# Okta vs Ping Identity Comparison
---
## AI Generated Summary
- **G2 reviewers report** that Okta excels in user experience, particularly with its **Single Sign-On** feature, which users find intuitive and seamless. Many appreciate how applications are easily accessible as tiles after a single login, eliminating the need to remember multiple passwords.
- **Users say** that Okta&#39;s implementation process is notably quick and straightforward, with recent feedback highlighting the intuitive onboarding wizard that helps organizations roll out **Multi-Factor Authentication** and user lifecycle management efficiently.
- **Reviewers mention** that while Ping Identity offers a range of solutions and is praised for its ability to adapt to customer needs, it sometimes lacks the same level of user-friendliness as Okta, particularly in the configuration and management of applications.
- **According to verified reviews** , Okta&#39;s support quality stands out, with users noting the reliability and strong security foundation it provides. This is contrasted with Ping Identity, where users have expressed a desire for more robust support options.
- **G2 reviewers highlight** that Okta&#39;s scalability is a significant advantage, making it suitable for mid-market businesses looking to grow. In comparison, Ping Identity is often seen as more tailored to enterprise-level needs, which may not align with smaller organizations.
- **Users appreciate** that Okta helps manage passwords effectively, providing additional layers of security that are crucial in today&#39;s environment. While Ping Identity also offers security features, some users feel that Okta&#39;s approach is more comprehensive and user-friendly.



| | Okta | Ping Identity | 
|---|---|---|
| **Star Rating** | 4.5 out of 5 | 4.4 out of 5 | 
| **Total Reviews** | 1,222 | 112 | 
| **Largest Market Segment** | Mid-Market (52.8% of reviews) | Enterprise (71.0% of reviews) | 
| **Entry Level Price** | $6.00 1 User per month | $3 Per User Per Month | 

---
## Top Pros & Cons

### Okta

Pros:
- Ease of Use (207 reviews)
- Security (158 reviews)

Cons:
- Authentication Issues (77 reviews)
- Login Issues (64 reviews)

### Ping Identity

Pros:
- Customer Management (1 reviews)
- Customer Support (1 reviews)

Cons:
- Authentication Issues (1 reviews)
- Complex Administration (1 reviews)

---
## Ratings Comparison
| Rating | Okta | Ping Identity | 
|---|---|---|
  | **Meets Requirements** | 9.3 (905 reviews) | 9.0 (76 reviews) | 
  | **Ease of Use** | 9.3 (930 reviews) | 8.7 (78 reviews) | 
  | **Ease of Setup** | 8.9 (430 reviews) | 8.3 (53 reviews) | 
  | **Ease of Admin** | 9.0 (200 reviews) | 8.3 (51 reviews) | 
  | **Quality of Support** | 8.9 (678 reviews) | 8.5 (70 reviews) | 
  | **Has the product been a good partner in doing business?** | 8.9 (194 reviews) | 8.6 (49 reviews) | 
  | **Product Direction (% positive)** | 8.8 (876 reviews) | 8.3 (74 reviews) | 

---
## Pricing

### Okta

#### Entry-Level Pricing

Plan: Starter

Price: $6.00 1 User per month

Description: Starting your Identity journey? Put a strong foundation in place.

Key Features:
- Universal Directory
- Workflows - 5 flows
- Single Sign-On

[Browse all 2 editions](https://www.g2.com/products/okta/pricing)

#### Free Trial

No

### Ping Identity

#### Entry-Level Pricing

Plan: Cloud MFA &amp; SSO

Price: $3 Per User Per Month

Description: Ping Identity&#39;s IDaaS for IT Departments

Key Features:
- Unlimited multi-factor authentication
- Unlimited single sign-on
- Included contextual capabilities to balance security with convenience

[Learn more about Ping Identity](https://www.g2.com/products/ping-identity/reviews)

#### Free Trial

Yes

---
## Features Comparison By Category

### Single Sign-On (SSO)

| Product | Score | Reviews |
|---|---|---|
| **Okta** | 9.1/10 | 509 |
| **Ping Identity** | 8.7/10 | 41 |

#### Authentication Options

| Feature | Okta | Ping Identity | 
|---|---|---|
| **Authentication User experience** | 9.3 (469 reviews) | 9.1 (35 reviews) | 
| **Supports Required Authentication systems** | 9.3 (60 reviews) | 9.1 (32 reviews) | 
| **Multi-Factor Authentication** | 9.3 (448 reviews) | 8.9 (31 reviews) | 
| **Supports Required Authentication Methods/Protocols** | 9.3 (52 reviews) | 9.1 (33 reviews) | 
| **Federation/SAML support (idp)** | 9.2 (298 reviews) | 9.0 (31 reviews) | 
| **Federation/SAML support (sp)** | 9.2 (287 reviews) | 9.4 (27 reviews) | 

#### Access Control Types

| Feature | Okta | Ping Identity | 
|---|---|---|
| **Endpoint access** | 9.2 (321 reviews) | 8.6 (22 reviews) | 
| **Local Access** | 9.2 (345 reviews) | 8.9 (28 reviews) | 
| **Remote Access** | 9.2 (355 reviews) | 8.7 (25 reviews) | 
| **Partner Access** | 9.0 (258 reviews) | 8.5 (17 reviews) | 
| **Supports BYOD users** | 9.0 (271 reviews) | 9.0 (17 reviews) | 

#### Administration

| Feature | Okta | Ping Identity | 
|---|---|---|
| **Ease of installation on server** | 9.1 (284 reviews) | 8.9 (29 reviews) | 
| **Password Policy Enforcement** | 9.2 (322 reviews) | 8.7 (21 reviews) | 
| **Administration Console** | 9.1 (278 reviews) | 8.2 (28 reviews) | 
| **Ease of connecting applications** | 9.1 (346 reviews) | 8.5 (31 reviews) | 
| **Self Service Password Administration** | 9.2 (320 reviews) | 8.1 (15 reviews) | 

#### Platform

| Feature | Okta | Ping Identity | 
|---|---|---|
| **Multiple Operating system support** | 9.2 (323 reviews) | 9.4 (27 reviews) | 
| **Multi-Domain Support** | 9.2 (287 reviews) | 8.8 (25 reviews) | 
| **Cross Browser support** | 9.2 (321 reviews) | 8.8 (31 reviews) | 
| **Fail over protection** | 9.0 (262 reviews) | 8.6 (25 reviews) | 
| **Reporting** | 8.9 (255 reviews) | 7.3 (22 reviews) | 
| **Auditing** | 8.9 (252 reviews) | 8.1 (27 reviews) | 
| **Third Party Web Services support** | 9.0 (268 reviews) | 8.8 (23 reviews) | 

### User Provisioning and Governance Tools

| Product | Score | Reviews |
|---|---|---|
| **Okta** | 9.1/10 | 131 |
| **Ping Identity** | N/A | N/A |

#### User on/off Boarding

| Feature | Okta | Ping Identity | 
|---|---|---|
| **Self Service Access requests** | 9.1 (96 reviews) ✓ Verified | Not enough data | 
| **Smart/Automated Provisioning** | 9.1 (94 reviews) ✓ Verified | Not enough data | 
| **Role Management** | 9.3 (96 reviews) ✓ Verified | Not enough data | 
| **Policy Management** | 9.1 (98 reviews) ✓ Verified | Not enough data | 
| **Access Termination** | 9.4 (93 reviews) ✓ Verified | Not enough data | 
| **Approval Workflows** | 8.9 (86 reviews) ✓ Verified | Not enough data | 

#### User Maintenance

| Feature | Okta | Ping Identity | 
|---|---|---|
| **Self Service Password Reset** | 9.3 (106 reviews) ✓ Verified | Not enough data | 
| **Bulk Changes** | 8.9 (88 reviews) ✓ Verified | Not enough data | 
| **Bi-directional Identity Synchronization** | 9.0 (80 reviews) ✓ Verified | Not enough data | 

#### Governance

| Feature | Okta | Ping Identity | 
|---|---|---|
| **Identifies and Alerts for Threats** | 9.0 (83 reviews) ✓ Verified | Not enough data | 
| **Compliance Audits** | 9.2 (83 reviews) ✓ Verified | Not enough data | 

#### Administration

| Feature | Okta | Ping Identity | 
|---|---|---|
| **Reporting** | 8.9 (87 reviews) ✓ Verified | Not enough data | 
| **Mobile App** | 8.9 (99 reviews) ✓ Verified | Not enough data | 
| **Ease of set up for target systems** | 9.0 (92 reviews) ✓ Verified | Not enough data | 
| **APIs** | 9.1 (87 reviews) ✓ Verified | Not enough data | 

### Multi-Factor Authentication (MFA)

| Product | Score | Reviews |
|---|---|---|
| **Okta** | N/A | N/A |
| **Ping Identity** | 8.2/10 | 20 |

#### Authentication type

| Feature | Okta | Ping Identity | 
|---|---|---|
| **SMS-Based** | Not enough data | 8.5 (8 reviews) ✓ Verified | 
| **Voice-Based Telephony** | Not enough data | 8.0 (5 reviews) ✓ Verified | 
| **Email-Based** | Not enough data | 8.9 (12 reviews) ✓ Verified | 
| **Hardware Token-Based** | Not enough data | 8.1 (7 reviews) ✓ Verified | 
| **Software Token** | Not enough data | 9.1 (13 reviews) ✓ Verified | 
| **Biometric Factor** | Not enough data | 7.9 (8 reviews) ✓ Verified | 
| **Mobile-Push** | Not enough data | 8.7 (14 reviews) ✓ Verified | 
| **Risk-Based Authentication** | Not enough data | 8.3 (8 reviews) ✓ Verified | 

#### Functionality

| Feature | Okta | Ping Identity | 
|---|---|---|
| **Multi-Device Sync** | Not enough data | 7.7 (10 reviews) | 
| **Backup** | Not enough data | Not enough data | 

#### Implementation

| Feature | Okta | Ping Identity | 
|---|---|---|
| **Easy Setup** | Not enough data | 7.8 (16 reviews) ✓ Verified | 
| **Mobile SDK** | Not enough data | 7.2 (10 reviews) ✓ Verified | 
| **Web SDK** | Not enough data | 7.9 (11 reviews) | 

### Zero Trust Networking

| Product | Score | Reviews |
|---|---|---|
| **Okta** | 8.9/10 | 42 |
| **Ping Identity** | N/A | N/A |

#### Network Management

| Feature | Okta | Ping Identity | 
|---|---|---|
| **Network Segmentation** | Feature Not Available | Not enough data | 
| **Network Mapping** | Feature Not Available | Not enough data | 
| **Security Analytics** | 9.0 (35 reviews) | Not enough data | 
| **API/Integrations** | 9.1 (34 reviews) | Not enough data | 

#### Security

| Feature | Okta | Ping Identity | 
|---|---|---|
| **Security Automation** | 9.3 (36 reviews) | Not enough data | 
| **Application Security** | 9.3 (38 reviews) | Not enough data | 
| **Workload Protection** | 9.1 (33 reviews) | Not enough data | 
| **Data Protection** | 9.2 (38 reviews) | Not enough data | 

#### Identity Management

| Feature | Okta | Ping Identity | 
|---|---|---|
| **Adaptive Access Control** | 9.2 (33 reviews) | Not enough data | 
| **Identity Scoring** | 9.2 (32 reviews) | Not enough data | 
| **User Monitoring** | 9.2 (37 reviews) | Not enough data | 

#### Generative AI

| Feature | Okta | Ping Identity | 
|---|---|---|
| **AI Text Summarization** | 6.6 (15 reviews) | Not enough data | 
| **AI Text Generation** | Feature Not Available | Not enough data | 

### Cloud Directory Services

| Product | Score | Reviews |
|---|---|---|
| **Okta** | 9.5/10 | 87 |
| **Ping Identity** | N/A | N/A |

#### Access Control

| Feature | Okta | Ping Identity | 
|---|---|---|
| **Role Management** | 9.3 (60 reviews) | Not enough data | 
| **Access Termination** | 9.4 (63 reviews) | Not enough data | 
| **Remote Access** | 9.4 (65 reviews) | Not enough data | 
| **Partner Access** | 9.3 (55 reviews) | Not enough data | 

#### Administration

| Feature | Okta | Ping Identity | 
|---|---|---|
| **Smart/Automated Provisioning** | 9.5 (60 reviews) | Not enough data | 
| **Policy Management** | 9.5 (59 reviews) | Not enough data | 
| **On-premise identity repositories supported** | 9.4 (54 reviews) | Not enough data | 
| **Ease of Connecting Applications** | 9.4 (69 reviews) | Not enough data | 

#### Functionality

| Feature | Okta | Ping Identity | 
|---|---|---|
| **SSO** | 9.5 (76 reviews) | Not enough data | 
| **Multi-Factor Authentication** | 9.6 (77 reviews) | Not enough data | 
| **Supports Required Authentication systems** | 9.4 (66 reviews) | Not enough data | 

### Risk-Based Authentication (RBA)

| Product | Score | Reviews |
|---|---|---|
| **Okta** | N/A | N/A |
| **Ping Identity** | N/A | N/A |

#### Administration

| Feature | Okta | Ping Identity | 
|---|---|---|
| **Bi-Directional Identity Synchronization** | Not enough data | Not enough data | 
| **Policy Management** | Not enough data | 8.7 (5 reviews) | 
| **Cloud Directory** | Not enough data | Not enough data | 
| **Application Integrations** | Not enough data | Not enough data | 

### Privileged Access Management (PAM)

| Product | Score | Reviews |
|---|---|---|
| **Okta** | N/A | N/A |
| **Ping Identity** | N/A | N/A |

#### Administration

| Feature | Okta | Ping Identity | 
|---|---|---|
| **Policy, User, and Role Management** | Not enough data | Not enough data | 
| **Approval Workflows** | Not enough data | Not enough data | 
| **Automated Provisioning** | Not enough data | Not enough data | 
| **Bulk Changes** | Not enough data | Not enough data | 
| **Centralized Management** | Not enough data | Not enough data | 
| **Self-Service Access Requests** | Not enough data | Not enough data | 

#### Functionality

| Feature | Okta | Ping Identity | 
|---|---|---|
| **Multi-Factor Authentication** | Not enough data | Not enough data | 
| **Single Sign-On** | Not enough data | Not enough data | 
| **BYOD support** | Not enough data | Not enough data | 
| **Password Vault** | Not enough data | Not enough data | 
| **Centralized management** | Not enough data | Not enough data | 
| **Role-based security** | Not enough data | Not enough data | 
| **Live notifications** | Not enough data | Not enough data | 
| **Live session recording &amp; playback** | Not enough data | Not enough data | 
| **Hide passwords** | Not enough data | Not enough data | 
| **Temporary, time-limited privilege** | Not enough data | Not enough data | 

#### Monitoring

| Feature | Okta | Ping Identity | 
|---|---|---|
| **Audit Logging** | Not enough data | Not enough data | 
| **Activity Logging** | Not enough data | Not enough data | 
| **Anomaly Detection** | Not enough data | Not enough data | 

#### Reporting

| Feature | Okta | Ping Identity | 
|---|---|---|
| **Audit log** | Not enough data | Not enough data | 
| **Reporting** | Not enough data | Not enough data | 

### Customer Identity and Access Management (CIAM)

| Product | Score | Reviews |
|---|---|---|
| **Okta** | 9.3/10 | 116 |
| **Ping Identity** | 8.9/10 | 9 |

#### Functionality

| Feature | Okta | Ping Identity | 
|---|---|---|
| **Self-registration and self-service** | 9.4 (100 reviews) ✓ Verified | 8.6 (7 reviews) ✓ Verified | 
| **Authentication** | 9.5 (108 reviews) ✓ Verified | 9.4 (9 reviews) ✓ Verified | 
| **Scalability** | 9.3 (104 reviews) ✓ Verified | 9.0 (8 reviews) ✓ Verified | 
| **Consent and preference management** | 9.5 (58 reviews) | 8.6 (7 reviews) ✓ Verified | 
| **Social login** | 9.1 (56 reviews) | Not enough data | 
| **Customer data linking** | 9.2 (99 reviews) ✓ Verified | Not enough data | 

#### AI Authentication Risk Management - Customer Identity and Access Management (CIAM)

| Feature | Okta | Ping Identity | 
|---|---|---|
| **Adaptive MFA** | Not enough data | Not enough data | 
| **Anomaly Detection** | Not enough data | Not enough data | 
| **Fraudulent Login Detection** | Not enough data | Not enough data | 
| **Adaptive Authentication Policies** | Not enough data | Not enough data | 
| **Risk-Based Authentication** | Not enough data | Not enough data | 

#### AI Biometric &amp; Behavioral Analysis - Customer Identity and Access Management (CIAM)

| Feature | Okta | Ping Identity | 
|---|---|---|
| **Behavioral Biometric Analysis** | Feature Not Available | Not enough data | 
| **Liveness Detection** | Not enough data | Not enough data | 

#### AI Context-Aware Security Controls - Customer Identity and Access Management (CIAM)

| Feature | Okta | Ping Identity | 
|---|---|---|
| **Account Recovery Assistants** | Feature Not Available | Not enough data | 
| **Constraint Enforcement** | Feature Not Available | Not enough data | 

### Passwordless Authentication

| Product | Score | Reviews |
|---|---|---|
| **Okta** | N/A | N/A |
| **Ping Identity** | N/A | N/A |

#### Functionality

| Feature | Okta | Ping Identity | 
|---|---|---|
| **FIDO2-compliant** | Not enough data | Not enough data | 
| **Works with hardware security keys** | Not enough data | Not enough data | 
| **Multiple authentication methods** | Not enough data | Not enough data | 
| **Offline or no-phone solution** | Not enough data | Not enough data | 

### Identity and Access Management (IAM)

| Product | Score | Reviews |
|---|---|---|
| **Okta** | 9.2/10 | 327 |
| **Ping Identity** | 8.3/10 | 21 |

#### Functionality

| Feature | Okta | Ping Identity | 
|---|---|---|
| **User provisioning** | 9.4 (186 reviews) | 7.5 (10 reviews) | 
| **Password manager** | 9.2 (190 reviews) | 8.3 (8 reviews) | 
| **Single Sign-on** | 9.5 (274 reviews) | 8.8 (14 reviews) | 
| **Enforces policies** | 9.4 (186 reviews) | 8.2 (16 reviews) | 
| **Authentication** | 9.4 (259 reviews) | 8.9 (18 reviews) | 
| **Multi-factor authentication** | 9.2 (231 reviews) | 8.3 (16 reviews) | 

####  Type

| Feature | Okta | Ping Identity | 
|---|---|---|
| **On-premises solution** | 9.1 (142 reviews) | 9.1 (11 reviews) | 
| **Cloud-solution** | 9.3 (174 reviews) | 8.1 (16 reviews) | 

####  Reporting

| Feature | Okta | Ping Identity | 
|---|---|---|
| **Tracking** | 9.1 (158 reviews) | 8.3 (12 reviews) | 
| **Reporting** | 9.2 (155 reviews) | 7.4 (14 reviews) | 
| **Access &amp; Permission Change Reporting** | 9.0 (44 reviews) | Not enough data | 
| **Compliance &amp; Audit Trail Export** | 9.2 (45 reviews) | Not enough data | 

#### Authentication &amp; Authorization - Identity and Access Management (IAM)

| Feature | Okta | Ping Identity | 
|---|---|---|
| **Adaptive &amp; Contextual Access Control** | 9.1 (49 reviews) | Not enough data | 

#### Administration &amp; Governance - Identity and Access Management (IAM)

| Feature | Okta | Ping Identity | 
|---|---|---|
| **Identity Lifecycle Management** | 9.2 (57 reviews) | Not enough data | 
| **Self‑Service Account Management** | 9.1 (44 reviews) | Not enough data | 

#### Generative AI - Identity and Access Management (IAM)

| Feature | Okta | Ping Identity | 
|---|---|---|
| **AI‑Driven Access Anomaly Detection** | 8.7 (45 reviews) | Not enough data | 
| **Automated Policy Tuning** | 8.9 (44 reviews) | Not enough data | 
| **Predictive Role Recommendations** | Feature Not Available | Not enough data | 

### Identity Threat Detection and Response (ITDR)

| Product | Score | Reviews |
|---|---|---|
| **Okta** | N/A | N/A |
| **Ping Identity** | N/A | N/A |

#### Monitoring

| Feature | Okta | Ping Identity | 
|---|---|---|
| **Investigate** | Not enough data | Not enough data | 
| **Monitoring** | Not enough data | Not enough data | 
| **Misconfigurations** | Not enough data | Not enough data | 
| **Integrate** | Not enough data | Not enough data | 
| **Visability** | Not enough data | Not enough data | 

#### Remediation

| Feature | Okta | Ping Identity | 
|---|---|---|
| **Remediation** | Not enough data | Not enough data | 
| **Audit** | Not enough data | Not enough data | 

### AWS Marketplace

| Product | Score | Reviews |
|---|---|---|
| **Okta** | N/A | N/A |
| **Ping Identity** | N/A | N/A |

#### Agentic AI - AWS Marketplace

| Feature | Okta | Ping Identity | 
|---|---|---|
| **Autonomous Task Execution** | Feature Not Available | Not enough data | 
| **Multi-step Planning** | Feature Not Available | Not enough data | 
| **Cross-system Integration** | Not enough data | Not enough data | 

### Non-Human Identity Management (NHIM) Solutions

| Product | Score | Reviews |
|---|---|---|
| **Okta** | N/A | N/A |
| **Ping Identity** | N/A | N/A |

#### Lifecycle &amp; Provisioning - Non-Human Identity Management (NHIM) Solutions

| Feature | Okta | Ping Identity | 
|---|---|---|
| **Credential Rotation &amp; Revocation** | Not enough data | Not enough data | 
| **Automated Registration &amp; Provisioning** | Not enough data | Not enough data | 
| **De-Provisioning &amp; Retirement** | Not enough data | Not enough data | 

#### Access, Authentication &amp; Authorization - Non-Human Identity Management (NHIM) Solutions

| Feature | Okta | Ping Identity | 
|---|---|---|
| **Fine-Grained Access Control** | Not enough data | Not enough data | 
| **Machine-Native Authentication Methods** | Not enough data | Not enough data | 
| **Contextual / Just-In-Time Access** | Not enough data | Not enough data | 

#### Visibility, Governance &amp; Compliance - Non-Human Identity Management (NHIM) Solutions

| Feature | Okta | Ping Identity | 
|---|---|---|
| **Policy Enforcement &amp; Governance** | Not enough data | Not enough data | 
| **Audit Logging &amp; Activity Monitoring** | Not enough data | Not enough data | 
| **Integration with IAM/Cloud/DevOps Ecosystem** | Not enough data | Not enough data | 
| **Discovery &amp; Inventory of Non-Human Ids** | Not enough data | Not enough data | 

---
## Categories
**Shared Categories (3):** [Identity and Access Management (IAM) Software](https://www.g2.com/categories/identity-and-access-management-iam), [Customer Identity and Access Management (CIAM) Software](https://www.g2.com/categories/customer-identity-and-access-management-ciam), [Single Sign-On (SSO) Solutions](https://www.g2.com/categories/single-sign-on-sso)

**Unique to Okta (7):** [Non-Human Identity Management (NHIM) Solutions](https://www.g2.com/categories/non-human-identity-management-nhim-solutions), [AWS Marketplace Software](https://www.g2.com/categories/aws-marketplace), [Identity Threat Detection and Response (ITDR)  Software](https://www.g2.com/categories/identity-threat-detection-and-response-itdr), [User Provisioning and Governance Tools](https://www.g2.com/categories/user-provisioning-and-governance-tools), [Zero Trust Networking Software](https://www.g2.com/categories/zero-trust-networking), [Cloud Directory Services](https://www.g2.com/categories/cloud-directory-services), [Other Development Software](https://www.g2.com/categories/other-development)

**Unique to Ping Identity (4):** [Privileged Access Management (PAM) Software](https://www.g2.com/categories/privileged-access-management-pam), [Passwordless Authentication Software](https://www.g2.com/categories/passwordless-authentication), [Multi-Factor Authentication (MFA) Software](https://www.g2.com/categories/multi-factor-authentication-mfa), [Risk-Based Authentication Software](https://www.g2.com/categories/risk-based-authentication-rba)


---
## Reviewer Demographics

### By Company Size

| Segment | Okta | Ping Identity | 
|---|---|---|
| **Small-Business** | 7.4% | 3.7% | 
| **Mid-Market** | 52.8% | 25.2% | 
| **Enterprise** | 39.8% | 71.0% | 

### By Industry

#### Okta

- **Computer Software:** 18.5%
- **Information Technology and Services:** 15.5%
- **Financial Services:** 6.4%
- **Internet:** 4.5%
- **Marketing and Advertising:** 4.1%
- **Computer &amp; Network Security:** 3.1%
- **Consumer Services:** 3.0%
- **Hospital &amp; Health Care:** 2.6%
- **Retail:** 2.1%
- **Telecommunications:** 1.8%
- **Other:** 38.5%

#### Ping Identity

- **Information Technology and Services:** 14.4%
- **Computer Software:** 9.6%
- **Hospital &amp; Health Care:** 7.7%
- **Insurance:** 7.7%
- **Retail:** 5.8%
- **Financial Services:** 5.8%
- **Pharmaceuticals:** 4.8%
- **Airlines/Aviation:** 3.8%
- **Banking:** 3.8%
- **Telecommunications:** 2.9%
- **Other:** 33.7%

---
## Alternatives

### Alternatives to Okta

- [CyberArk Workforce Identity](https://www.g2.com/products/cyberark-workforce-identity/reviews) — 4.5/5 stars (130 reviews)
- [JumpCloud](https://www.g2.com/products/jumpcloud/reviews) — 4.5/5 stars (3962 reviews)
- [OneLogin](https://www.g2.com/products/onelogin/reviews) — 4.4/5 stars (290 reviews)
- [Microsoft Entra ID](https://www.g2.com/products/microsoft-entra-id/reviews) — 4.5/5 stars (907 reviews)
- [1Password](https://www.g2.com/products/1password/reviews) — 4.6/5 stars (1787 reviews)
- [Cisco Duo](https://www.g2.com/products/cisco-duo/reviews) — 4.5/5 stars (512 reviews)
- [IBM Verify CIAM](https://www.g2.com/products/ibm-verify-ciam/reviews) — 4.3/5 stars (181 reviews)
- [SailPoint](https://www.g2.com/products/sailpoint/reviews) — 4.5/5 stars (174 reviews)
- [WSO2 Identity Platform](https://www.g2.com/products/wso2-identity-platform/reviews) — 4.5/5 stars (107 reviews)
- [BetterCloud](https://www.g2.com/products/bettercloud/reviews) — 4.4/5 stars (479 reviews)

### Alternatives to Ping Identity

- [Microsoft Entra ID](https://www.g2.com/products/microsoft-entra-id/reviews) — 4.5/5 stars (907 reviews)
- [Cisco Duo](https://www.g2.com/products/cisco-duo/reviews) — 4.5/5 stars (512 reviews)
- [OneLogin](https://www.g2.com/products/onelogin/reviews) — 4.4/5 stars (290 reviews)
- [Auth0](https://www.g2.com/products/auth0/reviews) — 4.3/5 stars (261 reviews)
- [SecureAuth: Workforce IAM](https://www.g2.com/products/secureauth-workforce-iam/reviews) — 4.4/5 stars (29 reviews)
- [LastPass](https://www.g2.com/products/lastpass/reviews) — 4.5/5 stars (2041 reviews)
- [JumpCloud](https://www.g2.com/products/jumpcloud/reviews) — 4.5/5 stars (3962 reviews)
- [CyberArk Workforce Identity](https://www.g2.com/products/cyberark-workforce-identity/reviews) — 4.5/5 stars (130 reviews)
- [IBM Verify CIAM](https://www.g2.com/products/ibm-verify-ciam/reviews) — 4.3/5 stars (181 reviews)
- [Google Authenticator](https://www.g2.com/products/google-authenticator/reviews) — 4.6/5 stars (579 reviews)

---
## Top Discussions

### Okta

- Title: [Is there a way to access your applications on a mobile device?](https://www.g2.com/discussions/is-there-a-way-to-access-your-applications-on-a-mobile-device) — 5 comments, 2 upvotes
  > **Top comment:** "Not that I am aware of. From my knowledge the mobile app is used to verify you are the person signing in online from your desktop computer. It’s send you a..."
- Title: [How good is Okta?](https://www.g2.com/discussions/how-good-is-okta) — 2 comments
  > **Top comment:** "Okta is a very powerful cloud-based directory system that is infinitely extensible via the Okta Expression Language, Custom Attributes, and Okta Workflows. "
- Title: [Does Okta have a plugin for integration with Spring Boot and Spring Security?](https://www.g2.com/discussions/does-okta-have-a-plugin-for-integration-with-spring-boot-and-spring-security) — 2 comments, 1 upvote
  > **Top comment:** "Spring security plugin is available to do user management, take a look at it https://bintray.com/grails/plugins/spring-security-core/view"
- Title: [How many applications?](https://www.g2.com/discussions/304-how-many-applications) — 2 comments, 1 upvote
  > **Top comment:** "Doesn’t it always, though? ;-)

Key factors to consider aside from number of applications you’d want to streamline access to via SSO for would be:

-How..."
- Title: [What database does Just Eat use?](https://www.g2.com/discussions/what-database-does-just-eat-use) — 1 comment
  > **Top comment:** "Google cloud"

### Ping Identity

No discussions available for this product.

---
**Source:** [G2.com](https://www.g2.com) | [Comparison Page](https://www.g2.com/compare/okta-vs-ping-identity)

