We performed a comparison between Cloudflare Access and CyberArk Identity based on real PeerSpot user reviews.
Find out in this report how the two Access Management solutions compare in terms of features, pricing, service and support, easy of deployment, and ROI."Cloudflare, in my opinion, was easy to implement."
"It's the endpoint exposition. We don't need to expose our VPN server to the internet and need a zero-test solution. I can apply some conditional access to the endpoint that's connecting to our network to check their security policies or the security condition of their workstation. Once the workstation is trying to connect to my internal network, then I would like to check the discrete condition of these endpoints that are trying to access my internal network. We created some conditional access. We have CrowdStrike, to check if the CrowdStrike is installed, to check if it's updated, and to check for Windows updates. We created some conditional policies to check it."
"Enables me to work from two locations."
"For Cloudflare Access, I am using the free plan...The most valuable feature is their protection."
"The tool also offers good scalability, and the dashboard, along with real-time analytics, is very good."
"The setup, via cloud, is simple."
"The feature that we find most valuable is the ability to integrate multiple IDs for on-premises Active Directory."
"The initial setup of CyberArk Identity was straightforward."
"It has machine learning and can help clients to learn the environment and understand what is happening."
"The user identification is simplified, and managing user privileges, whether adding or revoking them, is also quite straightforward when utilizing CyberArk SaaS."
"If anyone makes an error, or if an incident occurs by accident, the business will not be harmed as a result of this activity."
"CyberArk Identity is a mature product."
"The most valuable features of CyberArk Identity are its ability to control access to administrative staff."
"When there are any dynamic changes in complex applications, the tool takes a lot of time, making its analytics-related area a major matter of concern where improvements are needed."
"For the topic of improvement, providing some training material is one of my suggestions."
"The pricing is an area that can be improved. Pricing, as far as I recall, was the source of our problems."
"They don't have a person to provide support for customers using the solution under their free plan."
"There is room for improvement in documentation. The documentation could be more specific about the changes needed to achieve specific goals."
"CyberArk Identity could improve by having the ability to better manage the network, such as Cisco. There seem to be some issues in this area."
"In terms of general user feedback, the more security you put in front of a user, the more they complain. So usability and the user experience are always a challenge. So there's always room for improvement."
"I'm not sure what needs improvement. It is a good platform."
"More integrations would be better."
"They can include the Mobile Device Management (MDM) feature."
"We would like to see an improvement in the ability to manage mobile devices."
"They could improve their UI and make everything more user-friendly."
Cloudflare Access is ranked 9th in Access Management with 5 reviews while CyberArk Identity is ranked 8th in Access Management with 17 reviews. Cloudflare Access is rated 8.8, while CyberArk Identity is rated 8.2. The top reviewer of Cloudflare Access writes "Replaces traditional VPN and enables endpoint exposition ". On the other hand, the top reviewer of CyberArk Identity writes "Allows Linux and Unix administrators to login with single password ". Cloudflare Access is most compared with Twingate, Prisma Access by Palo Alto Networks, Zscaler Zero Trust Exchange, Auth0 and Google Cloud Platform Cloud Identity-Aware Proxy, whereas CyberArk Identity is most compared with Microsoft Intune, CyberArk Privileged Access Manager, Microsoft Entra ID, SailPoint IdentityIQ and PingID. See our Cloudflare Access vs. CyberArk Identity report.
See our list of best Access Management vendors.
We monitor all Access Management reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.