Try our new research platform with insights from 80,000+ expert users

CyberArk Privileged Access Manager vs Workspace ONE UEM comparison

 

Comparison Buyer's Guide

Executive Summary
 

Categories and Ranking

CyberArk Privileged Access ...
Average Rating
8.6
Reviews Sentiment
6.9
Number of Reviews
197
Ranking in other categories
User Activity Monitoring (1st), Enterprise Password Managers (3rd), Privileged Access Management (PAM) (1st), Mainframe Security (2nd), Operational Technology (OT) Security (3rd)
Workspace ONE UEM
Average Rating
8.2
Reviews Sentiment
6.8
Number of Reviews
100
Ranking in other categories
Remote Access (3rd), Virtual Desktop Infrastructure (VDI) (6th), Enterprise Mobility Management (EMM) (3rd), Identity and Access Management as a Service (IDaaS) (IAMaaS) (8th), Unified Endpoint Management (UEM) (2nd)
 

Mindshare comparison

While both are Security Software solutions, they serve different purposes. CyberArk Privileged Access Manager is designed for Privileged Access Management (PAM) and holds a mindshare of 20.9%, down 23.8% compared to last year.
Workspace ONE UEM, on the other hand, focuses on Unified Endpoint Management (UEM), holds 20.9% mindshare, down 24.3% since last year.
Privileged Access Management (PAM)
Unified Endpoint Management (UEM)
 

Featured Reviews

SatishIyer - PeerSpot reviewer
Lets you ensure relevant, compliant access in good time and with an audit trail, yet lacks clarity on MITRE ATT&CK
When I was a component owner for PAM's Privileged Threat Analytics (PTA) component, what I wanted was a clear mapping to the MITRE ATT&CK framework, a framework which has a comprehensive list of use cases. We reached out to the vendor and asked them how much coverage they have of the uses cases found on MITRE, which would have given us a better view of things while I was the product owner. Unfortunately they did not have the capability of mapping onto MITRE's framework at that time. PTA is essentially the monitoring interface of the broker (e.g. Privileged Access Management, the Vault, CPM, PSM, etc.), and it's where you can capture your broker bypass and perform related actions. For this reason, we thought that this kind of mapping would be required, but CyberArk informed us that they did not have the capability we had in mind with regard to MITRE ATT&CK. I am not sure what the situation is now, but it would definitely help to have that kind of alignment with one of the more well-known frameworks like MITRE. For CyberArk as a vendor, it would also help them to clearly spell out in which areas they have full functionality and in which ares they have partial or none. Of course, it also greatly benefits the customers when they're evaluating the product.
Joel Amate - PeerSpot reviewer
The solution is stable, scalable, and offers single sign-on
I give the solution a nine out of ten. I suggest if a person wants to start using Workspace ONE, they should make use of the cloud instance instead of the on-premise instance. There is an on-premise instance available, but the cloud instance is a better option now. I advise them to make use of the cloud instance. This is because management-wise, there is no need to manage a server. For example, we don't need to buy a server, and we don't need to buy network switches, which are required for the on-premise. At the same time, I can advise setting up all the functionalities or whatever functionalities are available for the trial version. We need to check if the Workspace ONE integration includes Azure AD or other identity providers. A lot of applications are using these providers for authentication, such as Ping, Okta, and others. If the Workspace ONE integration doesn't include these providers, the company might have to find a different solution. Security projects should also be considered. Specifically, if the solution can integrate with local security solutions to secure mobile devices.

Quotes from Members

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
 

Pros

"The ability to develop and deploy applications with no stored secrets is very valuable."
"I find value in notifications from CyberArk when passwords fail verification and have other issues."
"Our most valuable features would probably be key rotation, the SKM or SSH key manager, and account discovery."
"AIM has been a great help in automating password retrieval which removes the need for hard-coded credentials."
"The solution is stable."
"It is a central repository. Therefore, if someone needs to access a server, then they go through CyberArk PAM. It provides a secure way to do this and CyberArk PAM records everything. For example, if you are connecting to a Linux server, then once you get into the Linux server and if it is integrated with CyberArk, it will automatically start recording everything that is being done. In most banks, seeing the recordings is very useful. If there are any gaps or something has happened which shouldn't have happened, then we can check the logs and videos. So, it gives security, in a robust manner, to the organization."
"It provides an accountability to the individuals who are using it, knowing that it is audited and tracked."
"Central Password Manager is useful for agentless automated password management through AD integration as well as endpoints for different devices."
"Cloud-based VMware Workspace ONE is very good. It is easy to deploy and manage. Maintenance is also quite simple."
"Sometimes, we face an issue and raise a ticket. The technical support team is fantastic and resolves the issue."
"AirWatch has one of the best User Interfaces and it's quite easy to figure out where particular items are within the menu system."
"The Identity component of this solution is its most valuable feature."
"Zero Trust implementation is a great feature."
"It is easy to start something and work from scratch."
"We can impose cybersecurity requirements."
"We recently integrated Workspace ONE with our intelligence report, and this is a great tool from a reporting point of view. In our daily business, we get several requests from businesses to provide an Adobe request for monitoring, whether it is for Android or iOS devices. The main benefit of this tool is that we can exclude the report for applications."
 

Cons

"​It's hard to find competent resellers/support."
"There was a functionality of the solution that was missing. I had noticed it in Beyond Trust, but not in this solution. But, recently they have incorporated something similar."
"I'm not a fan of technical support with CyberArk. It's like jumping through red tape and hoops. Quite frankly, it's almost like when you call CyberArk you get the Help Desk or the level-one. I'm a level-one. I got the CCD, I know how to do the initial troubleshooting. When I call CyberArk it's because I can't figure the problem out. So I need a level-two, three, four. I don't need you to tell me, "Hey, open a ticket and then give me logs.""
"The turnaround time for technical support is lengthy."
"The documentation is rather basic and it is missing many use cases."
"The PTA could be improved. Currently, companies often have multiple domains and sometimes it's difficult to implement CyberArk in this kind of infrastructure. For example, you can add CPM (Central Policy Manager) and PSM (Privileged Session Manager and PVWA (Password Vault Web Access) for access, but if you want to add PTA (Privileged Threat Analysis) to scan Vault logs, it is difficult because this component may be adding multiple domain environments."
"The web interface has come a long way, but the PrivateArk client seems clunky and not intuitive. It could use an update to be brought up to speed with the usability of PVWA."
"Having a centralized place to manage the solution has been something that I have always wanted, and they are starting to understand that and bring things back together."
"When we had some issues, the support did not respond quickly, and they did not provide a solution."
"They could provide DLP integration for applications and specific user account security."
"Its performance is quite good on Apple phones or even mid-range phones. If you install an AirWatch on a phone that is not too powerful, you will have performance issues. That's only because the phone is not too powerful, and there is not enough memory, etc. They could do a lighter version for a less powerful phone. It would also be useful for very small companies that don't want to spend money on expensive phones. Having said that, I don't think that is their target market. If their target market is enterprise, all enterprises perhaps have an agreement with Google or Apple, and they would get a phone that has already been tested, and they know that AirWatch will work on that phone."
"There is a need for better user lifecycle management within VMware Identity Manager, along with better user governance...The scalability of the product needs to improve."
"The mobile SSO doesn't work as well on Android."
"I would like better integration for deploying programs with binary files."
"VMware Workspace ONE for the new users or the new clients that they try to procure and learn it, there can have difficulties. It does not have user-friendly portals. The portal seems to be more user-friendly in Microsoft solutions."
"Sometimes, we have challenges with remote patching and remote version upgrades."
 

Pricing and Cost Advice

"The product's licensing is yearly. I would rate the solution's pricing a six out of ten."
"The price of the solution is reasonable."
"I believe that this solution is priced well. It's the market leader and I think that it's the best solution."
"There are no additional costs other than the standard licensing fees."
"Licensing fees are paid on a yearly basis."
"CyberArk provides all the features bundled. This is compared to other vendors who provide them as a different license for each functionality."
"It's an affordable platform."
"This solution is expensive."
"A person should pay towards the licensing costs of VMware Identity Manager on a yearly or monthly basis, but government and public sector units cannot for a perpetual licensing model."
"We've purchased various licenses for VMware Workspace ONE, including premium and gold tiers. These licenses include security measures and support for managing telecom expenses like data and voice usage."
"There is a separate cost for technical support and extra premium features. The pricing should be simplified."
"There is a licensing fee for the users, and we pay a low amount for our support costs."
"It is quite expensive, but I think large companies have agreements with these organizations that provide remote monitoring for phones, and they get massive discounts. The public price does not reflect what they pay. You won't get the same pricing if you're buying for 10 employees versus 1,000 employees. On the public price, you get perhaps a 10% discount, but if you're buying 1,000, the discount could be really massive, especially if you signed a contract for a number of years."
"The solution can be costly when the customer is dealing with multiple platforms. If a customer is only dealing with iOS, Windows, and Android then Intune is the better choice because there are free licenses."
"If you purchase it for one year, it is very expensive. If you get it for three years or up to five years, then you can bargain a better price."
"I rate the product price a five on a scale of one to ten, where one is cheap and ten is expensive."
report
Use our free recommendation engine to learn which Privileged Access Management (PAM) solutions are best for your needs.
824,053 professionals have used our research since 2012.
 

Top Industries

By visitors reading reviews
Educational Organization
32%
Financial Services Firm
12%
Computer Software Company
11%
Manufacturing Company
6%
Computer Software Company
16%
Financial Services Firm
10%
Government
8%
Manufacturing Company
8%
 

Company Size

By reviewers
Large Enterprise
Midsize Enterprise
Small Business
 

Questions from the Community

How does Sailpoint IdentityIQ compare with CyberArk PAM?
We evaluated Sailpoint IdentityIQ before ultimately choosing CyberArk. Sailpoint Identity Platform is a solution to manage risks in cloud enterprise environments. It automates and streamlines the m...
What do you like most about CyberArk Privileged Access Manager?
The most valuable features of the solution are control and analytics.
What is your experience regarding pricing and costs for CyberArk Privileged Access Manager?
CyberArk Privileged Access Manager comes at a high cost. But the solution is worth its price.
How does Microsoft Intune compare with VMware Workspace One?
Microsoft Intune is a great tool for managing a mobile device fleet while keeping access control. The solution makes it easy to control security and manage the usage of mobile apps when you have a ...
How does VMware Workspace One compare with VMware Horizon 7?
VMware Workspace One has a powerful set of helpful features. The solution offers very good documentation, the initial setup is easy, and the product is very stable and reliable. I think the fact th...
What do you like most about VMware Workspace ONE?
The platform provides a stable environment for operations and quickly creates new environments. Additionally, it offers efficient flexibility.
 

Also Known As

CyberArk Privileged Access Security, CyberArk Enterprise Password Vault
VMware Workspace ONE, VMware AirWatch, Workspace ONE Assist, VMware Identity Manager, Workspace ONE Access, VMware Horizon Air
 

Learn More

 

Overview

 

Sample Customers

Rockwell Automation
Australian Sports Commission, Stockport NHS Foundation Trust, Lomond School, Merck, United Bank, Medical College of Wisconsin, Latymer Upper School, 2gether NHS Foundation Trust, Dowling Aaron Inc., Trillium Lakelands District School Board, Harrogate Grammar School, Duke University Football, Delta Air Lines, Adventist Health System, Giochi Preziosi, Cramlington Learning Village, Intermountain Healthcare, Safexpress, TAG Aviation
Find out what your peers are saying about CyberArk, Delinea, One Identity and others in Privileged Access Management (PAM). Updated: December 2024.
824,053 professionals have used our research since 2012.