>

>

CyberArk Identity

Logo

CyberArk Identity

CyberArk Identity

CyberArk Identity manages user access to applications and resources through centralized authentication and policy controls. It integrates with cloud and on-premises environments to support regulatory compliance and operational requirements.

CyberArk Identity manages user access to applications and resources through centralized authentication and policy controls. It integrates with cloud and on-premises environments to support regulatory compliance and operational requirements.

Cost considerations

Functionality

Compatibility

User experience

Customer support

Why these ratings?

Cyberse perspective

Solution details

Integrations
Key features
Target industry
Subcategory
Market segment
Cloud ecosystem partners
Pricing
Services support
Product features
Deployment

We use the following criteria to evaluate this product:

Cost considerations

CyberArk Identity sells SSO, MFA, lifecycle, compliance and other functions as separate $2–$5 per-user modules, so businesses must stack licenses for a complete package. The a-la-carte model pushes monthly costs higher than vendors that bundle core features and makes annual budgeting unpredictable. As a result, finance teams often see a slower payback period, placing CyberArk Identity toward the pricier end of the identity security market.

Cost considerations

CyberArk Identity sells SSO, MFA, lifecycle, compliance and other functions as separate $2–$5 per-user modules, so businesses must stack licenses for a complete package. The a-la-carte model pushes monthly costs higher than vendors that bundle core features and makes annual budgeting unpredictable. As a result, finance teams often see a slower payback period, placing CyberArk Identity toward the pricier end of the identity security market.

Functionality

CyberArk Identity covers onboarding through deprovisioning with SSO, adaptive MFA and automated just-in-time provisioning, and ties directly into the CyberArk PAM suite for privileged access. Built-in governance and analytics automate access reviews and flag risky entitlements, reducing manual effort and audit time. Out-of-the-box connectors to Workday and other HR systems keep accounts in sync as employees join, move or leave.

Functionality

CyberArk Identity covers onboarding through deprovisioning with SSO, adaptive MFA and automated just-in-time provisioning, and ties directly into the CyberArk PAM suite for privileged access. Built-in governance and analytics automate access reviews and flag risky entitlements, reducing manual effort and audit time. Out-of-the-box connectors to Workday and other HR systems keep accounts in sync as employees join, move or leave.

Compatibility

CyberArk Identity plugs directly into Active Directory, LDAP, and Azure AD with built-in connectors. It signs users into cloud and on-prem apps through SAML and OIDC and automates provisioning with SCIM, so most services work out of the box. Published REST APIs let teams weave identity tasks into custom workflows, giving CyberArk a top-tier compatibility profile.

Compatibility

CyberArk Identity plugs directly into Active Directory, LDAP, and Azure AD with built-in connectors. It signs users into cloud and on-prem apps through SAML and OIDC and automates provisioning with SCIM, so most services work out of the box. Published REST APIs let teams weave identity tasks into custom workflows, giving CyberArk a top-tier compatibility profile.

User experience

Gartner Peer Insights reviewers frequently call CyberArk Identity easy to implement and point to a clean admin console and MFA setup wizard. Business staff can reset passwords and enroll in MFA with little assistance, so onboarding moves quickly. Advanced policy tuning still needs detailed manuals, so administrators invest extra effort when they go beyond everyday tasks.

User experience

Gartner Peer Insights reviewers frequently call CyberArk Identity easy to implement and point to a clean admin console and MFA setup wizard. Business staff can reset passwords and enroll in MFA with little assistance, so onboarding moves quickly. Advanced policy tuning still needs detailed manuals, so administrators invest extra effort when they go beyond everyday tasks.

Customer support

CyberArk Identity provides 24×7 coverage with a two-hour initial response on critical issues, meeting the sub-4-hour threshold. Identity specialists handle escalations and customers can choose premium one-hour response. A searchable knowledge base and active community give users solid self-service options.

Customer support

CyberArk Identity provides 24×7 coverage with a two-hour initial response on critical issues, meeting the sub-4-hour threshold. Identity specialists handle escalations and customers can choose premium one-hour response. A searchable knowledge base and active community give users solid self-service options.