# CyberArk Privileged Access Manager vs Okta Comparison
---
## AI Generated Summary
- **G2 reviewers report** that Okta excels in user experience, with many praising its **intuitive UI** and the ease of finding necessary features quickly. Users appreciate the extensive **out-of-the-box integrations** with major software products, which simplifies setup and implementation.
- **Users say** that CyberArk Privileged Access Manager is also user-friendly, highlighting its **intuitive design** and effective customer support. Reviewers note that the initial setup process is straightforward, making it accessible for teams looking to manage privileged access efficiently.
- **According to verified reviews** , Okta stands out for its **ease of use** , scoring notably higher than CyberArk. Users mention that it is very efficient for logging into software programs, with mobile compatibility and integration with tools like **Google Authenticator** enhancing its usability.
- **Reviewers mention** that while CyberArk offers robust features for managing and securing privileged access, some users find it less intuitive than Okta, particularly in terms of **administrative tasks**. However, its strong password vaulting and session monitoring capabilities are frequently praised.
- **G2 reviewers highlight** that Okta&#39;s implementation process is quick and efficient, with minimal downtime reported. This is a significant advantage for organizations that need to get up and running without extensive delays, a point that some CyberArk users feel could be improved.
- **Users appreciate** that both products maintain a strong partnership approach, with CyberArk receiving positive feedback for its **integration capabilities** across various operating systems and databases. This feature is crucial for organizations looking to streamline their operational workflows, although Okta&#39;s broader integration options are often seen as a key differentiator.



| | CyberArk Privileged Access Manager | Okta | 
|---|---|---|
| **Star Rating** | 4.4 out of 5 | 4.5 out of 5 | 
| **Total Reviews** | 71 | 1,226 | 
| **Largest Market Segment** | Enterprise (69.2% of reviews) | Mid-Market (52.8% of reviews) | 
| **Entry Level Price** | No pricing available | $6.00 1 User per month | 

---
## Top Pros & Cons

### CyberArk Privileged Access Manager

Pros:
- Security (6 reviews)
- Ease of Use (5 reviews)

Cons:
- Difficult Setup (3 reviews)
- Integration Difficulty (3 reviews)

### Okta

Pros:
- Ease of Use (207 reviews)
- Security (158 reviews)

Cons:
- Authentication Issues (77 reviews)
- Login Issues (64 reviews)

---
## Ratings Comparison
| Rating | CyberArk Privileged Access Manager | Okta | 
|---|---|---|
  | **Meets Requirements** | 9.1 (56 reviews) | 9.3 (907 reviews) | 
  | **Ease of Use** | 8.2 (58 reviews) | 9.3 (932 reviews) | 
  | **Ease of Setup** | 7.0 (42 reviews) | 8.9 (432 reviews) | 
  | **Ease of Admin** | 8.1 (42 reviews) | 9.0 (200 reviews) | 
  | **Quality of Support** | 8.3 (52 reviews) | 8.9 (680 reviews) | 
  | **Has the product been a good partner in doing business?** | 8.9 (38 reviews) | 8.9 (194 reviews) | 
  | **Product Direction (% positive)** | 8.6 (58 reviews) | 8.8 (878 reviews) | 

---
## Pricing

### CyberArk Privileged Access Manager

#### Entry-Level Pricing

No pricing available

#### Free Trial

No information available

### Okta

#### Entry-Level Pricing

Plan: Starter

Price: $6.00 1 User per month

Description: Starting your Identity journey? Put a strong foundation in place.

Key Features:
- Universal Directory
- Workflows - 5 flows
- Single Sign-On

[Browse all 2 editions](https://www.g2.com/products/okta/pricing)

#### Free Trial

No

---
## Features Comparison By Category

### Single Sign-On (SSO)

| Product | Score | Reviews |
|---|---|---|
| **CyberArk Privileged Access Manager** | N/A | N/A |
| **Okta** | 9.1/10 | 510 |

#### Authentication Options

| Feature | CyberArk Privileged Access Manager | Okta | 
|---|---|---|
| **Authentication User experience** | Not enough data | 9.3 (470 reviews) | 
| **Supports Required Authentication systems** | Not enough data | 9.3 (61 reviews) | 
| **Multi-Factor Authentication** | Not enough data | 9.3 (449 reviews) | 
| **Supports Required Authentication Methods/Protocols** | Not enough data | 9.3 (53 reviews) | 
| **Federation/SAML support (idp)** | Not enough data | 9.2 (298 reviews) | 
| **Federation/SAML support (sp)** | Not enough data | 9.2 (287 reviews) | 

#### Access Control Types

| Feature | CyberArk Privileged Access Manager | Okta | 
|---|---|---|
| **Endpoint access** | Not enough data | 9.2 (321 reviews) | 
| **Local Access** | Not enough data | 9.2 (346 reviews) | 
| **Remote Access** | Not enough data | 9.2 (355 reviews) | 
| **Partner Access** | Not enough data | 9.0 (258 reviews) | 
| **Supports BYOD users** | Not enough data | 9.0 (271 reviews) | 

#### Administration

| Feature | CyberArk Privileged Access Manager | Okta | 
|---|---|---|
| **Ease of installation on server** | Not enough data | 9.1 (284 reviews) | 
| **Password Policy Enforcement** | Not enough data | 9.2 (322 reviews) | 
| **Administration Console** | Not enough data | 9.1 (278 reviews) | 
| **Ease of connecting applications** | Not enough data | 9.1 (346 reviews) | 
| **Self Service Password Administration** | Not enough data | 9.2 (320 reviews) | 

#### Platform

| Feature | CyberArk Privileged Access Manager | Okta | 
|---|---|---|
| **Multiple Operating system support** | Not enough data | 9.2 (323 reviews) | 
| **Multi-Domain Support** | Not enough data | 9.2 (287 reviews) | 
| **Cross Browser support** | Not enough data | 9.2 (321 reviews) | 
| **Fail over protection** | Not enough data | 9.0 (262 reviews) | 
| **Reporting** | Not enough data | 8.9 (255 reviews) | 
| **Auditing** | Not enough data | 8.9 (252 reviews) | 
| **Third Party Web Services support** | Not enough data | 9.0 (268 reviews) | 

### User Provisioning and Governance Tools

| Product | Score | Reviews |
|---|---|---|
| **CyberArk Privileged Access Manager** | N/A | N/A |
| **Okta** | 9.1/10 | 131 |

#### User on/off Boarding

| Feature | CyberArk Privileged Access Manager | Okta | 
|---|---|---|
| **Self Service Access requests** | Not enough data | 9.1 (96 reviews) ✓ Verified | 
| **Smart/Automated Provisioning** | Not enough data | 9.1 (94 reviews) ✓ Verified | 
| **Role Management** | Not enough data | 9.3 (96 reviews) ✓ Verified | 
| **Policy Management** | Not enough data | 9.1 (98 reviews) ✓ Verified | 
| **Access Termination** | Not enough data | 9.4 (93 reviews) ✓ Verified | 
| **Approval Workflows** | Not enough data | 8.9 (86 reviews) ✓ Verified | 

#### User Maintenance

| Feature | CyberArk Privileged Access Manager | Okta | 
|---|---|---|
| **Self Service Password Reset** | Not enough data | 9.3 (106 reviews) ✓ Verified | 
| **Bulk Changes** | Not enough data | 8.9 (88 reviews) ✓ Verified | 
| **Bi-directional Identity Synchronization** | Not enough data | 9.0 (80 reviews) ✓ Verified | 

#### Governance

| Feature | CyberArk Privileged Access Manager | Okta | 
|---|---|---|
| **Identifies and Alerts for Threats** | Not enough data | 9.0 (83 reviews) ✓ Verified | 
| **Compliance Audits** | Not enough data | 9.2 (83 reviews) ✓ Verified | 

#### Administration

| Feature | CyberArk Privileged Access Manager | Okta | 
|---|---|---|
| **Reporting** | Not enough data | 8.9 (87 reviews) ✓ Verified | 
| **Mobile App** | Not enough data | 8.9 (99 reviews) ✓ Verified | 
| **Ease of set up for target systems** | Not enough data | 9.0 (92 reviews) ✓ Verified | 
| **APIs** | Not enough data | 9.1 (87 reviews) ✓ Verified | 

### Zero Trust Networking

| Product | Score | Reviews |
|---|---|---|
| **CyberArk Privileged Access Manager** | N/A | N/A |
| **Okta** | 8.9/10 | 42 |

#### Network Management

| Feature | CyberArk Privileged Access Manager | Okta | 
|---|---|---|
| **Network Segmentation** | Not enough data | Feature Not Available | 
| **Network Mapping** | Not enough data | Feature Not Available | 
| **Security Analytics** | Not enough data | 9.0 (35 reviews) | 
| **API/Integrations** | Not enough data | 9.1 (34 reviews) | 

#### Security

| Feature | CyberArk Privileged Access Manager | Okta | 
|---|---|---|
| **Security Automation** | Not enough data | 9.3 (36 reviews) | 
| **Application Security** | Not enough data | 9.3 (38 reviews) | 
| **Workload Protection** | Not enough data | 9.1 (33 reviews) | 
| **Data Protection** | Not enough data | 9.2 (38 reviews) | 

#### Identity Management

| Feature | CyberArk Privileged Access Manager | Okta | 
|---|---|---|
| **Adaptive Access Control** | Not enough data | 9.2 (33 reviews) | 
| **Identity Scoring** | Not enough data | 9.2 (32 reviews) | 
| **User Monitoring** | Not enough data | 9.2 (37 reviews) | 

#### Generative AI

| Feature | CyberArk Privileged Access Manager | Okta | 
|---|---|---|
| **AI Text Summarization** | Not enough data | 6.6 (15 reviews) | 
| **AI Text Generation** | Not enough data | Feature Not Available | 

### Cloud Directory Services

| Product | Score | Reviews |
|---|---|---|
| **CyberArk Privileged Access Manager** | N/A | N/A |
| **Okta** | 9.5/10 | 87 |

#### Access Control

| Feature | CyberArk Privileged Access Manager | Okta | 
|---|---|---|
| **Role Management** | Not enough data | 9.3 (60 reviews) | 
| **Access Termination** | Not enough data | 9.4 (63 reviews) | 
| **Remote Access** | Not enough data | 9.4 (65 reviews) | 
| **Partner Access** | Not enough data | 9.3 (55 reviews) | 

#### Administration

| Feature | CyberArk Privileged Access Manager | Okta | 
|---|---|---|
| **Smart/Automated Provisioning** | Not enough data | 9.5 (60 reviews) | 
| **Policy Management** | Not enough data | 9.5 (59 reviews) | 
| **On-premise identity repositories supported** | Not enough data | 9.4 (54 reviews) | 
| **Ease of Connecting Applications** | Not enough data | 9.4 (69 reviews) | 

#### Functionality

| Feature | CyberArk Privileged Access Manager | Okta | 
|---|---|---|
| **SSO** | Not enough data | 9.5 (76 reviews) | 
| **Multi-Factor Authentication** | Not enough data | 9.6 (77 reviews) | 
| **Supports Required Authentication systems** | Not enough data | 9.4 (66 reviews) | 

### Privileged Access Management (PAM)

| Product | Score | Reviews |
|---|---|---|
| **CyberArk Privileged Access Manager** | 8.9/10 | 40 |
| **Okta** | N/A | N/A |

#### Administration

| Feature | CyberArk Privileged Access Manager | Okta | 
|---|---|---|
| **Policy, User, and Role Management** | 8.9 (38 reviews) | Not enough data | 
| **Approval Workflows** | 8.8 (36 reviews) | Not enough data | 
| **Automated Provisioning** | 8.4 (34 reviews) | Not enough data | 
| **Bulk Changes** | 8.1 (35 reviews) | Not enough data | 
| **Centralized Management** | 8.6 (37 reviews) | Not enough data | 
| **Self-Service Access Requests** | 8.4 (34 reviews) | Not enough data | 

#### Functionality

| Feature | CyberArk Privileged Access Manager | Okta | 
|---|---|---|
| **Multi-Factor Authentication** | 9.2 (38 reviews) | Not enough data | 
| **Single Sign-On** | 9.2 (36 reviews) | Not enough data | 
| **BYOD support** | 8.3 (30 reviews) | Not enough data | 
| **Password Vault** | 9.7 (38 reviews) | Not enough data | 
| **Centralized management** | 9.0 (36 reviews) | Not enough data | 
| **Role-based security** | 9.1 (37 reviews) | Not enough data | 
| **Live notifications** | 8.2 (33 reviews) | Not enough data | 
| **Live session recording &amp; playback** | 9.4 (36 reviews) | Not enough data | 
| **Hide passwords** | 9.7 (36 reviews) | Not enough data | 
| **Temporary, time-limited privilege** | 9.1 (35 reviews) | Not enough data | 

#### Monitoring

| Feature | CyberArk Privileged Access Manager | Okta | 
|---|---|---|
| **Audit Logging** | 9.3 (37 reviews) | Not enough data | 
| **Activity Logging** | 9.2 (37 reviews) | Not enough data | 
| **Anomaly Detection** | 8.1 (35 reviews) | Not enough data | 

#### Reporting

| Feature | CyberArk Privileged Access Manager | Okta | 
|---|---|---|
| **Audit log** | 9.2 (35 reviews) | Not enough data | 
| **Reporting** | 8.1 (36 reviews) | Not enough data | 

### Customer Identity and Access Management (CIAM)

| Product | Score | Reviews |
|---|---|---|
| **CyberArk Privileged Access Manager** | N/A | N/A |
| **Okta** | 9.3/10 | 116 |

#### Functionality

| Feature | CyberArk Privileged Access Manager | Okta | 
|---|---|---|
| **Self-registration and self-service** | Not enough data | 9.4 (100 reviews) ✓ Verified | 
| **Authentication** | Not enough data | 9.5 (108 reviews) ✓ Verified | 
| **Scalability** | Not enough data | 9.3 (104 reviews) ✓ Verified | 
| **Consent and preference management** | Not enough data | 9.5 (58 reviews) | 
| **Social login** | Not enough data | 9.1 (56 reviews) | 
| **Customer data linking** | Not enough data | 9.2 (99 reviews) ✓ Verified | 

#### AI Authentication Risk Management - Customer Identity and Access Management (CIAM)

| Feature | CyberArk Privileged Access Manager | Okta | 
|---|---|---|
| **Adaptive MFA** | Not enough data | Not enough data | 
| **Anomaly Detection** | Not enough data | Not enough data | 
| **Fraudulent Login Detection** | Not enough data | Not enough data | 
| **Adaptive Authentication Policies** | Not enough data | Not enough data | 
| **Risk-Based Authentication** | Not enough data | Not enough data | 

#### AI Biometric &amp; Behavioral Analysis - Customer Identity and Access Management (CIAM)

| Feature | CyberArk Privileged Access Manager | Okta | 
|---|---|---|
| **Behavioral Biometric Analysis** | Not enough data | Feature Not Available | 
| **Liveness Detection** | Not enough data | Not enough data | 

#### AI Context-Aware Security Controls - Customer Identity and Access Management (CIAM)

| Feature | CyberArk Privileged Access Manager | Okta | 
|---|---|---|
| **Account Recovery Assistants** | Not enough data | Feature Not Available | 
| **Constraint Enforcement** | Not enough data | Feature Not Available | 

### Identity and Access Management (IAM)

| Product | Score | Reviews |
|---|---|---|
| **CyberArk Privileged Access Manager** | N/A | N/A |
| **Okta** | 9.2/10 | 329 |

#### Functionality

| Feature | CyberArk Privileged Access Manager | Okta | 
|---|---|---|
| **User provisioning** | Not enough data | 9.4 (186 reviews) | 
| **Password manager** | Not enough data | 9.2 (191 reviews) | 
| **Single Sign-on** | Not enough data | 9.5 (276 reviews) | 
| **Enforces policies** | Not enough data | 9.4 (186 reviews) | 
| **Authentication** | Not enough data | 9.4 (260 reviews) | 
| **Multi-factor authentication** | Not enough data | 9.2 (231 reviews) | 

####  Type

| Feature | CyberArk Privileged Access Manager | Okta | 
|---|---|---|
| **On-premises solution** | Not enough data | 9.1 (142 reviews) | 
| **Cloud-solution** | Not enough data | 9.3 (174 reviews) | 

####  Reporting

| Feature | CyberArk Privileged Access Manager | Okta | 
|---|---|---|
| **Tracking** | Not enough data | 9.1 (158 reviews) | 
| **Reporting** | Not enough data | 9.2 (155 reviews) | 
| **Access &amp; Permission Change Reporting** | Not enough data | 9.0 (44 reviews) | 
| **Compliance &amp; Audit Trail Export** | Not enough data | 9.2 (45 reviews) | 

#### Authentication &amp; Authorization - Identity and Access Management (IAM)

| Feature | CyberArk Privileged Access Manager | Okta | 
|---|---|---|
| **Adaptive &amp; Contextual Access Control** | Not enough data | 9.1 (49 reviews) | 

#### Administration &amp; Governance - Identity and Access Management (IAM)

| Feature | CyberArk Privileged Access Manager | Okta | 
|---|---|---|
| **Identity Lifecycle Management** | Not enough data | 9.2 (57 reviews) | 
| **Self‑Service Account Management** | Not enough data | 9.1 (45 reviews) | 

#### Generative AI - Identity and Access Management (IAM)

| Feature | CyberArk Privileged Access Manager | Okta | 
|---|---|---|
| **AI‑Driven Access Anomaly Detection** | Not enough data | 8.7 (45 reviews) | 
| **Automated Policy Tuning** | Not enough data | 8.9 (44 reviews) | 
| **Predictive Role Recommendations** | Not enough data | Feature Not Available | 

### Identity Threat Detection and Response (ITDR)

| Product | Score | Reviews |
|---|---|---|
| **CyberArk Privileged Access Manager** | N/A | N/A |
| **Okta** | N/A | N/A |

#### Monitoring

| Feature | CyberArk Privileged Access Manager | Okta | 
|---|---|---|
| **Investigate** | Not enough data | Not enough data | 
| **Monitoring** | Not enough data | Not enough data | 
| **Misconfigurations** | Not enough data | Not enough data | 
| **Integrate** | Not enough data | Not enough data | 
| **Visability** | Not enough data | Not enough data | 

#### Remediation

| Feature | CyberArk Privileged Access Manager | Okta | 
|---|---|---|
| **Remediation** | Not enough data | Not enough data | 
| **Audit** | Not enough data | Not enough data | 

### AWS Marketplace

| Product | Score | Reviews |
|---|---|---|
| **CyberArk Privileged Access Manager** | N/A | N/A |
| **Okta** | N/A | N/A |

#### Agentic AI - AWS Marketplace

| Feature | CyberArk Privileged Access Manager | Okta | 
|---|---|---|
| **Autonomous Task Execution** | Not enough data | Feature Not Available | 
| **Multi-step Planning** | Not enough data | Feature Not Available | 
| **Cross-system Integration** | Not enough data | Not enough data | 

### Non-Human Identity Management (NHIM) Solutions

| Product | Score | Reviews |
|---|---|---|
| **CyberArk Privileged Access Manager** | N/A | N/A |
| **Okta** | N/A | N/A |

#### Lifecycle &amp; Provisioning - Non-Human Identity Management (NHIM) Solutions

| Feature | CyberArk Privileged Access Manager | Okta | 
|---|---|---|
| **Credential Rotation &amp; Revocation** | Not enough data | Not enough data | 
| **Automated Registration &amp; Provisioning** | Not enough data | Not enough data | 
| **De-Provisioning &amp; Retirement** | Not enough data | Not enough data | 

#### Access, Authentication &amp; Authorization - Non-Human Identity Management (NHIM) Solutions

| Feature | CyberArk Privileged Access Manager | Okta | 
|---|---|---|
| **Fine-Grained Access Control** | Not enough data | Not enough data | 
| **Machine-Native Authentication Methods** | Not enough data | Not enough data | 
| **Contextual / Just-In-Time Access** | Not enough data | Not enough data | 

#### Visibility, Governance &amp; Compliance - Non-Human Identity Management (NHIM) Solutions

| Feature | CyberArk Privileged Access Manager | Okta | 
|---|---|---|
| **Policy Enforcement &amp; Governance** | Not enough data | Not enough data | 
| **Audit Logging &amp; Activity Monitoring** | Not enough data | Not enough data | 
| **Integration with IAM/Cloud/DevOps Ecosystem** | Not enough data | Not enough data | 
| **Discovery &amp; Inventory of Non-Human Ids** | Not enough data | Not enough data | 

---
## Categories
**Shared Categories (1):** [AWS Marketplace Software](https://www.g2.com/categories/aws-marketplace)

**Unique to CyberArk Privileged Access Manager (1):** [Privileged Access Management (PAM) Software](https://www.g2.com/categories/privileged-access-management-pam)

**Unique to Okta (9):** [Non-Human Identity Management (NHIM) Solutions](https://www.g2.com/categories/non-human-identity-management-nhim-solutions), [Identity and Access Management (IAM) Software](https://www.g2.com/categories/identity-and-access-management-iam), [Identity Threat Detection and Response (ITDR)  Software](https://www.g2.com/categories/identity-threat-detection-and-response-itdr), [Customer Identity and Access Management (CIAM) Software](https://www.g2.com/categories/customer-identity-and-access-management-ciam), [User Provisioning and Governance Tools](https://www.g2.com/categories/user-provisioning-and-governance-tools), [Zero Trust Networking Software](https://www.g2.com/categories/zero-trust-networking), [Single Sign-On (SSO) Solutions](https://www.g2.com/categories/single-sign-on-sso), [Cloud Directory Services](https://www.g2.com/categories/cloud-directory-services), [Other Development Software](https://www.g2.com/categories/other-development)


---
## Reviewer Demographics

### By Company Size

| Segment | CyberArk Privileged Access Manager | Okta | 
|---|---|---|
| **Small-Business** | 9.2% | 7.3% | 
| **Mid-Market** | 21.5% | 52.8% | 
| **Enterprise** | 69.2% | 39.9% | 

### By Industry

#### CyberArk Privileged Access Manager

- **Information Technology and Services:** 15.6%
- **Banking:** 12.5%
- **Insurance:** 6.3%
- **Financial Services:** 4.7%
- **Retail:** 4.7%
- **Computer &amp; Network Security:** 4.7%
- **Information Services:** 3.1%
- **Government Administration:** 3.1%
- **Computer Software:** 3.1%
- **Semiconductors:** 3.1%
- **Other:** 39.1%

#### Okta

- **Computer Software:** 18.5%
- **Information Technology and Services:** 15.4%
- **Financial Services:** 6.5%
- **Internet:** 4.5%
- **Marketing and Advertising:** 4.2%
- **Computer &amp; Network Security:** 3.1%
- **Consumer Services:** 3.0%
- **Hospital &amp; Health Care:** 2.6%
- **Retail:** 2.1%
- **Telecommunications:** 1.8%
- **Other:** 38.4%

---
## Alternatives

### Alternatives to CyberArk Privileged Access Manager

- [Microsoft Entra ID](https://www.g2.com/products/microsoft-entra-id/reviews) — 4.5/5 stars (908 reviews)
- [BeyondTrust Privileged Remote Access](https://www.g2.com/products/beyondtrust-privileged-remote-access/reviews) — 4.5/5 stars (59 reviews)
- [Delinea Secret Server](https://www.g2.com/products/delinea-secret-server/reviews) — 4.4/5 stars (43 reviews)
- [Google Cloud Identity &amp; Access Management (IAM)](https://www.g2.com/products/google-cloud-identity-access-management-iam/reviews) — 4.4/5 stars (60 reviews)
- [ARCON | Privileged Access Management (PAM)](https://www.g2.com/products/arcon-privileged-access-management-pam/reviews) — 4.4/5 stars (27 reviews)
- [Delinea Cloud Suite](https://www.g2.com/products/delinea-cloud-suite/reviews) — 4.3/5 stars (20 reviews)
- [AWS Secrets Manager](https://www.g2.com/products/aws-secrets-manager/reviews) — 4.5/5 stars (18 reviews)
- [Teleport](https://www.g2.com/products/teleport/reviews) — 4.4/5 stars (109 reviews)
- [JumpCloud](https://www.g2.com/products/jumpcloud/reviews) — 4.5/5 stars (3968 reviews)
- [Silverfort](https://www.g2.com/products/silverfort/reviews) — 4.8/5 stars (18 reviews)

### Alternatives to Okta

- [CyberArk Workforce Identity](https://www.g2.com/products/cyberark-workforce-identity/reviews) — 4.5/5 stars (130 reviews)
- [JumpCloud](https://www.g2.com/products/jumpcloud/reviews) — 4.5/5 stars (3968 reviews)
- [OneLogin](https://www.g2.com/products/onelogin/reviews) — 4.4/5 stars (290 reviews)
- [Microsoft Entra ID](https://www.g2.com/products/microsoft-entra-id/reviews) — 4.5/5 stars (908 reviews)
- [1Password](https://www.g2.com/products/1password/reviews) — 4.6/5 stars (1791 reviews)
- [Cisco Duo](https://www.g2.com/products/cisco-duo/reviews) — 4.5/5 stars (514 reviews)
- [IBM Verify CIAM](https://www.g2.com/products/ibm-verify-ciam/reviews) — 4.3/5 stars (182 reviews)
- [SailPoint](https://www.g2.com/products/sailpoint/reviews) — 4.5/5 stars (174 reviews)
- [WSO2 Identity Platform](https://www.g2.com/products/wso2-identity-platform/reviews) — 4.5/5 stars (107 reviews)
- [BetterCloud](https://www.g2.com/products/bettercloud/reviews) — 4.4/5 stars (482 reviews)

---
## Top Discussions

### CyberArk Privileged Access Manager

No discussions available for this product.

### Okta

- Title: [Is there a way to access your applications on a mobile device?](https://www.g2.com/discussions/is-there-a-way-to-access-your-applications-on-a-mobile-device) — 5 comments, 2 upvotes
  > **Top comment:** "Not that I am aware of. From my knowledge the mobile app is used to verify you are the person signing in online from your desktop computer. It’s send you a..."
- Title: [How good is Okta?](https://www.g2.com/discussions/how-good-is-okta) — 2 comments
  > **Top comment:** "Okta is a very powerful cloud-based directory system that is infinitely extensible via the Okta Expression Language, Custom Attributes, and Okta Workflows. "
- Title: [Does Okta have a plugin for integration with Spring Boot and Spring Security?](https://www.g2.com/discussions/does-okta-have-a-plugin-for-integration-with-spring-boot-and-spring-security) — 2 comments, 1 upvote
  > **Top comment:** "Spring security plugin is available to do user management, take a look at it https://bintray.com/grails/plugins/spring-security-core/view"
- Title: [How many applications?](https://www.g2.com/discussions/304-how-many-applications) — 2 comments, 1 upvote
  > **Top comment:** "Doesn’t it always, though? ;-)

Key factors to consider aside from number of applications you’d want to streamline access to via SSO for would be:

-How..."
- Title: [What database does Just Eat use?](https://www.g2.com/discussions/what-database-does-just-eat-use) — 1 comment
  > **Top comment:** "Google cloud"

---
**Source:** [G2.com](https://www.g2.com) | [Comparison Page](https://www.g2.com/compare/cyberark-privileged-access-manager-vs-okta)

