Compare Akeyless Identity Security Platform and JumpCloud

At a Glance
Akeyless Identity Security Platform
Akeyless Identity Security Platform
Star Rating
(89)4.6 out of 5
Market Segments
Enterprise (52.4% of reviews)
Information
Pros & Cons
Entry-Level Pricing
No pricing available
Free Trial is available
Learn more about Akeyless Identity Security Platform
JumpCloud
JumpCloud
Star Rating
(3,938)4.5 out of 5
Market Segments
Mid-Market (54.0% of reviews)
Information
Pros & Cons
Entry-Level Pricing
$3.00 1 User Per Month
Free Trial is available
Learn more about JumpCloud
AI Generated Summary
AI-generated. Powered by real user reviews.
  • G2 reviewers report that JumpCloud excels in providing a seamless user management experience, with many users appreciating its ability to manage users, devices, and SSO effectively. One user noted that the SSO feature has significantly reduced the hassle of remembering multiple passwords.
  • Users say that Akeyless Identity Security Platform stands out for its straightforward architecture and ease of implementation. Reviewers highlighted that the platform allows for automatic secret rotation, enhancing security while simplifying password management in code.
  • According to verified reviews, JumpCloud's initial setup is praised for being quick and intuitive, making it easier for organizations to get started. Users have mentioned that the MDM feature contributes to a smooth onboarding process, which is crucial for teams looking to streamline their identity management.
  • Reviewers mention that while Akeyless offers strong security features, some users feel that it may not be as robust in user management compared to JumpCloud. However, they appreciate the platform's ability to save time and resources by eliminating the need for local infrastructure maintenance.
  • G2 reviewers highlight that JumpCloud's centralized management capabilities are a significant advantage, with users noting that it simplifies administrative tasks. The platform's ease of administration has been particularly beneficial for support engineers, making their work more efficient.
  • Users report that Akeyless provides excellent support, with a high quality of assistance noted in reviews. This is complemented by its strong performance in multi-factor authentication and role-based security, which users find essential for maintaining secure access across their organizations.
Pricing
Entry-Level Pricing
Akeyless Identity Security Platform
No pricing available
JumpCloud
Cloud Directory
$3.00
1 User Per Month
Learn more about JumpCloud
Free Trial
Akeyless Identity Security Platform
Free Trial is available
JumpCloud
Free Trial is available
Ratings
Meets Requirements
8.9
65
8.8
3,155
Ease of Use
9.0
65
9.0
3,188
Ease of Setup
8.3
54
8.8
2,947
Ease of Admin
8.7
42
9.0
2,721
Quality of Support
9.3
58
8.8
2,880
Has the product been a good partner in doing business?
9.7
41
9.0
2,583
Product Direction (% positive)
9.6
60
9.3
3,055
Features by Category
Not enough data
8.8
1,558
Authentication Options
Not enough data
9.1
1437
Not enough data
8.9
1376
Not enough data
9.1
1394
Not enough data
9.0
1356
Not enough data
8.9
1278
Not enough data
8.8
1203
Access Control Types
Not enough data
8.9
1307
Not enough data
8.9
1268
Not enough data
8.6
1240
Not enough data
8.4
1050
Not enough data
8.4
1115
Administration
Not enough data
8.8
1161
Not enough data
9.2
1331
Not enough data
9.1
1377
Not enough data
8.7
1328
Not enough data
8.8
1315
Platform
Not enough data
9.1
1317
Not enough data
8.8
1082
Not enough data
9.0
1228
Not enough data
8.5
1057
Not enough data
8.2
1231
Not enough data
8.4
1179
Not enough data
8.5
1117
User Provisioning and Governance ToolsHide 15 FeaturesShow 15 Features
Not enough data
8.5
914
User on/off Boarding
Not enough data
8.6
633
Not enough data
8.6
732
|
Verified
Not enough data
8.8
797
|
Verified
Not enough data
8.9
757
|
Verified
Not enough data
9.0
735
|
Verified
Not enough data
8.2
571
User Maintenance
Not enough data
8.9
790
|
Verified
Not enough data
8.6
725
|
Verified
Not enough data
8.5
647
|
Verified
Governance
Not enough data
8.0
579
Not enough data
8.3
636
|
Verified
Administration
Not enough data
8.1
751
|
Verified
Not enough data
7.4
577
Not enough data
8.6
759
|
Verified
Not enough data
8.3
623
|
Verified
Not enough data
8.7
20
Tracking
Not enough data
8.3
19
Not enough data
9.0
20
Not enough data
Feature Not Available
Management
Not enough data
8.9
19
Not enough data
8.5
19
Not enough data
9.1
19
Insights
Not enough data
9.2
16
Not enough data
8.8
16
Not enough data
Feature Not Available
Not enough data
8.3
17
Agentic AI - SaaS Spend Management
Not enough data
Feature Not Available
Not enough data
Feature Not Available
Not enough data
Feature Not Available
Not enough data
Feature Not Available
Not enough data
8.2
14
Not enough data
Feature Not Available
Not enough data
Feature Not Available
Encryption Key ManagementHide 10 FeaturesShow 10 Features
9.1
26
Not enough data
Functionality
9.2
22
Not enough data
9.2
17
Not enough data
9.2
21
Not enough data
Availability
8.8
20
Not enough data
9.3
21
Not enough data
9.4
18
Not enough data
9.4
21
Not enough data
Administration
8.8
20
Not enough data
9.4
18
Not enough data
8.9
22
Not enough data
Cloud Directory ServicesHide 11 FeaturesShow 11 Features
Not enough data
8.7
1,608
Access Control
Not enough data
8.8
1346
Not enough data
8.9
1316
Not enough data
8.5
1247
Not enough data
8.3
1069
Administration
Not enough data
8.7
1215
Not enough data
8.7
1337
Not enough data
8.5
1128
Not enough data
8.5
1278
Functionality
Not enough data
9.0
1320
Not enough data
9.1
1307
Not enough data
8.9
1238
Unified Endpoint Management (UEM)Hide 17 FeaturesShow 17 Features
Not enough data
8.8
399
Scope
Not enough data
Feature Not Available
Not enough data
9.1
368
Security
Not enough data
8.5
360
Not enough data
Feature Not Available
Not enough data
8.7
347
Management
Not enough data
9.1
356
Not enough data
8.9
351
Not enough data
8.9
356
Not enough data
8.7
344
Not enough data
8.1
327
Agentic AI - Unified Endpoint Management (UEM)
Not enough data
Feature Not Available
Not enough data
Feature Not Available
Not enough data
Feature Not Available
Not enough data
Feature Not Available
Not enough data
Feature Not Available
Not enough data
Feature Not Available
Not enough data
Feature Not Available
Privileged Access Management (PAM)Hide 21 FeaturesShow 21 Features
9.0
21
8.8
663
Administration
8.9
19
9.0
577
8.5
10
Feature Not Available
9.0
16
8.8
531
8.4
15
8.8
527
9.2
17
9.1
564
9.2
14
8.7
510
Functionality
9.9
13
9.2
550
9.8
17
9.2
545
9.8
11
8.6
468
9.0
16
8.6
436
9.5
17
9.1
535
9.4
19
9.0
527
8.6
12
8.7
488
9.3
9
8.3
81
9.4
17
8.9
473
9.3
16
8.7
440
Monitoring
8.6
16
8.7
514
8.6
18
8.6
533
8.8
10
Feature Not Available
Reporting
8.2
17
8.6
514
8.3
15
8.5
517
Password Policy EnforcementHide 12 FeaturesShow 12 Features
Not enough data
8.9
1,169
Functionality
Not enough data
8.8
906
Not enough data
8.8
939
Not enough data
Feature Not Available
Not enough data
Feature Not Available
Administration
Not enough data
9.0
1045
Not enough data
9.2
1067
Not enough data
8.7
1022
Not enough data
8.8
994
Not enough data
Feature Not Available
Compliance
Not enough data
8.7
804
Not enough data
Feature Not Available
Not enough data
Feature Not Available
Identity and Access Management (IAM)Hide 18 FeaturesShow 18 Features
Not enough data
8.7
1,540
Functionality
Not enough data
9.0
1402
Not enough data
8.4
1200
Not enough data
9.1
1355
Not enough data
9.0
1349
Not enough data
9.2
1385
Not enough data
9.1
1343
Type
Not enough data
8.2
1060
Not enough data
9.0
1362
Reporting
Not enough data
8.4
1250
Not enough data
8.4
1286
Not enough data
8.5
160
Not enough data
8.4
161
Authentication & Authorization - Identity and Access Management (IAM)
Not enough data
8.8
155
Administration & Governance - Identity and Access Management (IAM)
Not enough data
8.7
163
Not enough data
8.7
157
Generative AI - Identity and Access Management (IAM)
Not enough data
Feature Not Available
Not enough data
Feature Not Available
Not enough data
Feature Not Available
Not enough data
8.4
664
Administration
Not enough data
8.5
582
Not enough data
8.1
560
Not enough data
8.0
539
Not enough data
8.3
572
Not enough data
Feature Not Available
Not enough data
Feature Not Available
Maintenance
Not enough data
8.8
584
Not enough data
7.8
515
Communication
Not enough data
7.9
518
Not enough data
Feature Not Available
Not enough data
Feature Not Available
Not enough data
Feature Not Available
Security
Not enough data
8.8
557
Not enough data
8.8
549
Device Support
Not enough data
Feature Not Available
Not enough data
8.9
565
Not enough data
8.9
562
Performance
Not enough data
8.5
567
Certificate Lifecycle Management (CLM)Hide 9 FeaturesShow 9 Features
9.9
9
Not enough data
Functionality
10.0
5
Not enough data
10.0
5
Not enough data
10.0
5
Not enough data
9.7
6
Not enough data
10.0
6
Not enough data
10.0
6
Not enough data
10.0
6
Not enough data
9.3
5
Not enough data
10.0
6
Not enough data
Secrets Management ToolsHide 3 FeaturesShow 3 Features
8.2
31
Not enough data
Functionality
7.5
26
Not enough data
8.5
26
Not enough data
8.6
26
Not enough data
Non-Human Identity Management (NHIM) SolutionsHide 10 FeaturesShow 10 Features
Not enough data
Not enough data
Lifecycle & Provisioning - Non-Human Identity Management (NHIM) Solutions
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Access, Authentication & Authorization - Non-Human Identity Management (NHIM) Solutions
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Visibility, Governance & Compliance - Non-Human Identity Management (NHIM) Solutions
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
8.6
29
Not enough data
Usability & Access
9.3
28
Not enough data
8.1
25
Not enough data
7.3
18
Not enough data
8.6
22
Not enough data
8.8
26
Not enough data
Security Measures
9.0
22
Not enough data
9.3
23
Not enough data
Feature Not Available
Not enough data
Storage
Feature Not Available
Not enough data
Feature Not Available
Not enough data
Not enough data
Not enough data
Compliance
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Administration
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Security
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Mobile Device Management (MDM)Hide 18 FeaturesShow 18 Features
Not enough data
8.6
1,258
Platform - Mobile Device Management (MDM)
Not enough data
8.8
1070
Operating System
Not enough data
9.0
1131
Not enough data
8.7
1144
Not enough data
8.2
989
Management
Not enough data
8.5
1120
Not enough data
8.3
1053
Not enough data
Feature Not Available
Not enough data
Feature Not Available
Not enough data
8.4
1052
Security
Not enough data
8.8
1087
Not enough data
Feature Not Available
Agentic AI - Mobile Device Management (MDM)
Not enough data
Feature Not Available
Not enough data
Feature Not Available
Not enough data
Feature Not Available
Not enough data
Feature Not Available
Not enough data
Feature Not Available
Not enough data
Feature Not Available
Not enough data
Feature Not Available
Not enough data
Not enough data
Generative AI - Security Compliance
Not enough data
Feature Not Available
Not enough data
Feature Not Available
Reviews
Reviewers' Company Size
Akeyless Identity Security Platform
Akeyless Identity Security Platform
Small-Business(50 or fewer emp.)
20.2%
Mid-Market(51-1000 emp.)
27.4%
Enterprise(> 1000 emp.)
52.4%
JumpCloud
JumpCloud
Small-Business(50 or fewer emp.)
35.7%
Mid-Market(51-1000 emp.)
54.0%
Enterprise(> 1000 emp.)
10.3%
Reviewers' Industry
Akeyless Identity Security Platform
Akeyless Identity Security Platform
Information Technology and Services
15.7%
Computer Software
14.5%
Financial Services
9.6%
Marketing and Advertising
9.6%
Insurance
8.4%
Other
42.2%
JumpCloud
JumpCloud
Information Technology and Services
22.4%
Computer Software
12.6%
Financial Services
8.0%
Computer & Network Security
7.2%
Hospital & Health Care
2.8%
Other
47.0%
Alternatives
Akeyless Identity Security Platform
Akeyless Identity Security Platform Alternatives
HashiCorp Vault
HashiCorp Vault
Add HashiCorp Vault
1Password
1Password
Add 1Password
Keeper Password Manager
Keeper Password Manager
Add Keeper Password Manager
Egnyte
Egnyte
Add Egnyte
JumpCloud
JumpCloud Alternatives
Microsoft Entra ID
Microsoft Entra ID
Add Microsoft Entra ID
Okta
Okta
Add Okta
OneLogin
OneLogin
Add OneLogin
NinjaOne
NinjaOne
Add NinjaOne
Discussions
Akeyless Identity Security Platform
Akeyless Identity Security Platform Discussions
Monty the Mongoose crying
Akeyless Identity Security Platform has no discussions with answers
JumpCloud
JumpCloud Discussions
What is JumpCloud used for?
8 Comments
Jeff B.
JB
JumpCloud is an identity provider that allows you to consolidate all of your authentication/logins, apps and devices, to a Single Sign-On experience for your...Read more
Do you want a copy?
4 Comments
Bellucci30 B.
BB
What is JumpCloud used for?
3 Comments
Kate G.
KG
Not just SSO. We use JumpCloud for device management (policy groups, MDM), security management (MFA), user authentication (LDAP, Radius) and user management. Read more