Skip to main content
TrustRadius
CyberArk Workforce Identity

CyberArk Workforce Identity
Formerly Idaptive Next-Gen Access

Overview

What is CyberArk Workforce Identity?

CyberArk Identity is a SaaS-delivered suite of solutions designed to simplify identity and access management in enterprises. CyberArk Identity unifies Workforce Access and Identity Management solutions in a single offering. Workforce Access capabilities include single sign-on, multi-factor authentication, session security,…

Read more

Learn from top reviewers

Return to navigation

Pricing

View all pricing
N/A
Unavailable

What is CyberArk Workforce Identity?

CyberArk Identity is a SaaS-delivered suite of solutions designed to simplify identity and access management in enterprises. CyberArk Identity unifies Workforce Access and Identity Management solutions in a single offering. Workforce Access capabilities include single sign-on, multi-factor…

Entry-level set up fee?

  • No setup fee

Offerings

  • Free Trial
  • Free/Freemium Version
  • Premium Consulting/Integration Services

Would you like us to let the vendor know that you want pricing?

6 people also want pricing

Alternatives Pricing

What is Microsoft Entra ID?

Microsoft Entra ID (formerly Microsoft Azure Active Directory or Azure AD) is a cloud-based identity and access management (IAM) solution supporting restricted access to applications with Azure Multi-Factor Authentication (MFA) built-in, single sign-on (SSO), B2B collaboration controls, self…

What is Okta?

Okta is an enterprise grade identity management service, built in the cloud. IT can manage access across any application, person or device. Whether the people are employees, partners or customers or whether the applications are in the cloud, on premises or on a mobile device, Okta helps IT become…

Return to navigation

Product Details

What is CyberArk Workforce Identity?

CyberArk Identity is a SaaS-delivered suite of solutions designed to simplify identity and access management in enterprises. CyberArk Identity unifies Workforce Access and Identity Management solutions in a single offering. Workforce Access capabilities include single sign-on, multi-factor authentication, session security, and credential management. Identity Management capabilities include lifecycle management, identity orchestration, and identity governance. With CyberArk Identity, organizations can secure workforce access to applications, endpoints, and infrastructure and protect themselves from the leading cause of data breaches – compromised credentials.

CyberArk Identity is part of the CyberArk Identity Security Platform. Built for the dynamic enterprise, CyberArk Identity Security Platform secures access for any identity to any resource or environment from anywhere using any device.  The CyberArk Identity Security Platform enables operational efficiencies with a single admin portal, streamlines meeting compliance requirements with unified audit capabilities, and delivers Identity Security Intelligence for continuous identity threat detection and protection.

Workforce Access solutions:

  • CyberArk Single Sign-On (SSO) is a solution for one-click access to cloud, mobile, and legacy apps. CyberArk SSO enables a secure and frictionless sign-in experience for both internal and external users that adjusts based on risk.

  • CyberArk App Gateway is an add-on to the Single Sign-On solution that enables VPN-less access to legacy applications. It allows companies to set up per-application, per-user access to individual legacy applications hosted on-premises.

  • CyberArk Adaptive Multi-Factor Authentication (MFA) helps strengthen security and prevent attacks involving compromised credentials by requiring users to present multiple forms of evidence to gain access to your applications. CyberArk Adaptive MFA uses AI-powered behavioral analytics and contextual information to determine which authentication factors to apply to a particular user in a specific situation.

  • CyberArk Secure Web Sessions is a cloud-based service that enables organizations to monitor, record, and audit end-user activity within high-risk and high-value web applications. Security and compliance specialists can use Secure Web Sessions to search recorded sessions using free text input and quickly filter events by users, dates, and actions.

  • CyberArk Workforce Password Management is an enterprise-focused password manager providing a user-friendly solution to store business application credentials in a centralized vault and securely share them with other users in the organization.

Identity Management Services:

  • CyberArk Identity Lifecycle Management provides a way to route application access requests, create application accounts, manage entitlements for those accounts, and revoke access when necessary.

  • CyberArk Identity Flows is an identity orchestration solution that improves security, efficiency, and productivity by automating identity data and events. With Identity Flows, organizations can automate complex identity management workflows and synchronize identity data across diverse applications, directory stores, and repositories.

  • CyberArk Identity Compliance solution continuously discovers access, streamlines access certifications, and provides comprehensive identity analytics. Identity Compliance automates manually intensive, error-prone administrative processes, ensuring all workforce and privileged access rights are properly assigned and continually certified across enterprises.

CyberArk Workforce Identity Screenshots

Screenshot of Admin PortalScreenshot of Identity LoginScreenshot of SWS PortalScreenshot of UBA PortalScreenshot of User Portal

CyberArk Workforce Identity Videos

CyberArk Workforce Identity Competitors

CyberArk Workforce Identity Technical Details

Deployment TypesSoftware as a Service (SaaS), Cloud, or Web-Based
Operating SystemsUnspecified
Mobile ApplicationApple iOS, Android, Mobile Web
Supported CountriesAmericas, Israel, UK, Canada, France, GMBH, Spain, Netherlands, Italia (Milan), Italia (Rome), Turkey, Australia, Asia Pacific, Japan, India, Denmark
Supported LanguagesArabic, German, English, Spanish, French, Italian, Japanese, Korean, Dutch, Portuguese, Brazil Portuguese, Russian, Serbian, Swedish, Thai, Vietnamese, Chinese, Simplified Chinese - Traditional

Frequently Asked Questions

Okta, OneLogin by One Identity, and PingOne from Ping Identity are common alternatives for CyberArk Workforce Identity.

Reviewers rate ID-Management Access Control and Account Provisioning and De-provisioning and ID Management Workflow Automation highest, with a score of 9.

The most common users of CyberArk Workforce Identity are from Enterprises (1,001+ employees).
Return to navigation

Comparisons

View all alternatives
Return to navigation

Reviews From Top Reviewers

Companies can't remove reviews or game the system. Here's why
(1-5 of 13)

Certify is adequate, but need to improve

Rating: 6 out of 10
July 22, 2016
Vetted Review
Verified User
CyberArk Workforce Identity
1 year of experience
Centrify is being used across our entire organization to enforce an encryption policy on all of our Mac workstations. This allows us to control and secure our Mac machines in the same way that we can manage our PCs through Group Policy
  • Active Directory joining
  • Password reset
  • User notification of password reset
Cons
  • A more simplified process for installing Centrify and joining machines
  • More descriptive and useful error messaging and logging
  • Ability to manage machines through secured wireless connections
Centrify is well suited for hybrid Mac/PC environments where equivalent levels of administrator control are required. It may not be as well suited for organizations with lots of remote users - we have run into issues with user account lockouts that are more easily resolved with local user, but can be difficult with remote users

Cabarrus County Centrify

Rating: 9 out of 10
July 22, 2016
DB
Vetted Review
Verified User
CyberArk Workforce Identity
1 year of experience

Mobility management for tablets in use by various County departments. Increased secure use of mobile devices by providing security configuration with enforcement and ability to wipe device if needed. Remote device location provides ability to locate missing devices and also provides an added security feature allowing us to track and find employees in the field if in distress.

SSO for on premise applications using federation with Active Directory. SSO, user provisioning, and license management for cloud applications.

Provides users with ability to perform Password Reset.


  • Easy User Password Reset
  • Provisioning and protecting enterprise mobile devices
  • Integration with Office 365
Cons
  • Location services for Centrify administrators should be enhanced
  • Centrify browser extension becomes unstable and needs to be reinstalled

Well suited for any applications that are Active Directory integrated.

Cloud applications that require password changes due to inactivity or require passwords to be changed after X number of days.

Great Identity Provider + outstanding technical support

Rating: 9 out of 10
April 11, 2018
Vetted Review
Verified User
CyberArk Workforce Identity
2 years of experience
Centrify is used as an Identity Provider for several applications in the whole organization. On one hand, it provides our internal users a single sign-on experience to many applications, on the other hand, it helps us to keep our environment secure with Multi-Factor-Authentication and Condition-based Authentication rules. Additionally, it provides multiple options to provision user, groups or roles to the connected applications.
  • flexible usage of authentication rules
  • easy to use for users and admins
  • great reporting and troubleshooting features
  • great support
Cons
  • admin Portal performance (partial)
  • cloud Connector usage (connectors are chosen randomly, not per location)
  • logout URL customization
well suited...
- for any company size, as it is very scalable
- for any company that is looking for an IdP to set up SSO and wants to secure Access to MFA

less appropriate...
- for companies that are satisfied with their current, alternative IdP or don't have the need of an IdP (which is hard to believe :))

Make Everyone Happy With Centrify

Rating: 8 out of 10
July 19, 2016
DC
Vetted Review
Verified User
CyberArk Workforce Identity
2 years of experience
We are using Centrify across our entire company. Centrify solves several problems in our organization. First it helps improve our security by creating a secure, easy to use user authentication service across applications that would have previously required separate login credentials. This allows our users to only remember one password for multiple applications, reducing the possible security risks of password reuse and credential sharing. Centrify helps our IT Support staff by reducing the number of support calls for password management. Centrify also provides excellent credential management for our *NIX users as they often do not use Windows machines.
  • Centrify does an excellent job of supporting multiple platforms. Windows, Macs, Linux, iOS and Android are all well supported.
  • Ease of use. Centrify is easy and self explanatory for our users. Centrify is also great at integrating non SAML or LDAP systems into its service.
  • Centrify does a great job at uptime. The uptime provided is outstanding and ensures our users can always access their systems anywhere.
Cons
  • Centrify support could use more transparency in its actions. I've made provisioning changes and been burned in the past by them.
  • Centrify could support more browsers to integrate apps with.
  • Centrify could provide a user focused education platform to help users understand what CIS is and how it helps them.
Centrify is great in most organizations that do not have the resources to build their own SAML/ADFS authentication platform. It allows for the quick rollout and integration of SAML, AD, LDAP and more applications into the environment. CIS may not be appropriate in use cases where there are a large number of proprietary login methods or systems that require their own 2 factor auth mechanisms.

To reset passwords, CyberArk Workforce Identity is the ideal software.

Rating: 9 out of 10
March 29, 2022
Vetted Review
Verified User
CyberArk Workforce Identity
2 years of experience
We use CyberArk Workforce Identity to easily and securely log in to the apps. The platform is easy to implement, offers great features like frictionless login, AI-powered authentication, making it easy to detect anomalies against security breaches, and integrates with most frequently used apps like ZOOM. .
  • Reset passwords in all software is really easy and simple.
  • Integrations to more than 120 external applications.
  • Easy to use and implement.
  • Reports.
Cons
  • Custom reports don't always support SQL input.
CyberArk Workforce Identity gives small and non-small businesses the ability to protect their data and applications. Identity management allows my organization to classify and label data to make it easier to assign permissions based on user roles. It also allows you to track activity on shared applications and data, so you know exactly who is accessing what files.It offers great identity management features to help find exactly what we need.
Return to navigation