Compare Ping Identity and Varonis Data Security Platform

At a Glance
Ping Identity
Ping Identity
Star Rating
(106)4.4 out of 5
Market Segments
Enterprise (70.0% of reviews)
Information
Pros & Cons
Entry-Level Pricing
$3 Per User Per Month
Learn more about Ping Identity
Varonis Data Security Platform
Varonis Data Security Platform
Star Rating
(69)4.5 out of 5
Market Segments
Enterprise (63.2% of reviews)
Information
Pros & Cons
Entry-Level Pricing
No pricing available
Learn more about Varonis Data Security Platform
AI Generated Summary
AI-generated. Powered by real user reviews.
  • G2 reviewers report that Ping Identity excels in user experience, particularly highlighting its ability to adapt to customer needs and integrate smoothly with other vendors. Users appreciate the flexibility in configuring applications and managing them effectively, which enhances day-to-day usability.
  • According to verified reviews, Varonis Data Security Platform stands out for its exceptional visibility into data access and user behavior. Users find it invaluable for identifying overexposed data and excessive permissions, making it a strong choice for organizations focused on data security.
  • Reviewers mention that while Ping Identity has a quick implementation process, Varonis faces some challenges in setup, with users noting that it can be less intuitive. However, once established, Varonis is praised for its powerful data discovery capabilities.
  • Users say that Varonis provides unparalleled insights into sensitive data across complex environments, which is a key strength. This feature is particularly beneficial for organizations needing to manage compliance and security effectively.
  • G2 reviewers highlight that Varonis has a stronger support system, with users rating its quality of support significantly higher than that of Ping Identity. This can be crucial for organizations that require ongoing assistance and guidance.
  • According to recent feedback, while Ping Identity has a solid reputation for being a good business partner, Varonis is noted for its proactive approach in addressing user concerns and adapting to feedback, which enhances its overall product direction.
Pricing
Entry-Level Pricing
Ping Identity
Cloud MFA & SSO
$3
Per User Per Month
Learn more about Ping Identity
Varonis Data Security Platform
No pricing available
Free Trial
Ping Identity
Free Trial is available
Varonis Data Security Platform
No trial information available
Ratings
Meets Requirements
9.0
72
9.3
57
Ease of Use
8.7
74
8.2
59
Ease of Setup
8.3
49
7.9
52
Ease of Admin
8.3
50
8.2
39
Quality of Support
8.4
66
9.4
57
Has the product been a good partner in doing business?
8.6
48
9.2
40
Product Direction (% positive)
8.4
72
9.2
59
Features by Category
8.7
41
Not enough data
Authentication Options
9.1
35
Not enough data
9.1
32
Not enough data
8.9
31
Not enough data
9.1
33
Not enough data
9.0
31
Not enough data
9.4
27
Not enough data
Access Control Types
8.6
22
Not enough data
8.9
28
Not enough data
8.7
25
Not enough data
8.5
17
Not enough data
9.0
17
Not enough data
Administration
8.9
29
Not enough data
8.7
21
Not enough data
8.2
28
Not enough data
8.5
31
Not enough data
8.1
15
Not enough data
Platform
9.4
27
Not enough data
8.8
25
Not enough data
8.8
31
Not enough data
8.6
25
Not enough data
7.3
22
Not enough data
8.1
27
Not enough data
8.8
23
Not enough data
Multi-Factor Authentication (MFA)Hide 13 FeaturesShow 13 Features
8.2
20
Not enough data
Authentication type
8.5
8
|
Verified
Not enough data
8.0
5
|
Verified
Not enough data
8.9
12
|
Verified
Not enough data
8.1
7
|
Verified
Not enough data
9.1
13
|
Verified
Not enough data
7.9
8
|
Verified
Not enough data
8.7
14
|
Verified
Not enough data
8.3
8
|
Verified
Not enough data
Functionality
7.7
10
Not enough data
Not enough data
Not enough data
Implementation
7.8
16
|
Verified
Not enough data
7.2
10
|
Verified
Not enough data
7.9
11
Not enough data
Not enough data
8.6
17
Administration
Not enough data
Feature Not Available
Not enough data
Feature Not Available
Not enough data
Feature Not Available
Not enough data
8.8
14
Management
Not enough data
Feature Not Available
Not enough data
8.8
12
Not enough data
8.3
12
Not enough data
8.5
14
Not enough data
8.5
11
Compliance
Not enough data
9.0
12
Not enough data
8.2
10
Not enough data
9.0
10
Not enough data
9.4
11
Security
Not enough data
9.0
13
Not enough data
8.2
14
Not enough data
9.0
12
Data Quality
Not enough data
Feature Not Available
Not enough data
Feature Not Available
Not enough data
Feature Not Available
Maintainence
Not enough data
Feature Not Available
Not enough data
8.7
10
Generative AI
Not enough data
8.0
10
Not enough data
8.0
10
Agentic AI - Data Governance
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Data Loss Prevention (DLP)Hide 10 FeaturesShow 10 Features
Not enough data
8.9
17
Administration
Not enough data
8.9
12
Not enough data
9.0
13
Not enough data
8.4
15
Governance
Not enough data
9.1
13
Not enough data
9.0
14
Not enough data
8.8
16
Security
Not enough data
8.3
14
Not enough data
8.8
12
Not enough data
9.1
13
Not enough data
9.2
14
Not enough data
8.7
34
Data Protection
Not enough data
9.1
32
Not enough data
8.5
31
Not enough data
8.5
30
Not enough data
8.8
30
Not enough data
8.6
29
Not enough data
9.0
31
Not enough data
8.8
31
Compliance
Not enough data
8.8
30
Not enough data
8.7
29
Usability
Not enough data
8.6
29
Not enough data
8.4
29
Not enough data
8.6
31
Risk-Based Authentication (RBA)Hide 4 FeaturesShow 4 Features
Not enough data
Not enough data
Administration
Not enough data
Not enough data
8.7
5
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Privileged Access Management (PAM)Hide 21 FeaturesShow 21 Features
Not enough data
8.9
5
Administration
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Feature Not Available
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Feature Not Available
Functionality
Not enough data
Feature Not Available
Not enough data
Feature Not Available
Not enough data
Feature Not Available
Not enough data
Feature Not Available
Not enough data
Feature Not Available
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Feature Not Available
Not enough data
Feature Not Available
Not enough data
Not enough data
Monitoring
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Reporting
Not enough data
9.0
5
Not enough data
8.7
5
Customer Identity and Access Management (CIAM)Hide 15 FeaturesShow 15 Features
8.8
7
Not enough data
Functionality
8.6
7
|
Verified
Not enough data
9.3
7
|
Verified
Not enough data
8.8
7
|
Verified
Not enough data
8.6
7
|
Verified
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
AI Authentication Risk Management - Customer Identity and Access Management (CIAM)
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
AI Biometric & Behavioral Analysis - Customer Identity and Access Management (CIAM)
Not enough data
Not enough data
Not enough data
Not enough data
AI Context-Aware Security Controls - Customer Identity and Access Management (CIAM)
Not enough data
Not enough data
Not enough data
Not enough data
Sensitive Data DiscoveryHide 14 FeaturesShow 14 Features
Not enough data
9.2
18
Functionality
Not enough data
9.1
15
Not enough data
8.8
17
Not enough data
8.9
17
Not enough data
8.6
16
Not enough data
9.0
15
Not enough data
9.1
15
Not enough data
9.0
14
Not enough data
9.4
17
Not enough data
9.5
14
Not enough data
9.5
17
Agentic AI - Sensitive Data Discovery
Not enough data
9.7
5
Not enough data
9.7
5
Not enough data
9.3
5
Not enough data
9.7
5
Passwordless AuthenticationHide 4 FeaturesShow 4 Features
Not enough data
Not enough data
Functionality
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Identity and Access Management (IAM)Hide 18 FeaturesShow 18 Features
8.3
19
Not enough data
Functionality
7.5
10
Not enough data
8.3
8
Not enough data
8.8
14
Not enough data
8.2
15
Not enough data
8.8
17
Not enough data
8.3
16
Not enough data
Type
9.1
11
Not enough data
8.1
16
Not enough data
Reporting
8.3
12
Not enough data
7.4
14
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Authentication & Authorization - Identity and Access Management (IAM)
Not enough data
Not enough data
Administration & Governance - Identity and Access Management (IAM)
Not enough data
Not enough data
Not enough data
Not enough data
Generative AI - Identity and Access Management (IAM)
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Insider Threat Management (ITM)Hide 9 FeaturesShow 9 Features
Not enough data
9.0
10
Functionality
Not enough data
8.7
10
Not enough data
9.1
9
Not enough data
9.3
9
Not enough data
8.8
10
Not enough data
9.3
9
Not enough data
8.7
9
Monitoring
Not enough data
Feature Not Available
Not enough data
Feature Not Available
Not enough data
9.1
9
SaaS Security Posture Management (SSPM) SolutionsHide 9 FeaturesShow 9 Features
Not enough data
Not enough data
Monitoring
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Agentic AI - SaaS Security Posture Management (SSPM) Solutions Features
Not enough data
Not enough data
Not enough data
Not enough data
Security
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
User and Entity Behavior Analytics (UEBA)Hide 11 FeaturesShow 11 Features
Not enough data
9.5
9
Agentic AI - User and Entity Behavior Analytics (UEBA)
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Analysis
Not enough data
9.3
7
Not enough data
9.6
8
Not enough data
9.5
7
Not enough data
9.3
9
Detection
Not enough data
10.0
8
Not enough data
9.6
9
Not enough data
9.4
8
Data Security Posture Management (DSPM)Hide 9 FeaturesShow 9 Features
Not enough data
Not enough data
Discovery & Classification - Data Security Posture Management (DSPM)
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Risk Prioritization - Data Security Posture Management (DSPM)
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Remediation & Governance - Data Security Posture Management (DSPM)
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
AI Security Posture Management (AI-SPM) ToolsHide 9 FeaturesShow 9 Features
Not enough data
Not enough data
Functionality - AI Security Posture Management (AI-SPM) Tools
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Risk Assessment - AI Security Posture Management (AI-SPM) Tools
Not enough data
Not enough data
Not enough data
Not enough data
Governance & Compliance - AI Security Posture Management (AI-SPM) Tools
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Cloud Visibility
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Security
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Identity
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Compliance
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Administration
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Security
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Reviews
Reviewers' Company Size
Ping Identity
Ping Identity
Small-Business(50 or fewer emp.)
4.0%
Mid-Market(51-1000 emp.)
26.0%
Enterprise(> 1000 emp.)
70.0%
Varonis Data Security Platform
Varonis Data Security Platform
Small-Business(50 or fewer emp.)
8.8%
Mid-Market(51-1000 emp.)
27.9%
Enterprise(> 1000 emp.)
63.2%
Reviewers' Industry
Ping Identity
Ping Identity
Information Technology and Services
15.0%
Computer Software
10.0%
Hospital & Health Care
8.0%
Insurance
8.0%
Financial Services
6.0%
Other
53.0%
Varonis Data Security Platform
Varonis Data Security Platform
Financial Services
14.7%
Manufacturing
7.4%
Banking
7.4%
Accounting
5.9%
Food & Beverages
5.9%
Other
58.8%
Alternatives
Ping Identity
Ping Identity Alternatives
Microsoft Entra ID
Microsoft Entra ID
Add Microsoft Entra ID
Cisco Duo
Cisco Duo
Add Cisco Duo
OneLogin
OneLogin
Add OneLogin
Auth0
Auth0
Add Auth0
Varonis Data Security Platform
Varonis Data Security Platform Alternatives
Egnyte
Egnyte
Add Egnyte
BigID
BigID
Add BigID
BetterCloud
BetterCloud
Add BetterCloud
CrowdStrike Falcon Endpoint Protection Platform
CrowdStrike Falcon Endpoint...
Add CrowdStrike Falcon Endpoint Protection Platform
Discussions
Ping Identity
Ping Identity Discussions
Monty the Mongoose crying
Ping Identity has no discussions with answers
Varonis Data Security Platform
Varonis Data Security Platform Discussions
Monty the Mongoose crying
Varonis Data Security Platform has no discussions with answers