Try our new research platform with insights from 80,000+ expert users

Proofpoint Insider Threat Management vs Symantec Privileged Access Manager comparison

 

Comparison Buyer's Guide

Executive Summary
 

Categories and Ranking

Proofpoint Insider Threat M...
Average Rating
8.4
Number of Reviews
6
Ranking in other categories
User Activity Monitoring (2nd), User Entity Behavior Analytics (UEBA) (15th)
Symantec Privileged Access ...
Average Rating
7.8
Reviews Sentiment
7.2
Number of Reviews
51
Ranking in other categories
Privileged Access Management (PAM) (21st)
 

Mindshare comparison

Proofpoint Insider Threat Management and Symantec Privileged Access Manager aren’t in the same category and serve different purposes. Proofpoint Insider Threat Management is designed for User Activity Monitoring and holds a mindshare of 25.9%, down 27.5% compared to last year.
Symantec Privileged Access Manager, on the other hand, focuses on Privileged Access Management (PAM), holds 1.7% mindshare, up 1.8% since last year.
User Activity Monitoring
Privileged Access Management (PAM)
 

Featured Reviews

it_user223041 - PeerSpot reviewer
Apr 14, 2015
Easy to implement and configure. Ticketing and incident workflow can be improved.
Real time recording and investigation of suspected policy infractions. Ease of implementation and configuration. Knowledge, availability and responsiveness of ObserveIT technical team to support our implementation Has allowed us to provide level of assurance of compliance to complicated business…
Muhammad Baber - PeerSpot reviewer
May 6, 2022
Allows IT and consultants to access the infrastructure environment but needs more security and better support
Initial setup was very straightforward. It's basically a hardware appliance. It's a software appliance, but it's a hard-coded appliance. It's just a black and white screen, and it has everything inside. BeyondTrust is a Windows-based server, and they usually harden the machine and have their own patches on it, even though it's a Windows machine, so we can easily log into it. With the current solution, it's very difficult to log in. It's just a black and white screen, and you need a support account to log in onto it. It feels more secure. It's a shell, and the database is embedded. But with BeyondTrust, it's SQL-based and Windows-based, so it's vulnerable. When we first set up the solution, it was only a few endpoints to give access to the vendors. Now, it's around 400-500 machines. It required a lot of maintenance. There were a lot of new patches and new versions of the appliance, and then the appliances would move out of support very quickly, which is another reason we are moving to BeyondTrust. At the moment, we are using the version which is very stable, but it is out of support within six to seven months. They keep asking you to upgrade to the new version, which is challenging. Once we upgraded, we had a lot of issues that support couldn't fix.

Quotes from Members

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
 

Pros

"ObserveIT is small, easy to use, easy to deploy, and is not complicated, so it's more generally suited for only SMBs. It's a good value with a cheaper price."
"We can enforce complicated password policies and very important frequent password changes."
"It's easy to use and easy to configure."
"It gives you list of servers, so you can see which users have access to which servers. This is really useful, so we can make sure nobody is getting extra access than what is needed."
"Password Management and Session Recording. The simplicity and ease that it is to be up and running out-of-the-box is very much appreciated."
"Stability is solid as a rock."
"Comprehensive coverage of the required features for the PAM solution."
"Whoever built it from the ground up, they understand how an organization is laid out."
"It reduces the viral attacks on my website. It also allows certain users access to see what happens daily."
 

Cons

"ObserveIT is not scalable and it's not for the medium to large corporations. It's for the smaller environments. For the larger corporations, we have other scalable solutions."
"The service account management functionality needs to be extended to application pools, SQL database, PowerShell scripts, service account discovery, etc."
"Instead of just giving passwords to the user based on job function, from auditing perspective, turn that cycle around. That would really help from an auditing standpoint."
"Bring more technology into the portfolio and being able to collapse those products into a much more integrated way."
"The setup is complex."
"An improvement for this solution is that it should not be constantly based on user name and password. There should be a condition to edit and update your username."
"They should include some assignments in the test environment to explore the product's features."
"The support for other remote assistance tools would be excellent. Free included tools in Windows (Remote Assist) and Microsoft SCCM Configuration Manager (ConMgr Remote Control) allow companies to reduce the amount of RDP connections and expand the usage of the tools are frequently used by companies to provide technical support for remote assistance."
"It'd be great if you just stuck in your PIV card and Windows popped up, asked you for your password. You typed it in, then it remembered your credentials."
 

Pricing and Cost Advice

Information not available
"Don’t go with an agent model. Don’t go with a model that has you buying a thousand different parts. Go with PAM that gives you everything, or you’ll just be paying costs of implementing another tool that PAM would have just given you up front."
"The prices are not low, but one can ask for a discount. It’s not the cheapest PAM solution."
"The licensing is simple and scalable."
"The version we are using is affordable compared to BeyondTrust, which is maybe three to four times as expensive, but it depends on the features."
"Pricing is fair compared to other top vendors."
"It is more expensive than other solutions on the market."
"Appliances are relatively cheap, don’t skimp. Make sure you have redundancy, high availability, and enough appliances to manage the concurrent workload."
"They offer per-device, per-user, or monthly and yearly licensing models."
report
Use our free recommendation engine to learn which User Activity Monitoring solutions are best for your needs.
813,161 professionals have used our research since 2012.
 

Top Industries

By visitors reading reviews
Financial Services Firm
22%
Computer Software Company
12%
Manufacturing Company
8%
Government
8%
Computer Software Company
18%
Financial Services Firm
17%
Manufacturing Company
15%
Government
9%
 

Company Size

By reviewers
Large Enterprise
Midsize Enterprise
Small Business
No data available
 

Questions from the Community

Looking for recommendations and a pros/cons template for software to detect insider threats
In addition to responsesfrom Xavier Suriol and reviewer1324719, also consider ObserveIT from Proofpoint.
Looking for recommendations and a pros/cons template for software to detect insider threats
Hello All,I hope you had a merry Christmas.In this case it is as simple as it is.Just take Proofpoint ObserveIT - many companies in the public and financial sector have been using it for years.By ...
What do you like most about Symantec Privileged Access Manager?
We can check the activities in the server for fragile files and documents in case of any issues.
What is your experience regarding pricing and costs for Symantec Privileged Access Manager?
The product's pricing depends on the agreement. They offer per-device, per-user, or monthly and yearly licensing models.
What needs improvement with Symantec Privileged Access Manager?
There should be some training platform similar to Microsoft and IBM. We can't find useful documentation or YouTube videos to learn about the process. They should include some assignments in the tes...
 

Also Known As

ObserveIT
CA PAM, Xceedium Xsuite, CA Privileged Access Manager
 

Overview

 

Sample Customers

Coca Cola, Allianz, Premiere League, Xerox, AIG, Cigna, Starbucks, Revlon, Toshiba, Nissan and more.
NEOVERA, Telesis, eSoft
Find out what your peers are saying about CyberArk, Proofpoint, Amazon Web Services (AWS) and others in User Activity Monitoring. Updated: October 2024.
813,161 professionals have used our research since 2012.