Try our new research platform with insights from 80,000+ expert users

Entrust Identity Enterprise vs Ping Identity Platform comparison

 

Comparison Buyer's Guide

Executive SummaryUpdated on Dec 2, 2024

Review summaries and opinions

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
 

Categories and Ranking

Entrust Identity Enterprise
Ranking in Authentication Systems
10th
Ranking in Identity and Access Management as a Service (IDaaS) (IAMaaS)
11th
Average Rating
8.8
Reviews Sentiment
7.7
Number of Reviews
7
Ranking in other categories
No ranking in other categories
Ping Identity Platform
Ranking in Authentication Systems
6th
Ranking in Identity and Access Management as a Service (IDaaS) (IAMaaS)
6th
Average Rating
8.2
Reviews Sentiment
7.1
Number of Reviews
29
Ranking in other categories
Single Sign-On (SSO) (4th), Data Governance (8th), Access Management (4th), Customer Identity and Access Management (CIAM) (2nd), Directory Servers (1st)
 

Mindshare comparison

As of April 2025, in the Authentication Systems category, the mindshare of Entrust Identity Enterprise is 1.3%, down from 1.7% compared to the previous year. The mindshare of Ping Identity Platform is 3.5%, down from 4.9% compared to the previous year. It is calculated based on PeerSpot user engagement data.
Authentication Systems
 

Featured Reviews

Iwegbue Godspower Isioma - PeerSpot reviewer
Provides strong authentication feature, which requires users to enter a one-time password (OTP)
The main issue I've noticed pertains to setting up the desktop client on virtual machines in Azure, GCP, or AWS, specifically for Entrust Identity Enterprise intended for on-premises use. It works for on-premises, but I'm not sure if it's fully supported in cloud environments. If support were added, it would function perfectly with on-premises configurations. So, it functions well on-premises, but integrating it with cloud services like AWS or Azure could be challenging. There are issues with cloud integrations, such as Azure, AWS, and GCP.
Dilip Reddy - PeerSpot reviewer
Easy to use but requires improvements in the area of stability
In my company, we have worked on authorization, and I know that there are different types of grants. We have worked on the authorization code, client credentials, and ROPC grant. There are two types of tokens, like the JWT token and internally managed reference tokens. JWT tokens are useful for finding information related to the claim requests. Internally managed reference tokens are useful for dealing with visual data and information. For the clients to fit the user information, they need to do additional work to fit all the user info into the site, which is to define and validate the token issue and provide the request for VPNs. I worked on the key differences between the authorization code and implicit grant. In the authorization code type, you will have the authorization code issued initially to the client, and the client has to exchange it with the authorization server, like using a DAC channel to get the access token. In implicit grants, tokens are issued right away if the application is a single-page application. We can either use the authorization code or an implicit grant.

Quotes from Members

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
 

Pros

"The integration matrix of the solution is huge compared to others."
"It is a scalable solution. You can add users and credentials without problems."
"This solution is flexible and easy to use for our clients. We use it with different kinds of applications and integrate it with different processes."
"Entrust is an enterprise account, and they have a support system. Their training is also top-notch, and they are willing to share their knowledge with their partners."
"I am impressed with Entrust because they are one of the most advanced identity access management companies. Their portfolio of products is well aligned with the CISA zero trust framework. If you compare the features of Entrust products with the CISA pillars of zero trust, you'll see that they're perfectly matched with CISA requirements."
"The solution is stable. We haven't experienced any bugs or glitches."
"It is a very stable solution."
"From a security perspective, I highly value the product's biometric authentication methods such as FIDO, FaceID, YubiKey, and the mobile app."
"PingFederate gives you granular control over the settings. There are many options for fine-tuning policies."
"It gets a mobility portal in place in conjunction with Office 365. It provides very good possibilities and it's much better than other technology that we have used before which was unstable and slower."
"The soundness of the solution is its most valuable feature. For example, if you are in our corporate network, you can log on without any traffic interfering."
"It is a scalable solution...It is a stable solution."
"The only feature we were looking for in PingID was SSO integration with our existing web app."
 

Cons

"I would like to improve the tool's implementation and pricing."
"The product is very costly compared to other alternative solutions."
"We are introducing new processes and are migrating to a new version. Once we explore new functionalities, we'll be able to assess what could be improved."
"It functions well on-premises, but integrating it with cloud services like AWS or Azure could be challenging. There are issues with cloud integrations, such as Azure, AWS, and GCP."
"There is room for improvement in the solution, particularly in security."
"PingID's device management portal should be more easily accessible via a link. They provide no link to the portal like they do for the service. The passwordless functionality could be more comprehensive. You can't filter based on hardware devices. Having that filtering option would be great. Device authentication would be a great feature."
"PingID classifies the type of environment into internal and external, which is an area for improvement because you need to take additional steps to trust internal and external users."
"We have encountered instances where it is not easy to do authentication."
"PingID would benefit from a better user interface for integration."
"The product is not customizable."
"I think that the connection with like Microsoft Word, especially for Office 365, is a weak point that could be improved."
"They could use some bio-certification. It's just more user-friendly and more convenient than entering the one time passes. That would be an improvement."
 

Pricing and Cost Advice

"I would rate the product's pricing a five out of ten."
"The subscription could be yearly or monthly, depending upon your choice."
"It's worth the money."
"The tool is quite affordable."
"Ping Identity Platform is not very expensive."
"The pricing is neither too expensive nor too cheap."
"PingID pricing is a ten out of ten because it's a little bit cheaper than other tools, such as Okta and ForgeRock, and supports multiple tools."
"The product is costly."
"Compared to some SaaS-based solutions, the platform is relatively cost-effective."
"The platform's value justifies the pricing, especially considering its security features and scalability."
"Ping Identity Platform is not an expensive solution."
report
Use our free recommendation engine to learn which Authentication Systems solutions are best for your needs.
848,989 professionals have used our research since 2012.
 

Top Industries

By visitors reading reviews
Financial Services Firm
13%
Computer Software Company
12%
Government
8%
Manufacturing Company
7%
Financial Services Firm
26%
Computer Software Company
10%
Manufacturing Company
9%
Insurance Company
6%
 

Company Size

By reviewers
Large Enterprise
Midsize Enterprise
Small Business
 

Questions from the Community

What needs improvement with Entrust IdentityGuard?
The main issue I've noticed pertains to setting up the desktop client on virtual machines in Azure, GCP, or AWS, specifically for Entrust Identity Enterprise intended for on-premises use. It works ...
What is your primary use case for Entrust IdentityGuard?
I use it for an extra layer of security, that is two-factor authentication (2FA).
What advice do you have for others considering Entrust IdentityGuard?
I would recommend it. I've used it for three years now, and I'm very happy with it. Overall, I would rate the solution a nine out of ten.
What do you like most about PingID?
The mobile biometric authentication option improved user experience. It's always about security because, with two-factor authentication, it's always a separate device verifying the actual user logg...
What is your experience regarding pricing and costs for PingID?
The pricing is neither too expensive nor too cheap.
What needs improvement with PingID?
The management console needs to be improved. PingID should revise it.
 

Also Known As

IdentityGuard
Ping Identity (ID), PingFederate, PingAccess, PingOne, PingDataGovernance, PingDirectory, OpenDJ
 

Overview

 

Sample Customers

Bank of New Zealand, CRISIL, Banco Mercantil, G_teborg University, Ministry of Economic Development of New Zealand, Ocean Systems, Skanska, Societe Generale, Susquehanna Bancshares
Equinix, Land O'Lakes, CDPHP, Box, International SOS, Opower, VSP, Chevron, Truist, Academy of Art University, Northern Air Cargo, Repsol
Find out what your peers are saying about Entrust Identity Enterprise vs. Ping Identity Platform and other solutions. Updated: April 2025.
848,989 professionals have used our research since 2012.