Listing Thumbnail

    CyberArk Workforce Identity

     Info
    Sold by: CyberArk 
    Deployed on AWS
    Free Trial
    With CyberArk Workforce & Customer Access solutions, organizations can ensure that the right users have secure access to the right resources at the right time.

    Overview

    CyberArk Workforce Identity is a SaaS-delivered solution designed to simplify identity and access management in enterprises. CyberArk Identity unifies Workforce and B2B Access and Identity Management solutions in a single offering. CyberArk Workforce & B2B Access solutions ensure that the right users have secure access to the right resources at the right times.

    Organizations can use CyberArk Workforce solution to authenticate, authorize, and audit access to applications and IT systems, including AWS IAM and AWS SSO, with a security-first mindset. Strengthen security and reduce risk by protecting workforce and customer credentials and tightly controlling access to on-premises and cloud-based applications, services, and IT infrastructure.

    CyberArk Workforce Identity solution include:

    -CyberArk Single Sign-On: Enables one-click secure access to all the applications and resources including AWS IAM and AWS SSO -CyberArk Adaptive Multi-Factor Authentication: Enable a passwordless user experience with a comprehensive range of user-friendly, context and risk aware authetication methods. -CyberArk Secure Web Sessions: Protect identities beyond the login and gain visibility into every action users take within web applications. -CyberArk Workforce Password Management: Securely store, manage and share business application credentials. -CyberArk B2B Identity: Extends secure and seamless access for your business partners, vendors, and clients. -CyberArk Identity Lifecycle Management and compliance: Streamline identity lifecycle events, orchestrate identity workflows, and automate access reviews and compliance requierments.

    For custom orders please contact AWS-Marketplace@cyberark.com 

    Latest Release notes: https://docs.cyberark.com/identity/latest/en/content/releasenotes/ReleaseNotes-Latest.htm 

    Highlights

    • Identity Security Platform: CyberArk Workforce Identity includes deep integrations with CyberArk PAM, thousands of pre-integrated applications, and comprehensive support for MFA mechanisms, including the newest passwordless factors and technologies.
    • Architected for the modern enterprise: Leverages scalable CyberArk Identity Cloud Directory to unify user management across the enterprise, reduce identity silos, and simplify migration to the cloud.
    • With Identity Flows and Compliance eliminate manual tasks and processes by automating complex identity management workflows. Ensure all access rights are properly assigned and continually certified across the extended enterprise.

    Details

    Categories

    Delivery method

    Deployed on AWS

    Unlock automation with AI agent solutions

    Fast-track AI initiatives with agents, tools, and solutions from AWS Partners.
    AI Agents

    Features and programs

    Financing for AWS Marketplace purchases

    AWS Marketplace now accepts line of credit payments through the PNC Vendor Finance program. This program is available to select AWS customers in the US, excluding NV, NC, ND, TN, & VT.
    Financing for AWS Marketplace purchases

    Pricing

    Free trial

    Try this product free according to the free trial terms set by the vendor.

    CyberArk Workforce Identity

     Info
    Pricing is based on the duration and terms of your contract with the vendor. This entitles you to a specified quantity of use for the contract duration. If you choose not to renew or replace your contract before it ends, access to these entitlements will expire.
    Additional AWS infrastructure costs may apply. Use the AWS Pricing Calculator  to estimate your infrastructure costs.

    12-month contract (2)

     Info
    Dimension
    Description
    Cost/12 months
    Workforce Identity Std.
    Workforce Identity users - 100 users
    $12,528.00
    Workforce Password Mgmt
    Workforce Password Mgmt - 200 users
    $14,400.00

    Vendor refund policy

    Custom pricing options

    Request a private offer to receive a custom quote.

    How can we make this page better?

    We'd like to hear your feedback and ideas on how to improve this page.
    We'd like to hear your feedback and ideas on how to improve this page.

    Legal

    Vendor terms and conditions

    Upon subscribing to this product, you must acknowledge and agree to the terms and conditions outlined in the vendor's End User License Agreement (EULA) .

    Content disclaimer

    Vendors are responsible for their product descriptions and other product content. AWS does not warrant that vendors' product descriptions or other product content are accurate, complete, reliable, current, or error-free.

    Usage information

     Info

    Delivery details

    Software as a Service (SaaS)

    SaaS delivers cloud-based software applications directly to customers over the internet. You can access these applications through a subscription model. You will pay recurring monthly usage fees through your AWS bill, while AWS handles deployment and infrastructure management, ensuring scalability, reliability, and seamless integration with other AWS services.

    Support

    Vendor support

    Ensuring your CyberArk Workforce Identity is up to date and running efficiently is a priority. If you encounter a technical problem, contact CyberArk support 24x7, using our ticketing system at https://cyberark-customers.force.com  - Phone and email support are also available. Further details are available at www.cyberark.com/customer-support/#contact-supportContact 
    For support related questions: www.cyberark.com/customer-support/ 

    AWS infrastructure support

    AWS Support is a one-on-one, fast-response support channel that is staffed 24x7x365 with experienced and technical support engineers. The service helps customers of all sizes and technical abilities to successfully utilize the products and features provided by Amazon Web Services.

    Product comparison

     Info
    Updated weekly
    By BeyondTrust Corporation
    By Barracuda Networks

    Accolades

     Info
    Top
    100
    In Security
    Top
    10
    In Financial Services
    Top
    100
    In Infrastructure as Code

    Customer reviews

     Info
    Sentiment is AI generated from actual customer reviews on AWS and G2
    Reviews
    Functionality
    Ease of use
    Customer service
    Cost effectiveness
    19 reviews
    Insufficient data
    Positive reviews
    Mixed reviews
    Negative reviews

    Overview

     Info
    AI generated from product descriptions
    Multi-Factor Authentication
    Comprehensive, context and risk-aware authentication methods supporting passwordless user experiences
    Single Sign-On
    One-click secure access mechanism for applications and resources across cloud and on-premises environments
    Identity Lifecycle Management
    Automated workflow orchestration for identity management, access reviews, and compliance requirements
    Web Session Protection
    Advanced monitoring and visibility into user actions within web applications beyond initial login
    Identity Directory
    Scalable cloud-based directory for unified user management across enterprise environments, reducing identity fragmentation
    Identity Threat Detection
    Advanced discovery and intelligence system for detecting identity-based threats across infrastructure
    Privileged Access Management
    Comprehensive control and management of privileged passwords, accounts, credentials, and sessions for human and machine identities
    Remote Access Security
    Granular control, management, and auditing of privileged remote access for employees, vendors, developers, and cloud operations engineers
    Endpoint Privilege Control
    Dynamic least privilege enforcement across Windows, macOS, Linux, and mobile platforms to prevent malware and unauthorized access
    Cloud Entitlement Management
    Cross-cloud visibility of access permissions, detection of account permission anomalies, and guidance for privilege optimization
    Zero Trust Access Model
    Implements a dynamic access control framework based on continuous verification of user and device identity before granting resource access
    Multi-Cloud Resource Protection
    Provides secure access across AWS, on-premises, and multi-cloud environments without traditional VPN infrastructure
    Contextual Access Control
    Applies granular access rules and conditions that dynamically evaluate user and device trust before permitting workload access
    Identity Verification Mechanism
    Requires accessing entities to prove their authorization through comprehensive authentication and validation processes
    Remote Access Security Framework
    Enables secure, conditional access to corporate applications and cloud workloads with reduced attack surface exposure

    Contract

     Info
    Standard contract
    No
    No
    No

    Customer reviews

    Ratings and reviews

     Info
    0 ratings
    5 star
    4 star
    3 star
    2 star
    1 star
    0%
    0%
    0%
    0%
    0%
    0 AWS reviews
    |
    120 external reviews
    Star ratings include only reviews from verified AWS customers. External reviews can also include a star rating, but star ratings from external reviews are not averaged in with the AWS customer star ratings.
    S Azeem

    Eases regulatory compliance and streamlines administrative tasks with efficient identity and password management in sensitive sectors

    Reviewed on Jun 05, 2025
    Review provided by PeerSpot

    What is our primary use case?

    CyberArk Identity  is mainly used for accessing servers, partition management, and rotating passwords, especially in sensitive sectors such as banking and to protect patient data. It's crucial for complying with regulations and ensuring that administrative tasks such as encryption key management are streamlined.

    What is most valuable?

    CyberArk Identity  provides an easy identity portal, single console, log capture for GRC  compliance, and efficiently rotates passwords unknown to users, enhancing security. These features aid in reducing the attack surface by blocking unauthorized access and preventing exposure of internal solutions in sectors such as banking.

    What needs improvement?

    Some areas experience slowness based on the workload. There's a need to enhance network performance despite the good user experience with access management.

    For how long have I used the solution?

    We have been working with CyberArk Identity for more than five years. Previously, I worked with other PAM management tools. Currently, most customers are choosing it as a premier product, which is why we are focusing more on CyberArk Identity.

    How are customer service and support?

    They charge reasonable money for the features they provide. The price is reasonable for the product.

    How would you rate customer service and support?

    Positive

    Which solution did I use previously and why did I switch?

    While Arkon PAM is a competitor, that product is not as good nowadays. CyberArk Identity is at the top. When it comes to premium products, CyberArk Identity stands alone.

    How was the initial setup?

    The setup process for CyberArk Identity is singular, but it differs for all customers. Customers provide the data for implementation, based on which we receive payment. From a product perspective, it's easy, but we need to gather customer data and implement according to their requirements.

    Which other solutions did I evaluate?

    Other vendors include CrowdStrike and SentinelOne.

    What other advice do I have?

    Customers in the banking sector don't expose what solutions they have inside their systems for security reasons. My overall rating for CyberArk Identity is nine out of ten.

    Which deployment model are you using for this solution?

    On-premises

    If public cloud, private cloud, or hybrid cloud, which cloud provider do you use?

    Other
    IsaacHammond

    Enables efficient management of privileged access, though deployment has been complex

    Reviewed on Mar 05, 2025
    Review provided by PeerSpot

    What is our primary use case?

    If I have a core banking application platform with users or privileged users accessing that particular environment, I have to ensure that the right people are accessing what they're supposed to access. I need to have proper monitoring on them, ensuring that privileged accounts are not being shared and that generic accounts are not in use. For instance, if someone accesses the core banking application and performs changes or transactions, this solution enables me to track who did what in that session and even monitor or replay the session of that person's actions.

    How has it helped my organization?

    CyberArk provides identity governance. It gives you control of who, how, and what is accessing your environments. It provides simplicity for privileged users to access the environment. 

    What is most valuable?

    When using IAM  and PAM, CyberArk Identity  is the best choice. If it is just one model, for IAM , I prefer others like One Identity. For PAM, CyberArk Identity  is the best. 

    Furthermore, CyberArk Identity provides identity governance and gives me control over who and how access to environments occurs, offering significant confidentiality in what is accessed. 

    Initially, people find it challenging to adjust to these changes, however, over time, it becomes time-saving as there's no need to access each device individually. Instead, there is a single pane of glass or platform that administrators can log into to manage environments efficiently.

    The partner portals are and support portals are very good. 

    CyberArk Identity's ability to safeguard financial services infrastructure is good. If you have your core banking application transformed, and have privileged users accessing the environment, you can control who and what is accessing where and generic accounts cannot be used. If some accesses core banking functionality, you will be able to track what a person is doing.

    Its ability to help meet compliance requirements is good. It covers ISO standards. We easily integrate password policies. It helps us protect access within an organization. 

    It's helped us to comply with PCI DSS.

    There are a lot of time savings. There's a single pane of glass to log into to access the environment. We don't have to go through individually.

    We've reduced risk exposure. Instead of logging into different platforms, you just log in to one single platform. You have your resources being allocated to you. In this way, it also identifies you, with a single sign on privileges. It gives you protection in terms of not using generic accounts or administrative accounts that everybody uses. All credentials are saved in a particular system known as a vault, and only a particular port and a particular IP address can access the vault. Now, there is one way in or one way out. It doesn't create any vulnerabilities whereby people or unknown entities can enter easily.

    It impacts zero trust security strategies. It prevents lateral movements in the organization. You cannot be gaining access to a privileged account. 

    The solution helps with operational efficiency as it provides a very secure mode of access.

    What needs improvement?

    Integration or deployment is extremely difficult for CyberArk Identity. For example, vault integration and deployments are very tedious and involve components like HSMs, requiring extensive skill sets and knowledge. This complexity is especially true when integrating into various environments, service applications, and session monitoring setups. It is very demanding.

    For how long have I used the solution?

    I've deployed two solutions so far. I've worked with the solution for about three years, since 2021. I haven't worked with the projects this year. I've done some POCs.

    What do I think about the stability of the solution?

    With respect to stability, I find that stability is very good. It is very stable.

    What do I think about the scalability of the solution?

    The solution is very scalable.

    Which solution did I use previously and why did I switch?

    I'm also aware of One Identity.

    How was the initial setup?

    The initial setup was complex. It was very complex when it was my first time handling an implementation.

    What about the implementation team?

    We were the partner deploying for a customer.

    What's my experience with pricing, setup cost, and licensing?

    CyberArk Identity is slightly expensive compared to others. That said, it offers value for money. It comes with additional resources that I need to spin up on-premises. So, if I am not going fully cloud, there are additional resources I will need to purchase, such as spinning more VMs or acquiring an HSM device to encrypt the vault.

    What other advice do I have?

    I would probably give the solution a seven out of ten. 

    It offers the best PAM solution you can get compared to others, compared to One Identity.

    Deployment is complex. If you are deploying CyberArk Identity, you should have the skill sets, knowledge, and resources to manage it. It is not easy to manage or deploy CyberArk Identity. 

    Which deployment model are you using for this solution?

    On-premises
    WalwasaMulutazah Yahaya

    Integrates well with Microsoft Defender and has a reasonable price

    Reviewed on Feb 10, 2025
    Review provided by PeerSpot

    What is our primary use case?

    We use it to protect our login credentials within the computers and tablets that we provide to our team for field tasks.

    What is most valuable?

    Being able to integrate CyberArk Identity with Microsoft Defender is valuable. This integration feature is integral to maximizing the security benefits we get from the system.

    What needs improvement?

    To enhance the product, they can consider improving the user interface of the software and possibly the customer support team. Sometimes, there is a delay in handling my inquiries via email, which could be addressed for better service.

    For how long have I used the solution?

    I have used the solution for one year and a half.

    What do I think about the stability of the solution?

    We have never experienced downtime or crashing. I have not encountered such issues.

    What do I think about the scalability of the solution?

    The solution can be scaled. If we have subscribed, we are able to use it on different laptops and tablets. It does not limit us, even if I have ten or more devices. We can use it on different phones and computers, demonstrating its scalability.

    How are customer service and support?

    There are times when there is a delay in handling my inquiries via email. I would rate them an eight out of ten.

    How would you rate customer service and support?

    Positive

    Which solution did I use previously and why did I switch?

    We have not used other solutions. This is the first software that we are using to protect our data and access information within the organization.

    How was the initial setup?

    It was very easy because after we developed an interest, we went through the training on how to install it best, so while installing, we found things very easy.

    It took us one day for us to become familiar with everything. We were able to realize its benefits immediately after the deployment. 

    It does not require any maintenance.

    What about the implementation team?

    We had three people involved in the deployment.

    What's my experience with pricing, setup cost, and licensing?

    The pricing is acceptable. It is worth considering what we are protecting with the amount charged.

    What other advice do I have?

    A simple advice would be to have an IT person on the team for the software installation.

    Overall, I would rate CyberArk Identity a nine out of ten.

    Julio Montero

    Access management system provides strong security and effortless user authentication

    Reviewed on Jan 22, 2025
    Review provided by PeerSpot

    What is our primary use case?

    I work with Direct Identity. I was studying CyberArk, and I have used it a few times. Then I switched to a new project. I have some experience with CyberArk Identity .

    What is most valuable?

    What I like most about CyberArk Identity  is the model that is in place. It is very good. It is the most powerful access management system. There is a lot of security - especially when you have to onboard and allow access for new users for the corporate and new applications. It's wonderful.

    We saw results very quickly. I saw the power of identity management almost right away. It's one of the best in the industry. It competes very well against other solutions and Active Directory. It's very low cost in comparison to Microsoft solutions. 

    What needs improvement?

    Something they could improve is the management of multifactor authentication. When you translate the page from one language to another, it can be a difficult process. The translation isn't always good, and it may have a completely different name. I've noticed this in the English to Spanish translation.

    The implementation can be difficult. They have so many laws and filters that it can be overwhelming.

    For how long have I used the solution?

    A few months, or maybe two months ago, was the last time I used the product. I managed different multifactor accesses for users. When using you must sign in with corporate credentials to authenticate the users. The authentication can go through the phone or email. 

    What do I think about the stability of the solution?

    It's a very stable solution. When you have it in the cloud, you have CyberArk every time you need it. In the time I have been here, I have not experienced a fall in the service of CyberArk. There is no risk in the stability.

    How are customer service and support?

    I have contacted technical support. We used their help with virtual machines that CyberArk gives. I had one machine that I could not use due to an invalid token. They resolved the problem immediately after I reported it, on the same day, within one hour. It was a very good experience.

    How would you rate customer service and support?

    Positive

    Which solution did I use previously and why did I switch?

    A different solution can be, for example, Microsoft Azure  Active Directory. It is a very powerful identity management system and very good for a company that needs to improve constantly. Another good solution instead of CyberArk can be SailPoint, which has been making significant strides in recent years.

    How was the initial setup?

    The solution can be deployed on cloud or on-premises. CyberArk is more on the cloud than on local hardware. 

    The deployment is initially quite difficult. That said, when you are doing the implementation of CyberArk, there are so many tutorials that make the learning process very easy. The only complaint could be the language barrier. It's difficult if you don't have a very good level of English. Otherwise, it is very easy.

    You can have it set up within three months without much difficulty. It's hard to get started, however, once you get going, it gets easier. A full deployment takes half a year or less.

    There is some maintenance necessary. A company is constantly hiring and letting go of employees. The access is always changing, so access must always be adjusted. Or, if we need another law of filter, we would need to add those, or even take them away. That's another aspect of maintenance. 

    What about the implementation team?

    We do not use a third party for implementing CyberArk. We can contact CyberArk directly if we have questions.

    What's my experience with pricing, setup cost, and licensing?

    Regarding pricing, it can be quite a lot for small companies. For national companies, like a medium-sized company with 1,000 employees, it can be very good.

    It is also a very necessary solution. Every  company needs identity management for security within the corporation. It is essential to prevent unauthorized access and maintain strong barriers against hackers.

    Which other solutions did I evaluate?

    A different solution can be, for example, Microsoft Azure  Active Directory. It is a very powerful identity management system and very good for a company that needs to improve constantly. Another good solution instead of CyberArk can be SailPoint, which has been making significant strides in recent years.

    What other advice do I have?

    Out of everything, I will rate it nine out of ten. 

    It can be a language barrier, however, not necessarily if you understand English quite well. There is complexity in understanding the multifactor access, however the CyberArk interface is wonderful. I like it. It gives the user a very good, simple way to access different features of the CyberArk product.

    I have no relationship with CyberArk. I've only worked with the product.

    Which deployment model are you using for this solution?

    Hybrid Cloud
    Joble John

    Fairly priced and offers ease of integration

    Reviewed on Jun 10, 2024
    Review provided by PeerSpot

    What is our primary use case?

    I use the solution in my company for its vaults.

    What is most valuable?

    The features that I personally find most effective in terms of security stem from the fact that it is easy to integrate and also the adoption is faster.

    What needs improvement?

    At the moment CyberArk needs to enrich Conjur and it needs to be made more viable so that its adoption can be made much faster.

    For how long have I used the solution?

    I have been using CyberArk Identity for three years. Our company has a partnership with CyberArk.

    What do I think about the stability of the solution?

    Stability-wise, I rate the solution a nine out of ten.

    What do I think about the scalability of the solution?

    Scalability-wise, I rate the solution a nine out of ten.

    How are customer service and support?

    As my company has a partnership with CyberArk, we don't face any challenges with the support part. I rate the technical support a ten out of ten.

    How would you rate customer service and support?

    Positive

    How was the initial setup?

    In our company, we haven't faced any such challenges with the product's initial setup phase because our requirements were pretty clean and clear.

    The solution is deployed on an on-premises model.

    The solution can be deployed in two weeks, and it includes every area because my company has a complex environment.

    What was our ROI?

    Cost savings have been possible since my company has not had to pay any penalties after using the product. The product has also secured our company's environment.

    What's my experience with pricing, setup cost, and licensing?

    I think it is a fairly priced tool. I rate the tool between six and seven on a scale of one to ten where one is expensive, and ten is cheap.

    Which other solutions did I evaluate?

    Against CyberArk Identity, my company tried other products like Norton and some other tools, which were not up to the mark.

    What other advice do I have?

    My company doesn't use the tool for the multi-factor authentication feature.

    I recommend the product to those who plan to use it.

    The vendor maintains the solution automatically.

    I rate the overall tool an eight out of ten.

    Which deployment model are you using for this solution?

    On-premises
    View all reviews