Try our new research platform with insights from 80,000+ expert users

CyberArk Identity vs Microsoft Intune comparison

 

Comparison Buyer's Guide

Executive Summary
 

Categories and Ranking

CyberArk Identity
Average Rating
8.2
Number of Reviews
19
Ranking in other categories
Authentication Systems (9th), Identity Management (IM) (13th), Authorization Software (4th), Enterprise Password Managers (9th), User Entity Behavior Analytics (UEBA) (9th), Access Management (9th), Active Directory Management (11th), Cloud Resource Access Management (2nd), Customer Identity and Access Management (CIAM) (5th)
Microsoft Intune
Average Rating
8.2
Reviews Sentiment
7.2
Number of Reviews
210
Ranking in other categories
Configuration Management (2nd), Remote Access (1st), Enterprise Mobility Management (EMM) (1st), Unified Endpoint Management (UEM) (1st), Microsoft Security Suite (1st)
 

Mindshare comparison

While both are Security Software solutions, they serve different purposes. CyberArk Identity is designed for Customer Identity and Access Management (CIAM) and holds a mindshare of 3.0%, up 1.8% compared to last year.
Microsoft Intune, on the other hand, focuses on Unified Endpoint Management (UEM), holds 41.2% mindshare, down 44.7% since last year.
Customer Identity and Access Management (CIAM)
Unified Endpoint Management (UEM)
 

Featured Reviews

Avinash Gopu. - PeerSpot reviewer
Feb 29, 2024
Allows Linux and Unix administrators to login with single password
The solution helps with auditing, and monitoring, and integrates with Splunk for log analysis. User activity logs are captured in CyberArk Identity and sent to external tools like Splunk for analysis and monitoring. It is integrated with tools like Splunk and Dynatrace for the analysis of risk behavior and user activity. The pushing teams receive automated reports to assess factors such as login times and server activity in the last 60 days. The licensing for IAM and PAM tools is based on headcount and usage. Users who are not actively utilizing the resources may have their access revoked. This approach helps manage budgeting and reduces the risk impact on the organization by implementing protocols to mitigate threats.
Gaurav Chandola - PeerSpot reviewer
Dec 22, 2022
We can manage all aspects of our devices from a single console, easy to scale, and quick to deploy
Intune has many benefits from the Microsoft perspective. This solution can manage Windows 10 devices, app management, and provide security solutions. We don't need to worry about our network connection, and we'll be more secure with regular security patches and compliance. Since everything will be deployed through the internet and users will log in using the internet only, the risks have been mitigated. Security updates, security patching, and the application will be targeted from Intune. The location tracker will be available to track where the device is and the user's location. The user will be restricted from accessing certain applications using compliance policies. Conditional access policies will be based on the reason why the user needs access to the application. Microsoft Intune is one of the best products in the industry for managing Windows devices. The solution has more feature restrictions. The conditional access policies also eliminate the dependency on the on-prem network for the devices. The solution also manages our security settings and a lot of other beneficial features such as Microsoft Purview which gives us the compliance portion. We can manage all aspects of our device from a single console, including M365 services. This allows us to configure data classification types, such as public, private, internal, confidential, and highly confidential.

Quotes from Members

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
 

Pros

"The features that I personally find most effective in terms of security stem from the fact that it is easy to integrate and also the adoption is faster."
"The tool is a very strong and valuable enterprise solution, particularly in ensuring the continuity of service."
"The most valuable feature of CyberArk Identity is the adaptive interface."
"I found the solution to be stable."
"The user identification is simplified, and managing user privileges, whether adding or revoking them, is also quite straightforward when utilizing CyberArk SaaS."
"The initial setup of CyberArk Identity was straightforward."
"The integration capabilities, ability to integrate CyberArk into the overall IBB strategy of our current clients."
"The initial setup is straightforward. It takes me up to an hour and a half."
"If any user tries to access company data, it directly interacts with the conditional access policy. This helps us protect our data and set the criteria for how data can be accessed and shared."
"The Microsoft Windows Autopilot and Defender policies are the most valuable features of this solution."
"It supports end-users who tend to lock their devices quite frequently. Its conditional access policy helps us keep the users logged into their devices."
"Intune's security features for Apple iOS and Mac OS are helpful. We can check enrollment, manage public and private settings, and manage the organization's data using security key features."
"The conditional access policies that we set up are very useful."
"Autopilot is the most valuable feature."
"I like how Intune brings everything into one place. For example, you can set up conditional access to applications and devices inside Intune. I also like the segregation inside the Intune devices. You can segregate them by Windows, iOS, iPadOS, macOS, and Android. You can sort it by platform, so you don't need to go into the devices section."
"Our main use is Intune's management of mobile devices, like Android or iPhone devices. The application performs quite well for both types. We successfully managed almost 3,000 endpoints."
 

Cons

"The OpenID features could improve in CyberArk Identity."
"The product needs to leverage the cloud more, especially in the financial sector, where cloud adoption might be limited. Proper reporting within the cloud is essential. The tool should be more user-friendly to expedite access for users. The current agent-based system poses challenges if a user loses access to the server, making tasks difficult to perform. It should also improve technical support."
"More integrations would be better."
"I'm not sure what needs improvement. It is a good platform."
"The solution could be easier to use and I found it to be very complex involving many steps."
"We would like to see an improvement in the ability to manage mobile devices."
"CyberArk Identity's GUI is an area with certain shortcomings that need improvement."
"At the moment CyberArk needs to enrich Conjur and it needs to be made more viable so that its adoption can be made much faster."
"Lacking in features such as Wi-Fi and network security."
"It would be nice to have a location tracker for the mobile device management tool. I'm not sure if it exists but hasn't been configured or if it's missing, but we've been unable to utilize the location features."
"Reporting and troubleshooting for the application deployment could be better. It's very difficult to understand."
"It needs certificate provisioning for S/MIME purposes."
"We only have major classifications for iOS and Android, but there are different brands that have different cycles of updates. If they can fine-tune it to make it more brand-specific, that would be even better."
"The solution's app deployment needs to be improved."
"Intune has limited integration with non-Microsoft solutions."
"We haven't really gone through all the features of Intune. We are just discovering them. Every day, we see a new feature that we want to apply, but what will be great for Intune is to be able to deploy apps in a simple fashion. We should be able to easily install various apps on the Windows platform, iOS, and Android. Currently, we have to write some scripts. It's not as straightforward as we would like it to be. It should be simplified so that we can do it just with three clicks—next, next, finish—without needing to write a script."
 

Pricing and Cost Advice

"I would rate the tool’s pricing a seven out of ten. The product’s pricing is expensive and is on a yearly basis. You will need to pay around 10,000 GBP for 500 users."
"There is an initial license and then there is a subscription needed."
"We find that the pricing and licensing of this solution is adequate, as compared to the other competitors in the market."
"Their pricing is obviously a lot higher than many vendors in the marketplace but their service is also unmatched."
"In terms of pricing, BeyondTrust and CyberArk tend to be more expensive, with CyberArk receiving an eight out of ten, in this regard."
"CyberArk Identity is an expensive solution."
"It's not that affordable compared to Delinea or other products. They're less expensive and allow more customization. For the cost, it is expensive."
"The solution is cheap and I rate its pricing an eight out of ten."
"They have categorized the licenses according to the size of the business. So, if it's a smaller organization, we can choose the license accordingly. If it's a big organization, then we can choose accordingly. Everything is clearly mentioned, and we can decide. It's suitable for all kinds of infrastructure, and that's very goo"
"On a scale of one to ten with one being the cheapest, the cost of Microsoft Intune is a five."
"Even if they charge a premium, they aim to provide equal value."
"While Microsoft charges for actual usage, it lacks discount options."
"I rate Intune an eight out of ten for affordability. It's bundled with the 365 licensing, which is competitive overall."
"The price is very reasonable."
"Every customer used to purchase licenses based on their needs."
"The pricing for Microsoft Intune is reasonable. Our clients are satisfied."
report
Use our free recommendation engine to learn which Customer Identity and Access Management (CIAM) solutions are best for your needs.
815,854 professionals have used our research since 2012.
 

Top Industries

By visitors reading reviews
Financial Services Firm
15%
Computer Software Company
14%
Manufacturing Company
11%
Insurance Company
7%
Educational Organization
26%
Computer Software Company
11%
Financial Services Firm
7%
Government
7%
 

Company Size

By reviewers
Large Enterprise
Midsize Enterprise
Small Business
 

Questions from the Community

What do you like most about CyberArk Identity?
The integration capabilities, ability to integrate CyberArk into the overall IBB strategy of our current clients.
What is your experience regarding pricing and costs for CyberArk Identity?
I think it is a fairly priced tool. I rate the tool between six and seven on a scale of one to ten where one is expensive, and ten is cheap.
What needs improvement with CyberArk Identity?
At the moment CyberArk needs to enrich Conjur and it needs to be made more viable so that its adoption can be made much faster.
How does Microsoft Intune compare with VMware Workspace One?
Microsoft Intune is a great tool for managing a mobile device fleet while keeping access control. The solution makes it easy to control security and manage the usage of mobile apps when you have a ...
What are the pros and cons of Microsoft Intune?
Microsoft Intune is a great configuration management tool and has a lot of good things going for it. Here are some of the things I like about it: Pros: Protected productivity: Intune gives you th...
How does Google Cloud Identity compare with Microsoft Intune?
Microsoft Intune offers not only an easy-to-deploy data protection and productivity management solution, but also access to both Microsoft’s user community as well as around-the-clock customer s...
 

Also Known As

Idaptive
Intune, MS Intune, Microsoft Endpoint Manager
 

Overview

 

Sample Customers

MLB, Citi, Pfizer, SulAmerica, GE Capital, Shiseido
Mitchells and Buzzers, Callaway
Find out what your peers are saying about Auth0, Ping Identity, Omada and others in Customer Identity and Access Management (CIAM). Updated: November 2024.
815,854 professionals have used our research since 2012.