Compare Okta and Secret Double Octopus

Save your comparisonKeep these tools in one place and come back anytime.
Save to board
At a Glance
Okta
Okta
Star Rating
(1,220)4.5 out of 5
Market Segments
Mid-Market (52.8% of reviews)
Information
Pros & Cons
Entry-Level Pricing
$6.00 1 User per month
Browse all 2 pricing plans
Secret Double Octopus
Secret Double Octopus
Star Rating
(28)4.7 out of 5
Market Segments
Small-Business (57.1% of reviews)
Information
Pros & Cons
Not enough data
Entry-Level Pricing
No pricing available
Learn more about Secret Double Octopus
AI Generated Summary
AI-generated. Powered by real user reviews.
  • Users report that Okta excels in its "Ease of Setup" with a score of 8.8, making it a preferred choice for organizations looking for a straightforward implementation process. In contrast, Secret Double Octopus has a lower score of 7.9, indicating potential challenges during setup.
  • Reviewers mention that Okta's "Quality of Support" is rated at 8.8, which is commendable, but Secret Double Octopus outshines with a score of 9.6, suggesting that users may find more responsive and effective support when issues arise.
  • G2 users highlight Okta's robust "Multi-Factor Authentication" capabilities, scoring 9.3, which includes various authentication methods. However, Secret Double Octopus also scores well at 9.4, with users appreciating its "Biometric Factor" authentication, which is rated a perfect 10.0, indicating a strong preference for advanced security measures.
  • Users on G2 report that Okta's "Self Service Password Reset" feature is highly effective, scoring 9.4, which enhances user autonomy. In comparison, Secret Double Octopus also offers a solid password management solution, but specific user feedback suggests that Okta's implementation is more user-friendly.
  • Reviewers mention that Okta's "Role Management" feature is rated at 9.3, providing effective access control. Secret Double Octopus, while also strong in this area, has a slightly lower score of 9.2, indicating that Okta may offer a more comprehensive solution for managing user roles and permissions.
  • Users say that Okta's "Single Sign-on" feature is rated at 9.6, making it a standout for organizations looking to streamline user access across multiple applications. Secret Double Octopus, while competitive, scores slightly lower at 9.5, suggesting that Okta may provide a more seamless experience in this critical area.
Pricing
Entry-Level Pricing
Okta
Starter
$6.00
1 User per month
Browse all 2 pricing plans
Secret Double Octopus
No pricing available
Free Trial
Okta
No trial information available
Secret Double Octopus
No trial information available
Ratings
Meets Requirements
9.3
902
9.7
18
Ease of Use
9.3
927
9.6
19
Ease of Setup
8.9
428
7.9
12
Ease of Admin
9.0
200
8.2
12
Quality of Support
8.9
675
9.6
19
Has the product been a good partner in doing business?
8.9
194
9.3
12
Product Direction (% positive)
8.8
874
7.9
17
Features by Category
9.1
509
Not enough data
Authentication Options
9.3
469
Not enough data
9.3
60
Not enough data
9.3
448
Not enough data
9.3
52
Not enough data
9.2
298
Not enough data
9.2
287
Not enough data
Access Control Types
9.2
321
Not enough data
9.2
345
Not enough data
9.2
355
Not enough data
9.0
258
Not enough data
9.0
271
Not enough data
Administration
9.1
284
Not enough data
9.2
322
Not enough data
9.1
278
Not enough data
9.1
346
Not enough data
9.2
320
Not enough data
Platform
9.2
323
Not enough data
9.2
287
Not enough data
9.2
321
Not enough data
9.0
262
Not enough data
8.9
255
Not enough data
8.9
252
Not enough data
9.0
268
Not enough data
User Provisioning and Governance ToolsHide 15 FeaturesShow 15 Features
9.1
131
Not enough data
User on/off Boarding
9.1
96
|
Verified
Not enough data
9.1
94
|
Verified
Not enough data
9.3
96
|
Verified
Not enough data
9.1
98
|
Verified
Not enough data
9.4
93
|
Verified
Not enough data
8.9
86
|
Verified
Not enough data
User Maintenance
9.3
106
|
Verified
Not enough data
8.9
88
|
Verified
Not enough data
9.0
80
|
Verified
Not enough data
Governance
9.0
83
|
Verified
Not enough data
9.2
83
|
Verified
Not enough data
Administration
8.9
87
|
Verified
Not enough data
8.9
99
|
Verified
Not enough data
9.0
92
|
Verified
Not enough data
9.1
87
|
Verified
Not enough data
Multi-Factor Authentication (MFA)Hide 13 FeaturesShow 13 Features
Not enough data
8.9
11
Authentication type
Not enough data
Not enough data
Not enough data
7.7
5
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
8.3
6
Not enough data
10.0
5
Not enough data
9.8
8
Not enough data
Not enough data
Functionality
Not enough data
9.3
5
Not enough data
Not enough data
Implementation
Not enough data
8.1
8
Not enough data
Not enough data
Not enough data
Not enough data
8.9
42
Not enough data
Network Management
Feature Not Available
Not enough data
Feature Not Available
Not enough data
9.0
35
Not enough data
9.1
34
Not enough data
Security
9.3
36
Not enough data
9.3
38
Not enough data
9.1
33
Not enough data
9.2
38
Not enough data
Identity Management
9.2
33
Not enough data
9.2
32
Not enough data
9.2
37
Not enough data
Generative AI
6.6
15
Not enough data
Feature Not Available
Not enough data
Cloud Directory ServicesHide 11 FeaturesShow 11 Features
9.5
87
Not enough data
Access Control
9.3
60
Not enough data
9.4
63
Not enough data
9.4
65
Not enough data
9.3
55
Not enough data
Administration
9.5
60
Not enough data
9.5
59
Not enough data
9.4
54
Not enough data
9.4
69
Not enough data
Functionality
9.5
76
Not enough data
9.6
77
Not enough data
9.4
66
Not enough data
Biometric AuthenticationHide 7 FeaturesShow 7 Features
Not enough data
Not enough data
Integration
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Administration
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Customer Identity and Access Management (CIAM)Hide 15 FeaturesShow 15 Features
9.3
116
Not enough data
Functionality
9.4
100
|
Verified
Not enough data
9.5
108
|
Verified
Not enough data
9.3
104
|
Verified
Not enough data
9.5
58
Not enough data
9.1
56
Not enough data
9.2
99
|
Verified
Not enough data
AI Authentication Risk Management - Customer Identity and Access Management (CIAM)
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
AI Biometric & Behavioral Analysis - Customer Identity and Access Management (CIAM)
Feature Not Available
Not enough data
Not enough data
Not enough data
AI Context-Aware Security Controls - Customer Identity and Access Management (CIAM)
Feature Not Available
Not enough data
Feature Not Available
Not enough data
Passwordless AuthenticationHide 4 FeaturesShow 4 Features
Not enough data
9.4
11
Functionality
Not enough data
9.4
8
Not enough data
Not enough data
Not enough data
9.4
8
Not enough data
9.3
7
Identity and Access Management (IAM)Hide 18 FeaturesShow 18 Features
9.2
324
Not enough data
Functionality
9.4
186
Not enough data
9.2
190
Not enough data
9.5
271
Not enough data
9.4
185
Not enough data
9.5
258
Not enough data
9.2
231
Not enough data
Type
9.1
142
Not enough data
9.3
174
Not enough data
Reporting
9.1
158
Not enough data
9.2
155
Not enough data
9.0
44
Not enough data
9.2
45
Not enough data
Authentication & Authorization - Identity and Access Management (IAM)
9.1
49
Not enough data
Administration & Governance - Identity and Access Management (IAM)
9.2
57
Not enough data
9.1
44
Not enough data
Generative AI - Identity and Access Management (IAM)
8.7
45
Not enough data
8.9
44
Not enough data
Feature Not Available
Not enough data
Identity Threat Detection and Response (ITDR)Hide 7 FeaturesShow 7 Features
Not enough data
Not enough data
Monitoring
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Remediation
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Agentic AI - AWS Marketplace
Feature Not Available
Not enough data
Feature Not Available
Not enough data
Not enough data
Not enough data
Non-Human Identity Management (NHIM) SolutionsHide 10 FeaturesShow 10 Features
Not enough data
Not enough data
Lifecycle & Provisioning - Non-Human Identity Management (NHIM) Solutions
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Access, Authentication & Authorization - Non-Human Identity Management (NHIM) Solutions
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Visibility, Governance & Compliance - Non-Human Identity Management (NHIM) Solutions
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Reviews
Reviewers' Company Size
Okta
Okta
Small-Business(50 or fewer emp.)
7.4%
Mid-Market(51-1000 emp.)
52.8%
Enterprise(> 1000 emp.)
39.8%
Secret Double Octopus
Secret Double Octopus
Small-Business(50 or fewer emp.)
57.1%
Mid-Market(51-1000 emp.)
23.8%
Enterprise(> 1000 emp.)
19.0%
Reviewers' Industry
Okta
Okta
Computer Software
18.5%
Information Technology and Services
15.5%
Financial Services
6.3%
Internet
4.5%
Marketing and Advertising
4.1%
Other
51.1%
Secret Double Octopus
Secret Double Octopus
Computer Software
14.3%
Computer & Network Security
14.3%
Retail
9.5%
Information Technology and Services
9.5%
Financial Services
9.5%
Other
42.9%
Alternatives
Okta
Okta Alternatives
CyberArk Workforce Identity
CyberArk Workforce Identity
Add CyberArk Workforce Identity
JumpCloud
JumpCloud
Add JumpCloud
OneLogin
OneLogin
Add OneLogin
Microsoft Entra ID
Microsoft Entra ID
Add Microsoft Entra ID
Secret Double Octopus
Secret Double Octopus Alternatives
Cisco Duo
Cisco Duo
Add Cisco Duo
LastPass
LastPass
Add LastPass
Microsoft Entra ID
Microsoft Entra ID
Add Microsoft Entra ID
Google Authenticator
Google Authenticator
Add Google Authenticator
Discussions
Okta
Okta Discussions
Is there a way to access your applications on a mobile device?
5 Comments
Dawson S.
DS
Not that I am aware of. From my knowledge the mobile app is used to verify you are the person signing in online from your desktop computer. It’s send you a...Read more
How good is Okta?
2 Comments
Dan L.
DL
Okta is a very powerful cloud-based directory system that is infinitely extensible via the Okta Expression Language, Custom Attributes, and Okta Workflows. Read more
Does Okta have a plugin for integration with Spring Boot and Spring Security?
2 Comments
Uday Pratap S.
US
Spring security plugin is available to do user management, take a look at it https://bintray.com/grails/plugins/spring-security-core/viewRead more
Secret Double Octopus
Secret Double Octopus Discussions
Monty the Mongoose crying
Secret Double Octopus has no discussions with answers