List of CyberArk Customer Identity Integrations

This is a list of platforms and tools that integrate with CyberArk Customer Identity. This list is updated as of January 2026.

  • 1
    Adaptive Security Reviews & Ratings

    Adaptive Security

    Adaptive Security

    Next-gen security awareness training & AI attack simulations
    More Information
    Company Website
    Company Website
    Adaptive Security was founded in 2024 by seasoned entrepreneurs Brian Long and Andrew Jones. Since inception, the company has raised over $50 million from top-tier investors including OpenAI, Andreessen Horowitz, and executives from Google Cloud, Fidelity, Plaid, Shopify, and other industry leaders. Adaptive defends organizations against sophisticated, AI-driven cyber threats such as deepfakes, vishing, smishing, and spear phishing. Its next-generation security awareness training and AI phishing simulation platform enables security teams to deliver ultra-personalized training that adapts to each employee’s role, access level, and exposure. This training leverages real-time open-source intelligence (OSINT) and features highly convincing deepfake content—including synthetic media of a company’s own executives—to mirror real-world attack vectors. Through AI-powered simulations, customers can continuously assess and improve organizational resilience. Hyper-realistic phishing tests across voice, SMS, email, and video channels evaluate risk across every major vector. These simulations are fueled by Adaptive’s AI OSINT engine, giving teams deep visibility into how attackers might exploit their digital footprint. Today, Adaptive serves global leaders like Figma, The Dallas Mavericks, BMC Software, and Stone Point Capital. With an industry-leading Net Promoter Score of 94, Adaptive is redefining excellence in cybersecurity.
  • 2
    Hideez Reviews & Ratings

    Hideez

    Hideez

    Secure your business with seamless, passwordless authentication solutions.
    The Hideez Authentication Service stands out as a premier security solution designed for organizations of any scale. This all-encompassing service offers an array of features aimed at bolstering security and simplifying access control, such as password management, multi-factor authentication, passwordless single sign-on, and a variety of additional security tools. By utilizing the Hideez Service, companies can efficiently oversee their passwords, safely store them in an encrypted hardware token known as Hideez Keys, or opt for passwordless authentication and contactless desktop logins via the mobile application, Hideez Authenticator. The Hideez Server plays a crucial role in managing authentication tokens, centralizing associated endpoints, and securely storing digital identity data, including roles, permissions, and other configurations. As businesses strive to improve their security measures and streamline user authentication in environments with multiple users, the Hideez Authentication Service proves to be an excellent choice. The diverse features and customizable options make it highly suitable for organizations of varied sizes. Incorporating the Hideez Authentication Service into your business software and services comparison directory can assist clients in identifying the most effective security solution tailored to their unique requirements. Additionally, the ease of use and robust security capabilities offered by Hideez ensure that both companies and their employees can confidently navigate the digital landscape.
  • 3
    RadiantOne Reviews & Ratings

    RadiantOne

    Radiant Logic

    Elevate your organization with scalable identity-driven business growth.
    Transform your current infrastructure into a valuable asset for the entire organization through a platform that positions identity as a catalyst for business growth. RadiantOne serves as a foundational element for intricate identity systems. Through smart integration, you can enhance business results, bolster security and compliance, accelerate time-to-market, and more. RadiantOne enables organizations to sidestep the pitfalls of custom coding, rework, and continuous maintenance when aligning new initiatives with existing setups. The deployment of costly solutions often falls behind schedule or exceeds budgetary constraints, ultimately hurting ROI and causing dissatisfaction among employees. Identity frameworks that lack scalability end up squandering time and resources. Employees find it challenging to deliver innovative solutions to users, as inflexible systems fail to adapt to evolving needs. This situation results in duplicated efforts and repetitive processes, hindering overall efficiency and productivity. Therefore, investing in a flexible identity solution is crucial for keeping pace with the dynamic demands of the business landscape.
  • 4
    Tackle Cloud GTM Platform Reviews & Ratings

    Tackle Cloud GTM Platform

    Tackle.io

    Accelerate your sales growth with seamless marketplace solutions.
    Tackle’s Cloud Marketplace Platform provides all the necessary resources to efficiently create product listings, kickstart sales, and enhance your marketplace activities. With a strong commitment to helping software businesses drive revenue via cloud marketplaces, Tackle concentrates on prominent platforms like AWS Marketplace, Azure Marketplace, and Google Cloud Platform Marketplace. This platform notably speeds up the process of product listing and sales across these channels, all while delivering comprehensive transaction reports without requiring any engineering involvement. It allows your sales, business development, operations, and finance teams to smoothly engage with Cloud Marketplaces, promoting swift revenue growth. By leveraging these Cloud Marketplaces, you can take advantage of a more efficient sales and procurement process, expedite product launches, utilize established relationships and budgets with cloud providers, and tap into a broad audience of prospective customers. Furthermore, Tackle empowers you to refine your marketplace strategy, ensuring it remains responsive to changing market dynamics and consumer preferences, thereby enhancing your competitive edge. With these capabilities, businesses can not only increase their visibility but also strengthen their market position over time.
  • 5
    Data443 Global Privacy Manager Reviews & Ratings

    Data443 Global Privacy Manager

    Data443

    Empower customer privacy, boost conversions, enhance trust effortlessly.
    We enable retailers to champion their customers' privacy rights while maintaining high conversion rates and simplifying the handling of Subject Access Requests (SARs). Elevate your privacy settings to set a standard for outstanding user experience and customer support. Make it easy for customers to access intuitive privacy settings without hassle. Establish a centralized platform for addressing all customer privacy inquiries, allowing them to easily manage their preferences. Provide clear and transparent insights into the data you collect and its purposes, building trust in your brand. Rather than adopting a rigid consent model that can harm both sides, offer customers the flexibility to opt-in or out of specific data collection practices, empowering them and potentially increasing your conversion rates. Present a straightforward report detailing the data you've gathered, how it is used, and the protective measures in place to ensure its security. By refining your process for responding to Subject Access Requests (SARs), you enhance your customers’ privacy experience while lightening your team's workload. A thoughtfully organized privacy framework not only caters to customer needs but also enhances your business's reputation and trustworthiness. This approach ultimately leads to a more loyal customer base and can significantly contribute to your long-term success.
  • 6
    Arctic Wolf Reviews & Ratings

    Arctic Wolf

    Arctic Wolf Networks

    We make security work. AI-driven cybersecurity for seamless protection and unmatched resilience.
    We envision a future without cyber risk. Every organization should be so effective at security operations that both the likelihood and impact of a cyber attack are minimized to the point where risk is essentially zero. The Arctic Wolf Aurora Platform, Concierge Experience, and Security Journey make it fast and easy for organizations of any size to implement world-class security operations that continually guard against cyber threats in an efficient and sustainable way.
  • 7
    ImageWare Authenticate Reviews & Ratings

    ImageWare Authenticate

    ImageWare Systems

    Streamline security with user-friendly biometric authentication solutions.
    Improve user access management by utilizing biometric technology. Engineered for simplicity and ease of implementation, Authenticate guarantees dependable user verification across your enterprise applications and customer engagements. Effortlessly integrate with existing systems and take advantage of its self-enrollment capabilities to streamline the onboarding process for new users. For a seamless experience without passwords, individuals can choose their preferred authentication method from a variety of options. In instances where enhanced security is necessary, the system supports the enforcement of multi-modal authentication, which combines two or more methods to strengthen protection. Facial Authentication enables users to simply look into a camera on their mobile device or laptop, similar to taking a selfie, thus achieving optimal security, especially when used alongside NIST-compliant Biointellic Anti-Spoofing technology. Voice Recognition requires users to say a randomized phrase, usually through their mobile device, providing an additional level of security in the authentication process. By adopting these cutting-edge biometric solutions, organizations can not only fortify their security measures but also ensure a user-friendly experience that encourages compliance and satisfaction. Ultimately, this approach allows businesses to protect sensitive information while enhancing overall operational efficiency.
  • Previous
  • You're on page 1
  • Next