Try our new research platform with insights from 80,000+ expert users

CyberArk Privileged Access Manager vs Microsoft Enterprise Mobility + Security comparison

 

Comparison Buyer's Guide

Executive Summary

Review summaries and opinions

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
 

Categories and Ranking

CyberArk Privileged Access ...
Average Rating
8.6
Reviews Sentiment
6.9
Number of Reviews
208
Ranking in other categories
User Activity Monitoring (1st), Enterprise Password Managers (3rd), Privileged Access Management (PAM) (1st), Mainframe Security (2nd), Operational Technology (OT) Security (3rd)
Microsoft Enterprise Mobili...
Average Rating
8.4
Reviews Sentiment
7.8
Number of Reviews
10
Ranking in other categories
Enterprise Mobility Management (EMM) (15th)
 

Mindshare comparison

While both are Security Software solutions, they serve different purposes. CyberArk Privileged Access Manager is designed for Privileged Access Management (PAM) and holds a mindshare of 20.5%, down 23.6% compared to last year.
Microsoft Enterprise Mobility + Security, on the other hand, focuses on Enterprise Mobility Management (EMM), holds 0.8% mindshare, down 0.9% since last year.
Privileged Access Management (PAM)
Enterprise Mobility Management (EMM)
 

Featured Reviews

Lasantha Wijesinghe - PeerSpot reviewer
We have visibility and control through real-time user behavior analytics
It took us some time to realize its benefits because there was a learning curve for us. It took us about a year to get our heads around this product and start effectively using it. It is a journey. It takes at least five years for any company to make this product very useful and reach maturity. It is not only the product's fault. The company needs to have a vision, and the company culture needs to go with it. Senior leadership needs to support the vision. You need to have lots of ingredients for success. If everything is in place, you will see success after one year. In the first year, it is a struggle for everybody. My company was bought by a bigger company, and they were very new to privileged access management. Everybody was struggling. The advice I would give is to have a good vision for privileged access management. You need dedicated teams, senior management support, and proper company policies and standards before implementing the solution. Start building knowledge slowly and avoid jumping into the deep end without preparation. I would rate CyberArk Privileged Access Manager a nine out of ten.
Dheen Jaabir - PeerSpot reviewer
Seamless integration and easy implementation
Microsoft licensing has always been tricky. There have been several changes in the last quarter, such as the addition of a new SKU on top of the existing ones. The licensing can be messy at times. Apart from that, it's fine. One area where Microsoft lacks is network-level protection. Currently, it focuses on endpoint protection. However, with the shift to remote work, network-level protection has become less relevant since users take their devices home, and there is no physical boundary after COVID. So, investing in network equipment might not be as useful as protecting endpoints with features like EDR (Endpoint Detection and Response) and behavioral monitoring. That would probably be helpful.

Quotes from Members

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
 

Pros

"All access to our servers by both staff and vendors is monitored and recorded."
"Rather than multiple tools for maintaining regulatory compliance around passwords and privileged accounts, we have centralized as much as possible with CyberArk. This is now a one stop shop for end users to access their elevated credentials."
"The combination of CPM and PSM resolves a lot of use cases."
"Password Vault's policy configuration is very good - when you receive an attack, you can segment the structure of the project in order to isolate parts or users."
"Security is the solution's most valuable feature. As far as I know, this solution is the most secure system of this class on the market today, even considering another management system like Fudo Security, which we also use. The integration capabilities are very good; it helps strengthen our overall security."
"Session monitoring is excellent. It may be the solution's most valuable aspect."
"The logs and reporting features are impressive."
"We've written over a hundred custom connectors ourselves that allow us to do all types of privileged session management for various applications. On top of that, the rest of the API-based central credential providers allow us to get away from credentials that may be hard-coded in the script or some application."
"The solution is scalable."
"The solution offers excellent documentation that is easily available online."
"It is a stable solution...It is a scalable solution."
"A good feature that is present is MAM or Mobile Application Management. We can deploy this feature on the device, which is not managed by the organization. If I apply some security configuration on a personal device, the user would be really disappointed. What we do instead is that we give all access to the applications related to corporate and ask the users to use the application. We secure the application by putting the security features on the applications and not on the users' devices. This way, the users are happy, and we also meet our company's compliance standards. Then, everyone is happy."
"Integration between our departments has been the most valuable."
"Microsoft Mobility and EMS include Intune for Mobility, which provides mobile device management and mobile application management. With mobile device management, you can control the entire device in an organization."
"The product is centralized and we can use it for security purposes."
"The solution is very good at securing files. For example, if I forward a secure document, it's blocked from others, as I can send it with restrictions in relation to who can open it."
 

Cons

"Many of the infrastructure folks who use the product dislike it because it complicates their workflow. They get a little less control, and they have to go through a specific solution. It proactively logs in for them, which obfuscates some of the issues that they may be troubleshooting."
"The issue of technical support is crucial, as there are not many specialized partners available in Brazil to provide this service. While English language support is of good quality, there is a significant shortage of partners capable of meeting the demand locally."
"The initial setup could be simplified. Right now, in comparison to its nearest competitors, it's quite complex."
"More than the product itself, there is room for improvement in the documentation. The documentation should be very detailed and very structured. It has a lot of good information, on one level, but I feel that it could be more elaborate and more structured."
"The one place where we found that this product really needs to improve is the cloud. Simple integrations don't exist, even today. We don't have anything specific on CyberArk for managing, SaaS products, SaaS vendors, SaaS credentials. I understand it's a vendor-based thing and that they have to coordinate with the other vendors to be able to do that, and there are integrations coming. But these are the major places where CyberArk definitely needs to invest some more time."
"There is a learning curve when it comes to planning out the deployment strategy, but once it is defined, it runs itself."
"The solution is too complicated to use and should be simplified. It took me a long time to understand how to use it. There is a lot that the solution can improve for the future."
"Tech support staff can be more proactive."
"The auditing and reporting could be updated and upgraded. I would like to see light applications because they consume a lot of the device's memory at present."
"The MDM part of the engine could be better."
"Microsoft Enterprise Mobility + Security is expensive."
"The licensing can be messy at times."
"Microsoft's feature management is based on licenses. Microsoft follows ethical licensing and hence do not restrict the use of it."
"We did the deployment with the help of Microsoft's consultants. But sometimes, we found it difficult to educate the application developers to integrate."
"Technical support could be improved. Sometimes they use a third party that's not so knowledgeable in the product and that can slow down things a bit."
"Its performance needs enhancement."
 

Pricing and Cost Advice

"Our risk is definitely significantly lower. Also, our resources are low."
"Licensing fees are paid on a yearly basis."
"No, I do not have any advice on the price of the product."
"CyberArk provides all the features bundled. This is compared to other vendors who provide them as a different license for each functionality."
"I would rate the tool’s pricing a six out of ten."
"The price of CyberArk Privileged Access Manager could be less expensive."
"From a client perspective, CyberArk's pricing is fair but there is a significant increase each year. They should limit the price increase because this could potentially drive customers to other partners. Price changes should be at defined intervals. There should not be sudden jumps."
"The product’s pricing is feasible for enterprise customers. The pricing is expensive for smaller businesses. You need to pay additional costs for service implementation and local support."
"The increase in the prices of the product might not be the actual problem, but things become complex with some new plans that were introduced by Microsoft recently."
"The solution is cost-effective."
"We have to pay 10 dollars per user. I would rate the tool's pricing a six out of ten."
"I would rate pricing at eight out of ten. It is a bit higher because of the security features that Microsoft provides."
report
Use our free recommendation engine to learn which Privileged Access Management (PAM) solutions are best for your needs.
831,997 professionals have used our research since 2012.
 

Top Industries

By visitors reading reviews
Educational Organization
33%
Financial Services Firm
12%
Computer Software Company
11%
Manufacturing Company
6%
Computer Software Company
16%
Financial Services Firm
12%
Manufacturing Company
8%
Pharma/Biotech Company
7%
 

Company Size

By reviewers
Large Enterprise
Midsize Enterprise
Small Business
 

Questions from the Community

How does Sailpoint IdentityIQ compare with CyberArk PAM?
We evaluated Sailpoint IdentityIQ before ultimately choosing CyberArk. Sailpoint Identity Platform is a solution to manage risks in cloud enterprise environments. It automates and streamlines the m...
What do you like most about CyberArk Privileged Access Manager?
The most valuable features of the solution are control and analytics.
What is your experience regarding pricing and costs for CyberArk Privileged Access Manager?
CyberArk Privileged Access Manager is more expensive than its competitors, such as BeyondTrust, Delinea, and ManageEngine PAM360. While ManageEngine PAM360 offers similar flexibility and support at...
What is your experience regarding pricing and costs for Microsoft Enterprise Mobility + Security?
The increase in the prices of the product might not be the actual problem, but things become complex with some new plans that were introduced by Microsoft recently. Initially, my company used to ha...
What needs improvement with Microsoft Enterprise Mobility + Security?
Since Microsoft Enterprise Mobility + Security needs to deal with the competition from VMware and Ivanti, I visited PeerSpot's website to see how Microsoft can compete with its competitors. Microso...
 

Also Known As

CyberArk Privileged Access Security, CyberArk Enterprise Password Vault
Enterprise Mobility + Security E3, Enterprise Mobility + Security E5, MS Enterprise Mobility + Security
 

Overview

 

Sample Customers

Rockwell Automation
Mars, Whole Foods, Land O'Lakes, Dow
Find out what your peers are saying about CyberArk, Delinea, One Identity and others in Privileged Access Management (PAM). Updated: January 2025.
831,997 professionals have used our research since 2012.