Try our new research platform with insights from 80,000+ expert users

CyberArk Identity vs Ping Identity Platform comparison

 

Comparison Buyer's Guide

Executive Summary
 

Categories and Ranking

CyberArk Identity
Ranking in Authentication Systems
9th
Ranking in Access Management
9th
Ranking in Customer Identity and Access Management (CIAM)
5th
Average Rating
8.2
Number of Reviews
19
Ranking in other categories
Identity Management (IM) (13th), Authorization Software (4th), Enterprise Password Managers (9th), User Entity Behavior Analytics (UEBA) (9th), Active Directory Management (11th), Cloud Resource Access Management (2nd)
Ping Identity Platform
Ranking in Authentication Systems
5th
Ranking in Access Management
3rd
Ranking in Customer Identity and Access Management (CIAM)
2nd
Average Rating
8.2
Number of Reviews
28
Ranking in other categories
Single Sign-On (SSO) (4th), Data Governance (6th), Identity and Access Management as a Service (IDaaS) (IAMaaS) (5th), Directory Servers (1st)
 

Featured Reviews

Avinash Gopu. - PeerSpot reviewer
Feb 29, 2024
Allows Linux and Unix administrators to login with single password
The solution helps with auditing, and monitoring, and integrates with Splunk for log analysis. User activity logs are captured in CyberArk Identity and sent to external tools like Splunk for analysis and monitoring. It is integrated with tools like Splunk and Dynatrace for the analysis of risk behavior and user activity. The pushing teams receive automated reports to assess factors such as login times and server activity in the last 60 days. The licensing for IAM and PAM tools is based on headcount and usage. Users who are not actively utilizing the resources may have their access revoked. This approach helps manage budgeting and reduces the risk impact on the organization by implementing protocols to mitigate threats.
Dilip Reddy - PeerSpot reviewer
Jul 15, 2024
Easy to use but requires improvements in the area of stability
In my company, we have worked on authorization, and I know that there are different types of grants. We have worked on the authorization code, client credentials, and ROPC grant. There are two types of tokens, like the JWT token and internally managed reference tokens. JWT tokens are useful for finding information related to the claim requests. Internally managed reference tokens are useful for dealing with visual data and information. For the clients to fit the user information, they need to do additional work to fit all the user info into the site, which is to define and validate the token issue and provide the request for VPNs. I worked on the key differences between the authorization code and implicit grant. In the authorization code type, you will have the authorization code issued initially to the client, and the client has to exchange it with the authorization server, like using a DAC channel to get the access token. In implicit grants, tokens are issued right away if the application is a single-page application. We can either use the authorization code or an implicit grant.

Quotes from Members

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
 

Pros

"The feature that we find most valuable is the ability to integrate multiple IDs for on-premises Active Directory."
"It has machine learning and can help clients to learn the environment and understand what is happening."
"The features that I personally find most effective in terms of security stem from the fact that it is easy to integrate and also the adoption is faster."
"The initial setup is straightforward. It takes me up to an hour and a half."
"The tool helps with authentication. It acts as an MFA for any kind of privileged access that occurs in our organization."
"I found the solution to be stable."
"The tool is a very strong and valuable enterprise solution, particularly in ensuring the continuity of service."
"The most valuable features of CyberArk Identity are its ability to control access to administrative staff."
"The only feature we were looking for in PingID was SSO integration with our existing web app."
"It gets a mobility portal in place in conjunction with Office 365. It provides very good possibilities and it's much better than other technology that we have used before which was unstable and slower."
"The solution is stable. We haven't experienced any bugs or glitches."
"What I like best about PingID is that it's very user-friendly. PingID is well-built as a developer tool and regularly upgrades and updates via patches. I also like that PingID has clear documents that will help you integrate it with other solutions."
"It provides ease of connecting all our devices."
"People use the solution to secure their applications and authenticate particular processes."
"Setting up the infrastructure with Ping Identity Platform is very easy compared to other IAM products."
"We use the product to run different reports."
 

Cons

"I'm not sure what needs improvement. It is a good platform."
"We would like to see an improvement in the ability to manage mobile devices."
"CyberArk Identity could improve by having the ability to better manage the network, such as Cisco. There seem to be some issues in this area."
"The OpenID features could improve in CyberArk Identity."
"In terms of a governance platform, it's worth noting that CyberArk doesn't offer a particularly strong one."
"The solution could be easier to use and I found it to be very complex involving many steps."
"CyberArk Identity's GUI is an area with certain shortcomings that need improvement."
"The product needs to leverage the cloud more, especially in the financial sector, where cloud adoption might be limited. Proper reporting within the cloud is essential. The tool should be more user-friendly to expedite access for users. The current agent-based system poses challenges if a user loses access to the server, making tasks difficult to perform. It should also improve technical support."
"PingFederate's UI could be streamlined. They have recently made several improvements, but it's still too complex. It's a common complaint. The configuration should be simplified because the learning curve is too steep."
"We had issues with the stability."
"The timing of the token validity, if it could be extended, would be great. I'm not sure if there is even an option to configure these types of settings."
"PingID's device management portal should be more easily accessible via a link. They provide no link to the portal like they do for the service. The passwordless functionality could be more comprehensive. You can't filter based on hardware devices. Having that filtering option would be great. Device authentication would be a great feature."
"They could enhance the product's device tracking for better zero-trust security would be beneficial. Currently, it tracks IPs well but lacks detailed device information, which is crucial from a security standpoint."
"PingID would benefit from a better user interface for integration."
"I think that the connection with like Microsoft Word, especially for Office 365, is a weak point that could be improved."
"PingID classifies the type of environment into internal and external, which is an area for improvement because you need to take additional steps to trust internal and external users."
 

Pricing and Cost Advice

"There could be some additional costs apart from the licensing costs of the solution when you want to develop connectors in CyberArk Identity."
"The pricing of CyberArk Identity is competitive."
"Their pricing is obviously a lot higher than many vendors in the marketplace but their service is also unmatched."
"We find that the pricing and licensing of this solution is adequate, as compared to the other competitors in the market."
"In terms of pricing, BeyondTrust and CyberArk tend to be more expensive, with CyberArk receiving an eight out of ten, in this regard."
"It's not that affordable compared to Delinea or other products. They're less expensive and allow more customization. For the cost, it is expensive."
"There is an initial license and then there is a subscription needed."
"I would rate the tool’s pricing a seven out of ten. The product’s pricing is expensive and is on a yearly basis. You will need to pay around 10,000 GBP for 500 users."
"The product is costly."
"Ping Identity Platform is not an expensive solution."
"The pricing is neither too expensive nor too cheap."
"Ping offers flexible pricing that's not standardized."
"PingID pricing is a ten out of ten because it's a little bit cheaper than other tools, such as Okta and ForgeRock, and supports multiple tools."
"The platform's value justifies the pricing, especially considering its security features and scalability."
"The tool is quite affordable."
"PingID's pricing is pretty competitive."
report
Use our free recommendation engine to learn which Authentication Systems solutions are best for your needs.
815,854 professionals have used our research since 2012.
 

Top Industries

By visitors reading reviews
Financial Services Firm
15%
Computer Software Company
14%
Manufacturing Company
11%
Insurance Company
7%
Financial Services Firm
25%
Computer Software Company
10%
Manufacturing Company
9%
Healthcare Company
7%
 

Company Size

By reviewers
Large Enterprise
Midsize Enterprise
Small Business
 

Questions from the Community

What do you like most about CyberArk Identity?
The integration capabilities, ability to integrate CyberArk into the overall IBB strategy of our current clients.
What is your experience regarding pricing and costs for CyberArk Identity?
I think it is a fairly priced tool. I rate the tool between six and seven on a scale of one to ten where one is expensive, and ten is cheap.
What needs improvement with CyberArk Identity?
At the moment CyberArk needs to enrich Conjur and it needs to be made more viable so that its adoption can be made much faster.
What do you like most about PingID?
The mobile biometric authentication option improved user experience. It's always about security because, with two-factor authentication, it's always a separate device verifying the actual user logg...
What is your experience regarding pricing and costs for PingID?
The pricing is neither too expensive nor too cheap.
What needs improvement with PingID?
The management console needs to be improved. PingID should revise it.
 

Also Known As

Idaptive
Ping Identity (ID), PingFederate, PingAccess, PingOne, PingDataGovernance, PingDirectory, OpenDJ
 

Overview

 

Sample Customers

MLB, Citi, Pfizer, SulAmerica, GE Capital, Shiseido
Equinix, Land O'Lakes, CDPHP, Box, International SOS, Opower, VSP, Chevron, Truist, Academy of Art University, Northern Air Cargo, Repsol
Find out what your peers are saying about CyberArk Identity vs. Ping Identity Platform and other solutions. Updated: October 2024.
815,854 professionals have used our research since 2012.