We performed a comparison between Citrix Endpoint Management and CyberArk Identity based on real PeerSpot user reviews.
Find out what your peers are saying about Microsoft, VMware, ManageEngine and others in UEM (Unified Endpoint Management)."By using Microsoft Intune we can control which websites the users can go to and it provides a secure environment for our employees using their laptops that are having access from home. We have installed Intune to control the user's environment minimizing the chances of any hacking."
"The performance of Microsoft Intune is good."
"The solution has reduced the risk of security breaches by 30%."
"It's easy to deploy a configuration or policy to a system, especially when you don't have Azure AD. Now we are talking to all these small and medium-sized customers who don't necessarily have an on-premise Windows Active Directory. If they have invested in Office 365 Premium, this functionality becomes available to them."
"It is a stable solution."
"...Intune itself integrates with that entire Microsoft ecosystem. As an individual product itself, it's okay. It holds up. But when you start saying "I've bought this as part of a wider solution, as a company we are going Microsoft throughout," then it makes more sense to have Microsoft Intune... so you have that single dashboard."
"It's normally able to meet 100% expectations of our customers."
"It has a useful device management feature."
"A valuable feature of Citrix Endpoint Management is that it's stable. The stability is not a challenge among the move to the cloud."
"The MAM applications of the product are great."
"ShareFile, in particular, is valuable with its ease of sharing, and the best category security that is in the hands of users."
"One key feature is secure application delivery, which enables the secure delivery of mobile and web applications to end-user devices. This ensures data protection and compliance with corporate policies."
"The product is capable of acting in many different ways to help secure architecture."
"We have seen improvements in compliance management on the devices."
"The feature that we find most valuable is the ability to integrate multiple IDs for on-premises Active Directory."
"The setup, via cloud, is simple."
"The tool helps with authentication. It acts as an MFA for any kind of privileged access that occurs in our organization."
"The most valuable feature of CyberArk Identity is the adaptive interface."
"I found the solution to be stable."
"I like the RBAC (Role-Based Access Control). It basically involves defining various roles, and then simply assigning those roles to users."
"The most valuable features of CyberArk Identity are its ability to control access to administrative staff."
"The initial setup is straightforward. It takes me up to an hour and a half."
"The installation is very easy. However, to be able to configure it you will need special knowledge, such as training or self-studies to have a proper level of security. There are many settings one has to understand before being able to implement Microsoft Intune."
"We faced issues with macOS support. The product should have better inventory and asset management."
"The reporting and cost have room for improvement."
"The configuration could be better by consolidating options and making it simpler."
"The product needs to upgrade itself when the server is overloaded."
"One big problem with Microsoft is that they're changing the names of the products quite often, or they're quite consistently doing so. Intune is now Endpoint administration. Constantly switching the user interface or the administrative interface makes it quite hard to keep pace. If you are on a two-week holiday and you come back and look at the same screen you have looked at for the last couple of months, it looks different, which is annoying. Changing things around all the time doesn't make it easy."
"It would really be helpful to have the option to manage server operating systems as well, like Windows Server, at least. That way, we could scrap the use of SCCM, which requires a lot of on-premises infrastructure."
"An area for improvement is the absence of seamless integration, particularly with external dashboards."
"Requires integrating with ABM before enabling some of the features."
"Citrix needs to improve the architecture. They also need to strengthen the application integration. They keep referring to some things to be required as security, and they keep selling the next level and on-premise separately. They should give the customer the opportunity to decide whether they want to use the next level on-premise or on-cloud, but they should not charge additional fees if the customer wants to deploy the next level on-premise because the customer is already being charged as the end user. They should allow next level on-premise optimization without any additional charges."
"Support for inventory management of Apple devices should be added."
"Citrix often depends on other services like backend data centers, network security, and application firewalls. Issues in these areas can be misinterpreted as Citrix issues by users."
"The tool’s battery usage was high."
"CyberArk Identity could improve by having the ability to better manage the network, such as Cisco. There seem to be some issues in this area."
"There is room for improvement in documentation. The documentation could be more specific about the changes needed to achieve specific goals."
"They can include the Mobile Device Management (MDM) feature."
"The solution could be easier to use and I found it to be very complex involving many steps."
"In terms of general user feedback, the more security you put in front of a user, the more they complain. So usability and the user experience are always a challenge. So there's always room for improvement."
"The tool has issues with the third-party SMS gateway. The solution has its own SMS gateway. Integration support is a challenge when we don’t use their SMS gateway. The tool also needs to improve its scalability."
"The OpenID features could improve in CyberArk Identity."
"I'm not sure what needs improvement. It is a good platform."
Citrix Endpoint Management is ranked 7th in UEM (Unified Endpoint Management) with 10 reviews while CyberArk Identity is ranked 9th in Single Sign-On (SSO) with 17 reviews. Citrix Endpoint Management is rated 8.2, while CyberArk Identity is rated 8.2. The top reviewer of Citrix Endpoint Management writes "Offers flexible application management that allows secure delivery of applications to endpoints, enabling users to operate applications on the go". On the other hand, the top reviewer of CyberArk Identity writes "Allows Linux and Unix administrators to login with single password ". Citrix Endpoint Management is most compared with VMware Workspace ONE, MOBI, ManageEngine Endpoint Central, Cisco Meraki Systems Manager (MDM+EMM) and Ivanti Endpoint Manager, whereas CyberArk Identity is most compared with CyberArk Privileged Access Manager, Microsoft Entra ID, SailPoint IdentityIQ, PingFederate and VMware Workspace ONE.
We monitor all UEM (Unified Endpoint Management) reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.