Introducing G2.ai, the future of software buying.Try now

Compare Okta and Opal Security

Save
    Log in to your account
    to save comparisons,
    products and more.
At a Glance
Okta
Okta
Star Rating
(1,058)4.5 out of 5
Market Segments
Mid-Market (53.2% of reviews)
Information
Pros & Cons
Entry-Level Pricing
$6.00 1 User per month
Browse all 2 pricing plans
Opal Security
Opal Security
Star Rating
(30)4.6 out of 5
Market Segments
Mid-Market (56.7% of reviews)
Information
Pros & Cons
Not enough data
Entry-Level Pricing
No pricing available
Learn more about Opal Security
AI Generated Summary
AI-generated. Powered by real user reviews.
  • G2 reviewers report that Okta excels in overall user satisfaction, boasting a significantly higher G2 Score compared to Opal Security. Users appreciate its ease of use, with many highlighting features like fingerprint login that simplify the authentication process.
  • According to verified reviews, Okta's implementation process is praised for its quick setup and intuitive onboarding, making it easier for teams to integrate the platform into their existing workflows. In contrast, Opal Security, while effective, has fewer recent reviews, which may indicate a less established user base.
  • Users say that Okta provides a robust experience for account management and security authentication, with features that allow for seamless connections to other platforms. This is a key advantage for organizations looking for a comprehensive identity management solution.
  • Reviewers mention that Opal Security shines in its ability to manage access in a SOC-2 compliant manner, with a clear and intuitive UI that requires minimal documentation. This makes it a strong choice for teams focused on compliance and security, although it lacks the volume of recent user feedback seen with Okta.
  • Users highlight that while Opal Security offers excellent support and a strong focus on zero trust access management, Okta's overall support quality is still highly rated, providing a balanced experience for users who may need assistance during implementation.
  • According to recent feedback, both platforms have their strengths, but Okta's higher number of reviews and overall satisfaction ratings suggest it may be a more reliable choice for organizations seeking a well-rounded user provisioning and governance tool.
Pricing
Entry-Level Pricing
Okta
Starter
$6.00
1 User per month
Browse all 2 pricing plans
Opal Security
No pricing available
Free Trial
Okta
No trial information available
Opal Security
No trial information available
Ratings
Meets Requirements
9.3
788
9.0
21
Ease of Use
9.3
810
8.6
21
Ease of Setup
8.9
322
8.8
17
Ease of Admin
9.0
185
9.0
18
Quality of Support
8.9
590
9.9
21
Has the product been a good partner in doing business?
8.9
180
10.0
17
Product Direction (% positive)
8.7
764
9.4
19
Features by Category
9.1
453
Not enough data
Authentication Options
9.3
429
Not enough data
Feature Not Available
Not enough data
9.3
411
Not enough data
Feature Not Available
Not enough data
9.2
294
Not enough data
9.2
284
Not enough data
Access Control Types
9.2
317
Not enough data
9.2
345
Not enough data
9.2
352
Not enough data
9.0
257
Not enough data
9.0
270
Not enough data
Administration
9.1
280
Not enough data
9.2
321
Not enough data
9.1
274
Not enough data
9.2
336
Not enough data
9.2
320
Not enough data
Platform
9.2
324
Not enough data
9.2
288
Not enough data
9.2
322
Not enough data
9.0
262
Not enough data
8.9
255
Not enough data
8.9
251
Not enough data
9.0
269
Not enough data
User Provisioning and Governance ToolsHide 15 FeaturesShow 15 Features
9.1
124
9.0
9
User on/off Boarding
9.1
95
|
Verified
10.0
9
9.1
93
|
Verified
9.0
8
9.3
95
|
Verified
9.2
6
9.2
93
|
Verified
8.9
6
9.4
91
|
Verified
9.6
8
8.9
85
|
Verified
10.0
7
User Maintenance
9.3
105
|
Verified
Not enough data
8.9
87
|
Verified
9.3
7
9.0
79
|
Verified
9.2
8
Governance
8.9
82
|
Verified
7.3
5
9.1
82
|
Verified
9.2
6
Administration
8.9
86
|
Verified
7.8
6
8.9
98
|
Verified
Feature Not Available
8.9
90
|
Verified
8.8
8
9.1
84
|
Verified
8.1
6
8.7
40
Not enough data
Network Management
9.1
32
Not enough data
8.8
32
Not enough data
9.0
34
Not enough data
9.1
33
Not enough data
Security
9.3
35
Not enough data
9.2
37
Not enough data
9.1
32
Not enough data
9.2
36
Not enough data
Identity Management
9.2
32
Not enough data
9.1
31
Not enough data
9.2
36
Not enough data
Generative AI
6.3
14
Not enough data
6.7
14
Not enough data
Cloud Directory ServicesHide 11 FeaturesShow 11 Features
9.4
82
Not enough data
Access Control
9.3
60
Not enough data
9.4
63
Not enough data
9.4
62
Not enough data
9.3
55
Not enough data
Administration
9.5
60
Not enough data
9.5
59
Not enough data
9.4
54
Not enough data
9.4
67
Not enough data
Functionality
9.5
73
Not enough data
9.6
74
Not enough data
9.4
66
Not enough data
Privileged Access Management (PAM)Hide 21 FeaturesShow 21 Features
Not enough data
8.8
15
Administration
Not enough data
8.6
12
Not enough data
9.1
13
Not enough data
8.9
12
Not enough data
8.3
10
Not enough data
9.5
11
Not enough data
9.6
14
Functionality
Not enough data
8.9
14
Not enough data
9.2
15
Not enough data
8.3
7
Not enough data
Not enough data
Not enough data
9.5
13
Not enough data
9.6
13
Not enough data
9.2
13
Not enough data
4.7
6
Not enough data
Feature Not Available
Not enough data
9.9
13
Monitoring
Not enough data
8.9
12
Not enough data
8.8
13
Not enough data
Not enough data
Reporting
Not enough data
8.2
13
Not enough data
8.5
10
Customer Identity and Access Management (CIAM)Hide 15 FeaturesShow 15 Features
9.4
114
Not enough data
Functionality
9.4
100
|
Verified
Not enough data
9.5
107
|
Verified
Not enough data
9.4
103
|
Verified
Not enough data
Feature Not Available
Not enough data
Feature Not Available
Not enough data
9.2
99
|
Verified
Not enough data
AI Authentication Risk Management - Customer Identity and Access Management (CIAM)
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
AI Biometric & Behavioral Analysis - Customer Identity and Access Management (CIAM)
Not enough data
Not enough data
Not enough data
Not enough data
AI Context-Aware Security Controls - Customer Identity and Access Management (CIAM)
Not enough data
Not enough data
Not enough data
Not enough data
Identity and Access Management (IAM)Hide 18 FeaturesShow 18 Features
9.2
213
Not enough data
Functionality
9.3
175
Not enough data
9.2
176
Not enough data
9.6
194
Not enough data
9.4
173
Not enough data
9.5
193
Not enough data
9.3
184
Not enough data
Type
9.0
143
Not enough data
9.3
171
Not enough data
Reporting
9.1
157
Not enough data
9.2
156
Not enough data
9.0
44
Not enough data
9.2
44
Not enough data
Authentication & Authorization - Identity and Access Management (IAM)
9.0
44
Not enough data
Administration & Governance - Identity and Access Management (IAM)
9.2
45
Not enough data
9.1
43
Not enough data
Generative AI - Identity and Access Management (IAM)
8.7
44
Not enough data
8.9
44
Not enough data
9.1
44
Not enough data
Identity Threat Detection and Response (ITDR)Hide 7 FeaturesShow 7 Features
Not enough data
Not enough data
Monitoring
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Remediation
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Agentic AI - AWS Marketplace
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Non-Human Identity Management (NHIM) SolutionsHide 10 FeaturesShow 10 Features
Not enough data
Not enough data
Lifecycle & Provisioning - Non-Human Identity Management (NHIM) Solutions
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Access, Authentication & Authorization - Non-Human Identity Management (NHIM) Solutions
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Visibility, Governance & Compliance - Non-Human Identity Management (NHIM) Solutions
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Reviews
Reviewers' Company Size
Okta
Okta
Small-Business(50 or fewer emp.)
7.0%
Mid-Market(51-1000 emp.)
53.2%
Enterprise(> 1000 emp.)
39.8%
Opal Security
Opal Security
Small-Business(50 or fewer emp.)
20.0%
Mid-Market(51-1000 emp.)
56.7%
Enterprise(> 1000 emp.)
23.3%
Reviewers' Industry
Okta
Okta
Computer Software
17.9%
Information Technology and Services
15.4%
Financial Services
6.2%
Internet
4.9%
Marketing and Advertising
3.9%
Other
51.7%
Opal Security
Opal Security
Information Technology and Services
26.7%
Financial Services
20.0%
Computer Software
16.7%
Computer & Network Security
10.0%
Internet
6.7%
Other
20.0%
Alternatives
Okta
Okta Alternatives
CyberArk Workforce Identity
CyberArk Workforce Identity
Add CyberArk Workforce Identity
OneLogin
OneLogin
Add OneLogin
JumpCloud
JumpCloud
Add JumpCloud
Microsoft Entra ID
Microsoft Entra ID
Add Microsoft Entra ID
Opal Security
Opal Security Alternatives
JumpCloud
JumpCloud
Add JumpCloud
Microsoft Entra ID
Microsoft Entra ID
Add Microsoft Entra ID
BetterCloud
BetterCloud
Add BetterCloud
Salesforce Platform
Salesforce Platform
Add Salesforce Platform
Discussions
Okta
Okta Discussions
Is there a way to access your applications on a mobile device?
5 Comments
Erin C.
EC
There is an Okta Mobile app from which you can access your work applications, but it requires a little extra setup and not all organization use it....Read more
How many applications?
2 Comments
Graham P.
GP
Doesn’t it always, though? ;-) Key factors to consider aside from number of applications you’d want to streamline access to via SSO for would be: -How...Read more
Does Okta have a plugin for integration with Spring Boot and Spring Security?
2 Comments
Uday Pratap S.
US
Spring security plugin is available to do user management, take a look at it https://bintray.com/grails/plugins/spring-security-core/viewRead more
Opal Security
Opal Security Discussions
Monty the Mongoose crying
Opal Security has no discussions with answers