CyberArk Privileged Access Management vs. Google Authenticator

Overview
ProductRatingMost Used ByProduct SummaryStarting Price
CyberArk Privileged Access Management
Score 8.2 out of 10
N/A
CyberArk is a privileged account and access security suite issued by the company of the same name in Massachusetts . The Core Privileged Access Security Solution unifies Enterprise Password Vault, Privileged Session Manager and Privileged Threat Analytics to protect an organization’s most critical assets.N/A
Google Authenticator
Score 8.6 out of 10
N/A
Google Authenticator is a mobile authentication app.N/A
Pricing
CyberArk Privileged Access ManagementGoogle Authenticator
Editions & Modules
No answers on this topic
No answers on this topic
Offerings
Pricing Offerings
CyberArk Privileged Access ManagementGoogle Authenticator
Free Trial
YesNo
Free/Freemium Version
NoNo
Premium Consulting/Integration Services
NoNo
Entry-level Setup FeeNo setup feeOptional
Additional DetailsCyberArk offers a variety of Identity Security packages for different user types within an organization.
More Pricing Information
Community Pulse
CyberArk Privileged Access ManagementGoogle Authenticator
Top Pros

No answers on this topic

Top Cons

No answers on this topic

Best Alternatives
CyberArk Privileged Access ManagementGoogle Authenticator
Small Businesses

No answers on this topic

WatchGuard AuthPoint
WatchGuard AuthPoint
Score 9.0 out of 10
Medium-sized Companies
Delinea Secret Server
Delinea Secret Server
Score 8.7 out of 10
Cisco Duo
Cisco Duo
Score 9.4 out of 10
Enterprises
BeyondTrust Endpoint Privilege Management
BeyondTrust Endpoint Privilege Management
Score 8.7 out of 10
Cisco Duo
Cisco Duo
Score 9.4 out of 10
All AlternativesView all alternativesView all alternatives
User Ratings
CyberArk Privileged Access ManagementGoogle Authenticator
Likelihood to Recommend
8.0
(9 ratings)
9.1
(46 ratings)
Likelihood to Renew
-
(0 ratings)
8.0
(1 ratings)
Usability
-
(0 ratings)
8.0
(2 ratings)
Availability
-
(0 ratings)
10.0
(1 ratings)
Performance
-
(0 ratings)
10.0
(1 ratings)
Support Rating
7.2
(4 ratings)
8.6
(8 ratings)
Implementation Rating
-
(0 ratings)
10.0
(1 ratings)
Configurability
-
(0 ratings)
4.0
(1 ratings)
Ease of integration
-
(0 ratings)
8.0
(1 ratings)
Product Scalability
-
(0 ratings)
5.0
(1 ratings)
Vendor post-sale
-
(0 ratings)
8.0
(1 ratings)
Vendor pre-sale
-
(0 ratings)
8.0
(1 ratings)
User Testimonials
CyberArk Privileged Access ManagementGoogle Authenticator
Likelihood to Recommend
Cyberark
The system is great for enterprise or larger IT departments or teams where temporary or full access may be given using privileged IDs. Requirements for needing local admin access is also eliminated which can help with specific Windows workstation related tasks. It can be very useful when working with remote teams or contractors who may need temporary access to a system when required.
Read full review
Google
It is supported by virtually all cloud-based software applications for business. I am happy to allow users to use this in addition to other authenticators. Certainly, if your business is in the Google cloud it makes sense, but my approach to the remote/virtual work world these past couple of years has been structured flexibility. Leaving some choice up to the users for their own comfort, particularly when they are using their own devices. I cannot think of a scenario where it is less appropriate - perhaps where you run the risk of "app sprawl". I.e., where you are requiring users to handle multiple authenticators (which can happen with certain pieces of hardware) you may want to encourage consolidation into one to avoid frustration.
Read full review
Pros
Cyberark
  • Automatically discover new servers on the network and take control of the local admin password by vaulting it and ensuring nobody knows the password. A different password on every server.
  • Automatically roll the password in a configurable manner - after each use, after a certain period of time, etc.
  • Track and govern sensitive account usage by ensuring only properly authorized users can access the vault and obtain the credentials and then monitor usage.
Read full review
Google
  • One strength is in how it checks identity to stop unwanted people from getting access.
  • Another strength is in cutting down on the frustration of users for the authentication process.
  • With the pandemic and needing to work away from the office it also provided additional security in keeping our network/infrastructure safe.
Read full review
Cons
Cyberark
  • GUI - right now everything is on one page/dashboard. Some level of folder/Safe type view would be great
  • More options when storing passwords - especially for network based passwords
  • Better integrations with vendors like Cisco so that admins dont need to really get the password from the vault (think Last Pass type add on)
Read full review
Google
  • I once performed a factory reset of my smartphone which had Google Authenticator. I didn't have a backup for the device. When I restored my phone with the same google account, I was not able to restore the authenticator app settings. I had to add all the keys back into the app to use it. This is cumbersome, but I understand it is set up this way for security reasons.
  • I don't like the ease with which it lets you delete a key. If I accidentally delete a key, I am doomed to get my 2FA key reset, unless I still have the QR code saved somewhere.
Read full review
Likelihood to Renew
Cyberark
No answers on this topic
Google
It works as intended, easy to setup, free and gives you another level of security against any unwanted access or cyber attacks
Read full review
Usability
Cyberark
No answers on this topic
Google
I have not faced any technical challenge personally using this application. It's very lightweight and doesn't require many system resources on your mobile device.
Read full review
Reliability and Availability
Cyberark
No answers on this topic
Google
In terms of availability, I had not experienced any issues with outages or the product not working when needed
Read full review
Performance
Cyberark
No answers on this topic
Google
The performance of google Authenticator is good and I have not experienced any slow downs
Read full review
Support Rating
Cyberark
Customer support and technical support have always been great when we require assistance. Especially when we come across issues that we're not familiar with.
Read full review
Google
I have found Google’s support to be hit or miss. There are times when they are very responsive, and I get my issue resolved quickly, and there are times where a response from them takes weeks. There is no in-between. But my support experience with this particular product is nonexistent because I have not had a problem with it yet. Hopefully, we do not have any problems with it either.
Read full review
Implementation Rating
Cyberark
No answers on this topic
Google
It was easy to implement and it went very smoothly. No issues
Read full review
Alternatives Considered
Cyberark
It is known as one of the safest products in the market. It has good support and is also available as on-premise. You can run it virtually on VMWare (and probably on other hypervisors as well). You can have a second instance on bare metal and that makes it a very safe system.
Read full review
Google
We deploy Google Authenticator in residential and non-managed client scenarios. Google Authenticator can perform the basic functions needed for multi-factor authentication but lacks the more advanced features of solutions like Cisco's Secure Access by Duo. Google Authenticator is our go-to solution for anyone ready to increase their security but struggling to find the necessary technology budget.
Read full review
Scalability
Cyberark
No answers on this topic
Google
The product doesn’t have any features of tools that can help it scale
Read full review
Return on Investment
Cyberark
  • Decreased the probability of an external cyber attack to privileged accounts..
  • Management can control privileged account life cycle management more effectively
  • Recording privileged sessions allows our organization to play back exactly the point of a breach or malicious behavior
  • Automated system to manage and verify passwords, as privileged accounts are constantly created and deleted
  • Automatic PWD change functionality will substantially decrease probability of PWD theft or misuse.
Read full review
Google
  • More secure data = less worried about a data breach.
  • Takes longer to log in, and if I don't have my phone then I have to go looking for it, so it really makes it so that you can't be without your phone, which in certain instances is annoying or not possible and can hold up work time.
  • Everyone is willing to use the same program because everyone likes Google—makes it easier to manage.
Read full review
ScreenShots

CyberArk Privileged Access Management Screenshots

Screenshot of ISPSSScreenshot of Privilege CloudScreenshot of Identity Security IntelligenceScreenshot of Identity Security Intelligence