We performed a comparison between CyberArk Identity and Safe-T Secure Application Access based on real PeerSpot user reviews.
Find out what your peers are saying about Microsoft, Auth0, Okta and others in Access Management."The integration capabilities, ability to integrate CyberArk into the overall IBB strategy of our current clients."
"The most valuable features of CyberArk Identity are its ability to control access to administrative staff."
"The tool helps with authentication. It acts as an MFA for any kind of privileged access that occurs in our organization."
"The feature that we find most valuable is the ability to integrate multiple IDs for on-premises Active Directory."
"CyberArk Identity is a mature product."
"The user self-service program and the Office 365 provisioning service feature are the most valuable. It is a very easy and feature-rich solution that gives priority to the users and security."
"The initial setup is straightforward. It takes me up to an hour and a half."
"The setup, via cloud, is simple."
"It's easy to use over the web. A user who is not in the office can use it and securely insert files."
"Safe-T is very good for users because it has plug-in for Outlook."
"If you want a very flexible system that you can easily integrate, and develop interfaces for it or plug-ins to other application environments, it's probably the most flexible"
"the security level is very high. After we tested it and checked all the security aspects of the product, we found that it's highly secure."
"The solution could be easier to use and I found it to be very complex involving many steps."
"We would like to see an improvement in the ability to manage mobile devices."
"In terms of general user feedback, the more security you put in front of a user, the more they complain. So usability and the user experience are always a challenge. So there's always room for improvement."
"They can include the Mobile Device Management (MDM) feature."
"The tool has issues with the third-party SMS gateway. The solution has its own SMS gateway. Integration support is a challenge when we don’t use their SMS gateway. The tool also needs to improve its scalability."
"The solution's difficulty in gaining skill sets should be improved because it's a vertical product."
"The user interface could be improved."
"The product needs to leverage the cloud more, especially in the financial sector, where cloud adoption might be limited. Proper reporting within the cloud is essential. The tool should be more user-friendly to expedite access for users. The current agent-based system poses challenges if a user loses access to the server, making tasks difficult to perform. It should also improve technical support."
"The Outlook agent is not working well for installing it in the entire office."
"One important thing that we haven't found in this product is the ability to provide a read-only view for documents. Also, the ability for the customer to add annotations to these documents."
Earn 20 points
CyberArk Identity is ranked 8th in Access Management with 17 reviews while Safe-T Secure Application Access is ranked 27th in Access Management. CyberArk Identity is rated 8.2, while Safe-T Secure Application Access is rated 7.8. The top reviewer of CyberArk Identity writes "Allows Linux and Unix administrators to login with single password ". On the other hand, the top reviewer of Safe-T Secure Application Access writes "The architecture is open to integration and development, making the product very flexible". CyberArk Identity is most compared with Microsoft Intune, CyberArk Privileged Access Manager, Microsoft Entra ID, SailPoint IdentityIQ and PingFederate, whereas Safe-T Secure Application Access is most compared with .
See our list of best Access Management vendors.
We monitor all Access Management reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.