Try our new research platform with insights from 80,000+ expert users

CyberArk Identity vs Microsoft BitLocker comparison

 

Comparison Buyer's Guide

Executive Summary
 

Categories and Ranking

CyberArk Identity
Average Rating
8.2
Reviews Sentiment
7.5
Number of Reviews
19
Ranking in other categories
Authentication Systems (9th), Identity Management (IM) (13th), Authorization Software (4th), Enterprise Password Managers (9th), User Entity Behavior Analytics (UEBA) (9th), Access Management (9th), Active Directory Management (11th), Cloud Resource Access Management (2nd), Customer Identity and Access Management (CIAM) (5th)
Microsoft BitLocker
Average Rating
8.2
Reviews Sentiment
7.9
Number of Reviews
64
Ranking in other categories
Endpoint Encryption (1st), Mobile Data Protection (1st)
 

Mindshare comparison

CyberArk Identity and Microsoft BitLocker aren’t in the same category and serve different purposes. CyberArk Identity is designed for Customer Identity and Access Management (CIAM) and holds a mindshare of 3.0%, up 1.8% compared to last year.
Microsoft BitLocker, on the other hand, focuses on Endpoint Encryption, holds 40.5% mindshare, up 39.8% since last year.
Customer Identity and Access Management (CIAM)
Endpoint Encryption
 

Featured Reviews

Avinash Gopu. - PeerSpot reviewer
Allows Linux and Unix administrators to login with single password
The solution helps with auditing, and monitoring, and integrates with Splunk for log analysis. User activity logs are captured in CyberArk Identity and sent to external tools like Splunk for analysis and monitoring. It is integrated with tools like Splunk and Dynatrace for the analysis of risk behavior and user activity. The pushing teams receive automated reports to assess factors such as login times and server activity in the last 60 days. The licensing for IAM and PAM tools is based on headcount and usage. Users who are not actively utilizing the resources may have their access revoked. This approach helps manage budgeting and reduces the risk impact on the organization by implementing protocols to mitigate threats.
Douglas Curry - PeerSpot reviewer
Users can easily deploy and manage it
The solution's most valuable feature is that it is simple to deploy and manage. I can't say what features of the tool I like since it is very much a deploy-and-forget product. We don't use any advanced features of the tool in my company. The tool's recovery options are good, especially since it integrates with Active Directory, making everything a simple process. The product's integration capabilities are good.

Quotes from Members

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
 

Pros

"It has machine learning and can help clients to learn the environment and understand what is happening."
"CyberArk Identity is a mature product."
"The feature that we find most valuable is the ability to integrate multiple IDs for on-premises Active Directory."
"The most valuable feature of CyberArk Identity is the adaptive interface."
"The user identification is simplified, and managing user privileges, whether adding or revoking them, is also quite straightforward when utilizing CyberArk SaaS."
"The initial setup of CyberArk Identity was straightforward."
"I found the solution to be stable."
"The solution helps with auditing, and monitoring, and integrates with Splunk for log analysis. User activity logs are captured in CyberArk Identity and sent to external tools like Splunk for analysis and monitoring."
"The best thing about it is the encryption type and the way it requires TPM when someone tries to access the drive."
"It comes bundled with other Microsoft solutions."
"The most valuable feature is the TPM (Trusted Platform Module), which makes the PC security stronger because somebody who is not from the team cannot access the PC without the decryption PIN."
"Microsoft BitLocker is a Microsoft native product that provides good encryption."
"It is an encryption tool and provides security."
"The most valuable feature is the authentication process which is very fast."
"We have not seen any bugs or glitches, so the stability is good."
"The solution works the way it's supposed to - stability and scalability are fine."
 

Cons

"The OpenID features could improve in CyberArk Identity."
"More integrations would be better."
"In terms of a governance platform, it's worth noting that CyberArk doesn't offer a particularly strong one."
"The user interface could be improved."
"CyberArk Identity's GUI is an area with certain shortcomings that need improvement."
"The solution's difficulty in gaining skill sets should be improved because it's a vertical product."
"They can include the Mobile Device Management (MDM) feature."
"CyberArk Identity could improve by having the ability to better manage the network, such as Cisco. There seem to be some issues in this area."
"The only thing that could be slightly improved is the occasional stability issue."
"The visualization could be better."
"We recently found some stability issues with Microsoft BitLocker."
"BitLocker should be available on standard Windows. We need to spend money on a Pro license to get BitLocker because it's essential to protect our customers' data. We don't want that to fall into the wrong hands."
"In future releases, I would like to see a feature where I can have a view of each device that has BitLocker to see if these machines are encrypted or not. So, I just want a view or a dashboard that can tell us so that I can remediate and add BitLocker to those systems or devices."
"Instead of integrating with a third party, Microsoft BitLocker should have its own mechanism to safeguard the systems when they are not accessible for a long time."
"The deployment process regarding prerequisites and automation could be easy to understand."
"I often have to make multiple attempts to log in."
 

Pricing and Cost Advice

"The pricing of CyberArk Identity is competitive."
"There is an initial license and then there is a subscription needed."
"CyberArk Identity is an expensive solution."
"I think it is a fairly priced tool. I rate the tool between six and seven on a scale of one to ten where one is expensive, and ten is cheap."
"There could be some additional costs apart from the licensing costs of the solution when you want to develop connectors in CyberArk Identity."
"Their pricing is obviously a lot higher than many vendors in the marketplace but their service is also unmatched."
"It's not that affordable compared to Delinea or other products. They're less expensive and allow more customization. For the cost, it is expensive."
"In terms of pricing, BeyondTrust and CyberArk tend to be more expensive, with CyberArk receiving an eight out of ten, in this regard."
"Microsoft BitLocker's pricing is included in the Microsoft license, and you don't have to pay an additional fee for it."
"For reasons unknown, Microsoft products seem to be getting more expensive."
"This solution is included with Microsoft Server and my clients did not have to pay for anything extra."
"We already use Microsoft products, and Microsoft BitLocker is an add-on product that is free of cost for us."
"We didn't pay for additional licenses since the solution is built into Windows."
"The tool is cheap compared to the products offered by competitors. If one is cheap and ten is expensive, I rate the tool's price as one."
"BitLocker is included in our license and doesn't cost us anything extra."
"I think it's reasonably priced because I've never heard any complaints from my company about its costs."
report
Use our free recommendation engine to learn which Customer Identity and Access Management (CIAM) solutions are best for your needs.
816,406 professionals have used our research since 2012.
 

Top Industries

By visitors reading reviews
Financial Services Firm
15%
Computer Software Company
14%
Manufacturing Company
11%
Insurance Company
7%
Computer Software Company
12%
Government
10%
Manufacturing Company
8%
Financial Services Firm
8%
 

Company Size

By reviewers
Large Enterprise
Midsize Enterprise
Small Business
 

Questions from the Community

What do you like most about CyberArk Identity?
The integration capabilities, ability to integrate CyberArk into the overall IBB strategy of our current clients.
What is your experience regarding pricing and costs for CyberArk Identity?
I think it is a fairly priced tool. I rate the tool between six and seven on a scale of one to ten where one is expensive, and ten is cheap.
What needs improvement with CyberArk Identity?
At the moment CyberArk needs to enrich Conjur and it needs to be made more viable so that its adoption can be made much faster.
What should one take into account when replacing PGP with Microsoft BitLocker?
Beware to make backup of useful data, then use reverse decryption policy from Symantec panel/McAfee ePO to decrypt the DE partitions while it is sometimes more straightforward and faster to reinsta...
Would you choose Microsoft BitLocker or McAfee Complete Data Protection?
Microsoft BitLocker is very intuitive and easy to maintain. It is basically the global standard solution for drive encryption and successfully fulfills regulatory needs in terms of data protection....
How does Microsoft BitLocker compare with Symantec Endpoint Encryption?
Microsoft BitLocker is very intuitive and easy to maintain. It is basically the global standard solution for drive encryption and it successfully fulfills regulatory needs in terms of data protecti...
 

Also Known As

Idaptive
BitLocker, MS BitLocker
 

Overview

 

Sample Customers

MLB, Citi, Pfizer, SulAmerica, GE Capital, Shiseido
ACV, Proaxis Therapy, Choice Hotels International, adnymics GmbH, Intermedia, NMBS/SNCB
Find out what your peers are saying about Auth0, Ping Identity, Omada and others in Customer Identity and Access Management (CIAM). Updated: November 2024.
816,406 professionals have used our research since 2012.