Ping Identity Competitors and Alternatives

The top Ping Identity competitors are
  • SailPoint IdentityIQ
  • ForgeRock
  • IBM Tivoli Access Manager
  • CyberArk Privileged Access Security
  • CA Identity Suite
  • Oracle Identity Manager (Oracle IAM)
  • Gigya Customer Identity Management
  • Quest One Identity Manager
Read reviews of Ping Identity competitors and alternatives
Thorsten Butschke
owner at Butschke IT Services
Nov 03 2017

What is most valuable?

Everything (location, cost center, department, business role, etc.) is a role. The Data Importer is a great tool to... more»

How has it helped my organization?

We were able to connect 300+ SAP clients who were requesting access to SAP roles with the software. We also established... more»

What needs improvement?

Some internal structures are in place because of already depreciated functions back from the time when the solution was... more»

What's my experience with pricing, setup cost, and licensing?

Start with an operations team that is motivated to learn a lot in a short period of time. The longer you wait, the more... more»

Which other solutions did I evaluate?


What other advice do I have?

Great product, which I would recommend. It has a huge learning curve, but could solve all your IAM challenges. Make... more»
Eric Vanatta
Real User
Identity and Access Management System Administrator Sr. at a financial services firm with 1,001-5,000 employees
Jan 16 2018

What do you think of CyberArk Privileged Access Security?

Primary Use Case: CyberArk PAS is our go-to solution for securing against the pass the hash attack vector and auditing privileged account usage. • Improvements to My Organization: The CyberArk PAS has greatly increased our insight into how privileged accounts are being used and distributed within our footprint. • Valuable Features: Ease of use The auditing capabilities The great support of their customer success teams • Room for Improvement: Areas the product could be improved are in some of the reporting capabilities and how the reports are configured. • Use of Solution: One to three years.
Senior IT Risk Management and Compliance Assurance Security Specialist at a energy/utilities company with 10,001+ employees
Feb 25 2018

What is most valuable?

The proactive controls which can be configured to a granular level allowing the organization the flexibility to meet the changing demands of the workforce.

How has it helped my organization?

It has improved my organization tremendously. When compared to its introduction five years ago, OIM in my organization has improved its use and dependability, allowing us to pass audit each time.

What needs improvement?

Reconciliation exceptions. Automation of validation exercises performed by humans over Recon Exceptions generated as a result of an access synchronization event over a user's need for access or not.

Sign Up with Email