2026 Best Software Awards are here!See the list

Compare CyberArk Workforce Identity and Okta

Save
    Log in to your account
    to save comparisons,
    products and more.
At a Glance
CyberArk Workforce Identity
CyberArk Workforce Identity
Star Rating
(127)4.5 out of 5
Market Segments
Mid-Market (47.2% of reviews)
Information
Pros & Cons
Entry-Level Pricing
Starting at $3.00 1 per user per month
Browse all 5 pricing plans
Okta
Okta
Star Rating
(1,164)4.5 out of 5
Market Segments
Mid-Market (52.6% of reviews)
Information
Pros & Cons
Entry-Level Pricing
$6.00 1 User per month
Browse all 2 pricing plans
AI Generated Summary
AI-generated. Powered by real user reviews.
  • G2 reviewers report that Okta excels in providing a reliable and secure identity management experience, with users highlighting its strong foundation for features like Single Sign-On (SSO) and Multi-Factor Authentication (MFA). One user mentioned, "It makes it straightforward to roll out SSO, MFA, and user lifecycle management at scale."
  • Users say that CyberArk Workforce Identity offers a user-friendly interface, particularly for Access Reviews. Reviewers appreciate its modern UI and the efficiency it brings to the user access review process, stating, "It's considerably sped up our user access review process and has a nice, modern UI."
  • According to verified reviews, Okta's implementation process is praised for being intuitive and quick, with users noting that the onboarding experience is seamless. One user remarked, "I love using Okta as it provides an intuitive and clean UI, making the experience seamless."
  • Reviewers mention that while CyberArk Workforce Identity has a strong focus on access reviews, it may not offer the same breadth of features as Okta. Users noted that it is "not pretending to be other things but just Access reviews," indicating a more specialized approach.
  • G2 reviewers highlight that Okta's overall user satisfaction is significantly higher, reflected in its G2 Score of 76.08 compared to CyberArk's 50.82. This suggests that users find Okta to be a more comprehensive solution for identity and access management.
  • Users report that CyberArk's customer support is commendable, with one user stating, "Customer support is excellent," which indicates a strong support system for users navigating the platform. However, Okta also receives high marks for support, making both options viable in this regard.
Pricing
Entry-Level Pricing
CyberArk Workforce Identity
CyberArk Adaptive MFA
Starting at $3.00
1 per user per month
Browse all 5 pricing plans
Okta
Starter
$6.00
1 User per month
Browse all 2 pricing plans
Free Trial
CyberArk Workforce Identity
Free Trial is available
Okta
No trial information available
Ratings
Meets Requirements
9.0
116
9.3
857
Ease of Use
8.8
119
9.3
879
Ease of Setup
8.4
99
8.9
390
Ease of Admin
8.6
100
9.1
193
Quality of Support
9.0
114
8.9
643
Has the product been a good partner in doing business?
9.0
98
8.9
188
Product Direction (% positive)
9.2
119
8.7
833
Features by Category
9.1
38
9.1
497
Authentication Options
9.1
36
9.3
461
9.2
34
9.2
55
9.1
29
9.2
439
9.1
31
9.3
49
9.3
30
9.2
296
9.2
21
9.2
285
Access Control Types
8.9
23
9.2
321
9.2
25
9.2
345
9.1
24
9.2
355
9.2
14
9.0
257
8.9
19
9.0
271
Administration
9.5
30
9.1
284
9.4
29
9.2
321
9.3
34
9.1
276
9.0
34
9.1
345
9.1
27
9.2
320
Platform
9.2
31
9.2
323
9.4
21
9.2
287
9.3
30
9.2
321
8.8
20
9.0
261
8.3
28
8.9
255
8.6
28
8.9
251
8.8
19
9.0
268
User Provisioning and Governance ToolsHide 15 FeaturesShow 15 Features
8.2
42
9.1
128
User on/off Boarding
7.9
21
|
Verified
9.1
96
|
Verified
8.3
34
|
Verified
9.1
94
|
Verified
8.8
38
|
Verified
9.3
96
|
Verified
8.4
34
|
Verified
9.1
97
|
Verified
8.7
34
|
Verified
9.4
92
|
Verified
7.4
23
|
Verified
8.9
86
|
Verified
User Maintenance
9.1
29
|
Verified
9.3
106
|
Verified
8.2
29
|
Verified
8.9
88
|
Verified
8.4
27
|
Verified
9.0
80
|
Verified
Governance
7.9
26
|
Verified
9.0
83
|
Verified
8.5
26
|
Verified
9.2
83
|
Verified
Administration
7.9
37
|
Verified
8.9
87
|
Verified
6.9
24
|
Verified
8.9
99
|
Verified
8.2
38
|
Verified
9.0
92
|
Verified
7.7
25
|
Verified
9.1
86
|
Verified
Multi-Factor Authentication (MFA)Hide 13 FeaturesShow 13 Features
Not enough data
Not enough data
Authentication type
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Functionality
Feature Not Available
Not enough data
Feature Not Available
Not enough data
Implementation
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
8.9
41
Network Management
Feature Not Available
Feature Not Available
Feature Not Available
Feature Not Available
Feature Not Available
9.0
34
Feature Not Available
9.1
33
Security
Not enough data
9.3
35
Not enough data
9.2
37
Not enough data
9.1
32
Not enough data
9.2
37
Identity Management
Not enough data
9.2
32
Not enough data
9.1
31
Not enough data
9.2
36
Generative AI
Not enough data
6.3
14
Not enough data
Feature Not Available
Cloud Directory ServicesHide 11 FeaturesShow 11 Features
Not enough data
9.5
87
Access Control
Not enough data
9.3
60
Not enough data
9.4
63
Not enough data
9.4
65
Not enough data
9.3
55
Administration
Not enough data
9.5
60
Not enough data
9.5
59
Not enough data
9.4
54
Not enough data
9.4
69
Functionality
Not enough data
9.5
76
Not enough data
9.6
77
Not enough data
9.4
66
Biometric AuthenticationHide 7 FeaturesShow 7 Features
Not enough data
Not enough data
Integration
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Administration
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Risk-Based Authentication (RBA)Hide 4 FeaturesShow 4 Features
Not enough data
Not enough data
Administration
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Customer Identity and Access Management (CIAM)Hide 15 FeaturesShow 15 Features
Not enough data
9.3
116
Functionality
Not enough data
9.4
100
|
Verified
Not enough data
9.5
108
|
Verified
Not enough data
9.3
104
|
Verified
Not enough data
9.5
58
Not enough data
9.1
56
Not enough data
9.2
99
|
Verified
AI Authentication Risk Management - Customer Identity and Access Management (CIAM)
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
AI Biometric & Behavioral Analysis - Customer Identity and Access Management (CIAM)
Not enough data
Feature Not Available
Not enough data
Not enough data
AI Context-Aware Security Controls - Customer Identity and Access Management (CIAM)
Not enough data
Feature Not Available
Not enough data
Feature Not Available
Passwordless AuthenticationHide 4 FeaturesShow 4 Features
Not enough data
Not enough data
Functionality
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Identity and Access Management (IAM)Hide 18 FeaturesShow 18 Features
8.3
20
9.2
275
Functionality
8.7
10
9.3
179
9.4
8
9.2
183
9.0
12
9.5
239
9.2
10
9.4
179
8.8
11
9.5
231
8.8
10
9.3
213
Type
Feature Not Available
9.1
142
8.8
18
9.3
173
Reporting
8.9
17
9.1
156
8.4
18
9.2
155
Not enough data
9.0
44
Not enough data
9.2
44
Authentication & Authorization - Identity and Access Management (IAM)
Not enough data
9.0
47
Administration & Governance - Identity and Access Management (IAM)
Not enough data
9.3
49
Not enough data
9.1
44
Generative AI - Identity and Access Management (IAM)
Not enough data
8.7
44
Not enough data
8.9
44
Not enough data
Feature Not Available
Identity Threat Detection and Response (ITDR)Hide 7 FeaturesShow 7 Features
Not enough data
Not enough data
Monitoring
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Remediation
Not enough data
Not enough data
Not enough data
Not enough data
User and Entity Behavior Analytics (UEBA)Hide 11 FeaturesShow 11 Features
Not enough data
Not enough data
Agentic AI - User and Entity Behavior Analytics (UEBA)
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Analysis
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Detection
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Agentic AI - AWS Marketplace
Not enough data
Feature Not Available
Not enough data
Feature Not Available
Not enough data
Not enough data
Non-Human Identity Management (NHIM) SolutionsHide 10 FeaturesShow 10 Features
Not enough data
Not enough data
Lifecycle & Provisioning - Non-Human Identity Management (NHIM) Solutions
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Access, Authentication & Authorization - Non-Human Identity Management (NHIM) Solutions
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Visibility, Governance & Compliance - Non-Human Identity Management (NHIM) Solutions
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Reviews
Reviewers' Company Size
CyberArk Workforce Identity
CyberArk Workforce Identity
Small-Business(50 or fewer emp.)
6.4%
Mid-Market(51-1000 emp.)
47.2%
Enterprise(> 1000 emp.)
46.4%
Okta
Okta
Small-Business(50 or fewer emp.)
7.6%
Mid-Market(51-1000 emp.)
52.6%
Enterprise(> 1000 emp.)
39.9%
Reviewers' Industry
CyberArk Workforce Identity
CyberArk Workforce Identity
Information Technology and Services
20.8%
Financial Services
8.8%
Insurance
4.8%
Hospital & Health Care
4.8%
Computer & Network Security
4.8%
Other
56.0%
Okta
Okta
Computer Software
18.3%
Information Technology and Services
15.2%
Financial Services
6.1%
Internet
4.6%
Marketing and Advertising
4.1%
Other
51.6%
Alternatives
CyberArk Workforce Identity
CyberArk Workforce Identity Alternatives
Cisco Duo
Cisco Duo
Add Cisco Duo
OneLogin
OneLogin
Add OneLogin
Microsoft Entra ID
Microsoft Entra ID
Add Microsoft Entra ID
JumpCloud
JumpCloud
Add JumpCloud
Okta
Okta Alternatives
OneLogin
OneLogin
Add OneLogin
JumpCloud
JumpCloud
Add JumpCloud
Microsoft Entra ID
Microsoft Entra ID
Add Microsoft Entra ID
1Password
1Password
Add 1Password
Discussions
CyberArk Workforce Identity
CyberArk Workforce Identity Discussions
Monty the Mongoose crying
CyberArk Workforce Identity has no discussions with answers
Okta
Okta Discussions
Is there a way to access your applications on a mobile device?
5 Comments
Erin C.
EC
There is an Okta Mobile app from which you can access your work applications, but it requires a little extra setup and not all organization use it....Read more
How many applications?
2 Comments
Graham P.
GP
Doesn’t it always, though? ;-) Key factors to consider aside from number of applications you’d want to streamline access to via SSO for would be: -How...Read more
Does Okta have a plugin for integration with Spring Boot and Spring Security?
2 Comments
Uday Pratap S.
US
Spring security plugin is available to do user management, take a look at it https://bintray.com/grails/plugins/spring-security-core/viewRead more