Try our new research platform with insights from 80,000+ expert users

CyberArk Privileged Access Manager vs Microsoft Enterprise Mobility + Security comparison

 

Comparison Buyer's Guide

Executive Summary
 

Categories and Ranking

CyberArk Privileged Access ...
Average Rating
8.6
Reviews Sentiment
6.9
Number of Reviews
199
Ranking in other categories
User Activity Monitoring (1st), Enterprise Password Managers (3rd), Privileged Access Management (PAM) (1st), Mainframe Security (2nd), Operational Technology (OT) Security (3rd)
Microsoft Enterprise Mobili...
Average Rating
8.4
Reviews Sentiment
7.8
Number of Reviews
10
Ranking in other categories
Enterprise Mobility Management (EMM) (15th)
 

Mindshare comparison

While both are Security Software solutions, they serve different purposes. CyberArk Privileged Access Manager is designed for Privileged Access Management (PAM) and holds a mindshare of 20.9%, down 23.8% compared to last year.
Microsoft Enterprise Mobility + Security, on the other hand, focuses on Enterprise Mobility Management (EMM), holds 0.8% mindshare, down 0.9% since last year.
Privileged Access Management (PAM)
Enterprise Mobility Management (EMM)
 

Featured Reviews

SatishIyer - PeerSpot reviewer
Lets you ensure relevant, compliant access in good time and with an audit trail, yet lacks clarity on MITRE ATT&CK
When I was a component owner for PAM's Privileged Threat Analytics (PTA) component, what I wanted was a clear mapping to the MITRE ATT&CK framework, a framework which has a comprehensive list of use cases. We reached out to the vendor and asked them how much coverage they have of the uses cases found on MITRE, which would have given us a better view of things while I was the product owner. Unfortunately they did not have the capability of mapping onto MITRE's framework at that time. PTA is essentially the monitoring interface of the broker (e.g. Privileged Access Management, the Vault, CPM, PSM, etc.), and it's where you can capture your broker bypass and perform related actions. For this reason, we thought that this kind of mapping would be required, but CyberArk informed us that they did not have the capability we had in mind with regard to MITRE ATT&CK. I am not sure what the situation is now, but it would definitely help to have that kind of alignment with one of the more well-known frameworks like MITRE. For CyberArk as a vendor, it would also help them to clearly spell out in which areas they have full functionality and in which ares they have partial or none. Of course, it also greatly benefits the customers when they're evaluating the product.
Dheen Jaabir - PeerSpot reviewer
Seamless integration and easy implementation
Microsoft licensing has always been tricky. There have been several changes in the last quarter, such as the addition of a new SKU on top of the existing ones. The licensing can be messy at times. Apart from that, it's fine. One area where Microsoft lacks is network-level protection. Currently, it focuses on endpoint protection. However, with the shift to remote work, network-level protection has become less relevant since users take their devices home, and there is no physical boundary after COVID. So, investing in network equipment might not be as useful as protecting endpoints with features like EDR (Endpoint Detection and Response) and behavioral monitoring. That would probably be helpful.

Quotes from Members

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
 

Pros

"Every aspect of the solution is very well integrated, and even that gives comfort. It is a fail-safe kind of environment."
"I find value in notifications from CyberArk when passwords fail verification and have other issues."
"Increased our insight into how privileged accounts are being used and distributed within our footprint."
"When we started with RPA, there was a requirement that every credential and the bots themselves be protected through the PAM system. From the get-go, we've had CyberArk in the middle... We've got a pretty robust RPA implementation with our PAM platform. Users, bots, the credentials — everything is managed via our PAM solution."
"The users have the ability to rotate passwords on a daily basis with a Reconcile Account. Or, if they want to do one-time password checkouts, we can manage those, check in, check out. I like the flexibility of the changing of the password, specifically."
"The most valuable features of CyberArk Enterprise Password Vault are password vaulting and automatic rotation of passwords after use."
"The biggest feature is the security of the overall solution. It's very secure. The vaulting technology and the number of security layers involved in the vault, where privileged accounts are actually stored, is the heart of the solution."
"The most valuable feature is Special Monitoring."
"You can scale the solution up or down by department."
"A good feature that is present is MAM or Mobile Application Management. We can deploy this feature on the device, which is not managed by the organization. If I apply some security configuration on a personal device, the user would be really disappointed. What we do instead is that we give all access to the applications related to corporate and ask the users to use the application. We secure the application by putting the security features on the applications and not on the users' devices. This way, the users are happy, and we also meet our company's compliance standards. Then, everyone is happy."
"The solution is very good at securing files. For example, if I forward a secure document, it's blocked from others, as I can send it with restrictions in relation to who can open it."
"The product is centralized and we can use it for security purposes."
"The product is a unified solution and you don't require to purchase tools from different vendors. The system analyzes behavior and activity and takes steps for protection."
"The solution is scalable."
"Microsoft Mobility and EMS include Intune for Mobility, which provides mobile device management and mobile application management. With mobile device management, you can control the entire device in an organization."
"Integration between our departments has been the most valuable."
 

Cons

"Having a centralized place to manage the solution has been something that I have always wanted, and they are starting to understand that and bring things back together."
"The usual workload is sometimes delayed by the solution."
"The support services could act faster when people reach out to resolve issues."
"The continuous scanning of the assets is limited to Windows and Unix. We like to have the solution scan any databases, network devices, and security devices for privileged accounts. That would be very helpful."
"There should be more models and licensing plans for this software."
"CyberArk Enterprise Password Vault's deployment is complex for resources with little experience. Tech support needs to be improved as well based on quality and knowledge."
"The solution should be able to mitigate internal threats"
"We would like to expand the usage of the auto discovery accounts feed, then on our end, tie in the REST API for automation."
"The auditing and reporting could be updated and upgraded. I would like to see light applications because they consume a lot of the device's memory at present."
"The licensing is quite expensive."
"The licensing can be messy at times."
"We did the deployment with the help of Microsoft's consultants. But sometimes, we found it difficult to educate the application developers to integrate."
"Technical support could be improved. Sometimes they use a third party that's not so knowledgeable in the product and that can slow down things a bit."
"Microsoft Enterprise Mobility + Security is expensive."
"Its performance needs enhancement."
"Microsoft's feature management is based on licenses. Microsoft follows ethical licensing and hence do not restrict the use of it."
 

Pricing and Cost Advice

"The price of this solution is expensive."
"Network and security licenses are currently being managed by other outsource vendors, so they are facing some type of problems in the digital aspect."
"The license CyberArk Privileged Access Manager is on an annual basis."
"CyberArk DNA is free if you purchase the CyberArk solution. There is no additional charge for CyberArk DNA, which is great."
"The price of CyberArk support could be a little bit less. Otherwise, pricing is fine."
"Previously, the pricing was very meager. They started publicizing and advertising the solution, growing CyberArk, as an organization. They also changed their pricing with that growth, e.g., the pricier the product, the more people who will purchase it."
"The solution is costly but we get what we pay for."
"I haven't seen the numbers. I know it is not cheap, but I don't know what it is. I would rate it a six out of ten in terms of pricing. It is definitely more expensive than the other product, but it also provides more functionality, and it is modular too. So, we pay for the functionality we're actually going to use, and that's nice."
"The increase in the prices of the product might not be the actual problem, but things become complex with some new plans that were introduced by Microsoft recently."
"We have to pay 10 dollars per user. I would rate the tool's pricing a six out of ten."
"I would rate pricing at eight out of ten. It is a bit higher because of the security features that Microsoft provides."
"The solution is cost-effective."
report
Use our free recommendation engine to learn which Privileged Access Management (PAM) solutions are best for your needs.
824,067 professionals have used our research since 2012.
 

Top Industries

By visitors reading reviews
Educational Organization
32%
Financial Services Firm
12%
Computer Software Company
11%
Manufacturing Company
6%
Computer Software Company
17%
Financial Services Firm
11%
Manufacturing Company
8%
Pharma/Biotech Company
7%
 

Company Size

By reviewers
Large Enterprise
Midsize Enterprise
Small Business
 

Questions from the Community

How does Sailpoint IdentityIQ compare with CyberArk PAM?
We evaluated Sailpoint IdentityIQ before ultimately choosing CyberArk. Sailpoint Identity Platform is a solution to manage risks in cloud enterprise environments. It automates and streamlines the m...
What do you like most about CyberArk Privileged Access Manager?
The most valuable features of the solution are control and analytics.
What is your experience regarding pricing and costs for CyberArk Privileged Access Manager?
CyberArk Privileged Access Manager comes at a high cost. But the solution is worth its price.
What is your experience regarding pricing and costs for Microsoft Enterprise Mobility + Security?
The increase in the prices of the product might not be the actual problem, but things become complex with some new plans that were introduced by Microsoft recently. Initially, my company used to ha...
What needs improvement with Microsoft Enterprise Mobility + Security?
Since Microsoft Enterprise Mobility + Security needs to deal with the competition from VMware and Ivanti, I visited PeerSpot's website to see how Microsoft can compete with its competitors. Microso...
 

Also Known As

CyberArk Privileged Access Security, CyberArk Enterprise Password Vault
Enterprise Mobility + Security E3, Enterprise Mobility + Security E5, MS Enterprise Mobility + Security
 

Overview

 

Sample Customers

Rockwell Automation
Mars, Whole Foods, Land O'Lakes, Dow
Find out what your peers are saying about CyberArk, Delinea, One Identity and others in Privileged Access Management (PAM). Updated: December 2024.
824,067 professionals have used our research since 2012.