Try our new research platform with insights from 80,000+ expert users

CyberArk Identity vs Microsoft BitLocker comparison

 

Comparison Buyer's Guide

Executive Summary

Review summaries and opinions

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
 

Categories and Ranking

CyberArk Identity
Average Rating
8.2
Reviews Sentiment
7.0
Number of Reviews
23
Ranking in other categories
Authentication Systems (8th), Identity Management (IM) (11th), Authorization Software (3rd), Enterprise Password Managers (8th), User Entity Behavior Analytics (UEBA) (9th), Access Management (6th), Active Directory Management (9th), Cloud Resource Access Management (2nd), Customer Identity and Access Management (CIAM) (6th)
Microsoft BitLocker
Average Rating
8.2
Reviews Sentiment
7.4
Number of Reviews
65
Ranking in other categories
Endpoint Encryption (1st), Mobile Data Protection (1st)
 

Mindshare comparison

CyberArk Identity and Microsoft BitLocker aren’t in the same category and serve different purposes. CyberArk Identity is designed for Customer Identity and Access Management (CIAM) and holds a mindshare of 3.7%, up 3.2% compared to last year.
Microsoft BitLocker, on the other hand, focuses on Endpoint Encryption, holds 40.2% mindshare, up 39.9% since last year.
Customer Identity and Access Management (CIAM)
Endpoint Encryption
 

Featured Reviews

Julio Montero - PeerSpot reviewer
Access management system provides strong security and effortless user authentication
The solution can be deployed on cloud or on-premises. CyberArk is more on the cloud than on local hardware. The deployment is initially quite difficult. That said, when you are doing the implementation of CyberArk, there are so many tutorials that make the learning process very easy. The only complaint could be the language barrier. It's difficult if you don't have a very good level of English. Otherwise, it is very easy. You can have it set up within three months without much difficulty. It's hard to get started, however, once you get going, it gets easier. A full deployment takes half a year or less. There is some maintenance necessary. A company is constantly hiring and letting go of employees. The access is always changing, so access must always be adjusted. Or, if we need another law of filter, we would need to add those, or even take them away. That's another aspect of maintenance.
Douglas Curry - PeerSpot reviewer
Users can easily deploy and manage it
The solution's most valuable feature is that it is simple to deploy and manage. I can't say what features of the tool I like since it is very much a deploy-and-forget product. We don't use any advanced features of the tool in my company. The tool's recovery options are good, especially since it integrates with Active Directory, making everything a simple process. The product's integration capabilities are good.

Quotes from Members

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
 

Pros

"It has machine learning and can help clients to learn the environment and understand what is happening."
"CyberArk Identity is a mature product."
"The feature that we find most valuable is the ability to integrate multiple IDs for on-premises Active Directory."
"I had one machine that I could not use due to an invalid token. They resolved the problem immediately after I reported it, on the same day, within one hour. It is a very good experience."
"CyberArk Identity's ability to safeguard financial services infrastructure is good."
"I like the RBAC (Role-Based Access Control). It basically involves defining various roles, and then simply assigning those roles to users."
"Overall, I would rate CyberArk Identity a nine out of ten."
"It is very easy to use and is a trusted platform. It protects our platform, application, network, and infrastructure resources on any device."
"It is easy to implement and has AD integration."
"Microsoft BitLocker's most valuable features are stability and simplicity in terms of usage."
"The hard drive encryption is very good."
"It comes bundled with other Microsoft solutions."
"The solution has a feature that automatically asks the users to upgrade their password once we set up the process."
"The most valuable feature of this solution is the protection and ease of use."
"I like BitLocker because it gives us strong encryption to protect our data."
"We use Microsoft BitLocker for our endpoints, including laptops."
 

Cons

"When you translate the page from one language to another, it can be a difficult process. The translation isn't always good, and it may have a completely different name. I've noticed this in the English to Spanish translation."
"To enhance the product, they can consider improving the user interface of the software and possibly the customer support team. Sometimes, there is a delay in handling my inquiries via email, which could be addressed for better service."
"It does not have global market penetration, and sometimes, there are support issues."
"I'm not sure what needs improvement. It is a good platform."
"They could improve their UI and make everything more user-friendly."
"Integration or deployment is extremely difficult for CyberArk Identity."
"The solution's difficulty in gaining skill sets should be improved because it's a vertical product."
"More integrations would be better."
"They can improve the security of the application and include an encryption disk in the next feature."
"There is room for improvement in stability."
"The customizations could be more flexible."
"Technical support has not been very good."
"I would like to be able to encrypt our cloud tenancy."
"The solution should offer encryption for other items such as shared folders, removable media, etc."
"The solution needs to have better protection and improve its pricing."
"The only thing that could be slightly improved is the occasional stability issue."
 

Pricing and Cost Advice

"In terms of pricing, BeyondTrust and CyberArk tend to be more expensive, with CyberArk receiving an eight out of ten, in this regard."
"I would rate the tool’s pricing a seven out of ten. The product’s pricing is expensive and is on a yearly basis. You will need to pay around 10,000 GBP for 500 users."
"The solution is cheap and I rate its pricing an eight out of ten."
"I think it is a fairly priced tool. I rate the tool between six and seven on a scale of one to ten where one is expensive, and ten is cheap."
"The pricing point is very good. I compared it with other products, and it does not require a heavy investment."
"CyberArk Identity is an expensive solution."
"The pricing is acceptable. It is worth considering what we are protecting with the amount charged."
"It's not that affordable compared to Delinea or other products. They're less expensive and allow more customization. For the cost, it is expensive."
"It is free. It is enabled as part of the operating system. Once you have an operating system license, you're licensed for Bitlocker."
"We didn't pay for additional licenses since the solution is built into Windows."
"Microsoft BitLocker's pricing is included in the Microsoft license, and you don't have to pay an additional fee for it."
"It is a totally free solution."
"For reasons unknown, Microsoft products seem to be getting more expensive."
"The solution is expensive."
"It operates on a subscription model on an annual basis."
"The cost of this solution is bundled in with part of the subscription for the Microsoft Cloud. We have users subscribed to Enterprise E5 and it comes with E5"
report
Use our free recommendation engine to learn which Customer Identity and Access Management (CIAM) solutions are best for your needs.
845,485 professionals have used our research since 2012.
 

Top Industries

By visitors reading reviews
Financial Services Firm
17%
Computer Software Company
13%
Manufacturing Company
11%
Healthcare Company
6%
Computer Software Company
12%
Government
10%
Manufacturing Company
9%
Financial Services Firm
8%
 

Company Size

By reviewers
Large Enterprise
Midsize Enterprise
Small Business
 

Questions from the Community

What do you like most about CyberArk Identity?
The integration capabilities, ability to integrate CyberArk into the overall IBB strategy of our current clients.
What is your experience regarding pricing and costs for CyberArk Identity?
The pricing is acceptable. It is worth considering what we are protecting with the amount charged.
What needs improvement with CyberArk Identity?
To enhance the product, they can consider improving the user interface of the software and possibly the customer support team. Sometimes, there is a delay in handling my inquiries via email, which ...
What should one take into account when replacing PGP with Microsoft BitLocker?
Beware to make backup of useful data, then use reverse decryption policy from Symantec panel/McAfee ePO to decrypt the DE partitions while it is sometimes more straightforward and faster to reinsta...
Would you choose Microsoft BitLocker or McAfee Complete Data Protection?
Microsoft BitLocker is very intuitive and easy to maintain. It is basically the global standard solution for drive encryption and successfully fulfills regulatory needs in terms of data protection....
How does Microsoft BitLocker compare with Symantec Endpoint Encryption?
Microsoft BitLocker is very intuitive and easy to maintain. It is basically the global standard solution for drive encryption and it successfully fulfills regulatory needs in terms of data protecti...
 

Also Known As

Idaptive
BitLocker, MS BitLocker
 

Overview

 

Sample Customers

MLB, Citi, Pfizer, SulAmerica, GE Capital, Shiseido
ACV, Proaxis Therapy, Choice Hotels International, adnymics GmbH, Intermedia, NMBS/SNCB
Find out what your peers are saying about Auth0, Ping Identity, Omada and others in Customer Identity and Access Management (CIAM). Updated: March 2025.
845,485 professionals have used our research since 2012.