CyberArk Endpoint Privilege Manager and Fortinet FortiClient both operate in the endpoint security space. CyberArk is viewed as having a competitive edge for its comprehensive feature set, making it suitable for large enterprises, while Fortinet stands out in network security integration and cost-effectiveness.
Features: CyberArk Endpoint Privilege Manager focuses on removing local admin rights without losing necessary access, integrating with security systems, and providing password and application management. Fortinet FortiClient integrates effectively with FortiGate, offering features like antivirus, antispam, VPN functionalities, web filtering, and vulnerability scans.
Room for Improvement: CyberArk users suggest improving UI consistency, Linux integration, and performance reporting, as well as policy configuration and security integration. Fortinet users have pointed out issues with compatibility, web filter usability, and support processes, alongside a general need for more intuitive features and improved documentation.
Ease of Deployment and Customer Service: CyberArk is deployed across hybrid and cloud environments but faces challenges with response times and support accessibility. Its emphasis on certification for support can be a barrier. Fortinet is suitable for on-premises and hybrid setups, and its support is generally better received, although some users report slower response times.
Pricing and ROI: CyberArk is often seen as expensive due to user licenses but valued for advanced security features and risk reduction. Fortinet is seen as more affordable, particularly when part of a Fortinet bundle, with its free version offering basic VPN services. Both solutions show strong ROI by improving security posture and reducing breach-related costs.
Deploying CyberArk Endpoint Privilege Manager has secured the infrastructure, which saves money, time, and resources.
They respond immediately to our inquiries, resolve issues promptly, and provide valuable guidance, especially in critical situations.
We engage them when needed and receive prompt responses that typically resolve our issues.
Earlier, we received support for normal tickets within a day, but now it takes one or two days to resolve issues.
They initiate the troubleshooting process quickly and resolve issues in a timely manner.
They provide very good support, and an issue I had was resolved quickly over the phone.
Technical support can be logged on Fortinet's support portal.
We can set permissions per team or department, allowing some teams to elevate specific applications while others have different permissions.
CyberArk Endpoint Privilege Manager is quite scalable.
The available reports and other security tools assist in scaling it according to my organization's needs.
I hope Fortinet will start an insider developer program where professionals can provide feedback on new releases to ensure improvements.
We can add more licenses and Fortinet tokens, demonstrating excellent scalability.
We can recommend FortiClient for small organizations with 50 to 60 users as well as for larger enterprises due to its extensive features.
It is a robust solution that has effectively supported our environment without major issues.
Since implementing it, we have not experienced any outages or stability issues.
CyberArk Endpoint Privilege Manager offers multiple options for creating and stopping policies.
Its stability level is excellent.
CyberArk Endpoint Privilege Manager could be improved by simplifying the administration process, specifically when setting up policies and applications.
Currently, no user-based policy option is available inside the EPM console.
Some features provided in the self-hosted version of EPM are not supported in the software as a service version, like connection to some analysis applied by Palo Alto.
FortiClient needs improvement in restricting user information and ensuring more secure customer data to better protect source code and reduce the risk of security breaches.
There are advanced features like Zero Trust that I currently do not use but could be beneficial for security.
Fortinet frequently releases updates without thorough testing.
CyberArk Endpoint Privilege Manager is slightly expensive, but costs can be negotiated to become more competitive.
CyberArk Endpoint Privilege Manager is costly compared to other solutions.
FortiClient is a value-for-money product and is not considered expensive compared to similar products on the market.
Justifying the price to clients can be difficult.
FortiClient is included in a package with the UTM features, so there is no separate cost for it.
CyberArk Endpoint Privilege Manager effectively reduces malicious content in applications by allowing us to identify and block dangerous applications.
CyberArk Endpoint Privilege Manager enhances computer security by providing minimal access, effectively preventing ransomware attacks.
The most valuable feature is the ability to control users with admin rights.
The most valuable feature of FortiClient is its high security level.
We appreciate its VPN capabilities and the features that offer extra security functionalities like antivirus and malware scanning.
The integration with Active Directory is a valuable feature, allowing SSO for users.
CyberArk Endpoint Privilege Manager, a critical and foundational endpoint control addresses the underlying weaknesses of endpoint defenses against a privileged attacker and helps enterprises defend against these attacks through removing local admin rights, enforcing least privilege, and implementing foundational endpoint security controls across all Windows, macOS and Linux endpoints from hybrid to cloud environments.
Click here for a free 30 day trial: CyberArk Endpoint Privilege Manager free trial
FortiClient is a fabric agent that delivers endpoint protection, endpoint compliance, and secure access in a single, lightweight, lightweight client, providing visibility, information, and control to your endpoints. In addition, it enables secure, remote connectivity to the security fabric. It also integrates network and endpoint with segmentation and automation. FortiClient enables unified endpoint awareness by sharing endpoint telemetry with the security fabric. It is compatible with third-party EDR (endpoint detection and response and anti-malware solutions.
The FortiClient fabric agent can:
• Report on the status of a device, including firmware version and applications running.
• Send all suspicious files to a fabric sandbox.
• Enforce USB control, application control, URL filtering, and firmware upgrade policies.
• Provide application firewall service and malware protection.
• Enable devices to connect securely to the security fabric over either ZTNA tunnels or VPN (IPsec or SSL), both encrypted. The connection to the security fabric can be either a SASE service or a FortiGate next-generation firewall.
You can purchase FortiClient with one of three levels of capability:
Zero Trust security - The ZTNA edition enables both VPN and ZTNA encrypted tunnels, as well as USB device control and URL filtering.
Endpoint security - The EPP/APT edition adds AI-based NGAV (next-generation antivirus), application firewall, endpoint quarantine, and support for cloud sandbox.
Cloud-based endpoint security
Benefits and Features
• Fabric agent leverages integrations and provides telemetry information to the rest of the Fortinet security fabric.
• SAAS control and web/content filtering
• Dynamic access control helps with automation and simplifies compliance.
• Software inventory management enables visibility as well as management of licenses.
• Automated response detects and isolates any endpoints that may be compromised.
• ZTNA delivers better remote access and consistent application access policies
• Managed endpoint security services remotely assist with setup, configuration, deployment, vulnerability monitoring, and overall monitoring of endpoint security.
Reviews from Real Users:
PeerSpot users like that FortiClient is easy to use and integrates well with other solutions. They also appreciate the richness of its features and find it to be inexpensive in comparison to other products that require separate purchases for separate features.
We monitor all Endpoint Compliance reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.