Try our new research platform with insights from 80,000+ expert users

CyberArk Endpoint Privilege Manager vs Tanium comparison

 

Comparison Buyer's Guide

Executive Summary
 

Categories and Ranking

CyberArk Endpoint Privilege...
Average Rating
8.2
Reviews Sentiment
6.7
Number of Reviews
31
Ranking in other categories
Endpoint Compliance (4th), Privileged Access Management (PAM) (7th), Anti-Malware Tools (6th), Application Control (6th), Ransomware Protection (7th)
Tanium
Average Rating
7.4
Reviews Sentiment
6.8
Number of Reviews
15
Ranking in other categories
Server Monitoring (10th), Vulnerability Management (23rd), Endpoint Protection Platform (EPP) (35th), Endpoint Detection and Response (EDR) (26th)
 

Mindshare comparison

While both are Security Software solutions, they serve different purposes. CyberArk Endpoint Privilege Manager is designed for Privileged Access Management (PAM) and holds a mindshare of 4.0%, up 3.8% compared to last year.
Tanium, on the other hand, focuses on Endpoint Protection Platform (EPP), holds 2.4% mindshare, up 1.8% since last year.
Privileged Access Management (PAM)
Endpoint Protection Platform (EPP)
 

Featured Reviews

Anish R - PeerSpot reviewer
Foolproof and good for controlling access but can be expensive
I've worked in BeyondTrust, also. They have Asian-based solutions, and it's not as heavy as CyberArk. Since I have been working with CyberArk for some time, I feel a little bit more comfortable with CyberArk. BeyondTrust is also not that bad. However, they did not have all the capabilities that CyberArk was offering at that time. That said, this was maybe four or five years ago. I haven't explored anything after that. I'm sure a lot of things have changed. There used to be IBM Privilege Identity Manager as well, but it's not there anymore. Saviynt has its own solution as well. Basically, there are multiple solutions there, however, CyberArk was definitely been our choice for Privilege Identity Manager.
Mo Vermeiren - PeerSpot reviewer
Is able to make several campaigns work in parallel, but the user interface needs improvement
It's mainly used by the cybersecurity team for Windows patching and deployment of some software solutions I like the fact that you can create patching campaigns depending on the area of your network that you want to address first. I like the ability it has to make several campaigns that work in…

Quotes from Members

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
 

Pros

"Users can scale the solution."
"CyberArk Endpoint Privilege Manager is very easy to manage, which I like. The solution also has a dashboard where you can see which software is suspicious, which I find valuable."
"It offers great performance."
"You can use it to strip users of their local admin rights and, at the same time, elevate applications for them."
"It has drastically reduced the attack surface for local administrative rights and the chance of escalation of privilege. We've removed, at this point, close to 98 percent of the local administrative accounts on workstations. If there were an incident, it would stop at that point and we'd be able to know."
"The most valuable feature of the solution is its performance."
"The biggest benefit of CyberArk EPM for our customers is control over privileged access for endpoints. Endpoints are often the starting point for attackers to enter and move within a network. CyberArk EPM bridges the gap between security and operations teams. Operations teams are happy because work isn't stopped due to admin rights issues, while security teams are satisfied that full admin rights aren't given to all users."
"The product is stable."
"I like the tool's incident response and security patching."
"Tanium has made the process of detecting threats more proactive with its detection. So, the process is easier and more efficient."
"Tanium's most valuable feature is its instant discovery aspect."
"I'm not so familiar with the tool but I like the interaction of the console to the picture. Patching is the primary model I have been focusing on for the last couple of weeks. So I have created a proof of concept environment and have been checking the available features."
"I like the fact that you can create patching campaigns depending on the area of your network that you want to address first. I like the ability it has to make several campaigns that work in parallel."
"Tanium’s linear-chain architecture is valuable."
"For incident response tasks, all these tasks can get done in minutes with minimal disruption to the end-user."
"The security features are very valuable."
 

Cons

"Performance could be better. We have a couple of problems with CyberArk right now. One of the problems is performance in our environment. Support also takes a long time to respond. If the user already has local admin rights, then I can't collect any events in the console from this device. There are also some options in CyberArk that are not working properly, and are not helpful in this case. I can't collect any information to create a proper policy for the device. I have to investigate everything manually, or even disable the local admin from the device. I can collect the events only after this, and it's very time consuming. In my case, it's a waste of resources."
"The solution is very expensive."
"The tool should be more user-friendly."
"It's an old product and has many areas that can be improved."
"They need much better integration with Azure AD."
"CyberArk Endpoint Privilege Manager is a perfect solution, but CyberArk Endpoint Privilege Manager for Linux has many issues. Another area for improvement in CyberArk Endpoint Privilege Manager, specifically for Windows, is that there's no way for you to check credential theft from a text file, such as a notepad file."
"It cannot be on-prem. It is only cloud-based. Sometimes, that's a restriction in terms of usage."
"For an experienced system implementer it will take approximately one day. However, for somebody who is inexperienced it may take up to five days."
"The solution can give a lot of false positives."
"The reporting could be improved."
"We had some issues with the solution's OS upgrade."
"They could improve the UI."
"The solution needs to improve the reporting and tracking capabilities."
"The solution lacks mobility."
"I would like to have more integrations and custom plugins to input. Integration is always a big deal in a lot of different environments."
"The performance could improve in future releases. We have had performance issues in specialized web environments, but overall I think the problems are less than 2% of the computer systems being used."
 

Pricing and Cost Advice

"The solution requires an annual license to use it. There can be some extra costs in some cases."
"The product's license is easy to procure."
"I feel that the price of the product is nominal. It must be around 10 to 15 USD per installation. I rate the product price an eight to nine out of ten, where one is high price, and ten is low price."
"The solution's pricing is reasonable compared to other vendors' products."
"I think that it was in the range of $200,000 that had to get approved."
"We pay about $17 per user."
"The cost for CyberArk is very high."
"The tool's pricing is reasonable for customers."
"Tanium is a more expensive solution in Latin America than some of the competitors, such as BigFix."
"The solution is expensive but it's a good investment."
"It's an expensive solution. It would be nice if the cost were lower."
"It is higher than some competitors in the market."
"The product's pricing differs from region to region depending on negotiations and the number of endpoints."
"There is an annual license required to use this solution."
"The solution offers value for money."
report
Use our free recommendation engine to learn which Privileged Access Management (PAM) solutions are best for your needs.
824,067 professionals have used our research since 2012.
 

Top Industries

By visitors reading reviews
Financial Services Firm
15%
Computer Software Company
14%
Manufacturing Company
11%
Government
8%
Financial Services Firm
17%
Government
13%
Computer Software Company
11%
Manufacturing Company
8%
 

Company Size

By reviewers
Large Enterprise
Midsize Enterprise
Small Business
 

Questions from the Community

Looking for recommendations and a pros/cons template for software to detect insider threats
This is an inside-out --- outside-in --- inside-in question, as an insider can be an outsider as well. There is no short answer other than a blend of a PAM tool with Behavioral Analytics and Endpo...
What do you like most about CyberArk Endpoint Privilege Manager?
The most valuable feature of the solution is its performance.
What do you like most about Tanium?
Tanium’s linear-chain architecture is valuable.
What is your primary use case for Tanium?
We collect end-point data. We use it to make AI models and provide it to customers. I use Tanium’s sensors, collect data, and develop dashboards. The sensors have many data types. If we need differ...
 

Also Known As

Viewfinity
No data available
 

Learn More

 

Overview

 

Sample Customers

Information Not Available
JPMorgan Chase, eBay, Amazon, US Bank, MetLife, pwc, Cerner, Delphi, MGM Grand, New York Life
Find out what your peers are saying about CyberArk Endpoint Privilege Manager vs. Tanium and other solutions. Updated: May 2022.
824,067 professionals have used our research since 2012.