We performed a comparison between CyberArk Identity and VMware Workspace ONE based on real PeerSpot user reviews.
Find out what your peers are saying about Microsoft, Cisco, Auth0 and others in Single Sign-On (SSO)."If anyone makes an error, or if an incident occurs by accident, the business will not be harmed as a result of this activity."
"The user identification is simplified, and managing user privileges, whether adding or revoking them, is also quite straightforward when utilizing CyberArk SaaS."
"The solution helps with auditing, and monitoring, and integrates with Splunk for log analysis. User activity logs are captured in CyberArk Identity and sent to external tools like Splunk for analysis and monitoring."
"The tool helps with authentication. It acts as an MFA for any kind of privileged access that occurs in our organization."
"The initial setup of CyberArk Identity was straightforward."
"The most valuable features of CyberArk Identity are its ability to control access to administrative staff."
"The initial setup is straightforward. It takes me up to an hour and a half."
"The setup, via cloud, is simple."
"The product offers integration capabilities with third-party solutions."
"The most valuable feature of VMware Workspace ONE is its reliability."
"The most valuable feature is the interface with SCAP, which is the Security Content Automation Protocol."
"AirWatch has one of the best User Interfaces and it's quite easy to figure out where particular items are within the menu system."
"The feature that we find most valuable is the corporate email pushing."
"Remote management is most valuable. It allows you to manage multiple types of devices. It is not just limited to laptops or desktops. You can also manage IoT devices. If a device is lost or stolen, you can easily take control of the device without letting any information get leaked."
"We've configured single sign-on for two or three enterprise customers, and it works very well."
"It's all about securing data with the help of the email client called VMware Boxer. It enables the end-user to carry data in their mobile devices but there is containerization between the personal data and the organization's data. It helps enhance their security while still carrying their own BYOD."
"The product needs to leverage the cloud more, especially in the financial sector, where cloud adoption might be limited. Proper reporting within the cloud is essential. The tool should be more user-friendly to expedite access for users. The current agent-based system poses challenges if a user loses access to the server, making tasks difficult to perform. It should also improve technical support."
"They can include the Mobile Device Management (MDM) feature."
"CyberArk Identity could improve by having the ability to better manage the network, such as Cisco. There seem to be some issues in this area."
"In terms of general user feedback, the more security you put in front of a user, the more they complain. So usability and the user experience are always a challenge. So there's always room for improvement."
"The OpenID features could improve in CyberArk Identity."
"In terms of a governance platform, it's worth noting that CyberArk doesn't offer a particularly strong one."
"The user interface could be improved."
"The solution's difficulty in gaining skill sets should be improved because it's a vertical product."
"There are other solutions that might be better for certain use cases. This is not an all-purpose solution."
"Technical support needs to be more responsive to our requests."
"There could be ease of integration within the environment. I didn't have any issues when using it, but the integration part was a bit difficult for the other team."
"Pricing is the only challenge right now. The licensing fee should be simplified a little bit. They have kept too many products as add ons. These need to be bundled with the low-cost, standard version. This will help customers in adopting this technology at a faster pace."
"Sometimes, we have challenges with remote patching and remote version upgrades."
"From an improvement perspective, there is a need for discounts to be offered by the solution since it is something that any organization can expect from the product."
"This product makes use of SAML across the board, which has seven known security flaws. It would be good if the company created a way to protect against SAML flaws. One way would be to integrate a firewall server or an endpoint out in the cloud with which you could establish trust. If you knew nothing about SAML and you did some Google searches about what SAML is, what are the flaws, and what are the known vulnerabilities, eventually, you'll find that there are seven flaws. There are two methods that you can use to solve those seven problems. They essentially involve putting a firewall or putting rules, such as access controls, so that anybody in the world can't just come in, authenticate, and either be a good guy or be someone trying to knock on my door and get into my house. If I could eliminate that, it would be awesome."
"One thing VMware needs to improve is compatibility with different operating systems."
CyberArk Identity is ranked 9th in Single Sign-On (SSO) with 17 reviews while VMware Workspace ONE is ranked 2nd in UEM (Unified Endpoint Management) with 81 reviews. CyberArk Identity is rated 8.2, while VMware Workspace ONE is rated 8.2. The top reviewer of CyberArk Identity writes "Allows Linux and Unix administrators to login with single password ". On the other hand, the top reviewer of VMware Workspace ONE writes "The solution is stable, scalable, and offers single sign-on". CyberArk Identity is most compared with Microsoft Intune, CyberArk Privileged Access Manager, Microsoft Entra ID, SailPoint IdentityIQ and Microsoft BitLocker, whereas VMware Workspace ONE is most compared with Microsoft Intune, VMware Horizon, Jamf Pro, SOTI MobiControl and ManageEngine Endpoint Central.
We monitor all Single Sign-On (SSO) reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.