Try our new research platform with insights from 80,000+ expert users

CyberArk Identity vs Microsoft BitLocker comparison

 

Comparison Buyer's Guide

Executive Summary

Review summaries and opinions

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
 

Categories and Ranking

CyberArk Identity
Average Rating
8.2
Reviews Sentiment
7.0
Number of Reviews
23
Ranking in other categories
Authentication Systems (8th), Identity Management (IM) (11th), Authorization Software (3rd), Enterprise Password Managers (8th), User Entity Behavior Analytics (UEBA) (9th), Access Management (6th), Active Directory Management (9th), Cloud Resource Access Management (2nd), Customer Identity and Access Management (CIAM) (6th)
Microsoft BitLocker
Average Rating
8.2
Reviews Sentiment
7.4
Number of Reviews
65
Ranking in other categories
Endpoint Encryption (1st), Mobile Data Protection (1st)
 

Mindshare comparison

CyberArk Identity and Microsoft BitLocker aren’t in the same category and serve different purposes. CyberArk Identity is designed for Customer Identity and Access Management (CIAM) and holds a mindshare of 3.7%, up 3.2% compared to last year.
Microsoft BitLocker, on the other hand, focuses on Endpoint Encryption, holds 40.2% mindshare, up 39.9% since last year.
Customer Identity and Access Management (CIAM)
Endpoint Encryption
 

Featured Reviews

Julio Montero - PeerSpot reviewer
Access management system provides strong security and effortless user authentication
The solution can be deployed on cloud or on-premises. CyberArk is more on the cloud than on local hardware. The deployment is initially quite difficult. That said, when you are doing the implementation of CyberArk, there are so many tutorials that make the learning process very easy. The only complaint could be the language barrier. It's difficult if you don't have a very good level of English. Otherwise, it is very easy. You can have it set up within three months without much difficulty. It's hard to get started, however, once you get going, it gets easier. A full deployment takes half a year or less. There is some maintenance necessary. A company is constantly hiring and letting go of employees. The access is always changing, so access must always be adjusted. Or, if we need another law of filter, we would need to add those, or even take them away. That's another aspect of maintenance.
Douglas Curry - PeerSpot reviewer
Users can easily deploy and manage it
The solution's most valuable feature is that it is simple to deploy and manage. I can't say what features of the tool I like since it is very much a deploy-and-forget product. We don't use any advanced features of the tool in my company. The tool's recovery options are good, especially since it integrates with Active Directory, making everything a simple process. The product's integration capabilities are good.

Quotes from Members

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
 

Pros

"The solution helps with auditing, and monitoring, and integrates with Splunk for log analysis. User activity logs are captured in CyberArk Identity and sent to external tools like Splunk for analysis and monitoring."
"The feature that we find most valuable is the ability to integrate multiple IDs for on-premises Active Directory."
"The user self-service program and the Office 365 provisioning service feature are the most valuable. It is a very easy and feature-rich solution that gives priority to the users and security."
"It has machine learning and can help clients to learn the environment and understand what is happening."
"What I like most about CyberArk Identity is the model that is in place."
"Being able to integrate CyberArk Identity with Microsoft Defender is valuable."
"The tool helps with authentication. It acts as an MFA for any kind of privileged access that occurs in our organization."
"The best thing I like about CyberArk Identity is that it does not require heavy implementation, complex hardware, or complex training."
"The most valuable feature of this solution is the protection and ease of use."
"I liked the way it works with our Microsoft tools. As we roll out Intune, we can validate if the device has been encrypted, and if not, we can push it down. It is pretty simple to deploy."
"Microsoft BitLocker's most valuable feature is endpoint encryption, and it's quite easy to manage."
"It's very straightforward to recover data. It's safe for us; in case of lost information, it provides multiple options to recover the data."
"Integration with System Center Configuration Manager (C: and D: logical drives are encrypted before installing Windows via SCCM)."
"The initial setup is very simple."
"The solution works the way it's supposed to - stability and scalability are fine."
"The hard drive encryption is very good."
 

Cons

"CyberArk Identity's GUI is an area with certain shortcomings that need improvement."
"The OpenID features could improve in CyberArk Identity."
"When you translate the page from one language to another, it can be a difficult process. The translation isn't always good, and it may have a completely different name. I've noticed this in the English to Spanish translation."
"At the moment CyberArk needs to enrich Conjur and it needs to be made more viable so that its adoption can be made much faster."
"The product is not cheap, especially if you opt for an on-premise deployment requiring a complex server infrastructure. On the other hand, choosing the software as a service version simplifies infrastructure requirements but necessitates being online all the time."
"Integration or deployment is extremely difficult for CyberArk Identity."
"We would like to see an improvement in the ability to manage mobile devices."
"Something they could improve is the management of multifactor authentication. When you translate the page from one language to another, it can be a difficult process."
"Microsoft BitLocker needs to be an all-inclusive solution. For example, a Trusted Platform Module (TPM) cryptoprocessor is required to use Bitlocker with your computer which keeps Bitlocker from adoption beyond Windows."
"The customizations could be more flexible."
"They can improve the security of the application and include an encryption disk in the next feature."
"It needs a management console."
"I would recommend BitLocker only because of the economic side, not the technical side. If the features were included in the already existing licenses I would use it. If not, I would recommend other products."
"The biggest one for us is revoking access. So, even though someone downloads something to a device, we want the ability to cloak that device or data and bring it back or make that data unusable for that person. Currently, BitLocker doesn't give us that ability. It basically encrypts it. We're seeing if identity management or IAM allows us to do that. We're kind of looking at third-party software that does that for us."
"If integration with Active Directory are not mandatory for him, I think that there are many other solutions in the market that equal or are much stronger than Microsoft."
"Instead of integrating with a third party, Microsoft BitLocker should have its own mechanism to safeguard the systems when they are not accessible for a long time."
 

Pricing and Cost Advice

"The pricing of CyberArk Identity is competitive."
"CyberArk Identity is an expensive solution."
"There could be some additional costs apart from the licensing costs of the solution when you want to develop connectors in CyberArk Identity."
"We find that the pricing and licensing of this solution is adequate, as compared to the other competitors in the market."
"It's not that affordable compared to Delinea or other products. They're less expensive and allow more customization. For the cost, it is expensive."
"Their pricing is obviously a lot higher than many vendors in the marketplace but their service is also unmatched."
"There is an initial license and then there is a subscription needed."
"The pricing point is very good. I compared it with other products, and it does not require a heavy investment."
"Microsoft BitLocker is a free feature when you are using Microsoft solutions."
"We didn't pay for additional licenses since the solution is built into Windows."
"Microsoft BitLocker's pricing is included in the Microsoft license, and you don't have to pay an additional fee for it."
"On a scale from one to ten, where one is expensive and ten is cheap, I rate the solution's pricing an eight out of ten."
"The solution is priced low. I would rate the product's pricing one out of ten."
"The product's cost is included in Windows."
"The cost of this solution is bundled in with part of the subscription for the Microsoft Cloud. We have users subscribed to Enterprise E5 and it comes with E5"
"It's not about pricing, because we are working with Enterprise companies that already have Windows Enterprise, so BitLocker comes already included as a Windows feature. It's free for Enterprise users. The price is only for deployment. The customer will pay for McAfee, however."
report
Use our free recommendation engine to learn which Customer Identity and Access Management (CIAM) solutions are best for your needs.
847,959 professionals have used our research since 2012.
 

Top Industries

By visitors reading reviews
Financial Services Firm
17%
Computer Software Company
13%
Manufacturing Company
11%
Healthcare Company
6%
Computer Software Company
12%
Government
10%
Manufacturing Company
9%
Financial Services Firm
9%
 

Company Size

By reviewers
Large Enterprise
Midsize Enterprise
Small Business
 

Questions from the Community

What do you like most about CyberArk Identity?
The integration capabilities, ability to integrate CyberArk into the overall IBB strategy of our current clients.
What is your experience regarding pricing and costs for CyberArk Identity?
The pricing point is very good. I compared it with other products, and it does not require a heavy investment.
What needs improvement with CyberArk Identity?
It does not have global market penetration, and sometimes, there are support issues. CyberArk Identity can definitely improve on the IAM rules when I create them. The stability can also be better.
What should one take into account when replacing PGP with Microsoft BitLocker?
Beware to make backup of useful data, then use reverse decryption policy from Symantec panel/McAfee ePO to decrypt the DE partitions while it is sometimes more straightforward and faster to reinsta...
Would you choose Microsoft BitLocker or McAfee Complete Data Protection?
Microsoft BitLocker is very intuitive and easy to maintain. It is basically the global standard solution for drive encryption and successfully fulfills regulatory needs in terms of data protection....
How does Microsoft BitLocker compare with Symantec Endpoint Encryption?
Microsoft BitLocker is very intuitive and easy to maintain. It is basically the global standard solution for drive encryption and it successfully fulfills regulatory needs in terms of data protecti...
 

Also Known As

Idaptive
BitLocker, MS BitLocker
 

Overview

 

Sample Customers

MLB, Citi, Pfizer, SulAmerica, GE Capital, Shiseido
ACV, Proaxis Therapy, Choice Hotels International, adnymics GmbH, Intermedia, NMBS/SNCB
Find out what your peers are saying about Auth0, Ping Identity, Omada and others in Customer Identity and Access Management (CIAM). Updated: April 2025.
847,959 professionals have used our research since 2012.