Delinea Secret Server and CyberArk Endpoint Privilege Manager are both in the realm of managing privileged credentials and endpoint security. Delinea Secret Server seems to have the upper hand in pricing and support, while CyberArk's feature set is favored for its robust capabilities.
Features: Delinea Secret Server offers comprehensive credential management, automation capabilities, and straightforward deployment. CyberArk Endpoint Privilege Manager provides advanced threat detection, strong integration with systems, and precise control over endpoint privileges.
Room for Improvement: Delinea Secret Server could improve its reporting system, scalability, and ease of use. CyberArk could enhance its setup process, documentation, and user guides.
Ease of Deployment and Customer Service: Delinea Secret Server is noted for its straightforward deployment process and responsive customer service. CyberArk receives positive feedback for support but has a more complex initial deployment requiring technical expertise.
Pricing and ROI: Delinea Secret Server is recognized for cost-effective setup and good ROI, appealing to budget-conscious organizations. CyberArk, with a higher initial cost, is valued for strong ROI due to extensive features, fitting for enterprises focused on endpoint protection.
CyberArk Endpoint Privilege Manager, a critical and foundational endpoint control addresses the underlying weaknesses of endpoint defenses against a privileged attacker and helps enterprises defend against these attacks through removing local admin rights, enforcing least privilege, and implementing foundational endpoint security controls across all Windows, macOS and Linux endpoints from hybrid to cloud environments.
Click here for a free 30 day trial: CyberArk Endpoint Privilege Manager free trial
Secret Server is a fully-featured Privileged Access Management (PAM) solution available both on premise and in the cloud. It empowers security and IT ops teams to secure and manage all types of privileged accounts and offers the fastest time to value of any PAM solution.
We monitor all Privileged Access Management (PAM) reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.