Find out in this report how the two Endpoint Compliance solutions compare in terms of features, pricing, service and support, easy of deployment, and ROI.
Deploying CyberArk Endpoint Privilege Manager has secured the infrastructure, which saves money, time, and resources.
They respond immediately to our inquiries, resolve issues promptly, and provide valuable guidance, especially in critical situations.
We engage them when needed and receive prompt responses that typically resolve our issues.
At times, when we need quick support, I contact them via email or WhatsApp, and I have to wait for about an hour before finding a respondent.
I have not needed much technical support except during the uninstallation issues, which took some time to resolve.
We can set permissions per team or department, allowing some teams to elevate specific applications while others have different permissions.
CyberArk Endpoint Privilege Manager is quite scalable.
The available reports and other security tools assist in scaling it according to my organization's needs.
It is a robust solution that has effectively supported our environment without major issues.
Since implementing it, we have not experienced any outages or stability issues.
CyberArk Endpoint Privilege Manager offers multiple options for creating and stopping policies.
CyberArk Endpoint Privilege Manager could be improved by simplifying the administration process, specifically when setting up policies and applications.
Currently, no user-based policy option is available inside the EPM console.
Some features provided in the self-hosted version of EPM are not supported in the software as a service version, like connection to some analysis applied by Palo Alto.
20% to 30% of endpoints faced difficulty in cleaning or uninstalling the software.
CyberArk has saved us 15% of our costs.
CyberArk Endpoint Privilege Manager is slightly expensive, but costs can be negotiated to become more competitive.
CyberArk Endpoint Privilege Manager is costly compared to other solutions.
CyberArk Endpoint Privilege Manager effectively reduces malicious content in applications by allowing us to identify and block dangerous applications.
The features I find most valuable are the endpoint privilege capabilities, which provide automatic protection to our IT environment.
CyberArk Endpoint Privilege Manager enhances computer security by providing minimal access, effectively preventing ransomware attacks.
The integration of ML and AI provides complete visibility, suggests responses, detects threats, and includes integration into XDR, which covers email security, endpoint security, cloud security, among other aspects.
CyberArk Endpoint Privilege Manager, a critical and foundational endpoint control addresses the underlying weaknesses of endpoint defenses against a privileged attacker and helps enterprises defend against these attacks through removing local admin rights, enforcing least privilege, and implementing foundational endpoint security controls across all Windows, macOS and Linux endpoints from hybrid to cloud environments.
Click here for a free 30 day trial: CyberArk Endpoint Privilege Manager free trial
Trend Vision One Endpoint Security delivers comprehensive antivirus, data protection, and device management. It offers robust threat detection and is deployable on-premises or via the cloud, making it versatile for endpoint security across organizations.
Emphasizing reliable endpoint security, Trend Vision One guards workstations and servers with extended detection and response features. Its machine learning-driven threat detection offers protection from malware and viruses, including zero-day threats. With seamless updates and automation, it minimizes administrative burdens, making deployment efficient. Criticisms include high resource use during scans and integration complexities, with calls for improved data loss prevention and better encryption. Users see the need for enhanced Linux support and quicker security updates.
What features define Trend Vision One Endpoint Security?In the finance sector, Trend Vision One is implemented for robust data protection and regulatory compliance. Healthcare providers rely on it for protecting sensitive patient information from cyber threats. Retailers use it for safeguarding payment systems and customer data against breaches, ensuring uninterrupted business operations.
We monitor all Endpoint Compliance reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.