# CyberArk Workforce Identity Reviews
**Vendor:** CyberArk  
**Category:** [Identity and Access Management (IAM) Software](https://www.g2.com/categories/identity-and-access-management-iam)  
**Average Rating:** 4.5/5.0  
**Total Reviews:** 130
## About CyberArk Workforce Identity
CyberArk Identity Overview CyberArk Identity is a SaaS-delivered suite of solutions designed to simplify identity and access management in enterprises. CyberArk Identity unifies Workforce Access and Identity Management solutions in a single offering. Workforce Access capabilities include single sign-on, multi-factor authentication, session security, and credential management. Identity Management capabilities include lifecycle management, identity orchestration, and identity governance. With CyberArk Identity, organizations can secure workforce access to applications, endpoints, and infrastructure and protect themselves from the leading cause of data breaches – compromised credentials. CyberArk Identity is part of the CyberArk Identity Security Platform. Built for the dynamic enterprise, CyberArk Identity Security Platform secures access for any identity to any resource or environment from anywhere using any device. The CyberArk Identity Security Platform enables operational efficiencies with a single admin portal, streamlines meeting compliance requirements with unified audit capabilities, and delivers Identity Security Intelligence for continuous identity threat detection and protection. Workforce Access solutions: • CyberArk Single Sign-On (SSO) is an easy-to-manage solution for one-click access to your cloud, mobile, and legacy apps. CyberArk SSO enables a secure and frictionless sign-in experience for both internal and external users that adjusts based on risk. • CyberArk App Gateway is an add-on to our Single Sign-On solution that enables VPN-less access to legacy applications. It allows companies to set up per-application, per-user access to individual legacy applications hosted on-premises. • CyberArk Adaptive Multi-Factor Authentication (MFA) helps strengthen security and prevent attacks involving compromised credentials by requiring users to present multiple forms of evidence to gain access to your applications. Unlike traditional MFA solutions, CyberArk Adaptive MFA uses AI-powered behavioral analytics and contextual information to determine which authentication factors to apply to a particular user in a specific situation. • CyberArk Secure Web Sessions is a cloud-based service that enables organizations to monitor, record, and audit end-user activity within high-risk and high-value web applications. Security and compliance specialists can use Secure Web Sessions to search recorded sessions using free text input and quickly filter events by users, dates, and actions. • CyberArk Workforce Password Management is an enterprise-focused password manager providing a user-friendly solution to store business application credentials in a centralized vault and securely share them with other users in the organization. Identity Management Services: • CyberArk Identity Lifecycle Management provides an easy way to route application access requests, create application accounts, manage entitlements for those accounts, and revoke access when necessary. • CyberArk Identity Flows is an identity orchestration solution that improves security, efficiency, and productivity by automating identity data and events. With Identity Flows, organizations can orchestrate complex identity management processes and synchronize identity data across diverse applications, directory stores, and repositories. • CyberArk Identity Compliance solution continuously discovers access, streamlines access certifications, and provides comprehensive identity analytics. Identity Compliance automates manually intensive, error-prone administrative processes, ensuring all workforce and privileged access rights are properly assigned and continually certified across enterprises.



## CyberArk Workforce Identity Pros & Cons
**What users like:**

- Users appreciate the **ease of use** of CyberArk Workforce Identity, highlighted by its intuitive UI and streamlined processes. (14 reviews)
- Users love the **efficient user access reviews** and modern UI of CyberArk Workforce Identity, streamlining access management. (6 reviews)
- Users praise the **intuitive design** of CyberArk Workforce Identity, enhancing usability across diverse teams and improving security. (6 reviews)
- Users highlight the **responsiveness and friendliness of customer support** , making interactions smooth and efficient. (5 reviews)
- Users appreciate the **efficient access review capabilities** of CyberArk Workforce Identity, enhancing monitoring and management for authorized users. (4 reviews)
- Security (4 reviews)
- Setup Ease (4 reviews)
- Automation (3 reviews)
- Ease of Implementation (2 reviews)
- Easy Setup (2 reviews)

**What users dislike:**

- Users feel the **missing integrations** limit functionality, with inconsistent dashboard capabilities and data access across platforms. (4 reviews)
- Users find **integration issues** challenging, with limited platform support and cumbersome manual processes affecting productivity. (2 reviews)
- Users desire **more automation** in CyberArk Workforce Identity, as manual processes hinder efficiency and integration. (2 reviews)
- Users feel the product lacks **integrations and customization options** , limiting functionality with certain legacy platforms. (2 reviews)
- Users find it frustrating that **some processes remain manual** , hindering integration with applications unable to use the extension. (1 reviews)
- Error Handling (1 reviews)
- Implementation Difficulty (1 reviews)
- Inefficient Processes (1 reviews)
- Insufficient Information (1 reviews)
- Learning Curve (1 reviews)

## CyberArk Workforce Identity Reviews
  ### 1. Fast User-Device Linking, Needs Installation Speed Boost

**Rating:** 4.0/5.0 stars

**Reviewed by:** Dominika T. | Cybersecurity Engineer - Data Protection, Enterprise (> 1000 emp.)

**Reviewed Date:** April 28, 2026

**What do you like best about CyberArk Workforce Identity?**

I like how fast CyberArk Workforce Identity works. You just put in the search for the name of a user or device, and you get the answer if it's connected in just a few seconds. It's also helpful for checking if any installed tool, like CrowdStrike, is visible on the machine. The setup process is simple too.

**What do you dislike about CyberArk Workforce Identity?**

Sometimes it takes a while to see if Anatul had been installed. Just to check-in the server output first.

**What problems is CyberArk Workforce Identity solving and how is that benefiting you?**

I use CyberArk Workforce Identity to check if a user is assigned to a device, verifying device-user association and installed tools quickly. It's fast and lets me see connections in seconds.

  ### 2. The way Access Reviews should be!

**Rating:** 5.0/5.0 stars

**Reviewed by:** kam n. | Sr. Identity Governance Engineer, Enterprise (> 1000 emp.)

**Reviewed Date:** July 28, 2023

**What do you like best about CyberArk Workforce Identity?**

Simply put is about Access Review done right. Zilla is excellent with Access Review, they are not pretending to be other things but just Access reviews.

**What do you dislike about CyberArk Workforce Identity?**

It is still maturing and growing. Would love to see more dashboard capabilities or api into a BI tool would be a nice feature

**What problems is CyberArk Workforce Identity solving and how is that benefiting you?**

Automation of Access Reviews and the ease of integration

  ### 3. Zilla is easy to implement and to use!  It works as advertised.

**Rating:** 5.0/5.0 stars

**Reviewed by:** Verified User in Hospital & Health Care | Enterprise (> 1000 emp.)

**Reviewed Date:** March 14, 2023

**What do you like best about CyberArk Workforce Identity?**

The platform is relatively intuitive and works as demonstrated.  Our system owners even like it and have been complying with their review tasks.  Implementation-wise, it was the easiest implementation I have ever participated in. Customer support is excellent too.

**What do you dislike about CyberArk Workforce Identity?**

Needs more integrations (they offered integrations for around 70% of our platforms).  Some of our legacy platforms were annoying to get the data from.

**What problems is CyberArk Workforce Identity solving and how is that benefiting you?**

Zilla helps us with role-based access control.  It allows us to identify systems in which there are unexpected privileged accounts, and to ensure that provisioning and de-provisioning occurs in a timely fashion.

  ### 4. Access Reviews Made Simple

**Rating:** 5.0/5.0 stars

**Reviewed by:** Verified User in Information Technology and Services | Enterprise (> 1000 emp.)

**Reviewed Date:** November 07, 2024

**What do you like best about CyberArk Workforce Identity?**

It's considerably sped up our user access review process and has a nice, modern UI. No more spreadsheets for us!

**What do you dislike about CyberArk Workforce Identity?**

Upkeep and data sanitation can be tedious.

**What problems is CyberArk Workforce Identity solving and how is that benefiting you?**

Primarily user access reviews. Zilla quickly allowed us to automate the process in a few key areas, such as data collection and automating portions of the review itself, significantly reducing the time our stakeholders require to complete reviews. The out-of-the-box integrations are simple and easy to configure, and Zilla offers excellent tools for data collection if API syncs are unavailable for a specific system.

  ### 5. Great Product

**Rating:** 5.0/5.0 stars

**Reviewed by:** Nicole B. | Mid-Market (51-1000 emp.)

**Reviewed Date:** March 19, 2024

**What do you like best about CyberArk Workforce Identity?**

Zilla automated what my team had to do manually!   By managing user identities across various systems and applications within my organization.  I found the application had lots of flexibility for our use case.

**What do you dislike about CyberArk Workforce Identity?**

Nothing!  Zilla Security works great for us.

**What problems is CyberArk Workforce Identity solving and how is that benefiting you?**

Zilla offers invaluable audit and compliance reports, furnishing irrefutable evidence to uphold our regulatory obligations. With its robust access management feature, Zilla effectively safeguards against unauthorized access to sensitive data and systems, simultaneously reducing application costs per user. Furthermore, Zilla significantly aids in regulatory compliance efforts by securely providing an immutable audit trail, meticulously documenting each stage of our access review process.

  ### 6. Zilla helps audit access to multiple systems

**Rating:** 4.5/5.0 stars

**Reviewed by:** Chase S. | Enterprise (> 1000 emp.)

**Reviewed Date:** March 18, 2024

**What do you like best about CyberArk Workforce Identity?**

My favorite aspect of Zilla security is that it is a centralized location for all Vail Health users and the applications that they use. Before Zilla my organization had no way of auditing who had access to certain applications that are not tied to okta/AD.

**What do you dislike about CyberArk Workforce Identity?**

I dislike the fact that some processes in Zilla are manual. For example the mapping of users and integrating applications that are not capable of using the ZUS extension.

**What problems is CyberArk Workforce Identity solving and how is that benefiting you?**

Zilla is helping me with access reviews. Before Zilla we never had a process for reviewing access to applications that are not tied to okta/AD.

  ### 7. Have had nothing but positive things to say about using Zilla.

**Rating:** 5.0/5.0 stars

**Reviewed by:** Hubert H. | Enterprise (> 1000 emp.)

**Reviewed Date:** March 15, 2024

**What do you like best about CyberArk Workforce Identity?**

Ease of setup of access reviews.
Ease of use to the reviewer for performing reviews. 
Responsiveness of customer support to support requests.
Friendliness of the Zilla team. 
Continuous improvements or options in the tool.

**What do you dislike about CyberArk Workforce Identity?**

Some areas allow for the download of a large csv and others do not. 
Some screens expand to 500 lines others do not.

**What problems is CyberArk Workforce Identity solving and how is that benefiting you?**

The main use is for compliance requirements. We perform around 15 reviews a quarter using Zilla and the number keeps growing. It has helped the organization maintain compliance with our required regulations and controls.

  ### 8. Zilla Security- Enhanced automation of access control management.

**Rating:** 5.0/5.0 stars

**Reviewed by:** SYED ZAFFAR M. | University Faculty/ Management of resources, Mid-Market (51-1000 emp.)

**Reviewed Date:** May 25, 2024

**What do you like best about CyberArk Workforce Identity?**

We integrate Zilla security in our higher education institution to allow authorized students and subscribers access to academic resources, documents, projects and presentations. They frequently share their assignments and updates with group members remotely. This application helps us to monitor and control access management.

**What do you dislike about CyberArk Workforce Identity?**

So far, we have not faced any technical issues with this application.

**What problems is CyberArk Workforce Identity solving and how is that benefiting you?**

It provides the identity and details of all users who access our resources and automates the authorization management. Any misadventures will be detected and barred.

  ### 9. Great for executing user reviews for your financial systems

**Rating:** 4.5/5.0 stars

**Reviewed by:** Chris E. | Director, Enterprise Applications, Enterprise (> 1000 emp.)

**Reviewed Date:** March 19, 2024

**What do you like best about CyberArk Workforce Identity?**

Zilla allows me to quickly provide leadership the tools to approve the access of many financial systems users.  It also confirms that they have enabled Active Directory accounts on the network.  I am able to include a lot of information about each user, which makes their job of approving them even easier.  The Zilla support team has gone above and beyond to support us and help us better use the product.

**What do you dislike about CyberArk Workforce Identity?**

I haven't found anything that I don't like yet.  We are just now continue to expand our use of this product.

**What problems is CyberArk Workforce Identity solving and how is that benefiting you?**

Annual and semi-annual user access reviews required for audit.

  ### 10. PPFA - Zilla reivew

**Rating:** 4.5/5.0 stars

**Reviewed by:** Verified User in Hospital & Health Care | Mid-Market (51-1000 emp.)

**Reviewed Date:** March 14, 2024

**What do you like best about CyberArk Workforce Identity?**

Zilla Security is easy to use; they have fast and efficient customer services. The implementations are quick and integrations are seamless.

**What do you dislike about CyberArk Workforce Identity?**

Zilla has limitations relating to application reviews, which makes it difficult to manage our admin/user account environment. We also cannot simultaneously review admin users and inactive users t the same time.

**What problems is CyberArk Workforce Identity solving and how is that benefiting you?**

User provision and access governance tolls streamline our processes of managing user access across our organization. This is helpful relating to auditing onboarding and offboarding processes. We also like that we can review appropriate access levels and ensure least privilege.


## CyberArk Workforce Identity Discussions
  - [What are the benefits and drawbacks of using CyberArk Identity for identity and access management?](https://www.g2.com/discussions/what-are-the-benefits-and-drawbacks-of-using-cyberark-identity-for-identity-and-access-management)

- [View CyberArk Workforce Identity pricing details and edition comparison](https://www.g2.com/products/cyberark-workforce-identity/reviews/cyberark-workforce-identity-review-456978?section=pricing&secure%5Bexpires_at%5D=2026-05-16+01%3A59%3A35+-0500&secure%5Bsession_id%5D=62ed02e4-d6ab-47ed-9966-37f4ec08ac6d&secure%5Btoken%5D=9c3e20f8443c836b9198771e04187a5470d255c781a14e7c8afca62623990f27&format=llm_user)

## CyberArk Workforce Identity Features
**Authentication Options**
- Authentication User experience
- Supports Required Authentication systems
- Multi-Factor Authentication
- Supports Required Authentication Methods/Protocols
- Federation/SAML support (idp)
- Federation/SAML support (sp)

**User on/off Boarding**
- Self Service Access requests
- Smart/Automated Provisioning
- Role Management
- Policy Management
- Access Termination
- Approval Workflows

**Authentication type**
- SMS-Based
- Voice-Based Telephony
- Email-Based
- Hardware Token-Based
- Software Token
- Biometric Factor
- Mobile-Push
- Risk-Based Authentication

**Access Control**
- Role Management
- Access Termination
- Remote Access
- Partner Access

**Integration**
- Uses Open Standards
- Mobile SDK
- Workforce Authentication
- Customer Authentication

**Administration**
- Bi-Directional Identity Synchronization
- Policy Management
- Cloud Directory
- Application Integrations

**Functionality**
- Self-registration and self-service
- Authentication
- Scalability
- Consent and preference management
- Social login
- Customer data linking

**Functionality**
- FIDO2-compliant
- Works with hardware security keys
- Multiple authentication methods
- Offline or no-phone solution

**Functionality**
- User provisioning
- Password manager
- Single Sign-on
- Enforces policies
- Authentication
- Multi-factor authentication

**Monitoring**
- Investigate
- Monitoring
- Misconfigurations
- Integrate
- Visability

**Agentic AI - User and Entity Behavior Analytics (UEBA)**
- Autonomous Task Execution
- Multi-step Planning
- Proactive Assistance
- Decision Making

**Agentic AI - AWS Marketplace**
- Autonomous Task Execution
- Multi-step Planning
- Cross-system Integration

**Access Control Types**
- Endpoint access
- Local Access
- Remote Access
- Partner Access
- Supports BYOD users

**User Maintenance**
- Self Service Password Reset
- Bulk Changes
- Bi-directional Identity Synchronization

**Security**
- Security Automation
- Application Security
- Workload Protection
- Data Protection

**Administration**
- Smart/Automated Provisioning
- Policy Management
- On-premise identity repositories supported
- Ease of Connecting Applications

**Administration**
- Encryption
- Audit Trails
- Regulatory Compliance

**Analysis**
- Continuous Analysis
- Behavioral Analysis
- Data Context
- Activity Logging

** Type**
- Cloud-solution

**Remediation**
- Remediation
- Audit

**AI Authentication Risk Management - Customer Identity and Access Management (CIAM)**
- Adaptive MFA
- Anomaly Detection
- Fraudulent Login Detection
- Adaptive Authentication Policies
- Risk-Based Authentication

**Administration**
- Ease of installation on server
- Password Policy Enforcement
- Administration Console
- Ease of connecting applications
- Self Service Password Administration

**Governance**
- Identifies and Alerts for Threats
- Compliance Audits

**Identity Management**
- Adaptive Access Control
- Identity Scoring
- User Monitoring

**Functionality**
- SSO
- Multi-Factor Authentication
- Supports Required Authentication systems

**Detection**
- Anomaly Detection
- Incident Alerts
- Activity Monitoring

** Reporting**
- Tracking
- Reporting
- Access & Permission Change Reporting
- Compliance & Audit Trail Export

**Implementation**
- Easy Setup
- Mobile SDK
- Web SDK

**AI Biometric & Behavioral Analysis - Customer Identity and Access Management (CIAM)**
- Behavioral Biometric Analysis
- Liveness Detection

**Platform**
- Multiple Operating system support
- Multi-Domain Support
- Cross Browser support
- Fail over protection
- Reporting
- Auditing
- Third Party Web Services support

**Administration**
- Reporting
- Mobile App
- Ease of set up for target systems
- APIs

**Generative AI**
- AI Text Summarization
- AI Text Generation

**Authentication & Authorization - Identity and Access Management (IAM)**
- Adaptive & Contextual Access Control

**AI Context-Aware Security Controls - Customer Identity and Access Management (CIAM)**
- Account Recovery Assistants
- Constraint Enforcement

**Administration & Governance - Identity and Access Management (IAM)**
- Identity Lifecycle Management
- Self‑Service Account Management

**Generative AI - Identity and Access Management (IAM)**
- AI‑Driven Access Anomaly Detection
- Automated Policy Tuning
- Predictive Role Recommendations

## Top CyberArk Workforce Identity Alternatives
  - [Okta](https://www.g2.com/products/okta/reviews) - 4.5/5.0 (1,196 reviews)
  - [Cisco Duo](https://www.g2.com/products/cisco-duo/reviews) - 4.5/5.0 (494 reviews)
  - [OneLogin](https://www.g2.com/products/onelogin/reviews) - 4.4/5.0 (272 reviews)

