CyberArk Endpoint Privilege Manager and Cynet compete in the cybersecurity solutions category. Based on the data, Cynet seems to have the upper hand in terms of ease of use and customer support.
Features: CyberArk Endpoint Privilege Manager offers detailed privilege management, application control, and robust audit capabilities. It excels in integration with SIEM and Active Directory environments, providing high security and scalability. Cynet provides comprehensive endpoint protection, featuring user behavior analysis, automatic threat detection, and advanced threat protection, along with deception capabilities, offering a wide feature set.
Room for Improvement: CyberArk Endpoint Privilege Manager could enhance its Linux support, simplify the interface, and improve integration and automation features. Users also suggest a need for simpler architecture. Cynet could improve reporting capabilities, third-party integration, automation features, and expand mobile support, with a more straightforward solution for managing false positives and customizations.
Ease of Deployment and Customer Service: CyberArk Endpoint Privilege Manager is complex and deployment can be challenging, with mixed reviews on technical support. It is adaptable across cloud and on-premises models. Cynet is praised for easier deployment with flexible cloud options and better user management in hybrid environments. Its customer service is rated highly for accessibility and effectiveness.
Pricing and ROI: CyberArk is considered more expensive, typically used by larger enterprises in the finance and banking sectors, with its high cost justified by its robust features. Cynet offers competitive pricing and is seen as cost-effective with comprehensive features at a lower cost than competitors, appreciated for its affordability.
Deploying CyberArk Endpoint Privilege Manager has secured the infrastructure, which saves money, time, and resources.
They respond immediately to our inquiries, resolve issues promptly, and provide valuable guidance, especially in critical situations.
We engage them when needed and receive prompt responses that typically resolve our issues.
Earlier, we received support for normal tickets within a day, but now it takes one or two days to resolve issues.
Their SOC side support, when a threat is detected, is excellent.
Their technical support can be improved in terms of speed when opening a ticket.
I was very satisfied with their technical support.
We can set permissions per team or department, allowing some teams to elevate specific applications while others have different permissions.
CyberArk Endpoint Privilege Manager is quite scalable.
The available reports and other security tools assist in scaling it according to my organization's needs.
The solution is highly scalable.
Cynet is very scalable.
It is a robust solution that has effectively supported our environment without major issues.
Since implementing it, we have not experienced any outages or stability issues.
CyberArk Endpoint Privilege Manager offers multiple options for creating and stopping policies.
CyberArk Endpoint Privilege Manager could be improved by simplifying the administration process, specifically when setting up policies and applications.
Currently, no user-based policy option is available inside the EPM console.
Some features provided in the self-hosted version of EPM are not supported in the software as a service version, like connection to some analysis applied by Palo Alto.
There should be more options than deploying solely through group policy, as the assumption that GPO is working isn’t always the case.
Having a DLP feature would also add value.
Integration with local Active Directory, not only Azure AD, is a must.
CyberArk Endpoint Privilege Manager is slightly expensive, but costs can be negotiated to become more competitive.
CyberArk Endpoint Privilege Manager is costly compared to other solutions.
I think the pricing of Cynet is fair and one of the better options in the market.
CyberArk Endpoint Privilege Manager effectively reduces malicious content in applications by allowing us to identify and block dangerous applications.
CyberArk Endpoint Privilege Manager enhances computer security by providing minimal access, effectively preventing ransomware attacks.
The most valuable feature is the ability to control users with admin rights.
The valuable aspects of Cynet are its EDR and XDR components, which are available at a reasonable price point.
The most effective features of Cynet are its ransomware protection and lateral movement deception.
The SOAR function, deception, and forensics are very useful.
CyberArk Endpoint Privilege Manager, a critical and foundational endpoint control addresses the underlying weaknesses of endpoint defenses against a privileged attacker and helps enterprises defend against these attacks through removing local admin rights, enforcing least privilege, and implementing foundational endpoint security controls across all Windows, macOS and Linux endpoints from hybrid to cloud environments.
Click here for a free 30 day trial: CyberArk Endpoint Privilege Manager free trial
Cynet provides endpoint protection, threat detection, and response. It helps companies secure files, devices, and networks from zero-day threats, reducing the need for extensive support staff through its continuous monitoring, antivirus, and anti-malware functionalities.
Cynet offers comprehensive security features, including EDR, NGAV, and MDR, suitable for cloud, on-premises, and hybrid environments. Organizations benefit from its 24/7 SOC services, seamless integration with other cybersecurity systems, and intuitive graphical interface. Features like autonomous malware blocking, scalability, detailed network user behavior analysis, and rapid policy deployment ensure robust security operations.
What are Cynet's most valuable features?Cynet is implemented across industries like finance, healthcare, and retail due to its comprehensive cybersecurity capabilities. Organizations in these sectors benefit from detailed network user behavior analysis, data aggregation, automation, and incident response, ensuring robust protection for critical infrastructure and sensitive data.
We monitor all Ransomware Protection reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.