Ratings and Reviews 7 Ratings

Total
ease
features
design
support

Ratings and Reviews 1 Rating

Total
ease
features
design
support

Alternatives to Consider

  • Auth0 Reviews & Ratings
    1,003 Ratings
    Company Website
  • Frontegg Reviews & Ratings
    378 Ratings
    Company Website
  • FusionAuth Reviews & Ratings
    174 Ratings
    Company Website
  • ManageEngine ADManager Plus Reviews & Ratings
    594 Ratings
    Company Website
  • Keeper Security Reviews & Ratings
    1,751 Ratings
    Company Website
  • Uniqkey Reviews & Ratings
    181 Ratings
    Company Website
  • Rippling Reviews & Ratings
    16,712 Ratings
    Company Website
  • ManageEngine ADSelfService Plus Reviews & Ratings
    119 Ratings
    Company Website
  • 1Password Reviews & Ratings
    16,511 Ratings
    Company Website
  • Iru Reviews & Ratings
    1,487 Ratings
    Company Website

What is Okta?

A single platform offers endless opportunities to engage with both your customers and staff. Any application can be made secure with authentication capabilities. Okta enables you to swiftly develop experiences that are both secure and enjoyable. By integrating Okta's Customer ID products, you can assemble the necessary framework to ensure security, scalability, and dependability. Safeguard and empower your employees, contractors, and partners effectively. Okta’s workforce identification solutions ensure that your employees remain protected regardless of their location. You will be equipped with essential tools to streamline cloud transitions and facilitate hybrid work environments. Trusted by organizations worldwide, Okta is committed to safeguarding workforce identities while promoting seamless connectivity across various platforms. This reliability and trust make Okta a go-to choice for businesses aiming to enhance their security infrastructure.

What is CyberArk Privileged Access Manager?

To protect your organization from the detrimental misuse of privileged accounts and credentials, which frequently act as entry points to essential assets, it is crucial to implement robust security measures. The CyberArk PAM as a Service incorporates sophisticated automation technologies aimed at securing your business's growth. Given that cyber threats are perpetually on the lookout for weaknesses, adept management of privileged access is vital for mitigating risks. By safeguarding credentials, you can shield critical resources from potential breaches. Furthermore, maintaining compliance is achievable through comprehensive documentation of key events and conducting secure audits that are resistant to manipulation. The Privileged Access Manager integrates smoothly with numerous applications, platforms, and automation tools, thereby enhancing your security ecosystem. This integration not only optimizes operational efficiency but also strengthens your defenses against constantly changing threats, ensuring that your organization remains resilient in a volatile cyber landscape. Ultimately, prioritizing these strategies cultivates a proactive security posture essential for long-term success.

Media

Media

Integrations Supported

AWS Marketplace
Axonius
Azure Marketplace
Elastic Observability
IDmelon Authenticator
Malbek
Nexpose
RadiantOne
SSOReady
Securonix UEBA
Securonix Unified Defense SIEM
AppWork
Box
DocMagic
Fortra Event Manager
GoProfiles
Netacea Bot Management
OneDay
SmartDraw
Swimlane

Integrations Supported

AWS Marketplace
Axonius
Azure Marketplace
Elastic Observability
IDmelon Authenticator
Malbek
Nexpose
RadiantOne
SSOReady
Securonix UEBA
Securonix Unified Defense SIEM
AppWork
Box
DocMagic
Fortra Event Manager
GoProfiles
Netacea Bot Management
OneDay
SmartDraw
Swimlane

API Availability

Has API

API Availability

Has API

Pricing Information

Pricing not provided.
Free Trial Offered?
Free Version

Pricing Information

Pricing not provided.
Free Trial Offered?
Free Version

Supported Platforms

SaaS
Android
iPhone
iPad
Windows
Mac
On-Prem
Chromebook
Linux

Supported Platforms

SaaS
Android
iPhone
iPad
Windows
Mac
On-Prem
Chromebook
Linux

Customer Service / Support

Standard Support
24 Hour Support
Web-Based Support

Customer Service / Support

Standard Support
24 Hour Support
Web-Based Support

Training Options

Documentation Hub
Webinars
Online Training
On-Site Training

Training Options

Documentation Hub
Webinars
Online Training
On-Site Training

Company Facts

Organization Name

Okta

Date Founded

2009

Company Location

United States

Company Website

www.okta.com

Company Facts

Organization Name

CyberArk

Date Founded

1999

Company Location

United States

Company Website

www.cyberark.com/products/privileged-access-manager/

Categories and Features

API Management

API Design
API Lifecycle Management
Access Control
Analytics
Dashboard
Developer Portal
Testing Management
Threat Protection
Traffic Control
Version Control

Customer Identity and Access Management (CIAM)

Access Certification
Access Management
Analytics / Reporting
Automatic User/Device Recognition
Behavioral Analytics
Credential Management
Data Security
Multi-Factor Authentication (MFA)
Privacy / Consent Management
Real Time Notifications
Self-Service Portal
Single Sign On
User Provisioning

Identity Management

Access Certification
Compliance Management
Multifactor Authentication
Password Management
Privileged Account Management
Self-Service Access Request
Single Sign On
User Activity Monitoring
User Provisioning

Integration

Dashboard
ETL - Extract / Transform / Load
Metadata Management
Multiple Data Sources
Web Services

Single Sign On

Biometric
Credential Management
Identity Federation
Multifactor Authentication
Password Management
Policy Management
Social Sign On
User Management

User Provisioning and Governance

Access Governance
Access Verification Workflow
Audits / Reports
Automatic Provisioning / Deprovisioning
Delegated Access Authorization
Identity Synchronization
Lifecycle Management
Multi-Factor Authentication (MFA)
Password Management
Policy Enforcement
Single Sign-On (SSO)
User Self-Service

Categories and Features

Network Security

Access Control
Analytics / Reporting
Compliance Reporting
Firewalls
Internet Usage Monitoring
Intrusion Detection System
Threat Response
VPN
Vulnerability Scanning

Privileged Access Management

Application Access Control
Behavioral Analytics
Credential Management
Endpoint Management
For MSPs
Granular Access Controls
Least Privilege
Multifactor Authentication
Password Management
Policy Management
Remote Access Management
Threat Intelligence
User Activity Monitoring

Popular Alternatives

Popular Alternatives

Cisco Duo Reviews & Ratings

Cisco Duo

Cisco
Auth0 Reviews & Ratings

Auth0

Okta