We performed a comparison between CyberArk Endpoint Privilege Manager and CyberArk Privileged Access Manager based on real PeerSpot user reviews.
Find out in this report how the two Privileged Access Management (PAM) solutions compare in terms of features, pricing, service and support, easy of deployment, and ROI."I like that you can remove the admin rights from the user's computer and have control over the environment. That means you can delete the local admins and grant them proper privileges with the console. So, they will get proper permissions for applications they need, but we don't have to do it. In the domain where we don't have control, the user can only do specified actions, but not all of them."
"Users can scale the solution."
"The most valuable features of CyberArk Endpoint Privilege Manager are password management, session management, onboarding rules, platform customization, and safety management."
"The feature called PTA, which stands for Privileged Threat Analytics keeps track of what admins are doing and works with Centimeters. If something fishy is going on with a user's credentials, it alerts the security team so they can act fast. Plus, it automates stuff like resetting credentials or blocking users. So, if there's a potential hack, CyberArk can change passwords and lock out users in a snap. It also gives you a heads-up if anything unusual is going on with server activities, like someone creating new users with uncontrolled credentials."
"The solution is scalable."
"You can use it to strip users of their local admin rights and, at the same time, elevate applications for them."
"The product is stable."
"The solution allows me to give access and privileges to each user individually"
"You can easily manage more than 4000 accounts with one PSM."
"CyberArk has helped us to identify, store, protect, and monitor the usage of privileged accounts."
"It has helped us with our adoption with other teams, and it has also helped us to integrate it at the ground level."
"It is a scalable product."
"They just released Marketplace, and they are constantly releasing updates to the components and adding new components, like Conjur. This is something that we ran into with Secret Server and DevOps, so it is already scalable, but becoming more so in the future."
"It is a robust product."
"When we started with RPA, there was a requirement that every credential and the bots themselves be protected through the PAM system. From the get-go, we've had CyberArk in the middle... We've got a pretty robust RPA implementation with our PAM platform. Users, bots, the credentials — everything is managed via our PAM solution."
"Central Password Manager is useful for agentless automated password management through AD integration as well as endpoints for different devices."
"CyberArk Endpoint Privilege Manager can be better by making its UI more consistent."
"Performance could be better. We have a couple of problems with CyberArk right now. One of the problems is performance in our environment. Support also takes a long time to respond. If the user already has local admin rights, then I can't collect any events in the console from this device. There are also some options in CyberArk that are not working properly, and are not helpful in this case. I can't collect any information to create a proper policy for the device. I have to investigate everything manually, or even disable the local admin from the device. I can collect the events only after this, and it's very time consuming. In my case, it's a waste of resources."
"CyberArk is a pretty heavy solution."
"It's an old product and has many areas that can be improved."
"The price of the solution should improve."
"The installation process is pretty difficult."
"The solution's pricing could be better."
"It is hard to deal with technical support if you are not certified."
"There is room for improvement in the pricing model."
"The current interface doesn't scale that well, and has some screens still in the old layout."
"Having a centralized place to manage the solution has been something that I have always wanted, and they are starting to understand that and bring things back together."
"We would, of course, always prefer it if the pricing was cheaper."
"We'd like to see the creation of some kind of memo field for each device account, which could be used, in our network at least, to leave a note about the device for either the security or network engineering team members."
"The product documentation has to be more precise in certain aspects with explanations for functionality limitations along with reference material or screenshots."
"Integration with the ticketing system should allow any number of fields to be used for validation before allowing a user to be evaluated and able to access a server."
"The Vault's disaster recovery features need improvement."
More CyberArk Endpoint Privilege Manager Pricing and Cost Advice →
More CyberArk Privileged Access Manager Pricing and Cost Advice →
CyberArk Endpoint Privilege Manager is ranked 6th in Privileged Access Management (PAM) with 28 reviews while CyberArk Privileged Access Manager is ranked 1st in Privileged Access Management (PAM) with 144 reviews. CyberArk Endpoint Privilege Manager is rated 8.2, while CyberArk Privileged Access Manager is rated 8.8. The top reviewer of CyberArk Endpoint Privilege Manager writes "Offers integrated solutions and expands its capabilities through strategic acquisitions". On the other hand, the top reviewer of CyberArk Privileged Access Manager writes "Lets you ensure relevant, compliant access in good time and with an audit trail, yet lacks clarity on MITRE ATT&CK". CyberArk Endpoint Privilege Manager is most compared with Microsoft Defender for Endpoint, BeyondTrust Endpoint Privilege Management, CrowdStrike Falcon, Tanium and Cortex XDR by Palo Alto Networks, whereas CyberArk Privileged Access Manager is most compared with Cisco ISE (Identity Services Engine), Microsoft Entra ID, Delinea Secret Server, WALLIX Bastion and F5 BIG-IP Access Policy Manager (APM). See our CyberArk Endpoint Privilege Manager vs. CyberArk Privileged Access Manager report.
See our list of best Privileged Access Management (PAM) vendors.
We monitor all Privileged Access Management (PAM) reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.