CyberArk Privileged Access Manager and Microsoft Entra ID are both key players in the access management category, with Microsoft Entra ID obtaining an edge due to its superior integration features.
Features: CyberArk offers robust security for managing privileged accounts, building trust with its reliability in securing sensitive information. Microsoft Entra ID is recognized for its seamless integration with Microsoft services, making identity management across platforms efficient. Both products deliver essential functionalities, yet Microsoft's extensive integration capabilities make it highly valued for users focusing on connectivity.
Room for Improvement: CyberArk users point out that expanding integration with third-party applications could significantly enhance versatility. Microsoft Entra ID could benefit from better reporting tools and expanded customization options to meet varied user needs. Both products have rooms for growth, focusing on different aspects to elevate user experiences.
Ease of Deployment and Customer Service: CyberArk provides detailed documentation for its deployment, which may be complex but informative, while Microsoft Entra ID offers a straightforward, cloud-oriented setup. CyberArk's customer service is reliable and supportive, but Microsoft is often preferred for its quick response times and ease of access to support.
Pricing and ROI: CyberArk is viewed as cost-effective, providing a good return on investment with its security capabilities. Although Microsoft Entra ID is priced higher, its integration features are seen as worth the investment, offering substantial long-term value despite initial costs.
They are helpful, but complex issues can take a long time to resolve, which can delay solutions for urgent customer issues.
They do not go into analyzing the issue.
CyberArk's customer service has improved recently and is now very responsive.
The actual support when you get to that level is a ten out of ten.
There are immediate answers to any issues that arise with great knowledge and a deep understanding of the product and business needs.
It's not timely or professional.
They want everything to be on the cloud, but even in the SaaS version of CyberArk Privileged Access Manager, they need to deploy some servers on-premises.
The graphical user interface could be simplified and harmonized for better usability.
Upgrades require a lot of resources, as it impacts the entire organization.
A recent incident we dealt with took four months to resolve with a seven-day deadline, which was quite frustrating.
There is a need for better transformation support from on-premises Active Directory policies to the cloud, as Entra ID doesn't cover this sufficiently yet.
The frequent changes in branding cause confusion among customers who struggle to keep track of product names and functions.
I would rate it a nine out of ten for scalability.
We started small and expanded it to an enterprise level, and are now moving to the cloud for further growth.
The SaaS version is more flexible, allowing easier scaling with increased users.
We experienced no scalability issues with Microsoft Entra ID.
Its scalability is impressive, aided by Microsoft's efforts to expand its data centers.
When dealing with tens of thousands of objects, it requires proper management and best practices to retrieve only necessary data.
CyberArk is expensive compared to other products I know.
CyberArk is comparatively expensive compared to other PAM solutions, such as Delinea, especially during renewal.
It is very expensive.
We are getting our money's worth.
Most features of Entra ID are part of Microsoft's ecosystem and included in Microsoft 365 bundles, which means there are no additional costs associated with pricing and licensing.
Compared to other Microsoft products, the cost is not too expensive.
Proper fine-tuning and expertise ensure the product performs well.
Overall, the stability of the solution is high.
It's a critical solution that we can't do without.
The stability of the solution is very high at 99.999%.
We rarely had significant problems or crashes.
CyberArk Privileged Access Manager helps ensure data privacy because we now know who is using which credentials and at what time.
As a security professional, I have real-time visibility into ongoing sessions.
When you give access to a user, it monitors and detects if the user's behavior is unusual.
We can secure the applications that we are building and make sure that if the application were to be compromised, there is no full access to a customer's environment causing issues and other security concerns.
It's integrated with Microsoft technologies like Authenticator, SSO, and MFA, streamlining operations and creating a seamless environment.
The granular control, such as preventing logins from specific locations, enhances security significantly.
CyberArk Privileged Access Manager is a next-generation solution that allows users to secure both their applications and their confidential corporate information. It is extremely flexible and can be implemented across a variety of environments. This program runs with equal efficiency in a fully cloud-based, hybrid, or on-premises environment. Users can now protect their critical infrastructure and access it in any way that best meets their needs.
CyberArk Privileged Access Manager possesses a simplified and unified user interface. Users are able to manage the solution from one place. The UI allows users to view and manage all of the information and controls that administrators need to be able to easily access. Very often, management UIs do not have all of the controls and information streamlined in a single location. This platform provides a level of visibility that ensures users will be able to view all of their system’s most critical information at any time that they wish.
Benefits of CyberArk Privileged Access Manager
Some of CyberArk Privileged Access Manager’s benefits include:
Reviews from Real Users
CyberArk Privileged Access Manager’s software stands out among its competitors for one very fundamental reason. CyberArk Privileged Access Manager is an all-in-one solution. Users are given the ability to accomplish with a single platform what might usually only be accomplished with multiple solutions.
PeerSpot users note the truly all-in-one nature of this solution. Mateusz K., IT Manager at a financial services firm, wrote, "It improves security in our company. We have more than 10,000 accounts that we manage in CyberArk. We use these accounts for SQLs, Windows Server, and Unix. Therefore, keeping these passwords up-to-date in another solution or software would be impossible. Now, we have some sort of a platform to manage passwords, distribute the inflow, and manage IT teams as well as making regular changes to it according to the internal security policies in our bank."
Hichem T.-B., CDO & Co-Founder at ELYTIK, noted that “This is a complete solution that can detect cyber attacks well. I have found the proxy features most valuable for fast password web access.”
Microsoft Entra ID is used for extending on-premises Active Directory to the cloud, managing application access, enabling multi-factor authentication, and single sign-on. It facilitates policy enforcement and secure access, ensuring centralized identity management across cloud and on-premises resources.
Organizations utilize Microsoft Entra ID for robust user and group management, identity synchronization, and conditional access. Its seamless integration with third-party apps, scalability, and support for remote work make it a preferred choice. The admin center streamlines identity and access tasks, enhancing efficiency and security with features like privileged identity management and audit logs.
What are the key features of Microsoft Entra ID?Microsoft Entra ID implementation varies across industries. Tech firms leverage it for secure, scalable access management, while healthcare organizations utilize its identity protection features to safeguard patient data. Educational institutions adopt Entra ID for streamlined user management and policy enforcement, ensuring secure access for students and staff across on-premises and cloud resources.
We monitor all Access Management reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.