Try our new research platform with insights from 80,000+ expert users

CyberArk Identity vs Ping Identity Platform comparison

 

Comparison Buyer's Guide

Executive Summary
 

Categories and Ranking

CyberArk Identity
Ranking in Authentication Systems
9th
Ranking in Access Management
9th
Ranking in Customer Identity and Access Management (CIAM)
5th
Average Rating
8.2
Reviews Sentiment
7.0
Number of Reviews
19
Ranking in other categories
Identity Management (IM) (13th), Authorization Software (4th), Enterprise Password Managers (9th), User Entity Behavior Analytics (UEBA) (9th), Active Directory Management (11th), Cloud Resource Access Management (2nd)
Ping Identity Platform
Ranking in Authentication Systems
5th
Ranking in Access Management
3rd
Ranking in Customer Identity and Access Management (CIAM)
2nd
Average Rating
8.2
Reviews Sentiment
7.1
Number of Reviews
28
Ranking in other categories
Single Sign-On (SSO) (4th), Data Governance (6th), Identity and Access Management as a Service (IDaaS) (IAMaaS) (5th), Directory Servers (1st)
 

Featured Reviews

Avinash Gopu. - PeerSpot reviewer
Allows Linux and Unix administrators to login with single password
The solution helps with auditing, and monitoring, and integrates with Splunk for log analysis. User activity logs are captured in CyberArk Identity and sent to external tools like Splunk for analysis and monitoring. It is integrated with tools like Splunk and Dynatrace for the analysis of risk behavior and user activity. The pushing teams receive automated reports to assess factors such as login times and server activity in the last 60 days. The licensing for IAM and PAM tools is based on headcount and usage. Users who are not actively utilizing the resources may have their access revoked. This approach helps manage budgeting and reduces the risk impact on the organization by implementing protocols to mitigate threats.
Dilip Reddy - PeerSpot reviewer
Easy to use but requires improvements in the area of stability
In my company, we have worked on authorization, and I know that there are different types of grants. We have worked on the authorization code, client credentials, and ROPC grant. There are two types of tokens, like the JWT token and internally managed reference tokens. JWT tokens are useful for finding information related to the claim requests. Internally managed reference tokens are useful for dealing with visual data and information. For the clients to fit the user information, they need to do additional work to fit all the user info into the site, which is to define and validate the token issue and provide the request for VPNs. I worked on the key differences between the authorization code and implicit grant. In the authorization code type, you will have the authorization code issued initially to the client, and the client has to exchange it with the authorization server, like using a DAC channel to get the access token. In implicit grants, tokens are issued right away if the application is a single-page application. We can either use the authorization code or an implicit grant.

Quotes from Members

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
 

Pros

"The initial setup is straightforward. It takes me up to an hour and a half."
"I found the solution to be stable."
"The tool is a very strong and valuable enterprise solution, particularly in ensuring the continuity of service."
"CyberArk Identity is a mature product."
"The solution helps with auditing, and monitoring, and integrates with Splunk for log analysis. User activity logs are captured in CyberArk Identity and sent to external tools like Splunk for analysis and monitoring."
"The most valuable features of CyberArk Identity are its ability to control access to administrative staff."
"The features that I personally find most effective in terms of security stem from the fact that it is easy to integrate and also the adoption is faster."
"I like the RBAC (Role-Based Access Control). It basically involves defining various roles, and then simply assigning those roles to users."
"I like PingFederate."
"The product's most valuable features include its cloud-based capabilities for handling cloud applications and providing authentication and authorization through OIDC and SAML. It also supports integrations needed for both local and internal applications, including legacy applications requiring web server access."
"The most valuable feature is multifactor authentication."
"This is a user-friendly solution."
"PingFederate is very flexible. We can do many customizations, and it also provides an SDK to tailor it to our specific requirements. There are also numerous plugins available. I've worked with tools like ForgeRock and Okta, but I find PingFederate to be the most customizable."
"It is a scalable solution."
"The soundness of the solution is its most valuable feature. For example, if you are in our corporate network, you can log on without any traffic interfering."
"The mobile biometric authentication option improved user experience. It's always about security because, with two-factor authentication, it's always a separate device verifying the actual user logging in."
 

Cons

"The solution's difficulty in gaining skill sets should be improved because it's a vertical product."
"They could improve their UI and make everything more user-friendly."
"We would like to see an improvement in the ability to manage mobile devices."
"I'm not sure what needs improvement. It is a good platform."
"The product needs to leverage the cloud more, especially in the financial sector, where cloud adoption might be limited. Proper reporting within the cloud is essential. The tool should be more user-friendly to expedite access for users. The current agent-based system poses challenges if a user loses access to the server, making tasks difficult to perform. It should also improve technical support."
"More integrations would be better."
"The product is not cheap, especially if you opt for an on-premise deployment requiring a complex server infrastructure. On the other hand, choosing the software as a service version simplifies infrastructure requirements but necessitates being online all the time."
"The solution could be easier to use and I found it to be very complex involving many steps."
"One significant challenge was ensuring smooth user migration during system upgrades in Ping."
"In Ping Identity, we have had some issues. We've worked with logging and troubleshooting, including some firewall and security issues."
"We had issues with the stability."
"I think that the connection with like Microsoft Word, especially for Office 365, is a weak point that could be improved."
"PingID should put a little more effort into making a pretty self-explanatory deck about their tech features and the services they offer."
"They could use some bio-certification. It's just more user-friendly and more convenient than entering the one time passes. That would be an improvement."
"Sometimes, there are issues with its stability."
"PingID classifies the type of environment into internal and external, which is an area for improvement because you need to take additional steps to trust internal and external users."
 

Pricing and Cost Advice

"I think it is a fairly priced tool. I rate the tool between six and seven on a scale of one to ten where one is expensive, and ten is cheap."
"The pricing of CyberArk Identity is competitive."
"There is an initial license and then there is a subscription needed."
"It's not that affordable compared to Delinea or other products. They're less expensive and allow more customization. For the cost, it is expensive."
"Their pricing is obviously a lot higher than many vendors in the marketplace but their service is also unmatched."
"CyberArk Identity is an expensive solution."
"I would rate the tool’s pricing a seven out of ten. The product’s pricing is expensive and is on a yearly basis. You will need to pay around 10,000 GBP for 500 users."
"We find that the pricing and licensing of this solution is adequate, as compared to the other competitors in the market."
"Ping offers flexible pricing that's not standardized."
"PingID pricing is a ten out of ten because it's a little bit cheaper than other tools, such as Okta and ForgeRock, and supports multiple tools."
"Ping Identity Platform is not very expensive."
"Ping Identity Platform is not an expensive solution."
"The pricing is neither too expensive nor too cheap."
"The platform's value justifies the pricing, especially considering its security features and scalability."
"Compared to some SaaS-based solutions, the platform is relatively cost-effective."
"The product is costly."
report
Use our free recommendation engine to learn which Authentication Systems solutions are best for your needs.
823,875 professionals have used our research since 2012.
 

Top Industries

By visitors reading reviews
Financial Services Firm
15%
Computer Software Company
13%
Manufacturing Company
11%
Insurance Company
7%
Financial Services Firm
25%
Computer Software Company
10%
Manufacturing Company
9%
Educational Organization
7%
 

Company Size

By reviewers
Large Enterprise
Midsize Enterprise
Small Business
 

Questions from the Community

What do you like most about CyberArk Identity?
The integration capabilities, ability to integrate CyberArk into the overall IBB strategy of our current clients.
What is your experience regarding pricing and costs for CyberArk Identity?
I think it is a fairly priced tool. I rate the tool between six and seven on a scale of one to ten where one is expensive, and ten is cheap.
What needs improvement with CyberArk Identity?
At the moment CyberArk needs to enrich Conjur and it needs to be made more viable so that its adoption can be made much faster.
What do you like most about PingID?
The mobile biometric authentication option improved user experience. It's always about security because, with two-factor authentication, it's always a separate device verifying the actual user logg...
What is your experience regarding pricing and costs for PingID?
The pricing is neither too expensive nor too cheap.
What needs improvement with PingID?
The management console needs to be improved. PingID should revise it.
 

Also Known As

Idaptive
Ping Identity (ID), PingFederate, PingAccess, PingOne, PingDataGovernance, PingDirectory, OpenDJ
 

Overview

 

Sample Customers

MLB, Citi, Pfizer, SulAmerica, GE Capital, Shiseido
Equinix, Land O'Lakes, CDPHP, Box, International SOS, Opower, VSP, Chevron, Truist, Academy of Art University, Northern Air Cargo, Repsol
Find out what your peers are saying about CyberArk Identity vs. Ping Identity Platform and other solutions. Updated: December 2024.
823,875 professionals have used our research since 2012.