Cloudflare Access vs CyberArk Identity comparison

Cancel
You must select at least 2 products to compare!
Cloudflare Logo
1,554 views|1,300 comparisons
100% willing to recommend
CyberArk Logo
981 views|815 comparisons
94% willing to recommend
Comparison Buyer's Guide
Executive Summary

We performed a comparison between Cloudflare Access and CyberArk Identity based on real PeerSpot user reviews.

Find out in this report how the two Access Management solutions compare in terms of features, pricing, service and support, easy of deployment, and ROI.
To learn more, read our detailed Cloudflare Access vs. CyberArk Identity Report (Updated: May 2024).
772,679 professionals have used our research since 2012.
Featured Review
Quotes From Members
We asked business professionals to review the solutions they use.
Here are some excerpts of what they said:
Pros
"Enables me to work from two locations.""It's the endpoint exposition. We don't need to expose our VPN server to the internet and need a zero-test solution. I can apply some conditional access to the endpoint that's connecting to our network to check their security policies or the security condition of their workstation. Once the workstation is trying to connect to my internal network, then I would like to check the discrete condition of these endpoints that are trying to access my internal network. We created some conditional access. We have CrowdStrike, to check if the CrowdStrike is installed, to check if it's updated, and to check for Windows updates. We created some conditional policies to check it.""For Cloudflare Access, I am using the free plan...The most valuable feature is their protection.""The tool also offers good scalability, and the dashboard, along with real-time analytics, is very good.""Cloudflare, in my opinion, was easy to implement."

More Cloudflare Access Pros →

"I found the solution to be stable.""The setup, via cloud, is simple.""The tool is a very strong and valuable enterprise solution, particularly in ensuring the continuity of service.""The initial setup of CyberArk Identity was straightforward.""It has machine learning and can help clients to learn the environment and understand what is happening.""The feature that we find most valuable is the ability to integrate multiple IDs for on-premises Active Directory.""The initial setup is straightforward. It takes me up to an hour and a half.""I like the RBAC (Role-Based Access Control). It basically involves defining various roles, and then simply assigning those roles to users."

More CyberArk Identity Pros →

Cons
"They don't have a person to provide support for customers using the solution under their free plan.""The pricing is an area that can be improved. Pricing, as far as I recall, was the source of our problems.""When there are any dynamic changes in complex applications, the tool takes a lot of time, making its analytics-related area a major matter of concern where improvements are needed.""For the topic of improvement, providing some training material is one of my suggestions."

More Cloudflare Access Cons →

"CyberArk Identity could improve by having the ability to better manage the network, such as Cisco. There seem to be some issues in this area.""There is room for improvement in documentation. The documentation could be more specific about the changes needed to achieve specific goals.""I'm not sure what needs improvement. It is a good platform.""The solution could be easier to use and I found it to be very complex involving many steps.""CyberArk Identity's GUI is an area with certain shortcomings that need improvement.""The product is not cheap, especially if you opt for an on-premise deployment requiring a complex server infrastructure. On the other hand, choosing the software as a service version simplifies infrastructure requirements but necessitates being online all the time.""The product needs to leverage the cloud more, especially in the financial sector, where cloud adoption might be limited. Proper reporting within the cloud is essential. The tool should be more user-friendly to expedite access for users. The current agent-based system poses challenges if a user loses access to the server, making tasks difficult to perform. It should also improve technical support.""They can include the Mobile Device Management (MDM) feature."

More CyberArk Identity Cons →

Pricing and Cost Advice
  • "The prices are slightly expensive."
  • "The pricing is somewhere in the middle. I would rate the pricing a seven out of ten."
  • "My company has to make yearly payments towards the licensing costs attached to the solution. There are no hidden charges apart from the licensing costs of the solution."
  • More Cloudflare Access Pricing and Cost Advice →

  • "We find that the pricing and licensing of this solution is adequate, as compared to the other competitors in the market."
  • "There is an initial license and then there is a subscription needed."
  • "I would rate the tool’s pricing a seven out of ten. The product’s pricing is expensive and is on a yearly basis. You will need to pay around 10,000 GBP for 500 users."
  • "The pricing of CyberArk Identity is competitive."
  • "There could be some additional costs apart from the licensing costs of the solution when you want to develop connectors in CyberArk Identity."
  • "In terms of pricing, BeyondTrust and CyberArk tend to be more expensive, with CyberArk receiving an eight out of ten, in this regard."
  • "CyberArk Identity is an expensive solution."
  • "It's not that affordable compared to Delinea or other products. They're less expensive and allow more customization. For the cost, it is expensive."
  • More CyberArk Identity Pricing and Cost Advice →

    report
    Use our free recommendation engine to learn which Access Management solutions are best for your needs.
    772,679 professionals have used our research since 2012.
    Questions from the Community
    Top Answer:The tool also offers good scalability, and the dashboard, along with real-time analytics, is very good.
    Top Answer:The price of Cloudflare Access is the same as compared to Akamai, but I get better performance from Cloudflare. My company has to make yearly payments towards the licensing costs attached to the… more »
    Top Answer:My company has many complex applications. When there are any dynamic changes in complex applications, the tool takes a lot of time, making its analytics-related area a major matter of concern where… more »
    Top Answer:The integration capabilities, ability to integrate CyberArk into the overall IBB strategy of our current clients.
    Top Answer:Their pricing is obviously a lot higher than many vendors in the marketplace but their service is also unmatched.
    Top Answer:In terms of general user feedback, the more security you put in front of a user, the more they complain. So usability and the user experience are always a challenge. So there's always room for… more »
    Ranking
    10th
    out of 37 in Access Management
    Views
    1,554
    Comparisons
    1,300
    Reviews
    4
    Average Words per Review
    426
    Rating
    9.0
    8th
    out of 37 in Access Management
    Views
    981
    Comparisons
    815
    Reviews
    12
    Average Words per Review
    458
    Rating
    7.8
    Comparisons
    Also Known As
    Idaptive
    Learn More
    Overview

    Cloudflare Access is a powerful identity and access management solution that provides secure and seamless access to internal resources. It eliminates the need for traditional VPNs and allows organizations to enforce granular access controls based on user identity and device posture. With Cloudflare Access, users can authenticate using their existing identity providers, such as Google or Okta, and access resources without exposing them to the public internet. This ensures that only authorized users can access sensitive data and applications. 

    Additionally, Cloudflare Access provides a unified dashboard for managing access policies, making it easy to enforce security policies across the organization. With its zero-trust approach, Cloudflare Access helps organizations protect their resources from unauthorized access and potential data breaches.

    CyberArk Identity is a versatile identity management solution suitable for a wide range of enterprises. It is designed to enhance enterprise security and improve user experience. Its focus on security, compliance, and operational efficiency, combined with positive user feedback, makes it a strong contender in the identity management space.

    CyberArk Identity offers a robust suite of features to manage user identities and access privileges. It focuses on securing access to resources across various environments, including cloud and on-premises applications. Its capabilities include single sign-on (SSO), multi-factor authentication (MFA), lifecycle management, and privileged access management. These features are engineered to streamline access control, enhance security, and ensure compliance with regulatory standards.

    • Single Sign-On (SSO) simplifies user access by providing a single authentication point for multiple applications.
    • Multi-Factor Authentication (MFA) adds an extra layer of security by requiring additional verification methods.
    • Lifecycle Management automates user account provisioning and deprovisioning, aligning with HR processes and compliance requirements.
    • Privileged Access Management secures and monitors access to critical systems and data by privileged users.

    According to our user interviews, CyberArk Identity is praised for its reliability and user-friendly interface. IT professionals highlight the ease of integration with existing systems, while business executives appreciate the visibility it provides into access and identity management across the organization. Users also commend the responsive customer support, which is crucial for enterprise-level solutions.

    IT Professionals found that CyberArk Identity's focus on multi-layered security significantly reduced the risk of data breaches and unauthorized access. With a centralized dashboard and automation features, you can streamline identity and access management tasks, saving time and reducing complexity. Finally, it helps meet various compliance requirements.

    Sample Customers
    23andMe
    MLB, Citi, Pfizer, SulAmerica, GE Capital, Shiseido
    Top Industries
    VISITORS READING REVIEWS
    Computer Software Company14%
    Financial Services Firm10%
    Government8%
    Manufacturing Company7%
    REVIEWERS
    Financial Services Firm30%
    Computer Software Company30%
    Insurance Company10%
    Consumer Goods Company10%
    VISITORS READING REVIEWS
    Financial Services Firm15%
    Computer Software Company14%
    Manufacturing Company8%
    Insurance Company8%
    Company Size
    VISITORS READING REVIEWS
    Small Business27%
    Midsize Enterprise19%
    Large Enterprise54%
    REVIEWERS
    Small Business55%
    Midsize Enterprise10%
    Large Enterprise35%
    VISITORS READING REVIEWS
    Small Business22%
    Midsize Enterprise14%
    Large Enterprise64%
    Buyer's Guide
    Cloudflare Access vs. CyberArk Identity
    May 2024
    Find out what your peers are saying about Cloudflare Access vs. CyberArk Identity and other solutions. Updated: May 2024.
    772,679 professionals have used our research since 2012.

    Cloudflare Access is ranked 10th in Access Management with 5 reviews while CyberArk Identity is ranked 8th in Access Management with 18 reviews. Cloudflare Access is rated 8.8, while CyberArk Identity is rated 8.2. The top reviewer of Cloudflare Access writes "Replaces traditional VPN and enables endpoint exposition ". On the other hand, the top reviewer of CyberArk Identity writes "Allows Linux and Unix administrators to login with single password ". Cloudflare Access is most compared with Twingate, Prisma Access by Palo Alto Networks, Zscaler Zero Trust Exchange, Auth0 and Google Cloud Platform Cloud Identity-Aware Proxy, whereas CyberArk Identity is most compared with Microsoft Intune, CyberArk Privileged Access Manager, Microsoft Entra ID, Ping Identity Platform and Salesforce Identity. See our Cloudflare Access vs. CyberArk Identity report.

    See our list of best Access Management vendors.

    We monitor all Access Management reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.