Try our new research platform with insights from 80,000+ expert users

CyberArk Privileged Access Manager vs Proofpoint Insider Threat Management comparison

 

Comparison Buyer's Guide

Executive Summary
 

Categories and Ranking

CyberArk Privileged Access ...
Ranking in User Activity Monitoring
1st
Average Rating
8.6
Number of Reviews
193
Ranking in other categories
Enterprise Password Managers (2nd), Privileged Access Management (PAM) (1st), Mainframe Security (3rd), Operational Technology (OT) Security (3rd)
Proofpoint Insider Threat M...
Ranking in User Activity Monitoring
2nd
Average Rating
8.4
Number of Reviews
6
Ranking in other categories
User Entity Behavior Analytics (UEBA) (15th)
 

Mindshare comparison

As of October 2024, in the User Activity Monitoring category, the mindshare of CyberArk Privileged Access Manager is 24.1%, up from 18.9% compared to the previous year. The mindshare of Proofpoint Insider Threat Management is 25.9%, down from 27.5% compared to the previous year. It is calculated based on PeerSpot user engagement data.
User Activity Monitoring
 

Featured Reviews

SatishIyer - PeerSpot reviewer
Jun 21, 2022
Lets you ensure relevant, compliant access in good time and with an audit trail, yet lacks clarity on MITRE ATT&CK
When I was a component owner for PAM's Privileged Threat Analytics (PTA) component, what I wanted was a clear mapping to the MITRE ATT&CK framework, a framework which has a comprehensive list of use cases. We reached out to the vendor and asked them how much coverage they have of the uses cases found on MITRE, which would have given us a better view of things while I was the product owner. Unfortunately they did not have the capability of mapping onto MITRE's framework at that time. PTA is essentially the monitoring interface of the broker (e.g. Privileged Access Management, the Vault, CPM, PSM, etc.), and it's where you can capture your broker bypass and perform related actions. For this reason, we thought that this kind of mapping would be required, but CyberArk informed us that they did not have the capability we had in mind with regard to MITRE ATT&CK. I am not sure what the situation is now, but it would definitely help to have that kind of alignment with one of the more well-known frameworks like MITRE. For CyberArk as a vendor, it would also help them to clearly spell out in which areas they have full functionality and in which ares they have partial or none. Of course, it also greatly benefits the customers when they're evaluating the product.
it_user223041 - PeerSpot reviewer
Apr 14, 2015
Easy to implement and configure. Ticketing and incident workflow can be improved.
Real time recording and investigation of suspected policy infractions. Ease of implementation and configuration. Knowledge, availability and responsiveness of ObserveIT technical team to support our implementation Has allowed us to provide level of assurance of compliance to complicated business…

Quotes from Members

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
 

Pros

"The most valuable feature is that it is flexible. It has many connectors. that have done well, the EPV and SSH sessions are all being recorded and everything works fine."
"The most valuable feature is privileged session management."
"It is a scalable product."
"The Vault offers great capabilities for structuring and accessing data."
"It is very simple to use."
"Provides improved security around having your credentials locked down and rotated regularly."
"Every aspect of the solution is very well integrated, and even that gives comfort. It is a fail-safe kind of environment."
"It is a robust product."
"ObserveIT is small, easy to use, easy to deploy, and is not complicated, so it's more generally suited for only SMBs. It's a good value with a cheaper price."
 

Cons

"I would like to see a simplification of the product."
"There is a bit of a learning curve, but it's a pretty complex solution."
"There is a learning curve when it comes to planning out the deployment strategy, but once it is defined, it runs itself."
"Overall what I would really love to see is the third-party PAS reporter tool pulled more into the overall solution, ideally as its own deployable component service installation package."
"There is some stuff that we still have not fully integrated, which is our AIM solution. We are having all types of issues with it. I have been working with Level 3 support on it, but otherwise, from a functionality perspective, everything has been working except for the AIM solution."
"The technical support is very poor."
"Make it easier to deploy."
"We would like to expand the usage of the auto discovery accounts feed, then on our end, tie in the REST API for automation."
"ObserveIT is not scalable and it's not for the medium to large corporations. It's for the smaller environments. For the larger corporations, we have other scalable solutions."
 

Pricing and Cost Advice

"Pricing and licensing depend on the environment."
"CyberArk provides all the features bundled. This is compared to other vendors who provide them as a different license for each functionality."
"If you are looking at implementing this solution, buy the training and go to it."
"It can be an expensive product."
"Our risk is definitely significantly lower. Also, our resources are low."
"I'm a technician so I don't handle the licensing for CyberArk Privileged Access Manager, but I know that the price for the core license is about €140 per year. There's another type of license, the external vendor license, and that's about €600 and you can manage twenty devices. From what I know, the price for one device in a subscription is about €65 per year. You can buy the CyberArk Endpoint Privilege Manager too, or you can buy some other application or application license with CyberArk Privileged Access Manager, but all other features, such as the Analytics Server is included in the basic CyberArk license. With WALLIX, you need to buy separate licenses for the features."
"It's an affordable platform."
"The price of CyberArk Privileged Access Manager could be less expensive."
Information not available
report
Use our free recommendation engine to learn which User Activity Monitoring solutions are best for your needs.
813,161 professionals have used our research since 2012.
 

Top Industries

By visitors reading reviews
Educational Organization
29%
Financial Services Firm
13%
Computer Software Company
12%
Manufacturing Company
6%
Financial Services Firm
22%
Computer Software Company
12%
Manufacturing Company
8%
Government
8%
 

Company Size

By reviewers
Large Enterprise
Midsize Enterprise
Small Business
No data available
 

Questions from the Community

How does Sailpoint IdentityIQ compare with CyberArk PAM?
We evaluated Sailpoint IdentityIQ before ultimately choosing CyberArk. Sailpoint Identity Platform is a solution to manage risks in cloud enterprise environments. It automates and streamlines the m...
What do you like most about CyberArk Privileged Access Manager?
The most valuable features of the solution are control and analytics.
What is your experience regarding pricing and costs for CyberArk Privileged Access Manager?
CyberArk Privileged Access Manager comes at a high cost. But the solution is worth its price.
Looking for recommendations and a pros/cons template for software to detect insider threats
In addition to responsesfrom Xavier Suriol and reviewer1324719, also consider ObserveIT from Proofpoint.
Looking for recommendations and a pros/cons template for software to detect insider threats
Hello All,I hope you had a merry Christmas.In this case it is as simple as it is.Just take Proofpoint ObserveIT - many companies in the public and financial sector have been using it for years.By ...
 

Also Known As

CyberArk Privileged Access Security, CyberArk Enterprise Password Vault
ObserveIT
 

Overview

 

Sample Customers

Rockwell Automation
Coca Cola, Allianz, Premiere League, Xerox, AIG, Cigna, Starbucks, Revlon, Toshiba, Nissan and more.
Find out what your peers are saying about CyberArk Privileged Access Manager vs. Proofpoint Insider Threat Management and other solutions. Updated: October 2024.
813,161 professionals have used our research since 2012.