We performed a comparison between CyberArk Identity and Safe-T Secure Application Access based on real PeerSpot user reviews.
Find out what your peers are saying about Microsoft, Auth0, Okta and others in Access Management."I like the RBAC (Role-Based Access Control). It basically involves defining various roles, and then simply assigning those roles to users."
"It has machine learning and can help clients to learn the environment and understand what is happening."
"The most valuable feature of CyberArk Identity is the adaptive interface."
"The initial setup of CyberArk Identity was straightforward."
"The tool helps with authentication. It acts as an MFA for any kind of privileged access that occurs in our organization."
"The user self-service program and the Office 365 provisioning service feature are the most valuable. It is a very easy and feature-rich solution that gives priority to the users and security."
"The setup, via cloud, is simple."
"The integration capabilities, ability to integrate CyberArk into the overall IBB strategy of our current clients."
"the security level is very high. After we tested it and checked all the security aspects of the product, we found that it's highly secure."
"Safe-T is very good for users because it has plug-in for Outlook."
"If you want a very flexible system that you can easily integrate, and develop interfaces for it or plug-ins to other application environments, it's probably the most flexible"
"It's easy to use over the web. A user who is not in the office can use it and securely insert files."
"CyberArk Identity could improve by having the ability to better manage the network, such as Cisco. There seem to be some issues in this area."
"In terms of a governance platform, it's worth noting that CyberArk doesn't offer a particularly strong one."
"The product needs to leverage the cloud more, especially in the financial sector, where cloud adoption might be limited. Proper reporting within the cloud is essential. The tool should be more user-friendly to expedite access for users. The current agent-based system poses challenges if a user loses access to the server, making tasks difficult to perform. It should also improve technical support."
"The OpenID features could improve in CyberArk Identity."
"The user interface could be improved."
"More integrations would be better."
"We would like to see an improvement in the ability to manage mobile devices."
"The solution's difficulty in gaining skill sets should be improved because it's a vertical product."
"The Outlook agent is not working well for installing it in the entire office."
"One important thing that we haven't found in this product is the ability to provide a read-only view for documents. Also, the ability for the customer to add annotations to these documents."
Earn 20 points
CyberArk Identity is ranked 8th in Access Management with 17 reviews while Safe-T Secure Application Access is ranked 27th in Access Management. CyberArk Identity is rated 8.2, while Safe-T Secure Application Access is rated 7.8. The top reviewer of CyberArk Identity writes "Allows Linux and Unix administrators to login with single password ". On the other hand, the top reviewer of Safe-T Secure Application Access writes "The architecture is open to integration and development, making the product very flexible". CyberArk Identity is most compared with Microsoft Intune, CyberArk Privileged Access Manager, Microsoft Entra ID, SailPoint IdentityIQ and PingFederate, whereas Safe-T Secure Application Access is most compared with .
See our list of best Access Management vendors.
We monitor all Access Management reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.