Compare CyberArk Privileged Access Manager and CyberArk Workforce Identity

Save your comparisonKeep these tools in one place and come back anytime.
Save to board
At a Glance
CyberArk Privileged Access Manager
CyberArk Privileged Access Manager
Star Rating
(70)4.4 out of 5
Market Segments
Enterprise (70.3% of reviews)
Information
Pros & Cons
Entry-Level Pricing
No pricing available
Learn more about CyberArk Privileged Access Manager
CyberArk Workforce Identity
CyberArk Workforce Identity
Star Rating
(130)4.5 out of 5
Market Segments
Mid-Market (46.8% of reviews)
Information
Pros & Cons
Entry-Level Pricing
Starting at $3.00 1 per user per month
Browse all 5 pricing plans

CyberArk Privileged Access Manager vs CyberArk Workforce Identity

When assessing the two solutions, reviewers found CyberArk Workforce Identity easier to use, set up, and administer. Reviewers also preferred doing business with CyberArk Workforce Identity overall.

  • Reviewers felt that CyberArk Privileged Access Manager meets the needs of their business better than CyberArk Workforce Identity.
  • When comparing quality of ongoing product support, reviewers felt that CyberArk Workforce Identity is the preferred option.
  • For feature updates and roadmaps, our reviewers preferred the direction of CyberArk Workforce Identity over CyberArk Privileged Access Manager.
Pricing
Entry-Level Pricing
CyberArk Privileged Access Manager
No pricing available
CyberArk Workforce Identity
CyberArk Adaptive MFA
Starting at $3.00
1 per user per month
Browse all 5 pricing plans
Free Trial
CyberArk Privileged Access Manager
No trial information available
CyberArk Workforce Identity
Free Trial is available
Ratings
Meets Requirements
9.1
55
9.0
117
Ease of Use
8.2
57
8.8
120
Ease of Setup
7.0
41
8.4
100
Ease of Admin
8.1
42
8.6
100
Quality of Support
8.3
51
9.0
115
Has the product been a good partner in doing business?
8.9
38
9.0
98
Product Direction (% positive)
8.8
57
9.2
120
Features by Category
Not enough data
9.1
38
Authentication Options
Not enough data
9.1
36
Not enough data
9.2
34
Not enough data
9.1
29
Not enough data
9.1
31
Not enough data
9.3
30
Not enough data
9.2
21
Access Control Types
Not enough data
8.9
23
Not enough data
9.2
25
Not enough data
9.1
24
Not enough data
9.2
14
Not enough data
8.9
19
Administration
Not enough data
9.5
30
Not enough data
9.4
29
Not enough data
9.3
34
Not enough data
9.0
34
Not enough data
9.1
27
Platform
Not enough data
9.2
31
Not enough data
9.4
21
Not enough data
9.3
30
Not enough data
8.8
20
Not enough data
8.3
28
Not enough data
8.6
28
Not enough data
8.8
19
User Provisioning and Governance ToolsHide 15 FeaturesShow 15 Features
Not enough data
8.2
42
User on/off Boarding
Not enough data
7.9
21
|
Verified
Not enough data
8.3
34
|
Verified
Not enough data
8.8
38
|
Verified
Not enough data
8.4
34
|
Verified
Not enough data
8.7
34
|
Verified
Not enough data
7.4
23
|
Verified
User Maintenance
Not enough data
9.1
29
|
Verified
Not enough data
8.2
29
|
Verified
Not enough data
8.4
27
|
Verified
Governance
Not enough data
7.9
26
|
Verified
Not enough data
8.5
26
|
Verified
Administration
Not enough data
7.9
37
|
Verified
Not enough data
6.9
24
|
Verified
Not enough data
8.2
38
|
Verified
Not enough data
7.7
25
|
Verified
Multi-Factor Authentication (MFA)Hide 13 FeaturesShow 13 Features
Not enough data
Not enough data
Authentication type
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Functionality
Not enough data
Feature Not Available
Not enough data
Feature Not Available
Implementation
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Network Management
Not enough data
Feature Not Available
Not enough data
Feature Not Available
Not enough data
Feature Not Available
Not enough data
Feature Not Available
Security
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Identity Management
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Generative AI
Not enough data
Not enough data
Not enough data
Not enough data
Cloud Directory ServicesHide 11 FeaturesShow 11 Features
Not enough data
Not enough data
Access Control
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Administration
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Functionality
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Biometric AuthenticationHide 7 FeaturesShow 7 Features
Not enough data
Not enough data
Integration
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Administration
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Risk-Based Authentication (RBA)Hide 4 FeaturesShow 4 Features
Not enough data
Not enough data
Administration
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Privileged Access Management (PAM)Hide 21 FeaturesShow 21 Features
8.9
39
Not enough data
Administration
9.0
37
Not enough data
8.8
36
Not enough data
8.4
34
Not enough data
8.1
35
Not enough data
8.6
37
Not enough data
8.4
34
Not enough data
Functionality
9.2
38
Not enough data
9.1
35
Not enough data
8.3
30
Not enough data
9.7
38
Not enough data
9.0
36
Not enough data
9.1
36
Not enough data
8.2
33
Not enough data
9.4
36
Not enough data
9.7
36
Not enough data
9.1
35
Not enough data
Monitoring
9.3
37
Not enough data
9.2
37
Not enough data
8.1
35
Not enough data
Reporting
9.2
35
Not enough data
8.1
36
Not enough data
Customer Identity and Access Management (CIAM)Hide 15 FeaturesShow 15 Features
Not enough data
Not enough data
Functionality
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
AI Authentication Risk Management - Customer Identity and Access Management (CIAM)
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
AI Biometric & Behavioral Analysis - Customer Identity and Access Management (CIAM)
Not enough data
Not enough data
Not enough data
Not enough data
AI Context-Aware Security Controls - Customer Identity and Access Management (CIAM)
Not enough data
Not enough data
Not enough data
Not enough data
Passwordless AuthenticationHide 4 FeaturesShow 4 Features
Not enough data
Not enough data
Functionality
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Identity and Access Management (IAM)Hide 18 FeaturesShow 18 Features
Not enough data
8.3
21
Functionality
Not enough data
8.7
10
Not enough data
9.4
8
Not enough data
9.0
12
Not enough data
8.9
11
Not enough data
8.8
11
Not enough data
8.6
11
Type
Not enough data
Feature Not Available
Not enough data
8.7
19
Reporting
Not enough data
8.9
18
Not enough data
8.4
18
Not enough data
Not enough data
Not enough data
Not enough data
Authentication & Authorization - Identity and Access Management (IAM)
Not enough data
Not enough data
Administration & Governance - Identity and Access Management (IAM)
Not enough data
Not enough data
Not enough data
Not enough data
Generative AI - Identity and Access Management (IAM)
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Identity Threat Detection and Response (ITDR)Hide 7 FeaturesShow 7 Features
Not enough data
Not enough data
Monitoring
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Remediation
Not enough data
Not enough data
Not enough data
Not enough data
User and Entity Behavior Analytics (UEBA)Hide 11 FeaturesShow 11 Features
Not enough data
Not enough data
Agentic AI - User and Entity Behavior Analytics (UEBA)
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Analysis
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Detection
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Agentic AI - AWS Marketplace
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Categories
Categories
Shared Categories
CyberArk Privileged Access Manager
CyberArk Privileged Access Manager
CyberArk Workforce Identity
CyberArk Workforce Identity
CyberArk Privileged Access Manager and CyberArk Workforce Identity are categorized as AWS Marketplace
Reviews
Reviewers' Company Size
CyberArk Privileged Access Manager
CyberArk Privileged Access Manager
Small-Business(50 or fewer emp.)
9.4%
Mid-Market(51-1000 emp.)
20.3%
Enterprise(> 1000 emp.)
70.3%
CyberArk Workforce Identity
CyberArk Workforce Identity
Small-Business(50 or fewer emp.)
6.3%
Mid-Market(51-1000 emp.)
46.8%
Enterprise(> 1000 emp.)
46.8%
Reviewers' Industry
CyberArk Privileged Access Manager
CyberArk Privileged Access Manager
Information Technology and Services
15.9%
Banking
12.7%
Insurance
6.3%
Retail
4.8%
Computer & Network Security
4.8%
Other
55.6%
CyberArk Workforce Identity
CyberArk Workforce Identity
Information Technology and Services
20.6%
Financial Services
8.7%
Computer & Network Security
5.6%
Insurance
4.8%
Hospital & Health Care
4.8%
Other
55.6%
Alternatives
CyberArk Privileged Access Manager
CyberArk Privileged Access Manager Alternatives
Microsoft Entra ID
Microsoft Entra ID
Add Microsoft Entra ID
BeyondTrust Privileged Remote Access
BeyondTrust Privileged...
Add BeyondTrust Privileged Remote Access
IBM Vault (formerly HashiCorp Vault)
IBM Vault (formerly HashiCorp Vault)
Add IBM Vault (formerly HashiCorp Vault)
Delinea Secret Server
Delinea Secret Server
Add Delinea Secret Server
CyberArk Workforce Identity
CyberArk Workforce Identity Alternatives
Okta
Okta
Add Okta
Cisco Duo
Cisco Duo
Add Cisco Duo
OneLogin
OneLogin
Add OneLogin
Microsoft Entra ID
Microsoft Entra ID
Add Microsoft Entra ID
Discussions
CyberArk Privileged Access Manager
CyberArk Privileged Access Manager Discussions
Monty the Mongoose crying
CyberArk Privileged Access Manager has no discussions with answers
CyberArk Workforce Identity
CyberArk Workforce Identity Discussions
Monty the Mongoose crying
CyberArk Workforce Identity has no discussions with answers