Try our new research platform with insights from 80,000+ expert users

CyberArk Endpoint Privilege Manager vs Ivanti Endpoint Security for Endpoint Manager comparison

 

Comparison Buyer's Guide

Executive Summary
 

Categories and Ranking

CyberArk Endpoint Privilege...
Ranking in Endpoint Compliance
4th
Average Rating
8.2
Reviews Sentiment
6.7
Number of Reviews
31
Ranking in other categories
Privileged Access Management (PAM) (7th), Anti-Malware Tools (6th), Application Control (6th), Ransomware Protection (7th)
Ivanti Endpoint Security fo...
Ranking in Endpoint Compliance
5th
Average Rating
8.4
Reviews Sentiment
6.3
Number of Reviews
8
Ranking in other categories
Endpoint Protection Platform (EPP) (32nd), Unified Endpoint Management (UEM) (8th)
 

Featured Reviews

Anish R - PeerSpot reviewer
Foolproof and good for controlling access but can be expensive
I've worked in BeyondTrust, also. They have Asian-based solutions, and it's not as heavy as CyberArk. Since I have been working with CyberArk for some time, I feel a little bit more comfortable with CyberArk. BeyondTrust is also not that bad. However, they did not have all the capabilities that CyberArk was offering at that time. That said, this was maybe four or five years ago. I haven't explored anything after that. I'm sure a lot of things have changed. There used to be IBM Privilege Identity Manager as well, but it's not there anymore. Saviynt has its own solution as well. Basically, there are multiple solutions there, however, CyberArk was definitely been our choice for Privilege Identity Manager.
Chris Reece - PeerSpot reviewer
A security solution to manage devices with patching and remediation feature
The solution needs a complete overhaul or makeover. It gets stuck sometimes because they're focusing on the cloud UEM stuff rather than paying as much attention to that particular piece. The ease of use could be improved. It combines many different functionalities that you would need multiple servers like SCCM. If I wanted to train people, I’d move to a higher level from an Apache architect. There are five or six different products. So, training functional staff to use the product can be challenging because it can sometimes be cumbersome. Reporting is challenging. We use Avanti extraction to report off an endpoint. We don't use the reporting because of the need for more functionality, granularity, or customization.

Quotes from Members

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
 

Pros

"The solution allows me to give access and privileges to each user individually"
"I am impressed with the product's seamless integration. The PAM wallet and enterprise password wallet are good also good."
"The product is very flexible"
"What sets CyberArk apart is its continuous innovation, staying ahead of the competition."
"The feature called PTA, which stands for Privileged Threat Analytics keeps track of what admins are doing and works with Centimeters. If something fishy is going on with a user's credentials, it alerts the security team so they can act fast. Plus, it automates stuff like resetting credentials or blocking users. So, if there's a potential hack, CyberArk can change passwords and lock out users in a snap. It also gives you a heads-up if anything unusual is going on with server activities, like someone creating new users with uncontrolled credentials."
"The most valuable features of CyberArk Endpoint Privilege Manager are password management, session management, onboarding rules, platform customization, and safety management."
"The department management aspect of the solution is the most valuable aspect."
"The most valuable feature of CyberArk Endpoint Privilege Manager is its high performance, it's the best identity security platform. The security is good. It's easy to showcase the feature and capabilities and compare it with other competitors. It competes well with other solutions. Additionally, it is a complete solution."
"The most valuable features of the solution are accessing the data through the mobiles and meeting with the compliance for security best practices."
"The most valuable feature of Ivanti Endpoint Security for Endpoint Manager, which my company mainly uses, is patching. Another valuable feature of Ivanti Endpoint Security for Endpoint Manager is that it allows you to view the inventory list of the different machines."
"Patching and remediation are the strongest features."
"The best part about Ivanti and Matrix 42 is that they are low-code solution builders with drag-and-drop capabilities regarding service management."
"It provides security features for unified endpoint management."
"The key differentiator is that it manages mobile devices and laptops in the same console. Windows and Linux are on the same console. This is the only product that does this. It's really the best in the industry."
"The product has good stability."
"The solution's most valuable features are its patch management functionality and provisioning."
 

Cons

"The installation process is pretty difficult."
"We have had some major issues with the tool, but we have worked with the R&D teams and we have worked with support. There is room for improvement, especially on response times. But they're working on it and they're doing the best they can."
"Can be improved by allowing computers to be excluded from policies."
"Performance could be better. We have a couple of problems with CyberArk right now. One of the problems is performance in our environment. Support also takes a long time to respond. If the user already has local admin rights, then I can't collect any events in the console from this device. There are also some options in CyberArk that are not working properly, and are not helpful in this case. I can't collect any information to create a proper policy for the device. I have to investigate everything manually, or even disable the local admin from the device. I can collect the events only after this, and it's very time consuming. In my case, it's a waste of resources."
"For an experienced system implementer it will take approximately one day. However, for somebody who is inexperienced it may take up to five days."
"The turnaround time of the support team is an area of concern where improvements are required."
"The product needs a streamlined user interface; improvements to the user interface can enhance user experience and make the solution more intuitive to navigate."
"My recommendation for improvement is to add functionality for when users request access to an application. There's a pop-up UI, but it's not very customizable. I suggest creating a UI where we can write scripts or use SDKs to enhance it. This could automatically create tickets in a system like ServiceNow when users request an application. If a manager approves, we could automatically push policies to those users."
"The product's blocking definition needs improvement."
"An area for improvement in Ivanti Endpoint Security for Endpoint Manager is reporting. It's lacking. For example, Ivanti Endpoint Security for Endpoint Manager reports should tell you if the agent is up to date, if the security patch is updated, etc."
"It could benefit from faster integration with new technologies, such as quicker adaptation to Windows updates. Additionally, more advanced customization options would be valuable."
"One of the features that Ivanti could improve is patching for non-Windows settings, such as Linux and Ubuntu."
"Ivanti Endpoint Security for Endpoint Manager's support provided to its users by the vendor is one area that needs to improve."
"The solution needs a complete overhaul or makeover. It gets stuck sometimes because they're focusing on the cloud UEM stuff rather than paying as much attention to that particular piece. The ease of use could be improved. It combines many different functionalities that you would need multiple servers like SCCM. If I wanted to train people, I’d move to a higher level from an Apache architect. There are five or six different products. So, training functional staff to use the product can be challenging because it can sometimes be cumbersome. Reporting is challenging. We use Avanti extraction to report off an endpoint. We don't use the reporting because of the need for more functionality, granularity, or customization."
"When you open a new mobile, you automatically come onboard the mobile on the Ivanti platform but it needs some improvements."
"If I want to integrate the solution with any other solution, pushing the policies from the Ivanti side is a bit tough."
 

Pricing and Cost Advice

"The price of CyberArk Endpoint Privilege Manager is expensive."
"The product's license is easy to procure."
"The cost for CyberArk is very high."
"CyberArk Endpoint Privilege Manager has a very high price, so it's a one out of ten for me in terms of pricing."
"The price of CyberArk Endpoint Privilege Manager is expensive. The solution is priced based on the number of accounts onboarded and the number of concurrent sessions. Everyone else is included in the price, such as support."
"The professional services for one eight-hour day would be $1,800."
"It is an expensive solution."
"The solution requires an annual license to use it. There can be some extra costs in some cases."
"The product is expensive."
"The licensing is based on assets for MDM or EM, where you need one license per asset. The license is annual, and it is not very expensive."
"On a scale of one to ten, where ten is the highest, and one is the cheapest, I rate its pricing a five."
"Ivanti Endpoint Security for Endpoint Manager is more expensive than some of the products I've used. It follows module-based licensing, so it would be more costly if you had more modules. Your costs depend on what modules you need."
"The solution is pretty expensive."
"The pricing is relatively high compared to some competitors."
"On a scale from one to ten, where one is low and ten is high, I rate the solution's pricing ten out of ten."
report
Use our free recommendation engine to learn which Endpoint Compliance solutions are best for your needs.
824,053 professionals have used our research since 2012.
 

Top Industries

By visitors reading reviews
Financial Services Firm
15%
Computer Software Company
14%
Manufacturing Company
11%
Government
8%
Computer Software Company
19%
Financial Services Firm
13%
Government
10%
Manufacturing Company
9%
 

Company Size

By reviewers
Large Enterprise
Midsize Enterprise
Small Business
 

Questions from the Community

Looking for recommendations and a pros/cons template for software to detect insider threats
This is an inside-out --- outside-in --- inside-in question, as an insider can be an outsider as well. There is no short answer other than a blend of a PAM tool with Behavioral Analytics and Endpo...
What do you like most about CyberArk Endpoint Privilege Manager?
The most valuable feature of the solution is its performance.
What do you like most about Ivanti Endpoint Security for Endpoint Manager?
The most valuable features of the solution are accessing the data through the mobiles and meeting with the compliance for security best practices.
What needs improvement with Ivanti Endpoint Security for Endpoint Manager?
We've experienced challenges adapting Ivanti to new Windows versions, such as Windows 11, where integration delays have been notable. It could benefit from faster integration with new technologies,...
What is your primary use case for Ivanti Endpoint Security for Endpoint Manager?
We use Ivanti Endpoint Security for patch management, remote control functionalities, and asset tracking.
 

Also Known As

Viewfinity
LANDesk Security Suite, Ivanti Endpoint Security
 

Learn More

 

Overview

 

Sample Customers

Information Not Available
Otkritie Bank, France T_l_visions, MBDA, 21st Century Oncology, Sealed Air Corporation, Granite School District, The Bunker, The MAC Services Group, Adams 12 Five Star Schools District, AlliedBarton Security Services, Mohawk Industries, Sun National Bank
Find out what your peers are saying about CyberArk Endpoint Privilege Manager vs. Ivanti Endpoint Security for Endpoint Manager and other solutions. Updated: December 2024.
824,053 professionals have used our research since 2012.