Cyberark Conjur vs. Rublon

Overview
ProductRatingMost Used ByProduct SummaryStarting Price
Cyberark Conjur
Score 8.2 out of 10
N/A
Conjur is an open source interface to securely authenticate, control and audit non-human access across tools, applications, containers and cloud environments via a secrets management software solution. Secrets grant access to applications, tools, critical infrastructure and other sensitive data. Conjur secures this access by controlling secrets with granular Role-Based Access Control (RBAC). When an application requests access to a resource, Conjur authenticates the application, performs an…N/A
Rublon
Score 8.0 out of 10
Mid-Size Companies (51-1,000 employees)
Rublon enables workforces to securely access an organization's networks, servers and applications. With it, users can protect data via multi-factor authentication, and comply with data protection regulations like GDPR. The vendor says Rublon can be deployed organization-wide, enabling MFA for all cloud apps, VPNs, servers, workstations, internal as well as on-premise apps.
$0
up to 1 user
Pricing
Cyberark ConjurRublon
Editions & Modules
No answers on this topic
Free
$0
up to 1 user
Business
$1
per user
Offerings
Pricing Offerings
Cyberark ConjurRublon
Free Trial
NoYes
Free/Freemium Version
NoYes
Premium Consulting/Integration Services
NoYes
Entry-level Setup FeeNo setup feeOptional
Additional DetailsThe minimum number of user licenses that can be purchased for Rublon Business is 30.
More Pricing Information
Best Alternatives
Cyberark ConjurRublon
Small Businesses
GitLab
GitLab
Score 8.9 out of 10
WatchGuard AuthPoint
WatchGuard AuthPoint
Score 9.0 out of 10
Medium-sized Companies
GitLab
GitLab
Score 8.9 out of 10
Cisco Duo
Cisco Duo
Score 9.4 out of 10
Enterprises
GitLab
GitLab
Score 8.9 out of 10
Cisco Duo
Cisco Duo
Score 9.4 out of 10
All AlternativesView all alternativesView all alternatives
User Ratings
Cyberark ConjurRublon
Likelihood to Recommend
9.8
(2 ratings)
8.0
(1 ratings)
User Testimonials
Cyberark ConjurRublon
Likelihood to Recommend
Cyberark
Cyberark Conjur is well-suited and includes the following: > Securing access to sensitive data in multi-cloud environments. > Providing secure access to secrets and credentials for 3rd party services and applications
Read full review
Rublon
The risk of interception or manipulation by hackers is reduced. It manages to be combined with other means of authentication, they allow the developer's software to be completed with the AMF software. The application tests the user's rights and links him to its services and data. The authentication of the interested party is one of the many keys to this process.
Read full review
Pros
Cyberark
  • Provide allow-list
  • verifying authority
  • validate access
Read full review
Rublon
  • It is recommended to introduce authentication software using a phased approach.
  • This authentication software can also be used via the risk-based authentication approach.
Read full review
Cons
Cyberark
  • Searching containers can be difficult if you're not sure which you're looking for.
  • Initial authorization can be slow, specifically if the first instance failed.
Read full review
Rublon
  • This mechanism certainly allows to protect a work site, but it can be expensive from an application point of view.
  • It is unavoidable to precisely verify the user at the launch of the workstation and/or at the connection to its application using the measures of the security policy and also to show that the authentication procedure is correctly applied.
Read full review
Alternatives Considered
Cyberark
Cyberark Conjur has been a great asset to our company as it is a one stop shop that holds individuals, teams, departments, and the entire company accountable for the safety network. Not only do you have to be authorized to access Cyberark Conjuryou have to reauthorize to open, copy, or see individual passwords or accounts leaving a cyber trace of all your actions. There's no way to accidently get into something you're not supposed to be in.
Read full review
Rublon
A user communications neighbor serves as an immediate access gate to all applications to which the appropriate permission has been provided. The end user will simply have to have a single effectively secure signal. we get the authentication required to be able to verify a user. This provides greater fixity, speed and also efficiency of the connection.
Read full review
Return on Investment
Cyberark
  • Before Cyberark we put passwords in a spread sheet - leaving exposure to theft.
  • Gives security compliance to our company
  • Keeps company and teams secure and safe.
Read full review
Rublon
  • Consequently, with an OTP system, the user has an expert forecaster who provides him with a password upon request.
  • This password is valid for a limited duration, and for a single use.
Read full review
ScreenShots

Cyberark Conjur Screenshots

Screenshot of CyberArk Conjur UIScreenshot of CyberArk Conjur UIScreenshot of CyberArk Conjur UI

Rublon Screenshots

Screenshot of Rublon MFA for Windows Logon with Mobile Push