Compare CyberArk Identity vs. UserLock

Cancel
You must select at least 2 products to compare!
CyberArk Identity Logo
1,370 views|1,023 comparisons
UserLock Logo
398 views|209 comparisons
Most Helpful Review
Find out what your peers are saying about Microsoft, Okta, ForgeRock and others in Access Management. Updated: June 2021.
511,521 professionals have used our research since 2012.
Quotes From Members

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:

Pros
"The feature that we find most valuable is the ability to integrate multiple IDs for on-premises Active Directory.""The user self-service program and the Office 365 provisioning service feature are the most valuable. It is a very easy and feature-rich solution that gives priority to the users and security."

More CyberArk Identity Pros »

"The most valuable features are two-factor authentication and real-time logon monitoring."

More UserLock Pros »

Cons
"We would like to see an improvement in the ability to manage mobile devices.""They can include the Mobile Device Management (MDM) feature."

More CyberArk Identity Cons »

"The product and service are already great as it is but if I could add one feature, I guess it would be nice to have another factor of authentication (two additional factors) like your phone and a token for example, for when people forget their phone at home."

More UserLock Cons »

Pricing and Cost Advice
"We find that the pricing and licensing of this solution is adequate, as compared to the other competitors in the market."

More CyberArk Identity Pricing and Cost Advice »

"You will be hard-pressed to find better pricing."

More UserLock Pricing and Cost Advice »

report
Use our free recommendation engine to learn which Access Management solutions are best for your needs.
511,521 professionals have used our research since 2012.
Questions from the Community
Top Answer: The user self-service program and the Office 365 provisioning service feature are the most valuable. It is a very easy and feature-rich solution that gives priority to the users and security.
Top Answer: They can include the Mobile Device Management (MDM) feature.
Top Answer: We sell as well as use this solution for our IT operations. We are using it for single sign-on. We are a small company, and we have a few users of this solution.
Top Answer: The most valuable features are two-factor authentication and real-time logon monitoring.
Top Answer: You will be hard-pressed to find better pricing.
Top Answer: The product and service are already great as it is but if I could add one feature, I guess it would be nice to have another factor of authentication (two additional factors) like your phone and a… more »
Ranking
10th
out of 28 in Access Management
Views
1,370
Comparisons
1,023
Reviews
2
Average Words per Review
298
Rating
9.0
9th
out of 28 in Access Management
Views
398
Comparisons
209
Reviews
1
Average Words per Review
506
Rating
10.0
Popular Comparisons
Also Known As
Idaptive
Learn More
Overview

GRANT ACCESS TO YOUR WORKFORCE. GIVE NOTHING TO ATTACKERS.
Your users need quick access to a variety of business resources. You need confidence it’s them knocking – not an attacker. With CyberArk Workforce Identity, you can empower your workforce while keeping threats out.

Frictionless Sign On
Keep workers working, not logging in and out.

Adaptive Authentication
Make intelligent access decisions based on AI-powered analytics.

Secure Everywhere
Enable access across any device, anywhere at just the right time.

Two Factor Authentication & Access Management for Windows Active Directory.

UserLock helps administrators to manage and secure access for every user, without obstructing employees or frustrating IT.

Two Factor Authentication on Windows logon, RDP and VPN connections. UserLock supports 2FA using authenticator applications which include Google Authenticator, Microsoft Authenticator and LastPass Authenticator, or programmable hardware tokens such as YubiKey and Token2.

Access Restrictions: Using the contextual information around a user’s logon, UserLock will authorize, deny or limit how a user can access the network, once authenticated.

Access Monitoring: Track and alert on all users’ logon and logoff activity in real-time. Interact remotely with any session and respond to login behavior. 

Access Auditing: Record and report on all user connection events to provide a central audit across the whole network.

Offer
Learn more about CyberArk Identity
Learn more about UserLock
Sample Customers
MLB, Citi, Pfizer, SulAmerica, GE Capital, Shiseido
Barclays, US Department of Justice, National Bank of Kuwait, Turkish Aerospace, New York Albany School District, Regtransfers, University of Kent, Camden City School District, Oklahoma City Public Schools, Bank of Cyprus, Detran-PE: Pernambuco State Traffic Department
Top Industries
VISITORS READING REVIEWS
Computer Software Company40%
Energy/Utilities Company9%
Comms Service Provider7%
Government7%
VISITORS READING REVIEWS
Comms Service Provider29%
Government18%
Computer Software Company11%
Educational Organization5%
Find out what your peers are saying about Microsoft, Okta, ForgeRock and others in Access Management. Updated: June 2021.
511,521 professionals have used our research since 2012.

CyberArk Identity is ranked 10th in Access Management with 2 reviews while UserLock is ranked 9th in Access Management with 1 review. CyberArk Identity is rated 9.0, while UserLock is rated 10.0. The top reviewer of CyberArk Identity writes "A stable solution for accessing on-premises active directory". On the other hand, the top reviewer of UserLock writes "Affordable, easy to use, and integrates well with Active Directory". CyberArk Identity is most compared with Azure Active Directory, Okta Workforce Identity, Microsoft Intune, SailPoint IdentityNow and LastPass Enterprise, whereas UserLock is most compared with Duo Security, NEVIS nevisAuth, Azure Active Directory and Gluu.

See our list of best Access Management vendors.

We monitor all Access Management reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.