Try our new research platform with insights from 80,000+ expert users

CyberArk Identity vs Ping Identity Platform comparison

 

Comparison Buyer's Guide

Executive SummaryUpdated on Jan 27, 2025

Review summaries and opinions

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
 

ROI

Sentiment score
7.7
CyberArk Identity enhances security and provides substantial financial returns, with users noting long-term cost savings and investment value.
Sentiment score
7.4
Ping Identity Platform simplifies identity management, lowers IT overhead, enhances security, improves efficiency, boosts satisfaction, and offers scalability.
By the second month, we started seeing the benefits and achieved a return on investment.
 

Customer Service

Sentiment score
6.2
CyberArk Identity's customer service is responsive but inconsistent, with varying support experiences and commonly rated around eight out of ten.
Sentiment score
6.6
Ping Identity Platform's support is prompt, knowledgeable, and proactive, though some users find the support portal confusing.
They resolved the problem immediately after I reported it, on the same day, within one hour.
I have had conversations with them twice, and their technical support team was not that good.
There are times when there is a delay in handling my inquiries via email.
 

Scalability Issues

Sentiment score
7.6
CyberArk Identity is highly scalable, suits diverse sizes, but may face challenges with architectural scalability and license complexity.
Sentiment score
7.5
Ping Identity Platform efficiently scales across servers and clusters, supports large environments, but performance varies based on configurations.
We can use it on different phones and computers, demonstrating its scalability.
By addressing the issues I have highlighted, such as stability and making it bug and lag-free, along with improving customer support, they can enhance its scalability.
 

Stability Issues

Sentiment score
7.9
CyberArk Identity is highly stable, reliable, with a 99.9% SLA, and minor suggestions include expanding zones and availability dashboards.
Sentiment score
7.9
Ping Identity Platform is highly reliable, with minimal bugs or crashes, though some infrastructure and server connection issues exist.
In the time I have been here, I have not experienced a fall in the service of CyberArk.
There is a timeout period that I do not like, requiring repeated verification.
With respect to stability, I find that stability is very good.
 

Room For Improvement

CyberArk Identity needs improvements in management, scalability, usability, cloud capabilities, and cost-effectiveness, alongside better support and integration features.
Ping Identity Platform requires stronger functionalities, enhanced user experience, better security, and comprehensive support to compete effectively with Microsoft.
Integration or deployment is extremely difficult for CyberArk Identity.
It does not have global market penetration, and sometimes, there are support issues.
Something they could improve is the management of multifactor authentication.
 

Setup Cost

CyberArk Identity's pricing is competitive but costly, valued by larger enterprises for its superior services and security features.
Ping Identity Platform is competitively priced, offering robust features and good ROI, but may be costly for small businesses.
I compared it with other products, and it does not require a heavy investment.
Regarding pricing, it can be quite a lot for small companies.
If I am not going fully cloud, there are additional resources I will need to purchase, such as spinning more VMs or acquiring an HSM device to encrypt the vault.
 

Valuable Features

CyberArk Identity enhances security with features like Active Directory integration, multi-factor authentication, password rotation, and compliance support.
Ping Identity Platform offers robust security with multi-factor authentication, seamless integration, user-friendly interface, and extensive customization options.
It protects our platform, application, network, and infrastructure resources on any device.
It impacts zero trust security strategies. It prevents lateral movements in the organization.
It's very low cost in comparison to Microsoft solutions.
 

Categories and Ranking

CyberArk Identity
Ranking in Authentication Systems
8th
Ranking in Access Management
7th
Ranking in Customer Identity and Access Management (CIAM)
6th
Average Rating
8.2
Reviews Sentiment
7.0
Number of Reviews
23
Ranking in other categories
Identity Management (IM) (10th), Authorization Software (3rd), Enterprise Password Managers (8th), User Entity Behavior Analytics (UEBA) (9th), Active Directory Management (11th), Cloud Resource Access Management (2nd)
Ping Identity Platform
Ranking in Authentication Systems
6th
Ranking in Access Management
4th
Ranking in Customer Identity and Access Management (CIAM)
2nd
Average Rating
8.2
Reviews Sentiment
7.1
Number of Reviews
28
Ranking in other categories
Single Sign-On (SSO) (4th), Data Governance (8th), Identity and Access Management as a Service (IDaaS) (IAMaaS) (6th), Directory Servers (1st)
 

Mindshare comparison

As of March 2025, in the Authentication Systems category, the mindshare of CyberArk Identity is 1.5%, up from 1.0% compared to the previous year. The mindshare of Ping Identity Platform is 3.5%, down from 5.0% compared to the previous year. It is calculated based on PeerSpot user engagement data.
Authentication Systems
 

Featured Reviews

Julio Montero - PeerSpot reviewer
Access management system provides strong security and effortless user authentication
The solution can be deployed on cloud or on-premises. CyberArk is more on the cloud than on local hardware. The deployment is initially quite difficult. That said, when you are doing the implementation of CyberArk, there are so many tutorials that make the learning process very easy. The only complaint could be the language barrier. It's difficult if you don't have a very good level of English. Otherwise, it is very easy. You can have it set up within three months without much difficulty. It's hard to get started, however, once you get going, it gets easier. A full deployment takes half a year or less. There is some maintenance necessary. A company is constantly hiring and letting go of employees. The access is always changing, so access must always be adjusted. Or, if we need another law of filter, we would need to add those, or even take them away. That's another aspect of maintenance.
Dilip Reddy - PeerSpot reviewer
Easy to use but requires improvements in the area of stability
In my company, we have worked on authorization, and I know that there are different types of grants. We have worked on the authorization code, client credentials, and ROPC grant. There are two types of tokens, like the JWT token and internally managed reference tokens. JWT tokens are useful for finding information related to the claim requests. Internally managed reference tokens are useful for dealing with visual data and information. For the clients to fit the user information, they need to do additional work to fit all the user info into the site, which is to define and validate the token issue and provide the request for VPNs. I worked on the key differences between the authorization code and implicit grant. In the authorization code type, you will have the authorization code issued initially to the client, and the client has to exchange it with the authorization server, like using a DAC channel to get the access token. In implicit grants, tokens are issued right away if the application is a single-page application. We can either use the authorization code or an implicit grant.
report
Use our free recommendation engine to learn which Authentication Systems solutions are best for your needs.
842,296 professionals have used our research since 2012.
 

Top Industries

By visitors reading reviews
Financial Services Firm
17%
Computer Software Company
13%
Manufacturing Company
11%
Insurance Company
6%
Financial Services Firm
25%
Computer Software Company
10%
Manufacturing Company
9%
Healthcare Company
7%
 

Company Size

By reviewers
Large Enterprise
Midsize Enterprise
Small Business
 

Questions from the Community

What do you like most about CyberArk Identity?
The integration capabilities, ability to integrate CyberArk into the overall IBB strategy of our current clients.
What is your experience regarding pricing and costs for CyberArk Identity?
The pricing is acceptable. It is worth considering what we are protecting with the amount charged.
What needs improvement with CyberArk Identity?
To enhance the product, they can consider improving the user interface of the software and possibly the customer support team. Sometimes, there is a delay in handling my inquiries via email, which ...
What do you like most about PingID?
The mobile biometric authentication option improved user experience. It's always about security because, with two-factor authentication, it's always a separate device verifying the actual user logg...
What is your experience regarding pricing and costs for PingID?
The pricing is neither too expensive nor too cheap.
What needs improvement with PingID?
The management console needs to be improved. PingID should revise it.
 

Also Known As

Idaptive
Ping Identity (ID), PingFederate, PingAccess, PingOne, PingDataGovernance, PingDirectory, OpenDJ
 

Overview

 

Sample Customers

MLB, Citi, Pfizer, SulAmerica, GE Capital, Shiseido
Equinix, Land O'Lakes, CDPHP, Box, International SOS, Opower, VSP, Chevron, Truist, Academy of Art University, Northern Air Cargo, Repsol
Find out what your peers are saying about CyberArk Identity vs. Ping Identity Platform and other solutions. Updated: March 2025.
842,296 professionals have used our research since 2012.