Introducing G2.ai, the future of software buying.Try now

Compare CyberArk Workforce Identity and Okta

Save
    Log in to your account
    to save comparisons,
    products and more.
At a Glance
CyberArk Workforce Identity
CyberArk Workforce Identity
Star Rating
(127)4.5 out of 5
Market Segments
Mid-Market (47.2% of reviews)
Information
Pros & Cons
Entry-Level Pricing
Starting at $3.00 1 per user per month
Browse all 5 pricing plans
Okta
Okta
Star Rating
(1,061)4.5 out of 5
Market Segments
Mid-Market (53.4% of reviews)
Information
Pros & Cons
Entry-Level Pricing
$6.00 1 User per month
Browse all 2 pricing plans
AI Generated Summary
AI-generated. Powered by real user reviews.
  • G2 reviewers report that Okta excels in overall user satisfaction, reflected in its higher G2 Score compared to CyberArk Workforce Identity. Users appreciate its ease of use, with one reviewer noting how quickly it connects to other platforms, making daily tasks more efficient.
  • Users say that Okta's implementation process is notably smooth, with many highlighting its intuitive onboarding features. In contrast, while CyberArk Workforce Identity also received praise for its easy implementation, it lacks the same volume of recent reviews, which may indicate less current user engagement.
  • Reviewers mention that Okta provides a superior user experience with features like fingerprint login, which simplifies authentication. CyberArk Workforce Identity, while recognized for its modern UI and effective access review capabilities, does not match the same level of user-friendly features that Okta offers.
  • According to verified reviews, Okta's support quality is highly rated, although CyberArk Workforce Identity has received commendations for its customer service as well. Users appreciate the responsiveness of both platforms, but Okta's overall support experience is more frequently highlighted.
  • G2 reviewers highlight that Okta's extensive feature set, including robust multi-factor authentication and self-service password management, significantly enhances security and usability. CyberArk Workforce Identity, while strong in access reviews, does not offer the same breadth of features that users find beneficial in their day-to-day operations.
  • Users report that Okta's ability to manage user provisioning and access termination is particularly effective, with high ratings in these areas. CyberArk Workforce Identity, while competent, shows lower scores in similar functionalities, indicating that Okta may provide a more comprehensive solution for identity management needs.
Pricing
Entry-Level Pricing
CyberArk Workforce Identity
CyberArk Adaptive MFA
Starting at $3.00
1 per user per month
Browse all 5 pricing plans
Okta
Starter
$6.00
1 User per month
Browse all 2 pricing plans
Free Trial
CyberArk Workforce Identity
Free Trial is available
Okta
No trial information available
Ratings
Meets Requirements
9.0
116
9.3
795
Ease of Use
8.8
119
9.3
817
Ease of Setup
8.4
99
8.9
330
Ease of Admin
8.6
100
9.0
186
Quality of Support
9.0
114
8.9
595
Has the product been a good partner in doing business?
9.0
98
8.9
181
Product Direction (% positive)
9.2
119
8.7
771
Features by Category
9.1
38
9.1
453
Authentication Options
9.1
36
9.3
432
9.2
34
Feature Not Available
9.1
29
9.3
413
9.1
31
Feature Not Available
9.3
30
9.2
293
9.2
21
9.2
283
Access Control Types
8.9
23
9.2
317
9.2
25
9.2
344
9.1
24
9.2
352
9.2
14
9.0
256
8.9
19
9.0
270
Administration
9.5
30
9.1
280
9.4
29
9.2
320
9.3
34
9.1
273
9.0
34
9.1
335
9.1
27
9.2
319
Platform
9.2
31
9.2
323
9.4
21
9.2
287
9.3
30
9.2
321
8.8
20
9.0
261
8.3
28
8.9
254
8.6
28
8.9
250
8.8
19
9.0
268
User Provisioning and Governance ToolsHide 15 FeaturesShow 15 Features
8.2
42
9.1
124
User on/off Boarding
7.9
21
|
Verified
9.1
95
|
Verified
8.3
34
|
Verified
9.1
93
|
Verified
8.8
38
|
Verified
9.3
95
|
Verified
8.4
34
|
Verified
9.2
93
|
Verified
8.7
34
|
Verified
9.4
91
|
Verified
7.4
23
|
Verified
8.9
85
|
Verified
User Maintenance
9.1
29
|
Verified
9.3
105
|
Verified
8.2
29
|
Verified
8.9
87
|
Verified
8.4
27
|
Verified
9.0
79
|
Verified
Governance
7.9
26
|
Verified
8.9
82
|
Verified
8.5
26
|
Verified
9.1
82
|
Verified
Administration
7.9
37
|
Verified
8.9
86
|
Verified
6.9
24
|
Verified
8.9
98
|
Verified
8.2
38
|
Verified
8.9
90
|
Verified
7.7
25
|
Verified
9.1
84
|
Verified
Multi-Factor Authentication (MFA)Hide 13 FeaturesShow 13 Features
Not enough data
Not enough data
Authentication type
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Functionality
Feature Not Available
Not enough data
Feature Not Available
Not enough data
Implementation
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
8.7
40
Network Management
Feature Not Available
9.1
32
Feature Not Available
8.8
32
Feature Not Available
9.0
34
Feature Not Available
9.1
33
Security
Not enough data
9.3
35
Not enough data
9.2
37
Not enough data
9.1
32
Not enough data
9.2
37
Identity Management
Not enough data
9.2
32
Not enough data
9.1
31
Not enough data
9.2
36
Generative AI
Not enough data
6.3
14
Not enough data
6.7
14
Cloud Directory ServicesHide 11 FeaturesShow 11 Features
Not enough data
9.4
82
Access Control
Not enough data
9.3
60
Not enough data
9.4
63
Not enough data
9.4
62
Not enough data
9.3
55
Administration
Not enough data
9.5
60
Not enough data
9.5
59
Not enough data
9.4
54
Not enough data
9.4
67
Functionality
Not enough data
9.5
73
Not enough data
9.6
74
Not enough data
9.4
66
Biometric AuthenticationHide 7 FeaturesShow 7 Features
Not enough data
Not enough data
Integration
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Administration
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Risk-Based Authentication (RBA)Hide 4 FeaturesShow 4 Features
Not enough data
Not enough data
Administration
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Customer Identity and Access Management (CIAM)Hide 15 FeaturesShow 15 Features
Not enough data
9.4
114
Functionality
Not enough data
9.4
100
|
Verified
Not enough data
9.5
107
|
Verified
Not enough data
9.3
104
|
Verified
Not enough data
Feature Not Available
Not enough data
Feature Not Available
Not enough data
9.2
99
|
Verified
AI Authentication Risk Management - Customer Identity and Access Management (CIAM)
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
AI Biometric & Behavioral Analysis - Customer Identity and Access Management (CIAM)
Not enough data
Not enough data
Not enough data
Not enough data
AI Context-Aware Security Controls - Customer Identity and Access Management (CIAM)
Not enough data
Not enough data
Not enough data
Not enough data
Passwordless AuthenticationHide 4 FeaturesShow 4 Features
Not enough data
Not enough data
Functionality
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Identity and Access Management (IAM)Hide 18 FeaturesShow 18 Features
8.3
20
9.2
213
Functionality
8.7
10
9.3
173
9.4
8
9.2
176
9.0
12
9.6
198
9.2
10
9.4
173
8.8
11
9.5
200
8.8
10
9.3
186
Type
Feature Not Available
9.0
142
8.8
18
9.3
169
Reporting
8.9
17
9.1
155
8.4
18
9.1
154
Not enough data
9.0
43
Not enough data
9.1
43
Authentication & Authorization - Identity and Access Management (IAM)
Not enough data
9.0
43
Administration & Governance - Identity and Access Management (IAM)
Not enough data
9.2
44
Not enough data
9.0
42
Generative AI - Identity and Access Management (IAM)
Not enough data
8.7
43
Not enough data
8.9
43
Not enough data
9.1
43
Identity Threat Detection and Response (ITDR)Hide 7 FeaturesShow 7 Features
Not enough data
Not enough data
Monitoring
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Remediation
Not enough data
Not enough data
Not enough data
Not enough data
User and Entity Behavior Analytics (UEBA)Hide 11 FeaturesShow 11 Features
Not enough data
Not enough data
Agentic AI - User and Entity Behavior Analytics (UEBA)
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Analysis
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Detection
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Agentic AI - AWS Marketplace
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Non-Human Identity Management (NHIM) SolutionsHide 10 FeaturesShow 10 Features
Not enough data
Not enough data
Lifecycle & Provisioning - Non-Human Identity Management (NHIM) Solutions
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Access, Authentication & Authorization - Non-Human Identity Management (NHIM) Solutions
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Visibility, Governance & Compliance - Non-Human Identity Management (NHIM) Solutions
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Reviews
Reviewers' Company Size
CyberArk Workforce Identity
CyberArk Workforce Identity
Small-Business(50 or fewer emp.)
6.4%
Mid-Market(51-1000 emp.)
47.2%
Enterprise(> 1000 emp.)
46.4%
Okta
Okta
Small-Business(50 or fewer emp.)
6.9%
Mid-Market(51-1000 emp.)
53.4%
Enterprise(> 1000 emp.)
39.7%
Reviewers' Industry
CyberArk Workforce Identity
CyberArk Workforce Identity
Information Technology and Services
20.8%
Financial Services
8.8%
Insurance
4.8%
Hospital & Health Care
4.8%
Computer & Network Security
4.8%
Other
56.0%
Okta
Okta
Computer Software
17.9%
Information Technology and Services
15.5%
Financial Services
6.2%
Internet
4.9%
Marketing and Advertising
4.0%
Other
51.6%
Alternatives
CyberArk Workforce Identity
CyberArk Workforce Identity Alternatives
Cisco Duo
Cisco Duo
Add Cisco Duo
OneLogin
OneLogin
Add OneLogin
Microsoft Entra ID
Microsoft Entra ID
Add Microsoft Entra ID
JumpCloud
JumpCloud
Add JumpCloud
Okta
Okta Alternatives
OneLogin
OneLogin
Add OneLogin
JumpCloud
JumpCloud
Add JumpCloud
Microsoft Entra ID
Microsoft Entra ID
Add Microsoft Entra ID
1Password
1Password
Add 1Password
Discussions
CyberArk Workforce Identity
CyberArk Workforce Identity Discussions
Monty the Mongoose crying
CyberArk Workforce Identity has no discussions with answers
Okta
Okta Discussions
Is there a way to access your applications on a mobile device?
5 Comments
Erin C.
EC
There is an Okta Mobile app from which you can access your work applications, but it requires a little extra setup and not all organization use it....Read more
How many applications?
2 Comments
Graham P.
GP
Doesn’t it always, though? ;-) Key factors to consider aside from number of applications you’d want to streamline access to via SSO for would be: -How...Read more
Does Okta have a plugin for integration with Spring Boot and Spring Security?
2 Comments
Uday Pratap S.
US
Spring security plugin is available to do user management, take a look at it https://bintray.com/grails/plugins/spring-security-core/viewRead more