Try our new research platform with insights from 80,000+ expert users

CyberArk Endpoint Privilege Manager vs CyberArk Privileged Access Manager comparison

 

Comparison Buyer's Guide

Executive SummaryUpdated on Oct 6, 2024

Review summaries and opinions

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
 

ROI

Sentiment score
7.0
CyberArk Endpoint Privilege Manager boosts ROI by enhancing security, preventing breaches, saving resources, and reducing vulnerability to threats.
Sentiment score
7.0
CyberArk Privileged Access Manager enhances security, improves compliance, and increases efficiency, offering intrinsic value and potential cost reductions.
Deploying CyberArk Endpoint Privilege Manager has secured the infrastructure, which saves money, time, and resources.
During our quantitative analysis, we estimated potential savings of one to ten million dollars a year by using a PAM solution.
With other tools such as Okta where you have self-service for resetting your own passwords and things like that, the average savings is 12 minutes, which is six dollars for a password reset, and you can extrapolate that over your organization.
A strong identity and access management solution aids in navigating significant incident responses or breach situations.
 

Customer Service

Sentiment score
6.6
CyberArk Endpoint Privilege Manager's customer service is helpful and knowledgeable but may have occasional response delays and complexity issues.
Sentiment score
6.4
CyberArk support has mixed reviews, with praised regional support but criticism for delays and costly premium service.
They respond immediately to our inquiries, resolve issues promptly, and provide valuable guidance, especially in critical situations.
We engage them when needed and receive prompt responses that typically resolve our issues.
At times, when we need quick support, I contact them via email or WhatsApp, and I have to wait for about an hour before finding a respondent.
CyberArk has been exceptional in coming back to us with immediate responses.
It could be forever until you talk to someone who knows what they are doing.
They are helpful, but complex issues can take a long time to resolve, which can delay solutions for urgent customer issues.
 

Scalability Issues

Sentiment score
7.7
CyberArk Endpoint Privilege Manager is scalable and flexible, suitable for businesses of all sizes, though scaling can be labor-intensive.
Sentiment score
7.7
CyberArk Privileged Access Manager scales effortlessly but requires proper planning and understanding of configurations and licenses for large deployments.
We can set permissions per team or department, allowing some teams to elevate specific applications while others have different permissions.
CyberArk Endpoint Privilege Manager is quite scalable.
The available reports and other security tools assist in scaling it according to my organization's needs.
The CPM can reportedly handle up to 50,000 accounts independently without issue.
I would rate it a ten out of ten for scalability.
They had 40,000 passwords in this one safe, and it was saving the last ten iterations of each password object. That means they had 400,000 password objects in this safe. They exceeded the limit.
 

Stability Issues

Sentiment score
8.2
CyberArk Endpoint Privilege Manager is highly stable, with minimal issues and exceptional uptime, particularly for Windows users.
Sentiment score
7.8
CyberArk Privileged Access Manager is stable, though some experience configuration-related issues; upgrades and support enhance reliability and downtime.
It is a robust solution that has effectively supported our environment without major issues.
Since implementing it, we have not experienced any outages or stability issues.
CyberArk Endpoint Privilege Manager offers multiple options for creating and stopping policies.
Proper fine-tuning and expertise ensure the product performs well.
Overall, the stability of the solution is high.
It has a large customer base and positive feedback within my network.
 

Room For Improvement

CyberArk Endpoint Privilege Manager needs usability, performance, integration, UI design, pricing, support, and configuration enhancements for better functionality.
CyberArk Privileged Access Manager needs UI improvements, better integration, enhanced features, simplified deployment, and more proactive support.
CyberArk Endpoint Privilege Manager could be improved by simplifying the administration process, specifically when setting up policies and applications.
Currently, no user-based policy option is available inside the EPM console.
CyberArk should consider whitelisting important applications like PowerShell and DLL that are currently not allowed due to some malicious content.
They want everything to be on the cloud, but even in the SaaS version of CyberArk Privileged Access Manager, they need to deploy some servers on-premises.
We cannot generate a plug-in for web-based applications.
If they want clients to move to the cloud, they need to support them in real-time.
 

Setup Cost

CyberArk Endpoint Privilege Manager's pricing suits large enterprises, with costs based on users and sessions, often prohibitive for smaller businesses.
CyberArk Privileged Access Manager is pricey but valued for its advanced features and security, with tailored, scalable licensing options.
CyberArk has saved us 15% of our costs.
CyberArk Endpoint Privilege Manager is slightly expensive, but costs can be negotiated to become more competitive.
CyberArk Endpoint Privilege Manager is costly compared to other solutions.
CyberArk is expensive compared to other products I know.
CyberArk is comparatively expensive compared to other PAM solutions, such as Delinea, especially during renewal.
CyberArk's SaaS solution is particularly expensive.
 

Valuable Features

CyberArk Endpoint Privilege Manager enhances security and reduces IT support by managing privileges, threats, and unauthorized access across enterprises.
CyberArk Privileged Access Manager offers secure, automated password management and session monitoring, enhancing usability and compliance across platforms.
CyberArk Endpoint Privilege Manager effectively reduces malicious content in applications by allowing us to identify and block dangerous applications.
The features I find most valuable are the endpoint privilege capabilities, which provide automatic protection to our IT environment.
CyberArk Endpoint Privilege Manager enhances computer security by providing minimal access, effectively preventing ransomware attacks.
CyberArk Privileged Access Manager helps ensure data privacy because we now know who is using which credentials and at what time.
It keeps a record of activities, allowing me to easily fetch screen recordings to detect any misuse and see who did what and what happened.
As a security professional, I have real-time visibility into ongoing sessions.
 

Categories and Ranking

CyberArk Endpoint Privilege...
Ranking in Privileged Access Management (PAM)
5th
Average Rating
8.2
Reviews Sentiment
6.8
Number of Reviews
35
Ranking in other categories
Endpoint Compliance (4th), Anti-Malware Tools (5th), Application Control (6th), Ransomware Protection (7th)
CyberArk Privileged Access ...
Ranking in Privileged Access Management (PAM)
1st
Average Rating
8.6
Reviews Sentiment
6.9
Number of Reviews
208
Ranking in other categories
User Activity Monitoring (1st), Enterprise Password Managers (3rd), Mainframe Security (2nd), Operational Technology (OT) Security (3rd)
 

Mindshare comparison

As of February 2025, in the Privileged Access Management (PAM) category, the mindshare of CyberArk Endpoint Privilege Manager is 3.6%, up from 3.6% compared to the previous year. The mindshare of CyberArk Privileged Access Manager is 19.7%, down from 23.7% compared to the previous year. It is calculated based on PeerSpot user engagement data.
Privileged Access Management (PAM)
 

Featured Reviews

Jayasree Sriram - PeerSpot reviewer
Improves security and efficiency, and we also get very fast support
We have created automation. If a user is getting an issue, it will automatically give us a pop-up mentioning the platform where the issue is happening. We can then look at the platform to see what is happening there. We are looking into how to reduce password verification failures and reconciliation failures. These failures are not related to CyberArk. They are related to internal usage. We have not had issues with CyberArk. It works very smoothly. We can do many things with CyberArk. It helps us to see exactly what is happening. For example, if a user is out of their account, we can see what exactly is happening. For such issues, we use CyberArk and follow the recommendations. We have improved our system upgrades from a month to just two weeks for around 10,000 computers. Automation implemented by our senior team also provides timely notifications of issues, improving our response time and operational efficiency.
Lasantha Wijesinghe - PeerSpot reviewer
We have visibility and control through real-time user behavior analytics
It took us some time to realize its benefits because there was a learning curve for us. It took us about a year to get our heads around this product and start effectively using it. It is a journey. It takes at least five years for any company to make this product very useful and reach maturity. It is not only the product's fault. The company needs to have a vision, and the company culture needs to go with it. Senior leadership needs to support the vision. You need to have lots of ingredients for success. If everything is in place, you will see success after one year. In the first year, it is a struggle for everybody. My company was bought by a bigger company, and they were very new to privileged access management. Everybody was struggling. The advice I would give is to have a good vision for privileged access management. You need dedicated teams, senior management support, and proper company policies and standards before implementing the solution. Start building knowledge slowly and avoid jumping into the deep end without preparation. I would rate CyberArk Privileged Access Manager a nine out of ten.
report
Use our free recommendation engine to learn which Privileged Access Management (PAM) solutions are best for your needs.
832,138 professionals have used our research since 2012.
 

Top Industries

By visitors reading reviews
Financial Services Firm
15%
Computer Software Company
14%
Manufacturing Company
11%
Government
8%
Educational Organization
34%
Financial Services Firm
12%
Computer Software Company
11%
Manufacturing Company
6%
 

Company Size

By reviewers
Large Enterprise
Midsize Enterprise
Small Business
 

Questions from the Community

Looking for recommendations and a pros/cons template for software to detect insider threats
This is an inside-out --- outside-in --- inside-in question, as an insider can be an outsider as well. There is no short answer other than a blend of a PAM tool with Behavioral Analytics and Endpo...
What do you like most about CyberArk Endpoint Privilege Manager?
The most valuable feature of the solution is its performance.
How does Sailpoint IdentityIQ compare with CyberArk PAM?
We evaluated Sailpoint IdentityIQ before ultimately choosing CyberArk. Sailpoint Identity Platform is a solution to manage risks in cloud enterprise environments. It automates and streamlines the m...
What do you like most about CyberArk Privileged Access Manager?
The most valuable features of the solution are control and analytics.
What is your experience regarding pricing and costs for CyberArk Privileged Access Manager?
CyberArk Privileged Access Manager is more expensive than its competitors, such as BeyondTrust, Delinea, and ManageEngine PAM360. While ManageEngine PAM360 offers similar flexibility and support at...
 

Also Known As

Viewfinity
CyberArk Privileged Access Security, CyberArk Enterprise Password Vault
 

Overview

 

Sample Customers

Information Not Available
Rockwell Automation
Find out what your peers are saying about CyberArk Endpoint Privilege Manager vs. CyberArk Privileged Access Manager and other solutions. Updated: January 2025.
832,138 professionals have used our research since 2012.