Try our new research platform with insights from 80,000+ expert users

CyberArk Endpoint Privilege Manager vs Trellix Endpoint Security comparison

 

Comparison Buyer's Guide

Executive Summary
 

Categories and Ranking

CyberArk Endpoint Privilege...
Average Rating
8.2
Reviews Sentiment
6.7
Number of Reviews
31
Ranking in other categories
Endpoint Compliance (4th), Privileged Access Management (PAM) (7th), Anti-Malware Tools (6th), Application Control (6th), Ransomware Protection (7th)
Trellix Endpoint Security
Average Rating
8.0
Reviews Sentiment
7.1
Number of Reviews
98
Ranking in other categories
Endpoint Protection Platform (EPP) (9th), Extended Detection and Response (XDR) (12th)
 

Mindshare comparison

While both are Security Software solutions, they serve different purposes. CyberArk Endpoint Privilege Manager is designed for Privileged Access Management (PAM) and holds a mindshare of 4.0%, up 3.8% compared to last year.
Trellix Endpoint Security, on the other hand, focuses on Endpoint Protection Platform (EPP), holds 3.4% mindshare, down 3.8% since last year.
Privileged Access Management (PAM)
Endpoint Protection Platform (EPP)
 

Featured Reviews

Anish R - PeerSpot reviewer
Foolproof and good for controlling access but can be expensive
I've worked in BeyondTrust, also. They have Asian-based solutions, and it's not as heavy as CyberArk. Since I have been working with CyberArk for some time, I feel a little bit more comfortable with CyberArk. BeyondTrust is also not that bad. However, they did not have all the capabilities that CyberArk was offering at that time. That said, this was maybe four or five years ago. I haven't explored anything after that. I'm sure a lot of things have changed. There used to be IBM Privilege Identity Manager as well, but it's not there anymore. Saviynt has its own solution as well. Basically, there are multiple solutions there, however, CyberArk was definitely been our choice for Privilege Identity Manager.
AhmedEl-Tayeb - PeerSpot reviewer
Good user behavioral analysis and helpful patching but needs better support services
Some of our products have a first and second line owned by us. We are giving support services to the customers instead of the vendor. Some other products are supported directly by the technology vendor, however. Technical support from the vendor is very bad. Usually, when the customer submits a ticket, they put a severity level on the case. Whenever the case is very important, and there is a real malfunction in the product on the customer side, and there is something down that needs someone to have a look immediately, it takes more time than it should to even engage with the customer. When someone has to contact the customer and have a remote session within the customer environment, they sometimes lack in terms of communication with the customer. The support centers are located in the East and not all have an acceptable level of English in order to communicate directly with the customer.

Quotes from Members

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
 

Pros

"The most valuable feature of CyberArk Endpoint Privilege Manager is its scalability."
"It has drastically reduced the attack surface for local administrative rights and the chance of escalation of privilege. We've removed, at this point, close to 98 percent of the local administrative accounts on workstations. If there were an incident, it would stop at that point and we'd be able to know."
"The most valuable feature is that their database is completely encrypted and protected with multiple layers."
"The most valuable features of CyberArk Endpoint Privilege Manager are password management, session management, onboarding rules, platform customization, and safety management."
"The most valuable feature is that it does lifecycle management and that it will change to whatever the end target is."
"CyberArk Endpoint Privilege Manager is very easy to manage, which I like. The solution also has a dashboard where you can see which software is suspicious, which I find valuable."
"The most valuable feature of CyberArk Endpoint Privilege Manager is its high performance, it's the best identity security platform. The security is good. It's easy to showcase the feature and capabilities and compare it with other competitors. It competes well with other solutions. Additionally, it is a complete solution."
"The feature called PTA, which stands for Privileged Threat Analytics keeps track of what admins are doing and works with Centimeters. If something fishy is going on with a user's credentials, it alerts the security team so they can act fast. Plus, it automates stuff like resetting credentials or blocking users. So, if there's a potential hack, CyberArk can change passwords and lock out users in a snap. It also gives you a heads-up if anything unusual is going on with server activities, like someone creating new users with uncontrolled credentials."
"It provides a robust defense against cybersecurity threats while offering user-friendly features like notifications and approval prompts."
"The most valuable feature of Trellix Endpoint Security is containment, which takes less than a minute."
"Communication with all Mcafee products (also 3rd parties) by DXL infrastructure."
"The solution provides a data view of the Alpha systems with Trellix installs and makes small changes to the central management console. Nothing on the endpoints themselves works, but it focuses more on the management side."
"The reporting capabilities are a valuable feature. In enables more visibility on our network."
"The DLP and user interface are the most valuable feature."
"One valuable feature is Threat Prevention with the on-demand scan."
"The installation is pretty straightforward."
 

Cons

"The price of the solution should improve."
"It is hard to deal with technical support if you are not certified."
"Performance could be better. We have a couple of problems with CyberArk right now. One of the problems is performance in our environment. Support also takes a long time to respond. If the user already has local admin rights, then I can't collect any events in the console from this device. There are also some options in CyberArk that are not working properly, and are not helpful in this case. I can't collect any information to create a proper policy for the device. I have to investigate everything manually, or even disable the local admin from the device. I can collect the events only after this, and it's very time consuming. In my case, it's a waste of resources."
"Can be improved by allowing computers to be excluded from policies."
"CyberArk Endpoint Privilege Manager could be improved by simplifying the administration process, specifically when setting up policies and applications."
"The turnaround time of the support team is an area of concern where improvements are required."
"Compared to other tools like Linux, this solution isn't as user-friendly."
"They need much better integration with Azure AD."
"McAfee GW Security and McAfee Child Safety need some improvement as they are relatively new."
"It didn't work well for some of the use cases. We have different use cases for each entity. Their support is also not good and needs improvement."
"I would like to have the ability to have more control over the deployment in the next release. If you have this console in the cloud, you cannot make pilot groups for deploying the agents. We only have the current group. So, as soon as you inject the software, it will go directly into production, which doesn't work for us. We need to build up pilot groups slowly. We already requested to have this feature on the cloud, and we are still waiting."
"If there's a possibility for remote assistance or investigation support in the future, it would be beneficial. Currently, we use another remote software for such purposes. If this feature could be included in the next version, that would be an improvement. The feature is called Remote Administration. I'm somewhat satisfied, but there's an issue I recently encountered. When attempting to scan a suspected host machine, Symantec Endpoint Security did not provide any alerts. However, when we installed Malwarebytes and ran a scan, it detected a threat that wasn't identified by Symantec. We raised this concern with the team for resolution, and the investigation is still ongoing."
"Signatures to protect against new attacks."
"The tool could provide more advanced protection."
"Every time we open a ticket with McAfee, their response differs and they are not consistent."
"There are certain shortcomings in the features concerning DLP in Trellix, where certain additions must be made in the future."
 

Pricing and Cost Advice

"I feel that the price of the product is nominal. It must be around 10 to 15 USD per installation. I rate the product price an eight to nine out of ten, where one is high price, and ten is low price."
"I rate the solution's pricing an eight out of ten since the price can be too high for smaller businesses."
"CyberArk Endpoint Privilege Manager has a very high price, so it's a one out of ten for me in terms of pricing."
"The tool's pricing is reasonable for customers."
"The product's license is easy to procure."
"The cost for CyberArk is very high."
"I think that it was in the range of $200,000 that had to get approved."
"licensing for this solution is based on the number of APV (privileged users), and the number of sessions that you want to record."
"The pricing is more or less the same as the other tools in the market."
"I would rate the cost as four to five, considering it's normal compared to other products. I find it nominal and worth the money."
"It is reasonably priced."
"Trellix may cost around $46 to $47 for a single license without an EDR."
"The solution is not an expensive tool. Compared to other options, it's mostly average-priced. I've deployed it for customers ranging from 100 nodes to over 5,000 nodes. Its renewal prices are very low, and it offers both perpetual and subscription licenses. With a perpetual license, the product will keep working as long as it's not end-of-life, which benefits companies."
"The initial price is very good as they give good initial discounts, but it seems a little expensive once you renew the license."
"The tool is affordable"
"I am happy with the pricing."
report
Use our free recommendation engine to learn which Privileged Access Management (PAM) solutions are best for your needs.
824,067 professionals have used our research since 2012.
 

Top Industries

By visitors reading reviews
Financial Services Firm
15%
Computer Software Company
14%
Manufacturing Company
11%
Government
8%
Educational Organization
41%
Government
9%
Computer Software Company
7%
Manufacturing Company
7%
 

Company Size

By reviewers
Large Enterprise
Midsize Enterprise
Small Business
 

Questions from the Community

Looking for recommendations and a pros/cons template for software to detect insider threats
This is an inside-out --- outside-in --- inside-in question, as an insider can be an outsider as well. There is no short answer other than a blend of a PAM tool with Behavioral Analytics and Endpo...
What do you like most about CyberArk Endpoint Privilege Manager?
The most valuable feature of the solution is its performance.
How does McAfee Endpoint Security compare with MVISION?
The flexible manageability of McAfee Endpoint Security is one of our favorite aspects of this solution. You can deploy various components as desired with McAfee Endpoint Security, whereas many othe...
What do you like most about McAfee Endpoint Security?
It provides a robust defense against cybersecurity threats while offering user-friendly features like notifications and approval prompts.
What is your experience regarding pricing and costs for McAfee Endpoint Security?
The license costs are very reasonable, around 1,000 to 1,200 rupees per year.
 

Also Known As

Viewfinity
McAfee Endpoint Security, McAfee Complete Endpoint Protection, McAfee Endpoint Protection, Total Protection for Endpoint, Intel Security Total Protection for Endpoint, MCAFEE Complete Endpoint Protection
 

Learn More

 

Overview

 

Sample Customers

Information Not Available
inHouseIT, Seagate Technology
Find out what your peers are saying about CyberArk Endpoint Privilege Manager vs. Trellix Endpoint Security and other solutions. Updated: May 2022.
824,067 professionals have used our research since 2012.