We performed a comparison between CyberArk Identity and Microsoft Intune based on real PeerSpot user reviews.
Find out what your peers are saying about Microsoft, Cisco, Auth0 and others in Single Sign-On (SSO)."The most valuable feature of CyberArk Identity is the adaptive interface."
"The tool helps with authentication. It acts as an MFA for any kind of privileged access that occurs in our organization."
"The setup, via cloud, is simple."
"The solution helps with auditing, and monitoring, and integrates with Splunk for log analysis. User activity logs are captured in CyberArk Identity and sent to external tools like Splunk for analysis and monitoring."
"The user self-service program and the Office 365 provisioning service feature are the most valuable. It is a very easy and feature-rich solution that gives priority to the users and security."
"I like the RBAC (Role-Based Access Control). It basically involves defining various roles, and then simply assigning those roles to users."
"The initial setup is straightforward. It takes me up to an hour and a half."
"The initial setup of CyberArk Identity was straightforward."
"Technical support, in general, has been quite helpful."
"It is a comprehensive security solution that not only controls access to enterprise resources but also tracks and prevents unauthorized access, ensuring the protection of sensitive data and preventing potential data loss scenarios."
"While Microsoft Intune boasts a wide range of features, its user-friendliness and bundled licensing cost are key considerations for me."
"The most valuable features are the ones that make sure that the deployment is of a standard operating system and the Zero Touch deployment, which is very useful. This allows users to have an out of box experience."
"The security-related tools are excellent; these features allow us to secure devices, lock them down, and ensure compliance."
"Intune's most valuable features are the device, compliance, and configuration policies."
"Its protection policies are most valuable. It protects mobile devices as well as individual apps. It is pretty scalable, and its documentation is also pretty good. It is also pretty straightforward to deploy."
"Autopilot is the most valuable feature of Microsoft Intune."
"CyberArk Identity could improve by having the ability to better manage the network, such as Cisco. There seem to be some issues in this area."
"We would like to see an improvement in the ability to manage mobile devices."
"The solution could be easier to use and I found it to be very complex involving many steps."
"More integrations would be better."
"They could improve their UI and make everything more user-friendly."
"The user interface could be improved."
"The product needs to leverage the cloud more, especially in the financial sector, where cloud adoption might be limited. Proper reporting within the cloud is essential. The tool should be more user-friendly to expedite access for users. The current agent-based system poses challenges if a user loses access to the server, making tasks difficult to perform. It should also improve technical support."
"The tool has issues with the third-party SMS gateway. The solution has its own SMS gateway. Integration support is a challenge when we don’t use their SMS gateway. The tool also needs to improve its scalability."
"It would help if administrators could pinpoint the exact location of a stolen device to help law enforcement retrieve it and apprehend the suspect."
"It would be beneficial to have a more straightforward understanding of Intune's capabilities, presented in a simplified manner."
"The most important thing is reporting. They should improve their reporting. They should give a free hand to users. In SCCM, I can create my own reports. For example, in SCCM, I can create an inventory report for my PC or for all PCs, but in Intune, we don't have an option to create any report. Microsoft claims that Intune is a successor of SCCM, but SCCM is more powerful than Intune. So, they should develop Intune more and make it equivalent to SCCM. Then, their product will be great in the market."
"Microsoft needs to enhance device-level security, as sometimes when using Microsoft Intune, the device's operating system becomes stuck and requires a full uninstall to remove the Intune bug."
"A new Intune feature allows application packaging, but it incurs additional licensing costs for a significant number of applications."
"Regarding mobile devices, Intune is good, but there are other services that I would say are ahead of Intune from an administration and reporting point of view."
"Intune should be much more granular in terms of supporting more Android cellular devices."
"The main disadvantage seen today is regarding Linux clients. We have a lot of development resources that have Linux on their clients, and we can't manage them on the same platform, as we do with other clients such as macOS and Windows. So, it should have support for Linux clients. It should also have better support for macOS."
CyberArk Identity is ranked 9th in Single Sign-On (SSO) with 17 reviews while Microsoft Intune is ranked 1st in Unified Endpoint Management (UEM) with 164 reviews. CyberArk Identity is rated 8.2, while Microsoft Intune is rated 8.0. The top reviewer of CyberArk Identity writes "Allows Linux and Unix administrators to login with single password ". On the other hand, the top reviewer of Microsoft Intune writes "We can manage all aspects of our devices from a single console, easy to scale, and quick to deploy". CyberArk Identity is most compared with CyberArk Privileged Access Manager, Microsoft Entra ID, SailPoint IdentityIQ, PingFederate and VMware Workspace ONE, whereas Microsoft Intune is most compared with Jamf Pro, VMware Workspace ONE, ManageEngine Endpoint Central, SOTI MobiControl and Microsoft Entra ID.
We monitor all Single Sign-On (SSO) reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.