Try our new research platform with insights from 80,000+ expert users

CyberArk Identity vs Microsoft Intune comparison

 

Comparison Buyer's Guide

Executive Summary
 

Categories and Ranking

CyberArk Identity
Average Rating
8.2
Reviews Sentiment
7.0
Number of Reviews
19
Ranking in other categories
Authentication Systems (9th), Identity Management (IM) (13th), Authorization Software (4th), Enterprise Password Managers (9th), User Entity Behavior Analytics (UEBA) (9th), Access Management (9th), Active Directory Management (11th), Cloud Resource Access Management (2nd), Customer Identity and Access Management (CIAM) (5th)
Microsoft Intune
Average Rating
8.2
Reviews Sentiment
7.3
Number of Reviews
233
Ranking in other categories
Configuration Management (2nd), Remote Access (1st), Enterprise Mobility Management (EMM) (1st), Unified Endpoint Management (UEM) (1st), Microsoft Security Suite (1st)
 

Mindshare comparison

While both are Security Software solutions, they serve different purposes. CyberArk Identity is designed for Customer Identity and Access Management (CIAM) and holds a mindshare of 3.1%, up 1.9% compared to last year.
Microsoft Intune, on the other hand, focuses on Unified Endpoint Management (UEM), holds 39.1% mindshare, down 43.6% since last year.
Customer Identity and Access Management (CIAM)
Unified Endpoint Management (UEM)
 

Featured Reviews

Avinash Gopu. - PeerSpot reviewer
Allows Linux and Unix administrators to login with single password
The solution helps with auditing, and monitoring, and integrates with Splunk for log analysis. User activity logs are captured in CyberArk Identity and sent to external tools like Splunk for analysis and monitoring. It is integrated with tools like Splunk and Dynatrace for the analysis of risk behavior and user activity. The pushing teams receive automated reports to assess factors such as login times and server activity in the last 60 days. The licensing for IAM and PAM tools is based on headcount and usage. Users who are not actively utilizing the resources may have their access revoked. This approach helps manage budgeting and reduces the risk impact on the organization by implementing protocols to mitigate threats.
Gaurav Chandola - PeerSpot reviewer
We can manage all aspects of our devices from a single console, easy to scale, and quick to deploy
Intune has many benefits from the Microsoft perspective. This solution can manage Windows 10 devices, app management, and provide security solutions. We don't need to worry about our network connection, and we'll be more secure with regular security patches and compliance. Since everything will be deployed through the internet and users will log in using the internet only, the risks have been mitigated. Security updates, security patching, and the application will be targeted from Intune. The location tracker will be available to track where the device is and the user's location. The user will be restricted from accessing certain applications using compliance policies. Conditional access policies will be based on the reason why the user needs access to the application. Microsoft Intune is one of the best products in the industry for managing Windows devices. The solution has more feature restrictions. The conditional access policies also eliminate the dependency on the on-prem network for the devices. The solution also manages our security settings and a lot of other beneficial features such as Microsoft Purview which gives us the compliance portion. We can manage all aspects of our device from a single console, including M365 services. This allows us to configure data classification types, such as public, private, internal, confidential, and highly confidential.

Quotes from Members

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
 

Pros

"The user identification is simplified, and managing user privileges, whether adding or revoking them, is also quite straightforward when utilizing CyberArk SaaS."
"The solution helps with auditing, and monitoring, and integrates with Splunk for log analysis. User activity logs are captured in CyberArk Identity and sent to external tools like Splunk for analysis and monitoring."
"The feature that we find most valuable is the ability to integrate multiple IDs for on-premises Active Directory."
"The initial setup is straightforward. It takes me up to an hour and a half."
"The most valuable features of CyberArk Identity are its ability to control access to administrative staff."
"The initial setup of CyberArk Identity was straightforward."
"I like the RBAC (Role-Based Access Control). It basically involves defining various roles, and then simply assigning those roles to users."
"CyberArk Identity is a mature product."
"The biggest thing for us is enforcing logins only from devices that are managed by Intune."
"Maturity makes it a stable product."
"Its security is most valuable. It gives us a way to secure devices, not only those that are steady. We do have a few tablets and other devices, and it is a way for us to secure these devices and manage them. We know they're out there and what's their status. We can manage their life cycle and verify that they're updated properly."
"If any user tries to access company data, it directly interacts with the conditional access policy. This helps us protect our data and set the criteria for how data can be accessed and shared."
"The Autopilot feature is the most valuable because it saves significant time on managing devices. We can ship devices globally, and users can set them up on their own. It's convenient."
"Technical support, in general, has been quite helpful."
"What I like most about the tool is that it's now very easy to set up a device for someone to use. It also helps us tremendously in managing security. Before, we used on-premise management with a domain controller. It was difficult to manage security comprehensively. For example, it was hard to know which computers were updated. We weren't able to do that easily with our previous solution."
"Intune can wipe devices. For example, if a disgruntled employee wants to leak the data on their company phone, Intune can terminate their access and wipe the entire device with a click."
 

Cons

"They could improve their UI and make everything more user-friendly."
"I'm not sure what needs improvement. It is a good platform."
"The user interface could be improved."
"In terms of general user feedback, the more security you put in front of a user, the more they complain. So usability and the user experience are always a challenge. So there's always room for improvement."
"There is room for improvement in documentation. The documentation could be more specific about the changes needed to achieve specific goals."
"At the moment CyberArk needs to enrich Conjur and it needs to be made more viable so that its adoption can be made much faster."
"The solution's difficulty in gaining skill sets should be improved because it's a vertical product."
"CyberArk Identity could improve by having the ability to better manage the network, such as Cisco. There seem to be some issues in this area."
"Intune could be enhanced by automating application upgrades, similar to how it automates operating system upgrades."
"The solution could improve its flexibility."
"Intune has some limitations when it comes to application updates for third-party applications. You can schedule an update, but when it's a package setup, you need to supercede and replace it each time."
"Sometimes the syncing is inconsistent. I'm confident that the devices are checking in every eight hours, but sometimes the devices aren't picking up the settings as quickly as I would expect."
"China blocks Google and Google Play Store, which makes installation challenging. Microsoft Intune is a company software, which has to be installed to the app portal or Microsoft Software Center."
"It would be great if Intune offered better data protection controls for BYOD Windows PCs."
"The solution's app deployment needs to be improved."
"The documentation about the custom image setup could be better. Although Microsoft provides the steps to configure Intune or set up or deploy Intune, it doesn't have much information related to custom images. If you ask, "how can we deploy the custom image?" There is no information. The steps they mention ask you to connect to your on-premises environment or create your own image on the cloud itself once there is connectivity. But I needed to go to multiple websites to get all this information. I had to figure out how to upload the custom image if you want to use the on-premise custom image for Cloud PC. If you have the proper subscription, you must have the right access, like global admin or owner. Then you can add your custom image to that. There are no steps mentioned over there. Microsoft Intune doesn't have Chrome browser support. I would like to have that support because they will want it if we pitch the product to clients."
 

Pricing and Cost Advice

"There is an initial license and then there is a subscription needed."
"I think it is a fairly priced tool. I rate the tool between six and seven on a scale of one to ten where one is expensive, and ten is cheap."
"It's not that affordable compared to Delinea or other products. They're less expensive and allow more customization. For the cost, it is expensive."
"In terms of pricing, BeyondTrust and CyberArk tend to be more expensive, with CyberArk receiving an eight out of ten, in this regard."
"We find that the pricing and licensing of this solution is adequate, as compared to the other competitors in the market."
"I would rate the tool’s pricing a seven out of ten. The product’s pricing is expensive and is on a yearly basis. You will need to pay around 10,000 GBP for 500 users."
"The solution is cheap and I rate its pricing an eight out of ten."
"The pricing of CyberArk Identity is competitive."
"The price for Intune is fair."
"It comes as a bundle, so you do not really know what the prices are. Microsoft does not break it down to the user cost for us. It is just bundled with our E5 license."
"Microsoft Intune is more expensive than other solutions, but it offers a wider range of features and control."
"There is a license needed to use the solution and we are on an annual license."
"Even if they charge a premium, they aim to provide equal value."
"Its price is in the medium range. It is acceptable because you're paying for the features. I am not aware of any additional costs."
"The cost is somewhat on the higher side, particularly when considering certain price points, especially in markets like India."
"The pricing is competitive, but it is not cheap."
report
Use our free recommendation engine to learn which Customer Identity and Access Management (CIAM) solutions are best for your needs.
823,875 professionals have used our research since 2012.
 

Top Industries

By visitors reading reviews
Financial Services Firm
15%
Computer Software Company
13%
Manufacturing Company
11%
Insurance Company
7%
Educational Organization
26%
Computer Software Company
11%
Financial Services Firm
7%
Government
7%
 

Company Size

By reviewers
Large Enterprise
Midsize Enterprise
Small Business
 

Questions from the Community

What do you like most about CyberArk Identity?
The integration capabilities, ability to integrate CyberArk into the overall IBB strategy of our current clients.
What is your experience regarding pricing and costs for CyberArk Identity?
I think it is a fairly priced tool. I rate the tool between six and seven on a scale of one to ten where one is expensive, and ten is cheap.
What needs improvement with CyberArk Identity?
At the moment CyberArk needs to enrich Conjur and it needs to be made more viable so that its adoption can be made much faster.
How does Microsoft Intune compare with VMware Workspace One?
Microsoft Intune is a great tool for managing a mobile device fleet while keeping access control. The solution makes it easy to control security and manage the usage of mobile apps when you have a ...
What are the pros and cons of Microsoft Intune?
Microsoft Intune is a great configuration management tool and has a lot of good things going for it. Here are some of the things I like about it: Pros: Protected productivity: Intune gives you th...
How does Google Cloud Identity compare with Microsoft Intune?
Microsoft Intune offers not only an easy-to-deploy data protection and productivity management solution, but also access to both Microsoft’s user community as well as around-the-clock customer s...
 

Also Known As

Idaptive
Intune, MS Intune, Microsoft Endpoint Manager
 

Overview

 

Sample Customers

MLB, Citi, Pfizer, SulAmerica, GE Capital, Shiseido
Mitchells and Buzzers, Callaway
Find out what your peers are saying about Auth0, Ping Identity, Omada and others in Customer Identity and Access Management (CIAM). Updated: December 2024.
823,875 professionals have used our research since 2012.