Introducing G2.ai, the future of software buying.Try now

Compare Cisco Duo and CyberArk Workforce Identity

Save
    Log in to your account
    to save comparisons,
    products and more.
At a Glance
Cisco Duo
Cisco Duo
Star Rating
(439)4.5 out of 5
Market Segments
Enterprise (44.8% of reviews)
Information
Pros & Cons
Entry-Level Pricing
Free
Free Trial is available
Browse all 4 pricing plans
CyberArk Workforce Identity
CyberArk Workforce Identity
Star Rating
(127)4.5 out of 5
Market Segments
Mid-Market (47.2% of reviews)
Information
Pros & Cons
Entry-Level Pricing
Starting at $3.00 1 per user per month
Browse all 5 pricing plans
AI Generated Summary
AI-generated. Powered by real user reviews.
  • G2 reviewers report that CyberArk Workforce Identity excels in its intuitive interface and ease of implementation, with users highlighting that it was the easiest implementation they have ever participated in. This is a significant advantage for teams looking for a smooth onboarding experience.
  • Users say Cisco Duo stands out for its robust multi-factor authentication capabilities, offering multiple options such as push notifications, biometrics, and passcodes. This flexibility enhances security and user confidence, especially in enterprise environments.
  • Reviewers mention that while CyberArk Workforce Identity has a strong focus on access reviews, it may not fully meet the diverse authentication needs of all users. Some users appreciate its dedicated approach to access reviews but desire more comprehensive authentication features.
  • According to verified reviews, Cisco Duo is praised for its strong integration with enterprise tools and centralized admin controls, making it easier for organizations to enforce security policies across various applications and devices.
  • G2 reviewers highlight that CyberArk Workforce Identity has a modern UI that significantly speeds up user access review processes, which is a key feature for organizations looking to streamline their compliance efforts.
  • Users report that Cisco Duo provides peace of mind with its device health checks and responsive mobile support, ensuring that users feel secure and supported, especially when accessing sensitive information remotely.
Pricing
Entry-Level Pricing
Cisco Duo
Duo Free
Free
Browse all 4 pricing plans
CyberArk Workforce Identity
CyberArk Adaptive MFA
Starting at $3.00
1 per user per month
Browse all 5 pricing plans
Free Trial
Cisco Duo
Free Trial is available
CyberArk Workforce Identity
Free Trial is available
Ratings
Meets Requirements
9.4
347
9.0
116
Ease of Use
9.3
352
8.8
119
Ease of Setup
9.0
111
8.4
99
Ease of Admin
9.2
82
8.6
100
Quality of Support
8.9
263
9.0
114
Has the product been a good partner in doing business?
9.1
80
9.0
98
Product Direction (% positive)
8.4
335
9.2
119
Features by Category
9.3
104
9.1
38
Authentication Options
9.2
96
9.1
36
9.3
92
9.2
34
9.6
90
9.1
29
9.3
87
9.1
31
9.1
66
9.3
30
9.4
65
9.2
21
Access Control Types
9.6
81
8.9
23
9.3
84
9.2
25
9.5
87
9.1
24
9.1
69
9.2
14
9.2
72
8.9
19
Administration
9.1
76
9.5
30
9.3
76
9.4
29
9.2
73
9.3
34
9.3
76
9.0
34
9.0
76
9.1
27
Platform
9.4
83
9.2
31
9.5
78
9.4
21
9.4
79
9.3
30
9.1
68
8.8
20
9.0
68
8.3
28
9.0
65
8.6
28
9.1
70
8.8
19
User Provisioning and Governance ToolsHide 15 FeaturesShow 15 Features
Not enough data
8.2
42
User on/off Boarding
Not enough data
7.9
21
|
Verified
Not enough data
8.3
34
|
Verified
Not enough data
8.8
38
|
Verified
Not enough data
8.4
34
|
Verified
Not enough data
8.7
34
|
Verified
Not enough data
7.4
23
|
Verified
User Maintenance
Not enough data
9.1
29
|
Verified
Not enough data
8.2
29
|
Verified
Not enough data
8.4
27
|
Verified
Governance
Not enough data
7.9
26
|
Verified
Not enough data
8.5
26
|
Verified
Administration
Not enough data
7.9
37
|
Verified
Not enough data
6.9
24
|
Verified
Not enough data
8.2
38
|
Verified
Not enough data
7.7
25
|
Verified
Multi-Factor Authentication (MFA)Hide 13 FeaturesShow 13 Features
8.4
158
Not enough data
Authentication type
8.3
136
|
Verified
Not enough data
7.7
123
|
Verified
Not enough data
7.9
117
Not enough data
8.1
117
|
Verified
Not enough data
8.7
125
|
Verified
Not enough data
8.2
116
|
Verified
Not enough data
9.3
143
|
Verified
Not enough data
8.6
117
|
Verified
Not enough data
Functionality
8.7
125
|
Verified
Feature Not Available
8.0
117
Feature Not Available
Implementation
9.0
142
|
Verified
Not enough data
8.5
115
Not enough data
8.2
112
Not enough data
8.5
30
Not enough data
Network Management
8.6
22
Feature Not Available
8.5
23
Feature Not Available
8.7
24
Feature Not Available
8.7
23
Feature Not Available
Security
9.0
23
Not enough data
9.2
26
Not enough data
8.6
23
Not enough data
9.1
24
Not enough data
Identity Management
8.8
24
Not enough data
8.4
23
Not enough data
8.6
24
Not enough data
Generative AI
6.9
12
Not enough data
7.1
12
Not enough data
8.9
37
Not enough data
Data Protection
8.9
29
Not enough data
9.1
33
Not enough data
9.0
32
Not enough data
8.7
30
Not enough data
9.4
32
Not enough data
Analysis
8.5
31
Not enough data
8.8
31
Not enough data
8.9
31
Not enough data
Administration
8.8
29
Not enough data
8.4
28
Not enough data
8.9
30
Not enough data
Cloud Directory ServicesHide 11 FeaturesShow 11 Features
Not enough data
Not enough data
Access Control
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Administration
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Functionality
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Biometric AuthenticationHide 7 FeaturesShow 7 Features
8.8
6
Not enough data
Integration
8.9
6
Not enough data
8.1
6
Not enough data
8.9
6
Not enough data
8.6
6
Not enough data
Administration
9.2
6
Not enough data
8.9
6
Not enough data
9.2
6
Not enough data
Risk-Based Authentication (RBA)Hide 4 FeaturesShow 4 Features
9.2
24
Not enough data
Administration
9.4
18
Not enough data
9.1
21
Not enough data
9.1
19
Not enough data
Not enough data
Not enough data
Customer Identity and Access Management (CIAM)Hide 15 FeaturesShow 15 Features
Not enough data
Not enough data
Functionality
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
AI Authentication Risk Management - Customer Identity and Access Management (CIAM)
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
AI Biometric & Behavioral Analysis - Customer Identity and Access Management (CIAM)
Not enough data
Not enough data
Not enough data
Not enough data
AI Context-Aware Security Controls - Customer Identity and Access Management (CIAM)
Not enough data
Not enough data
Not enough data
Not enough data
9.2
17
Not enough data
Security
9.4
13
Not enough data
9.0
13
Not enough data
9.1
13
Not enough data
9.3
14
Not enough data
Administration
9.6
15
Not enough data
9.0
14
Not enough data
9.3
14
Not enough data
Access Control
9.7
15
Not enough data
9.1
15
Not enough data
9.2
14
Not enough data
9.0
14
Not enough data
Passwordless AuthenticationHide 4 FeaturesShow 4 Features
8.8
40
Not enough data
Functionality
9.0
33
Not enough data
8.8
34
Not enough data
9.2
39
Not enough data
8.0
37
Not enough data
Identity and Access Management (IAM)Hide 18 FeaturesShow 18 Features
8.9
10
8.3
20
Functionality
9.6
8
8.7
10
8.3
9
9.4
8
8.7
9
9.0
12
8.7
9
9.2
10
9.6
8
8.8
11
10.0
9
8.8
10
Type
8.5
9
Feature Not Available
8.1
9
8.8
18
Reporting
9.1
9
8.9
17
8.7
9
8.4
18
Not enough data
Not enough data
Not enough data
Not enough data
Authentication & Authorization - Identity and Access Management (IAM)
Not enough data
Not enough data
Administration & Governance - Identity and Access Management (IAM)
Not enough data
Not enough data
Not enough data
Not enough data
Generative AI - Identity and Access Management (IAM)
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Identity Threat Detection and Response (ITDR)Hide 7 FeaturesShow 7 Features
Not enough data
Not enough data
Monitoring
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Remediation
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Identity and Access Management - Zero Trust Platforms
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Security - Zero Trust Platforms
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Data Security - Zero Trust Platforms
Not enough data
Not enough data
Not enough data
Not enough data
Application Visibility - Zero Trust Platforms
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Reporting and Policies - Zero Trust Platforms
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Agentic AI - Zero Trust Platforms
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
User and Entity Behavior Analytics (UEBA)Hide 11 FeaturesShow 11 Features
Not enough data
Not enough data
Agentic AI - User and Entity Behavior Analytics (UEBA)
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Analysis
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Detection
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Agentic AI - AWS Marketplace
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Cloud Visibility
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Security
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Identity
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Reviews
Reviewers' Company Size
Cisco Duo
Cisco Duo
Small-Business(50 or fewer emp.)
18.1%
Mid-Market(51-1000 emp.)
37.1%
Enterprise(> 1000 emp.)
44.8%
CyberArk Workforce Identity
CyberArk Workforce Identity
Small-Business(50 or fewer emp.)
6.4%
Mid-Market(51-1000 emp.)
47.2%
Enterprise(> 1000 emp.)
46.4%
Reviewers' Industry
Cisco Duo
Cisco Duo
Information Technology and Services
16.6%
Higher Education
12.8%
Computer Software
5.8%
Hospital & Health Care
5.1%
Financial Services
4.8%
Other
54.9%
CyberArk Workforce Identity
CyberArk Workforce Identity
Information Technology and Services
20.8%
Financial Services
8.8%
Insurance
4.8%
Hospital & Health Care
4.8%
Computer & Network Security
4.8%
Other
56.0%
Alternatives
Cisco Duo
Cisco Duo Alternatives
LastPass
LastPass
Add LastPass
Microsoft Entra ID
Microsoft Entra ID
Add Microsoft Entra ID
OneLogin
OneLogin
Add OneLogin
SecureAuth: Workforce IAM
SecureAuth: Workforce IAM
Add SecureAuth: Workforce IAM
CyberArk Workforce Identity
CyberArk Workforce Identity Alternatives
Okta
Okta
Add Okta
OneLogin
OneLogin
Add OneLogin
Microsoft Entra ID
Microsoft Entra ID
Add Microsoft Entra ID
JumpCloud
JumpCloud
Add JumpCloud
Discussions
Cisco Duo
Cisco Duo Discussions
Is Duo Security free?
3 Comments
VP
No it is not free you will need subscription.Read more
What is duo security software?
2 Comments
Pradum K.
PK
It is mostly used for Two factor authentication service for various social media platform and for sso login to the same.Read more
What is a key feature of duo?
2 Comments
Mark Andrew G.
MG
Mobile authentication it is. No need for security key!Read more
CyberArk Workforce Identity
CyberArk Workforce Identity Discussions
Monty the Mongoose crying
CyberArk Workforce Identity has no discussions with answers