Try our new research platform with insights from 80,000+ expert users

CyberArk Identity vs Microsoft BitLocker comparison

 

Comparison Buyer's Guide

Executive Summary

Review summaries and opinions

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
 

Categories and Ranking

CyberArk Identity
Average Rating
8.2
Reviews Sentiment
7.0
Number of Reviews
19
Ranking in other categories
Authentication Systems (9th), Identity Management (IM) (13th), Authorization Software (4th), Enterprise Password Managers (9th), User Entity Behavior Analytics (UEBA) (9th), Access Management (8th), Active Directory Management (11th), Cloud Resource Access Management (3rd), Customer Identity and Access Management (CIAM) (6th)
Microsoft BitLocker
Average Rating
8.2
Reviews Sentiment
7.9
Number of Reviews
65
Ranking in other categories
Endpoint Encryption (1st), Mobile Data Protection (1st)
 

Mindshare comparison

CyberArk Identity and Microsoft BitLocker aren’t in the same category and serve different purposes. CyberArk Identity is designed for Customer Identity and Access Management (CIAM) and holds a mindshare of 3.7%, up 3.4% compared to last year.
Microsoft BitLocker, on the other hand, focuses on Endpoint Encryption, holds 41.3% mindshare, up 39.8% since last year.
Customer Identity and Access Management (CIAM)
Endpoint Encryption
 

Featured Reviews

RiyasAbdulkhader - PeerSpot reviewer
Offers Multi-factor authentication (MFA) and supports single sign-on (SSO) across multiple applications but dependency on Identity Connectors for seamless federation can be cumbersome
CyberArk Identity could improve by allowing federation directly or seamlessly, without the need for an Identity Connector. Instead of building separate Azure Connectors, if they could just federate, that would be nice. However, for this kind of feature to work, the customer's environment would need specific configurations. Basically, they could improve the federation capabilities to handle multiple domains separately, instead of just one. Right now, if you're working with one domain, it's okay. But for multiple domains, it becomes a bit complicated. In the on-premises version, you can curate more than one domain seamlessly. However, the SaaS version of CyberArk Identity requires more configuration. Moreover, CyberArk Identity is relatively new. They haven't been in the market for more than two or three years. They're still under development and not yet a fully-fledged product. They're constantly adding features, but they haven't yet achieved complete account management capabilities for all types of accounts, which is likely due to their competition. So, while they are actively promoting it, not many customers are using CyberArk Identity yet.
Douglas Curry - PeerSpot reviewer
Users can easily deploy and manage it
The solution's most valuable feature is that it is simple to deploy and manage. I can't say what features of the tool I like since it is very much a deploy-and-forget product. We don't use any advanced features of the tool in my company. The tool's recovery options are good, especially since it integrates with Active Directory, making everything a simple process. The product's integration capabilities are good.

Quotes from Members

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
 

Pros

"The user identification is simplified, and managing user privileges, whether adding or revoking them, is also quite straightforward when utilizing CyberArk SaaS."
"If anyone makes an error, or if an incident occurs by accident, the business will not be harmed as a result of this activity."
"The setup, via cloud, is simple."
"The most valuable feature of CyberArk Identity is the adaptive interface."
"The integration capabilities, ability to integrate CyberArk into the overall IBB strategy of our current clients."
"The feature that we find most valuable is the ability to integrate multiple IDs for on-premises Active Directory."
"CyberArk Identity is a mature product."
"The tool helps with authentication. It acts as an MFA for any kind of privileged access that occurs in our organization."
"It is easy to use and administer."
"The most valuable feature is the simplicity and integration with the Microsoft Clouds platform."
"The most valuable feature is the authentication process which is very fast."
"Feature-wise we have the ability to encrypt fast."
"The solution is included in Windows 11."
"It is an encryption tool and provides security."
"The solution's most valuable feature is that it is simple to deploy and manage."
"There's a lot of manageability within the solution. This is very helpful."
 

Cons

"They could improve their UI and make everything more user-friendly."
"CyberArk Identity could improve by having the ability to better manage the network, such as Cisco. There seem to be some issues in this area."
"The user interface could be improved."
"The solution's difficulty in gaining skill sets should be improved because it's a vertical product."
"In terms of a governance platform, it's worth noting that CyberArk doesn't offer a particularly strong one."
"The product is not cheap, especially if you opt for an on-premise deployment requiring a complex server infrastructure. On the other hand, choosing the software as a service version simplifies infrastructure requirements but necessitates being online all the time."
"CyberArk Identity's GUI is an area with certain shortcomings that need improvement."
"They can include the Mobile Device Management (MDM) feature."
"User profiles can be improved so that people can create their own passwords. It has one password per machine, which is a problem. We would prefer each user to have his or her own boot password. Each user can have a username and password or biometrics, such as fingerprints and iris scanner, integrated into the boot process, but I really can't see that coming anytime soon, if ever."
"At the end of it all, we are looking for something that can be easier to manage."
"Technical support has not been very good."
"The console GUI could be better."
"More customization options would have been nice, such as password selection, actions when the screen is locked, etc."
"The migration itself is a nightmare."
"I would like to be able to encrypt our cloud tenancy."
"BitLocker should be available on standard Windows. We need to spend money on a Pro license to get BitLocker because it's essential to protect our customers' data. We don't want that to fall into the wrong hands."
 

Pricing and Cost Advice

"The pricing of CyberArk Identity is competitive."
"In terms of pricing, BeyondTrust and CyberArk tend to be more expensive, with CyberArk receiving an eight out of ten, in this regard."
"Their pricing is obviously a lot higher than many vendors in the marketplace but their service is also unmatched."
"The solution is cheap and I rate its pricing an eight out of ten."
"There is an initial license and then there is a subscription needed."
"It's not that affordable compared to Delinea or other products. They're less expensive and allow more customization. For the cost, it is expensive."
"I would rate the tool’s pricing a seven out of ten. The product’s pricing is expensive and is on a yearly basis. You will need to pay around 10,000 GBP for 500 users."
"There could be some additional costs apart from the licensing costs of the solution when you want to develop connectors in CyberArk Identity."
"For reasons unknown, Microsoft products seem to be getting more expensive."
"We can activate the product at no cost."
"We didn't pay for additional licenses since the solution is built into Windows."
"It is a totally free solution."
"The solution is expensive."
"The solution is priced low. I would rate the product's pricing one out of ten."
"This solution is included with Microsoft Server and my clients did not have to pay for anything extra."
"Microsoft BitLocker's pricing is fair; I rate it a four out of ten."
report
Use our free recommendation engine to learn which Customer Identity and Access Management (CIAM) solutions are best for your needs.
832,138 professionals have used our research since 2012.
 

Top Industries

By visitors reading reviews
Financial Services Firm
16%
Computer Software Company
14%
Manufacturing Company
11%
Insurance Company
7%
Computer Software Company
12%
Government
10%
Manufacturing Company
8%
Financial Services Firm
8%
 

Company Size

By reviewers
Large Enterprise
Midsize Enterprise
Small Business
 

Questions from the Community

What do you like most about CyberArk Identity?
The integration capabilities, ability to integrate CyberArk into the overall IBB strategy of our current clients.
What is your experience regarding pricing and costs for CyberArk Identity?
I think it is a fairly priced tool. I rate the tool between six and seven on a scale of one to ten where one is expensive, and ten is cheap.
What needs improvement with CyberArk Identity?
At the moment CyberArk needs to enrich Conjur and it needs to be made more viable so that its adoption can be made much faster.
What should one take into account when replacing PGP with Microsoft BitLocker?
Beware to make backup of useful data, then use reverse decryption policy from Symantec panel/McAfee ePO to decrypt the DE partitions while it is sometimes more straightforward and faster to reinsta...
Would you choose Microsoft BitLocker or McAfee Complete Data Protection?
Microsoft BitLocker is very intuitive and easy to maintain. It is basically the global standard solution for drive encryption and successfully fulfills regulatory needs in terms of data protection....
How does Microsoft BitLocker compare with Symantec Endpoint Encryption?
Microsoft BitLocker is very intuitive and easy to maintain. It is basically the global standard solution for drive encryption and it successfully fulfills regulatory needs in terms of data protecti...
 

Also Known As

Idaptive
BitLocker, MS BitLocker
 

Overview

 

Sample Customers

MLB, Citi, Pfizer, SulAmerica, GE Capital, Shiseido
ACV, Proaxis Therapy, Choice Hotels International, adnymics GmbH, Intermedia, NMBS/SNCB
Find out what your peers are saying about Auth0, Ping Identity, Omada and others in Customer Identity and Access Management (CIAM). Updated: January 2025.
832,138 professionals have used our research since 2012.