No more typing reviews! Try our Samantha, our new voice AI agent.

CyberArk Identity vs UserLock comparison

 

Comparison Buyer's Guide

Executive SummaryUpdated on Aug 11, 2024

Review summaries and opinions

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
 

Categories and Ranking

CyberArk Identity
Ranking in Authentication Systems
9th
Ranking in Access Management
7th
Average Rating
8.2
Reviews Sentiment
6.7
Number of Reviews
29
Ranking in other categories
Identity Management (IM) (8th), Authorization Software (3rd), Enterprise Password Managers (9th), User Entity Behavior Analytics (UEBA) (9th), Active Directory Management (6th), Cloud Resource Access Management (3rd), Customer Identity and Access Management (CIAM) (7th)
UserLock
Ranking in Authentication Systems
29th
Ranking in Access Management
27th
Average Rating
10.0
Number of Reviews
2
Ranking in other categories
No ranking in other categories
 

Mindshare comparison

As of May 2026, in the Authentication Systems category, the mindshare of CyberArk Identity is 1.6%, down from 1.8% compared to the previous year. The mindshare of UserLock is 1.0%, up from 0.9% compared to the previous year. It is calculated based on PeerSpot user engagement data.
Authentication Systems Mindshare Distribution
ProductMindshare (%)
CyberArk Identity1.6%
UserLock1.0%
Other97.4%
Authentication Systems
 

Featured Reviews

Hariharan Thangasamy - PeerSpot reviewer
Cybersecurity Delivery Analyst at Accenture
Has strengthened privileged access control and improved audit visibility through session monitoring and password rotation
On the identity product side, it is awesome. However, they can improve in the documentation parts. For example, if there is a migration process, I can see the maximum customers are moving from self-hosted to on-premises or from on-premises to the cloud. It would be helpful if they released a generalized document for processes such as migration. A clear overview document would assist us in understanding more about the tool, configurations, and automations to enhance our security. Regarding the initial setup of CyberArk Identity, I faced some challenges. At some points, I could not find proper documentation for deploying, enhancing, or integrating with other components. I could not find the proper documentation in the community portal.
Bill H. - PeerSpot reviewer
Information Technology at City Of Keizer
Affordable, easy to use, and integrates well with Active Directory
The product and service are already great as it is but if I could add one feature, I guess it would be nice to have another factor of authentication (two additional factors) like your phone and a token for example, for when people forget their phone at home. It’s not that I mind not having two factors, but I do get that question from time to time from some of our users who think it would be really useful. From what I’ve heard, they’re working on it and it should be coming in the next version so that’s great news.

Quotes from Members

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
 

Pros

"It has machine learning and can help clients to learn the environment and understand what is happening."
"The user self-service program and the Office 365 provisioning service feature are the most valuable. It is a very easy and feature-rich solution that gives priority to the users and security."
"The support of CyberArk Identity is really good."
"It has aided in troubleshooting by allowing logs to be extracted and sent to a correlation engine, such as QRadar, for notifications or alerts."
"What I like most about CyberArk Identity is the model that is in place."
"The best features in CyberArk Identity that I appreciate most are the recent updates that have added features in the cloud privilege environment."
"CyberArk Identity provides identity governance and gives me control over who and how access to environments occurs, offering significant confidentiality in what is accessed."
"I like the RBAC (Role-Based Access Control). It basically involves defining various roles, and then simply assigning those roles to users."
"UserLock was pretty easy to set up and simple to use, and the documentation covered everything."
"The most valuable features are two-factor authentication and real-time logon monitoring."
"We mainly implemented UserLock for multi-factor authentication, but the user login insights are also nice."
"It is affordable, integrates easily with Active Directory, and is simple to install and maintain."
 

Cons

"While CyberArk Identity is a leader in Identity Security, the integration of multiple components could be improved."
"They can include the Mobile Device Management (MDM) feature."
"The product is not cheap, especially if you opt for an on-premise deployment requiring a complex server infrastructure. On the other hand, choosing the software as a service version simplifies infrastructure requirements but necessitates being online all the time."
"The solution could be easier to use and I found it to be very complex involving many steps."
"Some areas experience slowness based on the workload. There's a need to enhance network performance despite the good user experience with access management."
"The reporting functionality is somewhat complicated."
"They could improve their UI and make everything more user-friendly."
"At the moment CyberArk needs to enrich Conjur and it needs to be made more viable so that its adoption can be made much faster."
"The product and service are already great as it is but if I could add one feature, I guess it would be nice to have another factor of authentication (two additional factors) like your phone and a token for example, for when people forget their phone at home."
"I would like to see UserLock add the ability to automatically create a group policy in Active Directory."
"I would like to see UserLock add the ability to automatically create a group policy in Active Directory. That might streamline the setup process."
"The product and service are already great as it is but if I could add one feature, I guess it would be nice to have another factor of authentication (two additional factors) like your phone and a token for example, for when people forget their phone at home."
 

Pricing and Cost Advice

"We find that the pricing and licensing of this solution is adequate, as compared to the other competitors in the market."
"The pricing is acceptable. It is worth considering what we are protecting with the amount charged."
"The solution is cheap and I rate its pricing an eight out of ten."
"It's not that affordable compared to Delinea or other products. They're less expensive and allow more customization. For the cost, it is expensive."
"The pricing of CyberArk Identity is competitive."
"There is an initial license and then there is a subscription needed."
"I would rate the tool’s pricing a seven out of ten. The product’s pricing is expensive and is on a yearly basis. You will need to pay around 10,000 GBP for 500 users."
"There could be some additional costs apart from the licensing costs of the solution when you want to develop connectors in CyberArk Identity."
"You will be hard-pressed to find better pricing."
report
Use our free recommendation engine to learn which Authentication Systems solutions are best for your needs.
893,221 professionals have used our research since 2012.
 

Top Industries

By visitors reading reviews
Financial Services Firm
15%
Manufacturing Company
10%
Computer Software Company
8%
Construction Company
6%
Comms Service Provider
15%
Construction Company
14%
Manufacturing Company
8%
Government
8%
 

Company Size

By reviewers
Large Enterprise
Midsize Enterprise
Small Business
By reviewers
Company SizeCount
Small Business20
Midsize Enterprise4
Large Enterprise10
No data available
 

Questions from the Community

What is your experience regarding pricing and costs for CyberArk Identity?
I am not certain about CyberArk Identity's exact pricing model. For comparison, Okta was around five dollars per user. CyberArk Identity offers good discounts to some clients, which influences thei...
What needs improvement with CyberArk Identity?
We do not specifically use the password vaulting feature of CyberArk Identity. The centralized user dashboard of CyberArk Identity has not been that important for us. If it would be possible to sha...
What is your primary use case for CyberArk Identity?
It's not being purchased through AWS, but we're using CyberArk Identity as a SaaS solution. I think it's running on AWS, but we bought it directly from CyberArk.
Ask a question
Earn 20 points
 

Also Known As

Idaptive
No data available
 

Overview

 

Sample Customers

MLB, Citi, Pfizer, SulAmerica, GE Capital, Shiseido
Barclays, US Department of Justice, National Bank of Kuwait, Turkish Aerospace, New York Albany School District, Regtransfers, University of Kent, Camden City School District, Oklahoma City Public Schools, Bank of Cyprus, Detran-PE: Pernambuco State Traffic Department
Find out what your peers are saying about CyberArk Identity vs. UserLock and other solutions. Updated: April 2026.
893,221 professionals have used our research since 2012.