Try our new research platform with insights from 80,000+ expert users

CyberArk Identity vs ThreatLocker Elevation Control comparison

 

Comparison Buyer's Guide

Executive Summary
 

Categories and Ranking

CyberArk Identity
Ranking in Access Management
9th
Ranking in Customer Identity and Access Management (CIAM)
5th
Average Rating
8.2
Reviews Sentiment
7.5
Number of Reviews
19
Ranking in other categories
Authentication Systems (9th), Identity Management (IM) (13th), Authorization Software (4th), Enterprise Password Managers (9th), User Entity Behavior Analytics (UEBA) (9th), Active Directory Management (11th), Cloud Resource Access Management (2nd)
ThreatLocker Elevation Control
Ranking in Access Management
32nd
Ranking in Customer Identity and Access Management (CIAM)
23rd
Average Rating
0.0
Number of Reviews
0
Ranking in other categories
Privileged Access Management (PAM) (41st)
 

Mindshare comparison

As of November 2024, in the Access Management category, the mindshare of CyberArk Identity is 2.7%, up from 1.7% compared to the previous year. The mindshare of ThreatLocker Elevation Control is 0.2%, up from 0.0% compared to the previous year. It is calculated based on PeerSpot user engagement data.
Access Management
 

Featured Reviews

Avinash Gopu. - PeerSpot reviewer
Allows Linux and Unix administrators to login with single password
The solution helps with auditing, and monitoring, and integrates with Splunk for log analysis. User activity logs are captured in CyberArk Identity and sent to external tools like Splunk for analysis and monitoring. It is integrated with tools like Splunk and Dynatrace for the analysis of risk behavior and user activity. The pushing teams receive automated reports to assess factors such as login times and server activity in the last 60 days. The licensing for IAM and PAM tools is based on headcount and usage. Users who are not actively utilizing the resources may have their access revoked. This approach helps manage budgeting and reduces the risk impact on the organization by implementing protocols to mitigate threats.
Use ThreatLocker Elevation Control?
Share your opinion
report
Use our free recommendation engine to learn which Access Management solutions are best for your needs.
816,636 professionals have used our research since 2012.
 

Top Industries

By visitors reading reviews
Financial Services Firm
15%
Computer Software Company
14%
Manufacturing Company
10%
Insurance Company
7%
Computer Software Company
43%
Retailer
6%
Insurance Company
6%
Legal Firm
6%
 

Company Size

By reviewers
Large Enterprise
Midsize Enterprise
Small Business
No data available
 

Questions from the Community

What do you like most about CyberArk Identity?
The integration capabilities, ability to integrate CyberArk into the overall IBB strategy of our current clients.
What is your experience regarding pricing and costs for CyberArk Identity?
I think it is a fairly priced tool. I rate the tool between six and seven on a scale of one to ten where one is expensive, and ten is cheap.
What needs improvement with CyberArk Identity?
At the moment CyberArk needs to enrich Conjur and it needs to be made more viable so that its adoption can be made much faster.
Ask a question
Earn 20 points
 

Also Known As

Idaptive
No data available
 

Overview

 

Sample Customers

MLB, Citi, Pfizer, SulAmerica, GE Capital, Shiseido
Information Not Available
Find out what your peers are saying about Microsoft, Auth0, Ping Identity and others in Access Management. Updated: November 2024.
816,636 professionals have used our research since 2012.