Introducing G2.ai, the future of software buying.Try now

Compare Okta and Twingate

Save
    Log in to your account
    to save comparisons,
    products and more.
At a Glance
Okta
Okta
Star Rating
(1,051)4.5 out of 5
Market Segments
Mid-Market (53.2% of reviews)
Information
Pros & Cons
Entry-Level Pricing
$6.00 1 User per month
Browse all 2 pricing plans
Twingate
Twingate
Star Rating
(74)4.7 out of 5
Market Segments
Mid-Market (50.7% of reviews)
Information
Pros & Cons
Entry-Level Pricing
Starting at $10.00 1 user, per month
Free Trial is available
Browse all 3 pricing plans
AI Generated Summary
AI-generated. Powered by real user reviews.
  • G2 reviewers report that Okta excels in overall user satisfaction, reflected in its higher G2 Score of 78.69 compared to Twingate's 50.08. Users appreciate Okta's ease of use, with many highlighting features like fingerprint login that simplify the authentication process.
  • According to verified reviews, Okta has a significantly larger number of reviews (1013) compared to Twingate (71), indicating a more robust user base and providing greater confidence in the feedback. This extensive feedback helps potential buyers gauge the product's reliability and effectiveness.
  • Users say that Twingate shines in its administrative experience, with reviewers noting the simplicity of managing resources and policies, especially for teams handling numerous assets. This ease of management is particularly beneficial for organizations with complex infrastructures.
  • Reviewers mention that while Twingate offers a strong user experience, Okta's implementation process is often praised for its speed and intuitiveness. Users have noted how quickly Okta connects to other platforms, making it a preferred choice for those looking for a seamless onboarding experience.
  • According to recent user feedback, both products perform well in terms of support, but Twingate edges out slightly with higher ratings for quality of support. Users appreciate Twingate's responsiveness and the ability to manage team resources effectively, which enhances their overall experience.
  • G2 reviewers highlight that while both products are well-rated for their security features, Okta's advanced capabilities in areas like security analytics and API integrations are particularly noteworthy. Users have expressed satisfaction with Okta's comprehensive security measures, which are crucial for organizations prioritizing data protection.
Pricing
Entry-Level Pricing
Okta
Starter
$6.00
1 User per month
Browse all 2 pricing plans
Twingate
Business
Starting at $10.00
1 user, per month
Browse all 3 pricing plans
Free Trial
Okta
No trial information available
Twingate
Free Trial is available
Ratings
Meets Requirements
9.3
788
9.1
51
Ease of Use
9.3
810
9.7
52
Ease of Setup
8.9
322
9.2
45
Ease of Admin
9.0
185
9.1
45
Quality of Support
8.9
590
9.1
46
Has the product been a good partner in doing business?
8.9
180
9.3
44
Product Direction (% positive)
8.7
764
9.0
49
Features by Category
9.1
453
Not enough data
Authentication Options
9.3
429
Not enough data
Feature Not Available
Not enough data
9.3
411
Not enough data
Feature Not Available
Not enough data
9.2
294
Not enough data
9.2
284
Not enough data
Access Control Types
9.2
317
Not enough data
9.2
345
Not enough data
9.2
352
Not enough data
9.0
257
Not enough data
9.0
270
Not enough data
Administration
9.1
280
Not enough data
9.2
321
Not enough data
9.1
274
Not enough data
9.2
336
Not enough data
9.2
320
Not enough data
Platform
9.2
324
Not enough data
9.2
288
Not enough data
9.2
322
Not enough data
9.0
262
Not enough data
8.9
255
Not enough data
8.9
251
Not enough data
9.0
269
Not enough data
User Provisioning and Governance ToolsHide 15 FeaturesShow 15 Features
9.1
124
Not enough data
User on/off Boarding
9.1
95
|
Verified
Not enough data
9.1
93
|
Verified
Not enough data
9.3
95
|
Verified
Not enough data
9.2
93
|
Verified
Not enough data
9.4
91
|
Verified
Not enough data
8.9
85
|
Verified
Not enough data
User Maintenance
9.3
105
|
Verified
Not enough data
8.9
87
|
Verified
Not enough data
9.0
79
|
Verified
Not enough data
Governance
8.9
82
|
Verified
Not enough data
9.1
82
|
Verified
Not enough data
Administration
8.9
86
|
Verified
Not enough data
8.9
98
|
Verified
Not enough data
8.9
90
|
Verified
Not enough data
9.1
84
|
Verified
Not enough data
Network Access Control (NAC)Hide 9 FeaturesShow 9 Features
Not enough data
8.9
16
Data
Not enough data
9.0
16
Not enough data
9.4
16
Not enough data
9.2
16
Network
Not enough data
9.3
15
Not enough data
9.1
15
Not enough data
8.8
13
Logistics
Not enough data
8.5
10
Not enough data
8.6
11
Not enough data
8.1
8
8.7
40
7.7
32
Network Management
9.1
32
9.0
29
8.8
32
8.3
24
9.0
34
8.5
19
9.1
33
8.0
19
Security
9.3
35
8.3
22
9.2
37
8.7
22
9.1
32
8.8
23
9.2
36
8.3
22
Identity Management
9.2
32
8.8
19
9.1
31
7.7
17
9.2
36
7.5
18
Generative AI
6.3
14
4.4
6
6.7
14
3.9
6
Cloud Directory ServicesHide 11 FeaturesShow 11 Features
9.4
82
Not enough data
Access Control
9.3
60
Not enough data
9.4
63
Not enough data
9.4
62
Not enough data
9.3
55
Not enough data
Administration
9.5
60
Not enough data
9.5
59
Not enough data
9.4
54
Not enough data
9.4
67
Not enough data
Functionality
9.5
73
Not enough data
9.6
74
Not enough data
9.4
66
Not enough data
Customer Identity and Access Management (CIAM)Hide 15 FeaturesShow 15 Features
9.4
114
Not enough data
Functionality
9.4
100
|
Verified
Not enough data
9.5
107
|
Verified
Not enough data
9.4
103
|
Verified
Not enough data
Feature Not Available
Not enough data
Feature Not Available
Not enough data
9.2
99
|
Verified
Not enough data
AI Authentication Risk Management - Customer Identity and Access Management (CIAM)
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
AI Biometric & Behavioral Analysis - Customer Identity and Access Management (CIAM)
Not enough data
Not enough data
Not enough data
Not enough data
AI Context-Aware Security Controls - Customer Identity and Access Management (CIAM)
Not enough data
Not enough data
Not enough data
Not enough data
Identity and Access Management (IAM)Hide 18 FeaturesShow 18 Features
9.2
213
Not enough data
Functionality
9.3
175
Not enough data
9.2
176
Not enough data
9.6
194
Not enough data
9.4
173
Not enough data
9.5
193
Not enough data
9.3
184
Not enough data
Type
9.0
143
Not enough data
9.3
171
Not enough data
Reporting
9.1
157
Not enough data
9.2
156
Not enough data
9.0
44
Not enough data
9.2
44
Not enough data
Authentication & Authorization - Identity and Access Management (IAM)
9.0
44
Not enough data
Administration & Governance - Identity and Access Management (IAM)
9.2
45
Not enough data
9.1
43
Not enough data
Generative AI - Identity and Access Management (IAM)
8.7
44
Not enough data
8.9
44
Not enough data
9.1
44
Not enough data
Software-Defined Perimeter (SDP)Hide 11 FeaturesShow 11 Features
Not enough data
8.7
18
Administration
Not enough data
9.0
14
Not enough data
9.0
12
Not enough data
8.9
14
Protection
Not enough data
9.1
11
Not enough data
8.6
11
Not enough data
9.4
13
Not enough data
9.6
14
Monitoring
Not enough data
8.1
12
Not enough data
Feature Not Available
Not enough data
7.9
11
Not enough data
7.8
12
Not enough data
8.5
11
Management
Not enough data
8.8
7
Not enough data
Feature Not Available
Not enough data
8.3
8
Not enough data
9.1
9
Monitoring
Not enough data
Feature Not Available
Not enough data
8.8
7
Not enough data
7.1
7
Protection
Not enough data
Feature Not Available
Not enough data
Feature Not Available
Not enough data
9.1
9
Not enough data
8.2
10
Identity Threat Detection and Response (ITDR)Hide 7 FeaturesShow 7 Features
Not enough data
Not enough data
Monitoring
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Remediation
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Agentic AI - AWS Marketplace
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Non-Human Identity Management (NHIM) SolutionsHide 10 FeaturesShow 10 Features
Not enough data
Not enough data
Lifecycle & Provisioning - Non-Human Identity Management (NHIM) Solutions
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Access, Authentication & Authorization - Non-Human Identity Management (NHIM) Solutions
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Visibility, Governance & Compliance - Non-Human Identity Management (NHIM) Solutions
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Cloud Visibility
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Security
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Identity
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
8.3
30
Usage
Not enough data
9.3
28
Not enough data
8.8
27
Not enough data
Feature Not Available
Not enough data
8.8
28
Not enough data
Feature Not Available
Not enough data
8.8
26
Not enough data
Feature Not Available
Miscellaneous
Not enough data
6.9
22
Not enough data
Feature Not Available
Not enough data
7.4
19
Reviews
Reviewers' Company Size
Okta
Okta
Small-Business(50 or fewer emp.)
7.0%
Mid-Market(51-1000 emp.)
53.2%
Enterprise(> 1000 emp.)
39.8%
Twingate
Twingate
Small-Business(50 or fewer emp.)
43.7%
Mid-Market(51-1000 emp.)
50.7%
Enterprise(> 1000 emp.)
5.6%
Reviewers' Industry
Okta
Okta
Computer Software
17.9%
Information Technology and Services
15.4%
Financial Services
6.2%
Internet
4.9%
Marketing and Advertising
3.9%
Other
51.7%
Twingate
Twingate
Information Technology and Services
18.3%
Computer Software
14.1%
Computer & Network Security
14.1%
Financial Services
11.3%
Marketing and Advertising
5.6%
Other
36.6%
Alternatives
Okta
Okta Alternatives
CyberArk Workforce Identity
CyberArk Workforce Identity
Add CyberArk Workforce Identity
OneLogin
OneLogin
Add OneLogin
JumpCloud
JumpCloud
Add JumpCloud
Microsoft Entra ID
Microsoft Entra ID
Add Microsoft Entra ID
Twingate
Twingate Alternatives
Check Point Harmony SASE
Check Point Harmony SASE
Add Check Point Harmony SASE
Zscaler Private Access
Zscaler Private Access
Add Zscaler Private Access
NordLayer
NordLayer
Add NordLayer
Cisco Duo
Cisco Duo
Add Cisco Duo
Discussions
Okta
Okta Discussions
Is there a way to access your applications on a mobile device?
5 Comments
Erin C.
EC
There is an Okta Mobile app from which you can access your work applications, but it requires a little extra setup and not all organization use it....Read more
How many applications?
2 Comments
Graham P.
GP
Doesn’t it always, though? ;-) Key factors to consider aside from number of applications you’d want to streamline access to via SSO for would be: -How...Read more
Does Okta have a plugin for integration with Spring Boot and Spring Security?
2 Comments
Uday Pratap S.
US
Spring security plugin is available to do user management, take a look at it https://bintray.com/grails/plugins/spring-security-core/viewRead more
Twingate
Twingate Discussions
Monty the Mongoose crying
Twingate has no discussions with answers