Home/Identity and Access Management (IAM) Software/Okta vs Idaptive Next-Gen AccessUpdated on: April 19, 2024

Compare Okta vs Idaptive Next-Gen Access

98% The SW Score ranks the products within a particular category on a variety of parameters, to provide a definite ranking system. Read More Remove
90% The SW Score ranks the products within a particular category on a variety of parameters, to provide a definite ranking system. Read More Remove
Visit Website

Visit Website

ADD PRODUCT
98% The SW Score ranks the products within a particular category on a variety of parameters, to provide a definite ranking system. Read More Remove
90% The SW Score ranks the products within a particular category on a variety of parameters, to provide a definite ranking system. Read More Remove
Visit Website

Visit Website

Overview

Summary

Okta is an identity and access management software that provides great user experience and easy administration by connecting suppliers, partners and customers of an enterprise securely within a single loop. It is an identity provider having deep integrations to hundreds of apps, which can be accessed through multiple devices very safely and securely. Octa helps companies to modernize IT by enabling them to move faster automatically and even eliminate friction, build customer experiences by delighting them with personalised and inherently secure applications and even prevent data breaches by establishing people as the new security perimeter. In simple words, Okta sets an identity standard which is independent and neutral. It is a platform which securely connects the right people to the right technologies at the right time. It provides instant access to all apps with a single sign on, provides an added level of authentication which prevents identity attacks, encourages lifecycle management, centrally manages a universal directory in your organisation and even controls and manages API access securely. ..show more

Idaptive provides Next-Gen Access solutions to enterprises to protect them from unauthorized data access, cyber-attacks, and data breaches. It follows a Zero Trust and Security First approach to regulate access of each of the users by verifying them and validating their devices. The Multi-Factor Authentication creates an additional layer of security before any access is granted to applications. The software can monitor the network, device, and learn user behavior context to assign risk levels to each accessed event. By securely authenticating every access with a wide range of supported factors that also includes FIDO2 keys, virtual and hardware tokens, etc, Idaptive eliminates the need of using passwords. Admins can route application access requests, create application accounts, revoke access whenever necessary, etc easily. Enterprises can frame centralized policy management and secure endpoints that are used to access enterprise resources. With device security management, institutions can also extend enterprise authentication services to the cloud without duplicating identities. One can even select trusted devices to limit access to certain information and applications. If needed, data sets can be locked and deleted within minutes in the case of cyberattacks. Besides, there are several other security features as well that can be implemented to build robust cybersecurity within an organization. ..show more

Features

API Access Management Ensures that calls with authenticated access can enter APIs

Access Request Management Helps to view and manage access requests submitted by the personnel

Account Management Helps to manage user accounts within organisations

Compliance Management Helps in making an assessment of risks, ensures policy comprehension and that policies/procedures are being followed

Multi-factor Authentication Uses more than one method to verify a user's identity for a login

Password Management Enables the administrator to manage, authenticate and reset passwords

Passwordless Login Allows to login without password using other means of verification, e.g. SSH keys

Role Management Helps regulate access to systems, based on individual roles

Single Sign-On (SSO) Permits one set of login credentials to access multiple applications

Social Sign On Allows users to sign on using credentials of social networking services

User Activity Monitoring Monitors and records user activities in the enterprise

TECHNICAL DETAILS

Access Monitoring

24/7 (Live rep)

Business Hours

Online

Contact Number/Address

San Francisco, California / +1-800-219-0964

Santa Clara, California

API

N/A

Deployment

SaaS/Web/Cloud

Mobile - Android

Mobile - iOS

Installed - Windows

Installed - Mac

Customers

Individuals

Freelancers

Large Enterprises

Medium Business

Small Business

Pricing

Pricing Model

Free Trial

Freemium

One-time license

Open-source

Subscription

Quotation Based

Plans

Single Sign-On
$2 /User/Month

Features

  • Okta Integration Network
  • Okta ThreatInsight
  • Desktop and mobile SSO (cloud & on-prem apps)
  • Security Question
  • Email as a factor
  • 3rd party MFA integration
  • Group and app access policies
  • RADIUS authentication
  • PIV card authentication
  • IdP discovery
  • Custom org URLs (e.g. company.com/login)
  • Okta sign-in widget
  • Local language support
  • Unlimited integrations to AD & LDAP
  • SIEM integration
Adaptive Single Sign-On
$5 /User/Month

Features

  • Includes features of Single Sign-on plan
  • Location context
  • Device context
  • Network context
  • Risk-based Authentication
Multi-factor Authentication
$3 /User/Month

Features

  • Security questions
  • Okta Verify OTP
  • Okta Verify Push
  • Email as a factor
  • SMS
  • Voice
  • U2F
  • Third-party factors
  • Windows Hello
  • Apple TouchID
  • Specified IP zones
  • Okta ThreatInsight
Adaptive Multi-factor Authentication
$6 /User/Month

Features

  • Includes features of Multi-factor Authentication plan
  • New city, state, or country
  • New geo-location
  • Impossible travel patterns
  • New device
  • Managed device
  • New IP
  • Specified IP zones
  • Network anonymizers
  • Okta ThreatInsight
Universal Directory
$2 /User/Month

Features

  • Cloud directory
  • Unlimited directory integrations (AD/LDAP & apps)
  • Unlimited custom user attributes and fields
  • Custom mapping and transformation
  • Cloud-based LDAP authentication
Lifecycle Management
$4 /User/Month

Features

  • Auto provisioning / deprovisioning for OIN apps - Unlimited OIN Apps
  • Directory integration with AD or LDAP
  • Complete AD synchronization for Office 365
  • App access and provisioning tied to lifecycle states
  • Create and deactivate accounts in applications
  • Manage entitlements
  • Group discovery, matching, push, and updates
  • Automation
  • Access request workflows
  • Deprovisioning workflows
  • Access audit reports
  • Recent unassignments report
  • Rogue accounts report
  • APIs for full customization
  • Customizable directory for users groups and devices
  • Manage lifecycle states
  • Attribute mapping and transformation
API Access Management
$2 /User/Month

Features

  • Application and directory integrations
  • OAuth 2.0 and OIDC compliant
  • Dynamic client registration
  • Central access and authorization management
  • User consent
  • Customizable scopes and claims
  • Customizable authorization servers
Advanced Server Access
$15 /Month

$15 per server per month billed monthly

Features

  • Supports mixed environments: AWS, Azure, GCP, and on-premises
  • End-to-end lifecycle management of local Linux and Windows machine accounts
  • Seamless SSO and MFA authentication built into your SSH and RDP workflows
  • Backed by a Programmable CA that mints just-in-time, single-use client certificates
  • Client Application for local SSH and RDP integrations, and dynamic device binding
  • API allows for custom authentication and management workflows
Access Gateway
$3 /User/Month

Features

  • Number of app integrations: Included
  • Header-based applications
  • Kerberos/IWA applications
  • On-premise applications – such as Oracle E-Business Suite, PeopleSoft, and Sharepoint
  • Custom web apps, pages, and web portals
  • Number of policies: Unlimited
  • Application policies
  • Custom header variables
  • Authorization policies
  • Access Gateway servers: Unlimited
  • Datacenters: Unlimited
  • Networks and hosts: Unlimited
Light (Workflows)
$4 /User/Month

Light (Workflows)

  • $4 per user per month
  • up to 50 flows
  • Access to all Okta Workflows connectors
  • Access to all Okta Workflows templates
  • Access to all Okta Workflows features, functions
Medium (Workflows)
$5 /User/Month

Medium (Workflows)

  • $5 per user per month
  • up to 150 flows
  • Access to all Okta Workflows connectors
  • Access to all Okta Workflows templates
  • Access to all Okta Workflows features, functions
Unlimited (Workflows)
$6 /User/Month

Unlimited (Workflows)

  • $6 per user per month
  • unlimited flows
  • Access to all Okta Workflows connectors
  • Access to all Okta Workflows templates
  • Access to all Okta Workflows features, functions
Light (Identity Governance)
$9 /User/Month

Features

  • Up to 50 flows
  • Access Certification
  • Access Requests
  • Reporting
  • Advanced Sourcing
  • SCIM provisioning
  • OPP Provisioning
  • Light (up to 50 flows)
Medium (Identity Governance)
$10 /User/Month

Features

  • Up to 150 flows
  • Includes features of Light (Identity Governance) plan, plus
  • Medium (up to 150 flows)
Unlimited (Identity Governance)
$11 /User/Month

Features

  • Includes features of Medium (Identity Governance) plan, plus
  • Unlimited (unlimited flows)
Enterprise
Custom

Features

  • Custom Connection and User Tiers
  • Unlimited Okta Connections
  • No Admin or Actions Limits
  • 99.99% SLA & Enterprise Support
  • Advanced Deployment Options
  • Enterprise add-ons:
  • Attack Protection
  • Enterprise MFA
  • Adaptive MFA
  • Private Cloud
  • Premier Success Plans
  • HIPAA BAA & PCI
Essentials (B2C Plans)
$23 /Month

Features

  • Tiers up to 10,000
  • External MAU
  • Unlimited Social Connections
  • Custom Domains
  • User Role Management
  • 5 Actions
Professional (B2C Plans)
$240 /Month

Features

  • Tiers up to 10,000
  • External MAU
  • Pro MFA
  • External Databases
  • Admin Roles
  • 10 Actions
  • M2M Add-ons
Essential (B2B Plans)
$130 /Month

Features

  • Tiers up to 7,000 External MAU
  • 3 Enterprise Connections
  • Unlimited Okta Connections
  • Pro MFA
  • 5 Actions
  • User Role Management
  • 50 Organizations
  • M2M Add-ons

Professional (B2B Plans)
$800 /Month

Features

  • Tiers up to 7,000 External MAU
  • Unlimited Okta Connections
  • External Databases
  • 10 Actions
  • Admin Roles
  • 100 Organizations
  • M2M Add-ons
View Price Page
Single Sign-on
Others

STANDARD SSO: $2 per user per month
Features

  • Idaptive App Catalog
  • Desktop SSO
  • Role-based access policy
  • B2B federation
  • MFA using OATH tokens and security questions
  • MFA using a third-party RADIUS server
  • Cloud Directory
  • Integrations to AD, LDAP, and Google Cloud Directory
  • Custom user attributes
  • Directory APIs
  • Browser-based SSO portal
  • Idaptive mobile app
  • Self-service password update and reset for AD accounts
  • Self-service AD account unlock
  • Self-service AD profile updates
  • Administrator reports
  • SIEM integration

ADAPTIVE SSO: $4 per user per month (Plus add-ons)

Features

  • Includes features of STANDARD SSO
  • Includes Add-ons

Add-ons: $36 per user per year

  • Location context
  • Device context
  • Network context
  • Time-based context
  • User behavior risk context
Multi-factor Authentication
Others

STANDARD MFA: $2.5 per user per month
Features

  • Workstation (PC and Mac)
  • Virtual desktop login
  • VPN login
  • Web apps login
  • RADIUS server
  • Third-party IDPs
  • On-prem web app MFA (requires SSO and App Gateway add-on)
  • Cloud Directory
  • Integrations to AD, LDAP, and Google Cloud Directory
  • Custom user attributes
  • Directory APIs
  • Email OTP
  • Physical FIDO U2F-based keys
  • Hardware OTP Tokens
  • KBA(Security Questions)
  • OATH-based mobile authenticator apps
  • Mobile push notifications
  • Derived credentials
  • Smart cards
  • Offline OTP
  • SMS-based OTP
  • Phone call
  • Wearable as a token

ADAPTIVE MFA: $5 per user per year

Features

  • Includes features of STANDARD MFA
  • Location context
  • Device context
  • Time-based context
  • Network context
  • User behavior risk context
  • Rich insights
  • Incident investigation
  • Risk modeling
  • Response orchestration and automation
  • Third-party threat ingestion
Lifecycle Management
Others

STANDARD LCM: $3.5 per user per month
Features

  • Pre-integrated app provisioning and de-provisioning
  • AD, LDAP, Google Cloud Directory, and Idaptive Cloud Directory synchronization
  • AD synchronization and license management for Office 365
  • Self-service app request and approval
  • Create, update, and deactivate accounts in applications
  • Manage entitlements
  • Reporting
  • SIEM integration

ADVANCED LCM: $7 per user per year

Features

  • Includes features of STANDARD LCM, plus
  • Workday
  • SAP SuccessFactors
  • Bamboo HR
  • Ultimate Software's UltiPro
  • SCIM-based provisioning
  • SCIM server
Mobile Devices
Others

DEVICE CONTEXT: $2 per user per month
Features

  • Detect and block rooted or jailbroken devices
  • Automated certificate management
  • Device location
  • Remote enable or disable SSO
  • BYOD self-service enrollment

DEVICE SECURITY: $9 per user per year

Features

  • Includes features of DEVICE CONTEXT, plus
  • Remote lock
  • Remote wipe
  • Disk encryption
  • 802.1x
  • Proxy
  • VPN
  • Security
  • Passcode
  • Mobile app management add-on ($4 per user/per month)
    • Deploy, manage, and remove apps
    • Deploy custom apps
    • Deploy apps from managed Google Play store
    • Control app updates
Endpoint Management
Others

ENDPOINT CONTEXT: $2 per user per month

Features

  • Automated certificate management
  • Device location
  • Remote enable or disable SSO
  • BYOD self-service enrollment

ENDPOINT SECURITY: $10 per user per month

Features

  • Includes features of ENDPOINT CONTEXT, plus
  • Remote lock
  • Remote wipe
  • Security and privacy
  • WiFi settings
  • VPN settings
  • FileVault management
  • Application restrictions
  • Preferences restrictions
  • Media access
View Price Page

SCREENSHOTS

Okta Screenshots
View 1 screenshot(s)
Idaptive Next-Gen Access Screenshots

INTEGRATIONS

  • Slack
  • Salesforce
    NA

ALTERNATIVES

Top alternatives to Okta

JumpCloud
JumpCloud
Oracle SSO
Oracle SSO
Ping Identity
Ping Identity
Cognito
Cognito
CyberArk PAS
CyberArk PAS

Top alternatives to Idaptive Next-Gen Access

Okta
Okta
JumpCloud
JumpCloud
Ping Identity
Ping Identity
OneLogin
OneLogin
RSA SecurID
RSA SecurID