CyberArk Privileged Access Manager and JumpCloud both provide robust identity and access management solutions. CyberArk appears more favorable for security features and customer service, whereas JumpCloud is appreciated for its ease of deployment and overall value.
Features: CyberArk Privileged Access Manager is praised for its comprehensive security controls, extensive compliance features, and suitability for stringent security environments. JumpCloud is valued for its versatility in managing users across various platforms, ease of integration, and scalability.
Room for Improvement: Users of CyberArk Privileged Access Manager express a need for improvements in integration capabilities, user experience, and adaptability. JumpCloud users suggest enhancements in reporting features, customization options, and user management.
Ease of Deployment and Customer Service: JumpCloud is recognized for its straightforward deployment process and efficient onboarding experience. CyberArk Privileged Access Manager’s deployment is seen as more complex, requiring specialized knowledge. Customer service for CyberArk is highly rated for responsive support, whereas JumpCloud's customer service is considered good but less exceptional.
Pricing and ROI: JumpCloud is often highlighted as cost-effective with a favorable ROI, especially for small to mid-sized businesses. CyberArk is perceived as more expensive, with a higher initial setup cost. The strong security features and compliance benefits can justify the investment for larger enterprises or those with critical security needs.
They are very fast, responsive, and knowledgeable.
They are helpful, but complex issues can take a long time to resolve, which can delay solutions for urgent customer issues.
They do not go into analyzing the issue.
CyberArk's customer service has improved recently and is now very responsive.
It is not as intuitive as the rest of the platform.
They want everything to be on the cloud, but even in the SaaS version of CyberArk Privileged Access Manager, they need to deploy some servers on-premises.
Upgrades require a lot of resources, as it impacts the entire organization.
The graphical user interface could be simplified and harmonized for better usability.
We have flexibility with our primary and backup nodes if there's a large amount of web traffic.
The SaaS version is more flexible, allowing easier scaling with increased users.
I would rate it a nine out of ten for scalability.
We started small and expanded it to an enterprise level, and are now moving to the cloud for further growth.
It offers the same features you would get from a vendor that charges 250,000 British pounds for a fraction of the price.
CyberArk is comparatively expensive compared to other PAM solutions, such as Delinea, especially during renewal.
CyberArk is expensive compared to other products I know.
It is very expensive.
We've experienced zero downtime.
Proper fine-tuning and expertise ensure the product performs well.
Overall, the stability of the solution is high.
The solution's mental health function can detect if someone needs help.
CyberArk Privileged Access Manager helps ensure data privacy because we now know who is using which credentials and at what time.
As a security professional, I have real-time visibility into ongoing sessions.
After giving access, it continually checks if the user is the same user.
iboss offers a comprehensive security platform designed for diverse use cases such as web filtering, data loss protection, corporate proxy services, and URL filtering.
iboss integrates advanced features to address dynamic security needs, leveraging its strength in SASE, ZTNA, AI initiatives, and cloud integration, while ensuring seamless operations for remote work. It excels in historical forensics, malware protection, and flexible cloud deployments. Users benefit from comprehensive traffic scanning, robust malware detection, and PaaS capabilities that reduce hardware management. An intuitive admin console ensures efficient management with content filtering and low false positives. SSL decryption enhances security, while DLP protects data in AI conversations. Deployment is rapid and scalable, allowing effortless integration with emerging technologies.
What features does iboss offer?
What benefits and ROI should users consider?
iboss finds significant application in sectors such as education, where web filtering for K-12 is crucial, and in corporate environments requiring robust proxy services and URL filtering for network security. Its adaptability is essential in scenarios demanding flexible, decentralized security frameworks, particularly for remote work setups.
CyberArk Privileged Access Manager is a next-generation solution that allows users to secure both their applications and their confidential corporate information. It is extremely flexible and can be implemented across a variety of environments. This program runs with equal efficiency in a fully cloud-based, hybrid, or on-premises environment. Users can now protect their critical infrastructure and access it in any way that best meets their needs.
CyberArk Privileged Access Manager possesses a simplified and unified user interface. Users are able to manage the solution from one place. The UI allows users to view and manage all of the information and controls that administrators need to be able to easily access. Very often, management UIs do not have all of the controls and information streamlined in a single location. This platform provides a level of visibility that ensures users will be able to view all of their system’s most critical information at any time that they wish.
Benefits of CyberArk Privileged Access Manager
Some of CyberArk Privileged Access Manager’s benefits include:
Reviews from Real Users
CyberArk Privileged Access Manager’s software stands out among its competitors for one very fundamental reason. CyberArk Privileged Access Manager is an all-in-one solution. Users are given the ability to accomplish with a single platform what might usually only be accomplished with multiple solutions.
PeerSpot users note the truly all-in-one nature of this solution. Mateusz K., IT Manager at a financial services firm, wrote, "It improves security in our company. We have more than 10,000 accounts that we manage in CyberArk. We use these accounts for SQLs, Windows Server, and Unix. Therefore, keeping these passwords up-to-date in another solution or software would be impossible. Now, we have some sort of a platform to manage passwords, distribute the inflow, and manage IT teams as well as making regular changes to it according to the internal security policies in our bank."
Hichem T.-B., CDO & Co-Founder at ELYTIK, noted that “This is a complete solution that can detect cyber attacks well. I have found the proxy features most valuable for fast password web access.”
JumpCloud enables organizations to manage devices, users, and applications across platforms like Windows, Mac, Linux, iOS, and Android. It offers centralized authentication, identity and access management, single sign-on, directory services, security policy enforcement, and cloud service integration.
Organizations leverage JumpCloud for its robust device management, policy management, and seamless integration with applications such as Microsoft 365 and Google Workspace. Its flexibility, stability, scalability, and ease of use make it a strong choice for managing business directories, executing scripts on-demand, synchronizing system access, and implementing mobile device management. Key features include remote access, Windows Out of Box Experience, strong authentication and authorization controls, centralized user and device management, efficient onboarding and offboarding processes, and extensive security and reporting features.
What are the most important features?In specific industries, JumpCloud is utilized to manage a wide array of tasks such as automating administrative functions in healthcare, ensuring secure access to sensitive data in finance, and supporting remote work needs in technology sectors. Its ability to integrate with diverse platforms and provide centralized control makes it suitable for managing complex IT environments.
We monitor all Enterprise Password Managers reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.