Try our new research platform with insights from 80,000+ expert users

CyberArk Endpoint Privilege Manager vs Varonis Platform comparison

 

Comparison Buyer's Guide

Executive SummaryUpdated on Jan 12, 2025

Review summaries and opinions

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
 

Categories and Ranking

CyberArk Endpoint Privilege...
Ranking in Ransomware Protection
7th
Average Rating
8.2
Reviews Sentiment
6.8
Number of Reviews
35
Ranking in other categories
Endpoint Compliance (4th), Privileged Access Management (PAM) (3rd), Anti-Malware Tools (5th), Application Control (5th)
Varonis Platform
Ranking in Ransomware Protection
8th
Average Rating
8.2
Reviews Sentiment
6.4
Number of Reviews
14
Ranking in other categories
Data Loss Prevention (DLP) (9th), Data Governance (6th), SaaS Security Posture Management (SSPM) (5th), Data Security Posture Management (DSPM) (8th), Compliance Management (8th), Identity Threat Detection and Response (ITDR) (5th)
 

Mindshare comparison

As of April 2025, in the Ransomware Protection category, the mindshare of CyberArk Endpoint Privilege Manager is 7.3%, up from 5.4% compared to the previous year. The mindshare of Varonis Platform is 3.0%, up from 1.1% compared to the previous year. It is calculated based on PeerSpot user engagement data.
Ransomware Protection
 

Featured Reviews

Sumit Chavan - PeerSpot reviewer
Helps secure the infrastructure and control users with admin rights
There are many features that are currently missing. A customization option is required for certain policies. For instance, if we need to stop PowerShell scripting, we have to create a different policy for that. Being able to create a sub-level policy within a top-level policy would be good. Currently, no user-based policy option is available inside the EPM console. We can only create computer-based policies. The database is available, but there is a drawback in not being able to create local groups on the EPM console. We only have to depend on Active Directory. This limits infrastructure security as we depend on the Active Directory team to manage user groups. If they remove any users, we lose control. If we could create groups locally and block them or set specific policies, we would have more control. Local endpoint management is missing from the EPM site. Moreover, there is an issue with policies not running as expected when we make enhancements. We have to find multiple ways to whitelist applications or enhance policies.
Frederic  Delos - PeerSpot reviewer
Offers the ability to identify sensitive areas, allowing you to drill down into the sensitive data
The most effective feature for me is its ability to identify sensitive areas, allowing you to drill down into the sensitive data, provided you have access, to determine whether it's a false positive or a true positive. That's the best thing for me, out of all of it. It's got everything, like other ones, but I like to be able to look at something if I'm doing forensics on the alert and say, "Okay, do I really need to do something with this?" For example, we don't want sensitive data in our OneDrive. So it identifies the sensitive data that's possibly in the OneDrive. And what I can do is look at it and identify whether it's actually sensitive data in Datalert or whether it looks like sensitive data, but I know it's a false positive. If it is a false positive, I can basically say ignore this pattern based on X, Y, and Z, you know, whether it's Redjax or keyword proximity. So I like that. With other tools, I gotta go through a whole process because it's a little bit more complex. Here, I can tag it and bag it in one shot. And the next good time I scan, it slips over it. So it helps in that.

Quotes from Members

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
 

Pros

"The most valuable feature of CyberArk Endpoint Privilege Manager is its high performance, it's the best identity security platform. The security is good. It's easy to showcase the feature and capabilities and compare it with other competitors. It competes well with other solutions. Additionally, it is a complete solution."
"It doesn't affect operational efficiency. If you set everything correctly, the user doesn't notice that it is in the background."
"This is the number one product for privilege account security."
"It offers great performance."
"The most valuable feature of CyberArk Endpoint Privilege Manager is its ability to reset passwords every time that it is needed or periodically."
"We can do both server and endpoint protection."
"Their customer support was excellent."
"I have always found that CyberArk is a very tight, foolproof product compared to most other products available."
"The solution has significantly improved data security and compliance posture by allowing us to track and monitor activities. We can see who accesses data and when files are created and understand what's happening in our environment."
"Technical support from Varonis is rated as nine out of ten."
"The solution's classification engine is highly configurable and efficient."
"It can easily identify unusual behavior or access patterns that may pose a potential threat, while operating as a unified reporting system."
"The analytics would have to be our most valuable feature."
"The solution ensures that users have not accidentally shared sensitive information with the wrong people or too many people."
"The 24/7 support is the most valuable feature. They have been able to answer support questions pretty quickly."
"I also appreciate the reporting feature, which allows for the extraction of various reports based on specific needs. These reports can be used for audit purposes, such as tracking changes in file locations or deletions."
 

Cons

"Technical support is slow to respond when we run into issues."
"For an experienced system implementer it will take approximately one day. However, for somebody who is inexperienced it may take up to five days."
"CyberArk Endpoint Privilege Manager could be improved by simplifying the administration process, specifically when setting up policies and applications."
"CyberArk has some performance issues. For example, servers could not handle the solution when we first took CyberArk Endpoint Privilege Manager."
"The solution is very expensive."
"CyberArk Endpoint Privilege Manager can be better by making its UI more consistent."
"My recommendation for improvement is to add functionality for when users request access to an application. There's a pop-up UI, but it's not very customizable. I suggest creating a UI where we can write scripts or use SDKs to enhance it. This could automatically create tickets in a system like ServiceNow when users request an application. If a manager approves, we could automatically push policies to those users."
"It is hard to deal with technical support if you are not certified."
"The product is very complicated."
"The solution's areas of improvement are the interface and the dependency on on-premises deployment for some components."
"It is significantly complex."
"We have Microsoft Office 365. I just saw an article today which says that they're actually getting integrated with Microsoft Office 365, which would be a useful feature. For user-based reports, log on activity, and stuff like that, it doesn't seem to really be present like Log360. That could just be my inexperience with it. I've been dealing with it for only about two and a half months."
"For unstructured data monitoring, it's one of the top ones, if not the top one, due to its usability."
"The solution's interface is a little complicated with regard to setting up filters and reports."
"Varonis requires more access permissions for its core functions compared to competitors, which can be a concern for companies about data safety."
"Varonis requires more access permissions for its core functions compared to competitors, which can be a concern for companies about data safety."
 

Pricing and Cost Advice

"The tool is a bit pricey compared to its competitors. My company does work with competitors, but I don't have hands-on experience with other software. I've just done some comparisons."
"The product's license is easy to procure."
"I rate the solution's pricing an eight out of ten since the price can be too high for smaller businesses."
"Although I do not deal directly with the pricing, CyberArk Endpoint Privilege Manager is costly compared to other solutions. However, it offers beneficial features."
"The professional services for one eight-hour day would be $1,800."
"The cost for CyberArk is very high."
"The solution requires an annual license to use it. There can be some extra costs in some cases."
"I think that it was in the range of $200,000 that had to get approved."
"It's expensive, kind of, really expensive."
"I would rate the pricing an eight out of ten, with ten being the most expensive."
"Varonis Platform wasn't certainly the cheapest solution."
"The pricing is good. It neither expensive nor cheap. It is average."
"The platform is expensive. I rate the pricing a nine out of ten."
"Licensing is on an annual basis. Maintenance and renewal fees are separate. Varonis Datalert is quite expensive."
"You could do a subscription, where you pay yearly, or you could purchase it outright. The licensing cost is based on the number of users on the system that you are monitoring."
report
Use our free recommendation engine to learn which Ransomware Protection solutions are best for your needs.
845,406 professionals have used our research since 2012.
 

Top Industries

By visitors reading reviews
Financial Services Firm
15%
Computer Software Company
14%
Manufacturing Company
11%
Government
8%
Financial Services Firm
16%
Computer Software Company
11%
Manufacturing Company
10%
Insurance Company
7%
 

Company Size

By reviewers
Large Enterprise
Midsize Enterprise
Small Business
 

Questions from the Community

Looking for recommendations and a pros/cons template for software to detect insider threats
This is an inside-out --- outside-in --- inside-in question, as an insider can be an outsider as well. There is no short answer other than a blend of a PAM tool with Behavioral Analytics and Endpo...
What do you like most about CyberArk Endpoint Privilege Manager?
The most valuable feature of the solution is its performance.
What is your experience regarding pricing and costs for CyberArk Endpoint Privilege Manager?
CyberArk Endpoint Privilege Manager is slightly expensive, but costs can be negotiated to become more competitive.
What do you like most about Varonis Platform?
The solution has significantly improved data security and compliance posture by allowing us to track and monitor activities. We can see who accesses data and when files are created and understand w...
What needs improvement with Varonis Platform?
Varonis started as an on-premises solution and is transitioning to cloud. It hasn't fully moved yet, which is an area for improvement. Varonis requires more access permissions for its core function...
What is your primary use case for Varonis Platform?
The primary use case for Varonis Platform is data discovery, specifically for discovering sensitive data in our organization to protect it. We are looking for a solution that can scan our repositor...
 

Also Known As

Viewfinity
No data available
 

Overview

 

Sample Customers

Information Not Available
Nottingham Building Society
Find out what your peers are saying about CyberArk Endpoint Privilege Manager vs. Varonis Platform and other solutions. Updated: March 2025.
845,406 professionals have used our research since 2012.