Try our new research platform with insights from 80,000+ expert users

CyberArk Privileged Access Manager vs Ekran System comparison

 

Comparison Buyer's Guide

Executive Summary
 

Categories and Ranking

CyberArk Privileged Access ...
Ranking in User Activity Monitoring
1st
Ranking in Privileged Access Management (PAM)
1st
Average Rating
8.6
Reviews Sentiment
6.9
Number of Reviews
196
Ranking in other categories
Enterprise Password Managers (3rd), Mainframe Security (2nd), Operational Technology (OT) Security (3rd)
Ekran System
Ranking in User Activity Monitoring
4th
Ranking in Privileged Access Management (PAM)
23rd
Average Rating
8.0
Reviews Sentiment
7.5
Number of Reviews
1
Ranking in other categories
No ranking in other categories
 

Mindshare comparison

As of December 2024, in the User Activity Monitoring category, the mindshare of CyberArk Privileged Access Manager is 30.9%, up from 31.0% compared to the previous year. The mindshare of Ekran System is 24.5%, up from 15.9% compared to the previous year. It is calculated based on PeerSpot user engagement data.
User Activity Monitoring
 

Featured Reviews

SatishIyer - PeerSpot reviewer
Lets you ensure relevant, compliant access in good time and with an audit trail, yet lacks clarity on MITRE ATT&CK
When I was a component owner for PAM's Privileged Threat Analytics (PTA) component, what I wanted was a clear mapping to the MITRE ATT&CK framework, a framework which has a comprehensive list of use cases. We reached out to the vendor and asked them how much coverage they have of the uses cases found on MITRE, which would have given us a better view of things while I was the product owner. Unfortunately they did not have the capability of mapping onto MITRE's framework at that time. PTA is essentially the monitoring interface of the broker (e.g. Privileged Access Management, the Vault, CPM, PSM, etc.), and it's where you can capture your broker bypass and perform related actions. For this reason, we thought that this kind of mapping would be required, but CyberArk informed us that they did not have the capability we had in mind with regard to MITRE ATT&CK. I am not sure what the situation is now, but it would definitely help to have that kind of alignment with one of the more well-known frameworks like MITRE. For CyberArk as a vendor, it would also help them to clearly spell out in which areas they have full functionality and in which ares they have partial or none. Of course, it also greatly benefits the customers when they're evaluating the product.
Andreas Lalos - PeerSpot reviewer
Early threat detection and diverse OS support with enhanced security
Ekran System offers a lightweight solution that does not impact the systems where it is implemented. It provides rich metadata for monitored activities and includes threat analysis capabilities for early alerting and investigation of unauthorized actions. Additionally, it supports diverse operating systems and allows for monitoring and enforcement policies, like blocking actions for policy violations, and provides a retention of historical data in a lightweight format.

Quotes from Members

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
 

Pros

"The most valuable feature of the solution stems from the fact that it's the best in the market. I haven't seen any other PAM solutions better than CyberArk Enterprise Password Vault."
"Increased our insight into how privileged accounts are being used and distributed within our footprint."
"We have accomplished our security goals. We have two-factor authenticated and vaulted our important accounts, so people can't just steal stuff from us."
"The most valuable feature of CyberArk Privileged Access Manager is the vault. I am satisfied with the interface and the documentation."
"The password rotation and cyber gateway have been quite useful."
"CyberArk Privileged Access Manager is very powerful and customizable."
"You can easily manage more than 4000 accounts with one PSM."
"What I found most valuable in CyberArk Privileged Access Manager is the Session Manager as it allows you to split the connection between the administrator site and the target site. I also found the Password Manager valuable as it lets you rotate the passwords of privileged users."
"It supports diverse operating systems and allows for monitoring and enforcement policies, like blocking actions for policy violations, and provides a retention of historical data in a lightweight format."
 

Cons

"In the beginning, CyberArk Privileged Access Manager didn't have a multifactor authentication feature, so that was an area for improvement, but now it's part of the solution. Having just one console for two CyberArk products would be good, particularly for the CyberArk Privileged Access Manager and the CyberArk Endpoint Privilege Manager, with the latter being a product for endpoint management that supports the workstations and allows you to manage workstations. In the next update of CyberArk Privileged Access Manager, it would be good to have a local agent where you can manage all users and processes, and have an agent on the servers such as Linux and Windows."
"We need a bit more education for our user community because they are not using it to its capabilities."
"CyberArk Privileged Access Manager could improve the integration docking, it should have more layers. For example, integration with OpenShift."
"CyberArk has a lot on the privileged access side but they have to concentrate more on the application side as well."
"There were a lot of manual steps in the initial setup which could have been automated. I read the 10.4 release that was sent out about a month or two ago, and I saw the steps required for upgrade have been reduced by about 90%. That was a big thing for me, but I still haven't seen that yet because we have not upgrade past 9.9.5."
"As a customer, I might need a plugin for a specific product, or an application, and CyberArk might have already worked with some other client on it. There has to be some platform where it is available for everybody else to go and grab it, instead of my having to reinvent the wheel."
"The usual workload is sometimes delayed by the solution."
"The scalability, sometimes, is lacking. It works really well for more static environments... But for an environment where you're constantly spinning up new infrastructure or new endpoints, sometimes it has a hard time keeping up."
"Ekran System could improve in terms of communication to the market, particularly after their rebranding as Shiteka."
 

Pricing and Cost Advice

"Its price is high. I have also worked with Delinea. CyberArk is comparatively expensive compared to other PAM solutions, such as Delinea, especially during renewal."
"The main problem for the tool is its licensing. I work for a really big company. When you try to develop this as a service, usually you work with leverage teams who are formed with dozens of members. You might dedicate one FTE, or less, for something, e.g., an antivirus administrator. You might have half an FTE's effort dedicated to administering the antivirus, but then you have a team of about 30 users who might access that ticket. The problem is that CyberArk eliminated the possibility of concurrent users years ago. This is a big problem for companies who work with leverage teams. You need to pay for everyone. 40 licenses are used by 20 or 30 people. This is a big problem because licenses are not precisely cheap."
"Before we bought it, they were licensing each function individually, which got complicated and very expensive. When we decided to buy it, it was much more straightforward and still quite expensive, but it brings a lot of value and risk reduction to the organization."
"Compared to other solutions, it is costly."
"I'm aware that the organization had purchased licensing for almost all of CyberArk's solutions including licensing for PTA, EPM, and the Application Identity Manager. But when it comes to PSM, this is one of the components where there's an additional charge for any extra PSMs that you want to deploy. I believe that there's some rider where the vendor has a bit of leeway to, at times, charge a premium on whatever additional services you may require above the board."
"The cost is high compared to other products."
"The price of the solution is reasonable."
"Cost efficiency is the number one thing that can be improved in my mind. This would change lots of companies minds on purchasing the product."
Information not available
report
Use our free recommendation engine to learn which User Activity Monitoring solutions are best for your needs.
823,875 professionals have used our research since 2012.
 

Top Industries

By visitors reading reviews
Educational Organization
32%
Financial Services Firm
12%
Computer Software Company
11%
Manufacturing Company
6%
Government
13%
Computer Software Company
11%
Financial Services Firm
10%
Manufacturing Company
10%
 

Company Size

By reviewers
Large Enterprise
Midsize Enterprise
Small Business
No data available
 

Questions from the Community

How does Sailpoint IdentityIQ compare with CyberArk PAM?
We evaluated Sailpoint IdentityIQ before ultimately choosing CyberArk. Sailpoint Identity Platform is a solution to manage risks in cloud enterprise environments. It automates and streamlines the m...
What do you like most about CyberArk Privileged Access Manager?
The most valuable features of the solution are control and analytics.
What is your experience regarding pricing and costs for CyberArk Privileged Access Manager?
CyberArk Privileged Access Manager comes at a high cost. But the solution is worth its price.
What is your experience regarding pricing and costs for Ekran System?
The business model has become more complex with changes in feature licensing, yet they provide affordable options, particularly with the standard edition, which doesn't charge for the management co...
What needs improvement with Ekran System?
Ekran System could improve in terms of communication to the market, particularly after their rebranding as Shiteka. The solution does not support other protocols beyond traditional monitoring chann...
What is your primary use case for Ekran System?
The primary use case for Ekran System is third-party vendor monitoring and privileged access management monitoring. It is also used for privilege access management solutions.
 

Also Known As

CyberArk Privileged Access Security, CyberArk Enterprise Password Vault
No data available
 

Overview

 

Sample Customers

Rockwell Automation
Deloitte, UPS, Seoul National University, KDN, Finat, Constitutional Court of Korea, Ukrsibbank
Find out what your peers are saying about CyberArk, Amazon Web Services (AWS), Proofpoint and others in User Activity Monitoring. Updated: December 2024.
823,875 professionals have used our research since 2012.