Try our new research platform with insights from 80,000+ expert users

Entrust Identity Enterprise vs Ping Identity Platform comparison

 

Comparison Buyer's Guide

Executive SummaryUpdated on Dec 2, 2024

Review summaries and opinions

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
 

Categories and Ranking

Entrust Identity Enterprise
Ranking in Authentication Systems
10th
Ranking in Identity and Access Management as a Service (IDaaS) (IAMaaS)
11th
Average Rating
8.8
Reviews Sentiment
7.7
Number of Reviews
7
Ranking in other categories
No ranking in other categories
Ping Identity Platform
Ranking in Authentication Systems
5th
Ranking in Identity and Access Management as a Service (IDaaS) (IAMaaS)
6th
Average Rating
8.2
Reviews Sentiment
7.1
Number of Reviews
28
Ranking in other categories
Single Sign-On (SSO) (3rd), Data Governance (9th), Access Management (3rd), Customer Identity and Access Management (CIAM) (2nd), Directory Servers (1st)
 

Mindshare comparison

As of February 2025, in the Authentication Systems category, the mindshare of Entrust Identity Enterprise is 1.4%, down from 1.6% compared to the previous year. The mindshare of Ping Identity Platform is 3.6%, down from 5.0% compared to the previous year. It is calculated based on PeerSpot user engagement data.
Authentication Systems
 

Featured Reviews

Iwegbue Godspower Isioma - PeerSpot reviewer
Provides strong authentication feature, which requires users to enter a one-time password (OTP)
The main issue I've noticed pertains to setting up the desktop client on virtual machines in Azure, GCP, or AWS, specifically for Entrust Identity Enterprise intended for on-premises use. It works for on-premises, but I'm not sure if it's fully supported in cloud environments. If support were added, it would function perfectly with on-premises configurations. So, it functions well on-premises, but integrating it with cloud services like AWS or Azure could be challenging. There are issues with cloud integrations, such as Azure, AWS, and GCP.
Dilip Reddy - PeerSpot reviewer
Easy to use but requires improvements in the area of stability
In my company, we have worked on authorization, and I know that there are different types of grants. We have worked on the authorization code, client credentials, and ROPC grant. There are two types of tokens, like the JWT token and internally managed reference tokens. JWT tokens are useful for finding information related to the claim requests. Internally managed reference tokens are useful for dealing with visual data and information. For the clients to fit the user information, they need to do additional work to fit all the user info into the site, which is to define and validate the token issue and provide the request for VPNs. I worked on the key differences between the authorization code and implicit grant. In the authorization code type, you will have the authorization code issued initially to the client, and the client has to exchange it with the authorization server, like using a DAC channel to get the access token. In implicit grants, tokens are issued right away if the application is a single-page application. We can either use the authorization code or an implicit grant.

Quotes from Members

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
 

Pros

"This solution is flexible and easy to use for our clients. We use it with different kinds of applications and integrate it with different processes."
"It is a scalable solution. You can add users and credentials without problems."
"The integration matrix of the solution is huge compared to others."
"Entrust is an enterprise account, and they have a support system. Their training is also top-notch, and they are willing to share their knowledge with their partners."
"I am impressed with Entrust because they are one of the most advanced identity access management companies. Their portfolio of products is well aligned with the CISA zero trust framework. If you compare the features of Entrust products with the CISA pillars of zero trust, you'll see that they're perfectly matched with CISA requirements."
"I like PingFederate."
"I work on the application onboarding process because we have multiple customers and get data from different sources."
"The solution is stable. We haven't experienced any bugs or glitches."
"The only feature we were looking for in PingID was SSO integration with our existing web app."
"What I like best about PingID is that it's very user-friendly. PingID is well-built as a developer tool and regularly upgrades and updates via patches. I also like that PingID has clear documents that will help you integrate it with other solutions."
"The solution has a smooth and configurable user interface for single sign-on capabilities."
"The soundness of the solution is its most valuable feature. For example, if you are in our corporate network, you can log on without any traffic interfering."
"It's pretty stable as a product."
 

Cons

"It functions well on-premises, but integrating it with cloud services like AWS or Azure could be challenging. There are issues with cloud integrations, such as Azure, AWS, and GCP."
"The product is very costly compared to other alternative solutions."
"I would like to improve the tool's implementation and pricing."
"We are introducing new processes and are migrating to a new version. Once we explore new functionalities, we'll be able to assess what could be improved."
"The product's community has certain shortcomings that require improvement."
"The management console needs to be improved. PingID should revise it."
"The timing of the token validity, if it could be extended, would be great. I'm not sure if there is even an option to configure these types of settings."
"If the solution is going to compete with Microsoft, they need to offer more unique functionality to keep their current user base."
"I think that the connection with like Microsoft Word, especially for Office 365, is a weak point that could be improved."
"There is room for improvement in the solution, particularly in security."
"We had issues with the stability."
"PingAccess can only have one token provider, and you cannot enable two different token providers simultaneously."
 

Pricing and Cost Advice

"I would rate the product's pricing a five out of ten."
"It's worth the money."
"The subscription could be yearly or monthly, depending upon your choice."
"The product is costly."
"Ping offers flexible pricing that's not standardized."
"PingID's pricing is pretty competitive."
"The platform's value justifies the pricing, especially considering its security features and scalability."
"PingID pricing is a ten out of ten because it's a little bit cheaper than other tools, such as Okta and ForgeRock, and supports multiple tools."
"Ping Identity Platform is not very expensive."
"Compared to some SaaS-based solutions, the platform is relatively cost-effective."
"Ping Identity Platform is not an expensive solution."
report
Use our free recommendation engine to learn which Authentication Systems solutions are best for your needs.
832,138 professionals have used our research since 2012.
 

Top Industries

By visitors reading reviews
Financial Services Firm
14%
Computer Software Company
14%
Government
7%
Comms Service Provider
6%
Financial Services Firm
25%
Computer Software Company
10%
Manufacturing Company
9%
Educational Organization
7%
 

Company Size

By reviewers
Large Enterprise
Midsize Enterprise
Small Business
 

Questions from the Community

What needs improvement with Entrust IdentityGuard?
The main issue I've noticed pertains to setting up the desktop client on virtual machines in Azure, GCP, or AWS, specifically for Entrust Identity Enterprise intended for on-premises use. It works ...
What is your primary use case for Entrust IdentityGuard?
I use it for an extra layer of security, that is two-factor authentication (2FA).
What advice do you have for others considering Entrust IdentityGuard?
I would recommend it. I've used it for three years now, and I'm very happy with it. Overall, I would rate the solution a nine out of ten.
What do you like most about PingID?
The mobile biometric authentication option improved user experience. It's always about security because, with two-factor authentication, it's always a separate device verifying the actual user logg...
What is your experience regarding pricing and costs for PingID?
The pricing is neither too expensive nor too cheap.
What needs improvement with PingID?
The management console needs to be improved. PingID should revise it.
 

Also Known As

IdentityGuard
Ping Identity (ID), PingFederate, PingAccess, PingOne, PingDataGovernance, PingDirectory, OpenDJ
 

Overview

 

Sample Customers

Bank of New Zealand, CRISIL, Banco Mercantil, G_teborg University, Ministry of Economic Development of New Zealand, Ocean Systems, Skanska, Societe Generale, Susquehanna Bancshares
Equinix, Land O'Lakes, CDPHP, Box, International SOS, Opower, VSP, Chevron, Truist, Academy of Art University, Northern Air Cargo, Repsol
Find out what your peers are saying about Entrust Identity Enterprise vs. Ping Identity Platform and other solutions. Updated: January 2025.
832,138 professionals have used our research since 2012.