CyberArk Identity is a SaaS-delivered suite of solutions designed to simplify identity and access management in enterprises. CyberArk Identity unifies Workforce Access and Identity Management solutions in a single offering. Workforce Access capabilities include single sign-on, multi-factor authentication, session security, and credential management. Identity Management capabilities include lifecycle management, identity orchestration, and identity governance. With CyberArk Identity,…
N/A
NordLayer
Score 6.7 out of 10
N/A
NordLayer provides cybersecurity tools for businesses of any size or work model developed by the standard of NordVPN. NordLayer helps organizations secure networks and enhance internet security and modernizes network and resource access with technical improvements aligning with the best regulatory compliance standards. Helping organizations to adopt FWaaS, ZTNA, and SWG principles, NordLayer is focused on the Security Service Edge of cybersecurity services.…
$8
per month if Yearly plan per user
Oracle Identity Governance
Score 6.0 out of 10
N/A
Oracle Identity Governance (OIG) -formerly Oracle Identity Manager or OIM- is an enterprise identity management system that automatically manages users' access privileges within enterprise IT resources.
$3,600
Pricing
CyberArk Workforce Identity
NordLayer
Oracle Identity Governance
Editions & Modules
No answers on this topic
Lite
$8
per month if Yearly plan per user
Core
$11
per month if Yearly plan per user
Premium
$14
per month if Yearly plan per user
Custom
x
per month if Yearly plan per user
Processor - Minimum
$1
Named User Plus - Software Update License & Support
$792
Named User Plus - Price
$3,600
Processor - Software Update License & Support
39,600.00
Processor - Price
180,000
Named User Plus - Minimum
N/A
Offerings
Pricing Offerings
CyberArk Workforce Identity
NordLayer
Oracle Identity Governance
Free Trial
Yes
No
Yes
Free/Freemium Version
No
No
Yes
Premium Consulting/Integration Services
Yes
No
No
Entry-level Setup Fee
No setup fee
No setup fee
No setup fee
Additional Details
—
—
—
More Pricing Information
Community Pulse
CyberArk Workforce Identity
NordLayer
Oracle Identity Governance
Considered Multiple Products
CyberArk Workforce Identity
No answer on this topic
NordLayer
No answer on this topic
Oracle Identity Governance
Verified User
Consultant
Chose Oracle Identity Governance
Of all the options mentioned here, we did consider VMware Identity Manager and Centrify Identity Service the most since we had just used these two for some of our implementation but we landed on OIM purely because the client had a lot of Oracle Business apps to integrate with …
Centrify is a great solution for anyone looking to start using Office 365. It is also a great solution for anyone wanting to provide their users with an SSO solution using OAUTH, Federation, or SAML for any hosted service. If you are looking to use Centrify for MDM but you aren't using a hosted/hybrid email solution such as Office 365, there are better on-premise options that should be explored.
NordLayer has become an invaluable resource for our security posture and day-to-day activity. The primary use case is preventing staff members from accessing sensitive resources on an unencrypted connection, applying NordLayer and conditional access policies in congruency. The ability to create teams and assigned them to specific dedicated servers is also helpful and allows for further security segmentation
Well suited for: 1. Large and medium organisations who have the capacity to invest in IAM roadmap for long term. 2. Organisations with and existing oracle and partner applications ecosystem. 3. Scenario where the user base is on the higher side and organisations looking to scale up in near future. 4. Organisation with complex workflow need in identity management process. Not well suited for 1. Small organisations or even medium ones which have a lesser number of applications 2. Scenarios where custom connectors need to be developed but at the same time turnaround should be quick. 3. Scenarios when features you are looking for are missing, getting them added could take a lot of effort. 4. UI is not very user-friendly and needs to be customised. 5. Takes time to stablise post going live
Occasionally, I get logged out of Gmail, sometimes in the middle of an email. I'm not sure why it happens, but I think it has something to do with timing out. Which is strange because I'm on email all day. Not sure why.
The browser plugin needs some work, or some research about what browser/OS restrictions may limit its functionality. Ours does not work at all even after contacting support so we do not use it
Toast/Windows notifications scheduled or deployed through admin center would be amazing. The ability to remind a user who has been disconnected for X hours would be a great feature
Centrify is central to creating efficiency and safety for our clients and internally. To remove it would cause a massive disturbance in the lives of our employees and our clients.
Overall good product and somewhat reliable when used in a specific manner. However, there are cons like unending bugs and no well-defined upgrade path. The product could have been more flexible and lite in terms of organisational infra needs. OIM is a robust product but other vendors are almost on-par now.
The support staff thus far has been very helpful. At times I feel they are driving the process forward without my intervention or constant reminder, which is nice to have in a company for a change. Most support seems to be a hassle but so far Centrify appears to treat your project as their own project.
Centrify offered us more for our money by being more than just an SSO platform. There were several other features included such as MDM and MFA. This started other initiatives for us and felt the other solutions we evaluated would not have been able to provide.
CyberArk Workforce Identity provides secure access to on-premises and cloud applications. The platform is highly scalable and works well for companies of any size.
I can classify and label data. Also keep track of activity in shared applications and data, to know exactly who accesses each of the files.