Try our new research platform with insights from 80,000+ expert users

CyberArk Privileged Access Manager vs Ping Identity Platform comparison

 

Comparison Buyer's Guide

Executive Summary

Review summaries and opinions

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
 

ROI

Sentiment score
7.0
Organizations using CyberArk see improved security, compliance, cost savings, and efficiency in credential management and audits.
Sentiment score
7.4
Ping Identity Platform simplifies identity management, lowers IT overhead, enhances security, improves efficiency, boosts satisfaction, and offers scalability.
The return on investment lies in improved security infrastructure, addressing over-privileged access, and reducing the risk of credential compromise, which is a major source of data breaches.
During our quantitative analysis, we estimated potential savings of one to ten million dollars a year by using a PAM solution.
With other tools such as Okta where you have self-service for resetting your own passwords and things like that, the average savings is 12 minutes, which is six dollars for a password reset, and you can extrapolate that over your organization.
 

Customer Service

Sentiment score
6.4
Customers are generally satisfied with CyberArk's rapid and knowledgeable support, despite some delays in accessing higher-level assistance.
Sentiment score
6.6
Ping Identity Platform's support is prompt, knowledgeable, and proactive, though some users find the support portal confusing.
CyberArk has been exceptional in coming back to us with immediate responses.
It could be forever until you talk to someone who knows what they are doing.
They are helpful, but complex issues can take a long time to resolve, which can delay solutions for urgent customer issues.
 

Scalability Issues

Sentiment score
7.7
CyberArk Privileged Access Manager scales efficiently, handling vast accounts, with flexible growth though requires careful initial deployment planning.
Sentiment score
7.5
Ping Identity Platform efficiently scales across servers and clusters, supports large environments, but performance varies based on configurations.
The CPM can reportedly handle up to 50,000 accounts independently without issue.
I would rate it a ten out of ten for scalability.
They had 40,000 passwords in this one safe, and it was saving the last ten iterations of each password object. That means they had 400,000 password objects in this safe. They exceeded the limit.
 

Stability Issues

Sentiment score
7.8
CyberArk Privileged Access Manager is stable, with few issues due to environment complexity, praised for performance and effective support.
Sentiment score
7.9
Ping Identity Platform is highly reliable, with minimal bugs or crashes, though some infrastructure and server connection issues exist.
Proper fine-tuning and expertise ensure the product performs well.
Overall, the stability of the solution is high.
It has a large customer base and positive feedback within my network.
 

Room For Improvement

CyberArk Privileged Access Manager needs a user-friendly design, streamlined integration, and improved support to enhance usability and adoption.
Ping Identity Platform requires stronger functionalities, enhanced user experience, better security, and comprehensive support to compete effectively with Microsoft.
They want everything to be on the cloud, but even in the SaaS version of CyberArk Privileged Access Manager, they need to deploy some servers on-premises.
We cannot generate a plug-in for web-based applications.
If they want clients to move to the cloud, they need to support them in real-time.
 

Setup Cost

CyberArk Privileged Access Manager provides strong security and support, justifying its high cost for large enterprises needing advanced features.
Ping Identity Platform is competitively priced, offering robust features and good ROI, but may be costly for small businesses.
CyberArk is expensive compared to other products I know.
CyberArk is comparatively expensive compared to other PAM solutions, such as Delinea, especially during renewal.
CyberArk's SaaS solution is particularly expensive.
 

Valuable Features

CyberArk Privileged Access Manager offers policy automation, session monitoring, API integration, and advanced analytics for streamlined cybersecurity and compliance.
Ping Identity Platform offers robust security with multi-factor authentication, seamless integration, user-friendly interface, and extensive customization options.
CyberArk Privileged Access Manager helps ensure data privacy because we now know who is using which credentials and at what time.
It keeps a record of activities, allowing me to easily fetch screen recordings to detect any misuse and see who did what and what happened.
It can integrate with Splunk, SNMP, and other solutions and technologies.
 

Categories and Ranking

CyberArk Privileged Access ...
Average Rating
8.6
Reviews Sentiment
6.9
Number of Reviews
217
Ranking in other categories
User Activity Monitoring (1st), Enterprise Password Managers (2nd), Privileged Access Management (PAM) (1st), Mainframe Security (2nd), Operational Technology (OT) Security (3rd)
Ping Identity Platform
Average Rating
8.2
Reviews Sentiment
7.1
Number of Reviews
28
Ranking in other categories
Single Sign-On (SSO) (4th), Authentication Systems (6th), Data Governance (8th), Identity and Access Management as a Service (IDaaS) (IAMaaS) (6th), Access Management (4th), Customer Identity and Access Management (CIAM) (2nd), Directory Servers (1st)
 

Featured Reviews

Lasantha Wijesinghe - PeerSpot reviewer
We have visibility and control through real-time user behavior analytics
It took us some time to realize its benefits because there was a learning curve for us. It took us about a year to get our heads around this product and start effectively using it. It is a journey. It takes at least five years for any company to make this product very useful and reach maturity. It is not only the product's fault. The company needs to have a vision, and the company culture needs to go with it. Senior leadership needs to support the vision. You need to have lots of ingredients for success. If everything is in place, you will see success after one year. In the first year, it is a struggle for everybody. My company was bought by a bigger company, and they were very new to privileged access management. Everybody was struggling. The advice I would give is to have a good vision for privileged access management. You need dedicated teams, senior management support, and proper company policies and standards before implementing the solution. Start building knowledge slowly and avoid jumping into the deep end without preparation. I would rate CyberArk Privileged Access Manager a nine out of ten.
Dilip Reddy - PeerSpot reviewer
Easy to use but requires improvements in the area of stability
In my company, we have worked on authorization, and I know that there are different types of grants. We have worked on the authorization code, client credentials, and ROPC grant. There are two types of tokens, like the JWT token and internally managed reference tokens. JWT tokens are useful for finding information related to the claim requests. Internally managed reference tokens are useful for dealing with visual data and information. For the clients to fit the user information, they need to do additional work to fit all the user info into the site, which is to define and validate the token issue and provide the request for VPNs. I worked on the key differences between the authorization code and implicit grant. In the authorization code type, you will have the authorization code issued initially to the client, and the client has to exchange it with the authorization server, like using a DAC channel to get the access token. In implicit grants, tokens are issued right away if the application is a single-page application. We can either use the authorization code or an implicit grant.
report
Use our free recommendation engine to learn which Access Management solutions are best for your needs.
845,406 professionals have used our research since 2012.
 

Top Industries

By visitors reading reviews
Educational Organization
34%
Financial Services Firm
12%
Computer Software Company
11%
Manufacturing Company
6%
Financial Services Firm
25%
Computer Software Company
10%
Manufacturing Company
9%
Educational Organization
6%
 

Company Size

By reviewers
Large Enterprise
Midsize Enterprise
Small Business
 

Questions from the Community

How does Sailpoint IdentityIQ compare with CyberArk PAM?
We evaluated Sailpoint IdentityIQ before ultimately choosing CyberArk. Sailpoint Identity Platform is a solution to manage risks in cloud enterprise environments. It automates and streamlines the m...
What do you like most about CyberArk Privileged Access Manager?
The most valuable features of the solution are control and analytics.
What do you like most about PingID?
The mobile biometric authentication option improved user experience. It's always about security because, with two-factor authentication, it's always a separate device verifying the actual user logg...
What is your experience regarding pricing and costs for PingID?
The pricing is neither too expensive nor too cheap.
What needs improvement with PingID?
The management console needs to be improved. PingID should revise it.
 

Also Known As

CyberArk Privileged Access Security, CyberArk Enterprise Password Vault
Ping Identity (ID), PingFederate, PingAccess, PingOne, PingDataGovernance, PingDirectory, OpenDJ
 

Overview

 

Sample Customers

Rockwell Automation
Equinix, Land O'Lakes, CDPHP, Box, International SOS, Opower, VSP, Chevron, Truist, Academy of Art University, Northern Air Cargo, Repsol
Find out what your peers are saying about CyberArk Privileged Access Manager vs. Ping Identity Platform and other solutions. Updated: March 2025.
845,406 professionals have used our research since 2012.