."
"Being able to integrate CyberArk Identity with Microsoft Defender is valuable."
"CyberArk Identity is a mature product."
"I had one machine that I could not use due to an invalid token. They resolved the problem immediately after I reported it, on the same day, within one hour. It is a very good experience."
"I found the solution to be stable."
"CyberArk Identity's ability to safeguard financial services infrastructure is good."
"Microsoft BitLocker is a Microsoft native product that provides good encryption."
"I like BitLocker because it gives us strong encryption to protect our data."
"The initial setup is very simple."
"It seemed easy, straightforward, and secure."
"It is easy to implement and has AD integration."
"Microsoft BitLocker's most valuable feature is endpoint encryption, and it's quite easy to manage."
"The most valuable feature is the authentication process which is very fast."
"BitLocker is completely stable."
 

Cons

"In terms of a governance platform, it's worth noting that CyberArk doesn't offer a particularly strong one."
"There is room for improvement in documentation. The documentation could be more specific about the changes needed to achieve specific goals."
"They could improve their UI and make everything more user-friendly."
"Something they could improve is the management of multifactor authentication. When you translate the page from one language to another, it can be a difficult process."
"The solution could be easier to use and I found it to be very complex involving many steps."
"The solution's difficulty in gaining skill sets should be improved because it's a vertical product."
"To enhance the product, they can consider improving the user interface of the software and possibly the customer support team. Sometimes, there is a delay in handling my inquiries via email, which could be addressed for better service."
"At the moment CyberArk needs to enrich Conjur and it needs to be made more viable so that its adoption can be made much faster."
"The pricing should be improved."
"There is room for improvement in stability."
"The console GUI could be better."
"It's possible that the time it takes to pull items in to BitLocker could be reduced a bit."
"BitLocker should be available on standard Windows. We need to spend money on a Pro license to get BitLocker because it's essential to protect our customers' data. We don't want that to fall into the wrong hands."
"Microsoft BitLocker needs to be an all-inclusive solution. For example, a Trusted Platform Module (TPM) cryptoprocessor is required to use Bitlocker with your computer which keeps Bitlocker from adoption beyond Windows."
"We recently found some stability issues with Microsoft BitLocker."
"I would like to be able to encrypt our cloud tenancy."
 

Pricing and Cost Advice

"I think it is a fairly priced tool. I rate the tool between six and seven on a scale of one to ten where one is expensive, and ten is cheap."
"The pricing is acceptable. It is worth considering what we are protecting with the amount charged."
"Their pricing is obviously a lot higher than many vendors in the marketplace but their service is also unmatched."
"The solution is cheap and I rate its pricing an eight out of ten."
"There could be some additional costs apart from the licensing costs of the solution when you want to develop connectors in CyberArk Identity."
"CyberArk Identity is an expensive solution."
"It's not that affordable compared to Delinea or other products. They're less expensive and allow more customization. For the cost, it is expensive."
"In terms of pricing, BeyondTrust and CyberArk tend to be more expensive, with CyberArk receiving an eight out of ten, in this regard."
"We can activate the product at no cost."
"BitLocker is included in our license and doesn't cost us anything extra."
"The tool is cheap compared to the products offered by competitors. If one is cheap and ten is expensive, I rate the tool's price as one."
"On a scale from one to ten, where one is expensive and ten is cheap, I rate the solution's pricing an eight out of ten."
"The solution is priced low. I would rate the product's pricing one out of ten."
"The solution is expensive."
"Microsoft BitLocker's pricing is fair; I rate it a four out of ten."
"Microsoft BitLocker's pricing is included in the Microsoft license, and you don't have to pay an additional fee for it."
report
Use our free recommendation engine to learn which Customer Identity and Access Management (CIAM) solutions are best for your needs.
841,152 professionals have used our research since 2012.
 

Top Industries

By visitors reading reviews
Financial Services Firm
16%
Computer Software Company
13%
Manufacturing Company
11%
Insurance Company
6%
Computer Software Company
12%
Government
10%
Manufacturing Company
9%
Financial Services Firm
8%
 

Company Size

By reviewers
Large Enterprise
Midsize Enterprise
Small Business
 

Questions from the Community

What do you like most about CyberArk Identity?
The integration capabilities, ability to integrate CyberArk into the overall IBB strategy of our current clients.
What is your experience regarding pricing and costs for CyberArk Identity?
Regarding pricing, it can be quite a lot for small companies. For national companies, like a medium-sized company with 1,000 employees, it can be very good. It is also a very necessary solution. Ev...
What needs improvement with CyberArk Identity?
Something they could improve is the management of multifactor authentication. When you translate the page from one language to another, it can be a difficult process. The translation isn't always g...
What should one take into account when replacing PGP with Microsoft BitLocker?
Beware to make backup of useful data, then use reverse decryption policy from Symantec panel/McAfee ePO to decrypt the DE partitions while it is sometimes more straightforward and faster to reinsta...
Would you choose Microsoft BitLocker or McAfee Complete Data Protection?
Microsoft BitLocker is very intuitive and easy to maintain. It is basically the global standard solution for drive encryption and successfully fulfills regulatory needs in terms of data protection....
How does Microsoft BitLocker compare with Symantec Endpoint Encryption?
Microsoft BitLocker is very intuitive and easy to maintain. It is basically the global standard solution for drive encryption and it successfully fulfills regulatory needs in terms of data protecti...
 

Also Known As

Idaptive
BitLocker, MS BitLocker
 

Overview

 

Sample Customers

MLB, Citi, Pfizer, SulAmerica, GE Capital, Shiseido
ACV, Proaxis Therapy, Choice Hotels International, adnymics GmbH, Intermedia, NMBS/SNCB
Find out what your peers are saying about Auth0, Ping Identity, Omada and others in Customer Identity and Access Management (CIAM). Updated: March 2025.
841,152 professionals have used our research since 2012.