We just raised a $30M Series A: Read our story

Compare Akamai Identity Cloud vs. CyberArk Identity

Cancel
You must select at least 2 products to compare!
Featured Review
Find out what your peers are saying about Microsoft, Fortinet, Frontegg and others in Single Sign-On (SSO). Updated: November 2021.
552,305 professionals have used our research since 2012.
Quotes From Members

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:

Pricing and Cost Advice
"Azure Active Directory is more expensive than Google, but the capabilities they provide are superior.""Microsoft has a free version of Azure AD. So, if you don't do a lot of advanced features, then you can use the free version, which is no cost at all because it is underpinning Office 365. Because Microsoft gives it to you as a SaaS, so there are no infrastructure costs whatsoever that you need to incur. If you use the free version, then it is free. If you use the advanced features (that we use), it is a license fee per user.""The basic tier of Azure Active Directory is free, so many users use the service for free. For a small company having the security and compliance that Azure offers is a great benefit. For small companies that are using the basic services, not having to pay for Azure Active Directory is the main asset because they can manage their users and have authentications tools and security.""Licensing fees are paid on a monthly basis and the cost depends on the number of users.""Azure Active Directory has a very extensive licensing model. Most of the features are available in the free and basic version, and then there are premium P1 and P2 editions. The licensing model is based on how many users you have per month. In Australia, for a P1 license, the cost is 8 dollars. With P1 and P2 licenses, you get a lot of goodies around the security side of things. For example, User Identity Protection is available only in P2. These are extra features that allow you to have a pretty good security posture, but most of the required things are available in the free and basic version.""Be sure: You know your userbase, e.g., how many users you have. You choose the right license and model that suit your business requirements.""The P1 version costs $6 per user per month.""For the Czech people, the solution is not cheap, as we are not a rich country. However, for most countries, the product pricing is acceptable."

More Azure Active Directory Pricing and Cost Advice »

Information Not Available
Information Not Available
report
Use our free recommendation engine to learn which Single Sign-On (SSO) solutions are best for your needs.
552,305 professionals have used our research since 2012.
Questions from the Community
Top Answer: All of the features are amazing, such as identity governance and privileged identity management.
Top Answer: It can be a bit expensive for organizations, but they do have different pricing models. Their free tier can be used on a… more »
Top Answer: Azure Active Directory could benefit by adding the capability for identity life cycle for the on-premise solution. For… more »
Ask a question

Earn 20 points

Top Answer: I found the solution to be stable.
Top Answer: The solution could be easier to use and I found it to be very complex involving many steps.
Top Answer: I rate CyberArk Identity an eight out of ten.
Comparisons
Also Known As
Idaptive
Learn More
Overview

The Azure Active Directory (Azure AD) enterprise identity service provides single sign-on and multi-factor authentication to help protect your users from 99.9 percent of cybersecurity attacks. With Azure Active Directory, you get:

- Single sign-on enabling access to your apps from anywhere

- Conditional Access and multi-factor authentication to help protect and govern access

- A single identity platform to engage with internal and external users more securely

- Developer tools to easily integrate identity into your apps and services 

To learn more about our solution, ask questions, and share feedback, join our Microsoft Security, Compliance and Identity Community.

Security Monitoring, Blocking, and Fraud Protections
Akamai Identity Cloud continuously monitors our production environments for the state and health of the Akamai Identity Cloud platform. We gather detailed key performance indicator (KPI) metrics on uptime and availability for every service. Abnormalities trigger alerts to the Network Operations Command Center (NOCC) staff, on-call 24/7/365.

Brute Force Attacks (Account Takeovers)
Akamai Identity Cloud offers account-locking functionality to protect against brute force password attempts. After a specific number of failed attempts from a user, Akamai Identity Cloud locks an account. This feature is completely customizable Customers determine when and how to block additional login attempts. In addition, the Akamai Identity Cloud offers CAPTCHA- and SMS-based authentication options. Customers can choose to implement these for step-up authentication at any login attempt threshold.

Advanced Persistent Distributed Attacks
Akamai Identity Cloud has experience in successfully staving off distributed attacks. By proactively monitoring for bots/malicious activity — correlating dozens of custom metrics specific to login and registration — we can block the numerous sets of dynamic IPs that malicious actors spin during an attack.

Through IP-blocking and whitelisting, Akamai Identity Cloud can ensure that access is granted only when authorized. For example, Akamai Identity Cloud can identify IP addresses from specific countries or regions and block them from registering and/or logging in on a per customer choice (geoblocking). It can also block specific lists of IP addresses (e.g., lists of known bad IP addresses and black hat-associated IP addresses). If IP addresses are legitimate but exceptions to standard rules, or if they’ve been erroneously added to blacklists, Akamai Identity Cloud can whitelist them ensuring that IP addresses on this list are always accepted.

Denial-of-Service Attacks
Online Business Systems, Inc., an external third-party penetration testing firm, tested Akamai Identity Cloud’s ability to withstand DoS attacks. Bot mitigation strategies include rate limiting to mitigate bot DoS attacks, reCAPTCHA to mitigate bots that create fake user profiles, and both client- and server-side validation to ensure that all field values are legitimate.

Trend Monitoring
Akamai Identity Cloud employs custom API monitoring on a per-customer basis to establish trends in usage as well as to identify and block abnormal usage patterns. It is proven to successfully identify and mitigate malicious activity on behalf of Akamai Identity Cloud customers. And because each customer is unique, Akamai Identity Cloud can implement alerting and blocking rules that reflect inherent trend differentiations.

Adjusting a customers custom blocking rules is a collaborative process between Akamai Identity Cloud and the customer. Different customers have different risk appetites and risk tolerances, and these affect trade-offs between blocking some legitimate traffic and assuming some costs of fraud. Advanced persistent attacks might involve multiple adjustments of the custom policy engine rules.

Intrusion Detection
OSSEC intrusion detection system automatically reviews logs for suspicious activity on a regular basis. New account creation fraud protections include CAPTCHA- and SMS-based authentication — options that a customer may choose to implement as a step-up authentication protection against scripted account creation attacks. Akamai Identity Cloud proactively monitors for bots/malicious activity by correlating dozens of custom metrics specific to login and registration, as well as by identifying anomalies specific to a customer’s unique traffic patterns.

GRANT ACCESS TO YOUR WORKFORCE. GIVE NOTHING TO ATTACKERS.
Your users need quick access to a variety of business resources. You need confidence it’s them knocking – not an attacker. With CyberArk Workforce Identity, you can empower your workforce while keeping threats out.

Frictionless Sign On
Keep workers working, not logging in and out.

Adaptive Authentication
Make intelligent access decisions based on AI-powered analytics.

Secure Everywhere
Enable access across any device, anywhere at just the right time.

Offer
Learn more about Azure Active Directory
Learn more about Akamai Identity Cloud
Learn more about CyberArk Identity
Sample Customers
Azure Active Directory is trusted by companies of all sizes and industries including Walmart, Zscaler, Uniper, Amtrak, monday.com, and more.
Best Buy, Audi, Fox, IBM, Fiat, Honda
MLB, Citi, Pfizer, SulAmerica, GE Capital, Shiseido
Top Industries
REVIEWERS
Financial Services Firm18%
Computer Software Company14%
Manufacturing Company12%
Insurance Company6%
VISITORS READING REVIEWS
Computer Software Company32%
Comms Service Provider17%
Financial Services Firm6%
Government6%
VISITORS READING REVIEWS
Computer Software Company29%
Comms Service Provider15%
Government9%
Wholesaler/Distributor6%
VISITORS READING REVIEWS
Computer Software Company33%
Government10%
Comms Service Provider8%
Energy/Utilities Company8%
Company Size
REVIEWERS
Small Business32%
Midsize Enterprise13%
Large Enterprise55%
VISITORS READING REVIEWS
Small Business15%
Midsize Enterprise13%
Large Enterprise72%
No Data Available
No Data Available
Find out what your peers are saying about Microsoft, Fortinet, Frontegg and others in Single Sign-On (SSO). Updated: November 2021.
552,305 professionals have used our research since 2012.

Akamai Identity Cloud is ranked 22nd in Single Sign-On (SSO) while CyberArk Identity is ranked 10th in Single Sign-On (SSO) with 2 reviews. Akamai Identity Cloud is rated 0.0, while CyberArk Identity is rated 9.0. On the other hand, the top reviewer of CyberArk Identity writes "Easy and feature-rich solution with good self-service program and Office 365 provisioning". Akamai Identity Cloud is most compared with Auth0, PingFederate and Symantec Siteminder, whereas CyberArk Identity is most compared with Microsoft Intune, Okta Workforce Identity, SailPoint IdentityIQ and LastPass Business.

See our list of best Single Sign-On (SSO) vendors.

We monitor all Single Sign-On (SSO) reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.