Introducing G2.ai, the future of software buying.Try now

Compare Akeyless Identity Security Platform and CyberArk Conjur

Save
    Log in to your account
    to save comparisons,
    products and more.
At a Glance
Akeyless Identity Security Platform
Akeyless Identity Security Platform
Star Rating
(82)4.6 out of 5
Market Segments
Enterprise (49.4% of reviews)
Information
Pros & Cons
Entry-Level Pricing
No pricing available
Free Trial is available
Learn more about Akeyless Identity Security Platform
CyberArk Conjur
CyberArk Conjur
Star Rating
(17)4.5 out of 5
Market Segments
Enterprise (57.1% of reviews)
Information
Pros & Cons
Not enough data
Entry-Level Pricing
No pricing available
Learn more about CyberArk Conjur

Akeyless Identity Security Platform vs CyberArk Conjur

When assessing the two solutions, reviewers found CyberArk Conjur easier to use and set up. However, reviewers felt that administration of both products was equally easy, and preferred doing business with Akeyless Identity Security Platform overall.

  • Reviewers felt that CyberArk Conjur meets the needs of their business better than Akeyless Identity Security Platform.
  • When comparing quality of ongoing product support, reviewers felt that Akeyless Identity Security Platform is the preferred option.
  • For feature updates and roadmaps, our reviewers preferred the direction of CyberArk Conjur over Akeyless Identity Security Platform.
Pricing
Entry-Level Pricing
Akeyless Identity Security Platform
No pricing available
CyberArk Conjur
No pricing available
Free Trial
Akeyless Identity Security Platform
Free Trial is available
CyberArk Conjur
No trial information available
Ratings
Meets Requirements
8.9
61
9.4
13
Ease of Use
9.0
60
9.1
13
Ease of Setup
8.2
49
8.3
10
Ease of Admin
8.7
42
8.7
10
Quality of Support
9.2
55
8.8
13
Has the product been a good partner in doing business?
9.7
41
9.2
10
Product Direction (% positive)
9.6
55
10.0
13
Features by Category
Cloud Workload Protection PlatformsHide 10 FeaturesShow 10 Features
Not enough data
Not enough data
Management
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Operations
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Security Controls
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Administration
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Monitoring
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Protection
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Encryption Key ManagementHide 10 FeaturesShow 10 Features
9.1
24
Not enough data
Functionality
9.2
22
Not enough data
9.2
17
Not enough data
9.2
20
Not enough data
Availability
8.8
20
Not enough data
9.2
19
Not enough data
9.4
18
Not enough data
9.4
21
Not enough data
Administration
8.8
19
Not enough data
9.4
18
Not enough data
9.0
20
Not enough data
Privileged Access Management (PAM)Hide 21 FeaturesShow 21 Features
8.9
18
9.1
10
Administration
8.9
18
9.4
8
8.5
10
9.0
7
9.0
16
8.6
6
8.4
15
8.6
7
9.2
16
9.2
8
9.2
14
8.3
7
Functionality
9.9
13
9.6
8
9.8
16
9.4
8
9.8
11
8.1
7
9.2
14
9.3
7
9.4
15
9.5
7
9.3
17
9.4
8
8.6
12
9.5
7
9.3
9
9.2
8
9.4
16
9.4
8
9.2
15
9.5
7
Monitoring
8.6
15
8.8
7
8.4
16
9.0
7
8.8
10
9.2
6
Reporting
8.2
17
9.2
8
8.3
15
9.4
8
Certificate Lifecycle Management (CLM)Hide 9 FeaturesShow 9 Features
9.9
9
Not enough data
Functionality
10.0
5
Not enough data
10.0
5
Not enough data
10.0
5
Not enough data
9.7
6
Not enough data
10.0
6
Not enough data
10.0
6
Not enough data
10.0
6
Not enough data
9.3
5
Not enough data
10.0
6
Not enough data
Secrets Management ToolsHide 3 FeaturesShow 3 Features
8.2
30
Not enough data
Functionality
7.5
26
Not enough data
8.5
26
Not enough data
8.5
25
Not enough data
Not enough data
Not enough data
Agentic AI - AWS Marketplace
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Non-Human Identity Management (NHIM) SolutionsHide 10 FeaturesShow 10 Features
Not enough data
Not enough data
Lifecycle & Provisioning - Non-Human Identity Management (NHIM) Solutions
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Access, Authentication & Authorization - Non-Human Identity Management (NHIM) Solutions
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Visibility, Governance & Compliance - Non-Human Identity Management (NHIM) Solutions
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Cloud Visibility
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Security
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Identity
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
8.6
29
Not enough data
Usability & Access
9.3
28
Not enough data
8.1
25
Not enough data
7.3
18
Not enough data
8.6
22
Not enough data
8.8
26
Not enough data
Security Measures
9.0
22
Not enough data
9.3
23
Not enough data
Feature Not Available
Not enough data
Storage
Feature Not Available
Not enough data
Feature Not Available
Not enough data
Not enough data
Not enough data
Compliance
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Administration
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Security
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Categories
Categories
Shared Categories
Akeyless Identity Security Platform
Akeyless Identity Security Platform
CyberArk Conjur
CyberArk Conjur
Akeyless Identity Security Platform and CyberArk Conjur are categorized as Secrets Management Tools and Privileged Access Management (PAM)
Reviews
Reviewers' Company Size
Akeyless Identity Security Platform
Akeyless Identity Security Platform
Small-Business(50 or fewer emp.)
20.8%
Mid-Market(51-1000 emp.)
29.9%
Enterprise(> 1000 emp.)
49.4%
CyberArk Conjur
CyberArk Conjur
Small-Business(50 or fewer emp.)
14.3%
Mid-Market(51-1000 emp.)
28.6%
Enterprise(> 1000 emp.)
57.1%
Reviewers' Industry
Akeyless Identity Security Platform
Akeyless Identity Security Platform
Information Technology and Services
15.4%
Computer Software
12.8%
Marketing and Advertising
10.3%
Insurance
9.0%
Financial Services
9.0%
Other
43.6%
CyberArk Conjur
CyberArk Conjur
Information Technology and Services
50.0%
Financial Services
21.4%
Management Consulting
7.1%
Food & Beverages
7.1%
Construction
7.1%
Other
7.1%
Alternatives
Akeyless Identity Security Platform
Akeyless Identity Security Platform Alternatives
HashiCorp Vault
HashiCorp Vault
Add HashiCorp Vault
1Password
1Password
Add 1Password
Egnyte
Egnyte
Add Egnyte
Keeper Password Manager
Keeper Password Manager
Add Keeper Password Manager
CyberArk Conjur
CyberArk Conjur Alternatives
HashiCorp Vault
HashiCorp Vault
Add HashiCorp Vault
Microsoft Entra ID
Microsoft Entra ID
Add Microsoft Entra ID
JumpCloud
JumpCloud
Add JumpCloud
1Password
1Password
Add 1Password
Discussions
Akeyless Identity Security Platform
Akeyless Identity Security Platform Discussions
Monty the Mongoose crying
Akeyless Identity Security Platform has no discussions with answers
CyberArk Conjur
CyberArk Conjur Discussions
Monty the Mongoose crying
CyberArk Conjur has no discussions with answers