Try our new research platform with insights from 80,000+ expert users
CyberArk Endpoint Privilege Manager Logo

CyberArk Endpoint Privilege Manager pros and cons

Vendor: CyberArk
4.1 out of 5
671 followers
Post review

Pros & Cons summary

Buyer's Guide

Get pricing advice, tips, use cases and valuable features from real users of this product.
Get the report

Prominent pros & cons

PROS

CyberArk Endpoint Privilege Manager reduces the attack surface significantly by removing local administrative rights and minimizing the risk of escalation privileges.
It features password management and session management which enhance security by regularly updating credentials and monitoring active sessions.
CyberArk Endpoint Privilege Manager offers customizable features that can be tailored to specific enterprise needs, alongside automated privilege management that aids in effective access control.
The program provides detailed activity logs and auditing capabilities to ensure compliance with both national and international regulations.
CyberArk Endpoint Privilege Manager continuously innovates, maintaining a competitive edge in the cybersecurity market.

CONS

CyberArk Endpoint Privilege Manager has performance issues in certain environments with slow support response times.
Linux compatibility is problematic with many unresolved issues.
Many features in CyberArk Endpoint Privilege Manager are difficult for new users due to the complex integration process.
Pricing for CyberArk is considered high, which could be improved for better flexibility.
CyberArk Endpoint Privilege Manager's threat protection and defense capabilities require enhancement.
 

CyberArk Endpoint Privilege Manager Pros review quotes

Oluwajuwon Olorunlona - PeerSpot reviewer
Dec 8, 2022
CyberArk Endpoint Privilege Manager is very easy to manage, which I like. The solution also has a dashboard where you can see which software is suspicious, which I find valuable.
AP
Jan 13, 2023
The solution is scalable.
WG
May 19, 2020
It has drastically reduced the attack surface for local administrative rights and the chance of escalation of privilege. We've removed, at this point, close to 98 percent of the local administrative accounts on workstations. If there were an incident, it would stop at that point and we'd be able to know.
Learn what your peers think about CyberArk Endpoint Privilege Manager. Get advice and tips from experienced pros sharing their opinions. Updated: November 2024.
816,406 professionals have used our research since 2012.
reviewer1614768 - PeerSpot reviewer
Jun 30, 2021
I like that you can remove the admin rights from the user's computer and have control over the environment. That means you can delete the local admins and grant them proper privileges with the console. So, they will get proper permissions for applications they need, but we don't have to do it. In the domain where we don't have control, the user can only do specified actions, but not all of them.
Anish R - PeerSpot reviewer
Nov 16, 2022
I have always found that CyberArk is a very tight, foolproof product compared to most other products available.
Karthik Raja - PeerSpot reviewer
Aug 19, 2024
The biggest benefit of CyberArk EPM for our customers is control over privileged access for endpoints. Endpoints are often the starting point for attackers to enter and move within a network. CyberArk EPM bridges the gap between security and operations teams. Operations teams are happy because work isn't stopped due to admin rights issues, while security teams are satisfied that full admin rights aren't given to all users.
EN
Aug 15, 2023
The password rotation and the session recording are the most valuable features.
reviewer2539296 - PeerSpot reviewer
Aug 30, 2024
The tool is an endpoint management system. It monitors everything a standard user does and helps elevate privileges when necessary for advanced users. It keeps an auditable trail of all activities. Practically, it stops and blocks potentially hazardous user behavior, whether intentional or unintentional. Certain companies must use endpoint management software because of national or international rules or ISO norms.
Ike-Ekweruo - PeerSpot reviewer
Feb 26, 2024
CyberArk Endpoint Privilege Manager (EPM) 's most valuable feature is its ability to manage user application privileges and protect against ransomware attacks by controlling access to specific files and applications.
David Morimanno - PeerSpot reviewer
Aug 25, 2023
We were able to reduce the number of privileged accounts by 50%, which helped to simplify our privileged access management environment.
 

CyberArk Endpoint Privilege Manager Cons review quotes

Oluwajuwon Olorunlona - PeerSpot reviewer
Dec 8, 2022
CyberArk Endpoint Privilege Manager is a perfect solution, but CyberArk Endpoint Privilege Manager for Linux has many issues. Another area for improvement in CyberArk Endpoint Privilege Manager, specifically for Windows, is that there's no way for you to check credential theft from a text file, such as a notepad file.
AP
Jan 13, 2023
The installation process is pretty difficult.
WG
May 19, 2020
We have had some major issues with the tool, but we have worked with the R&D teams and we have worked with support. There is room for improvement, especially on response times. But they're working on it and they're doing the best they can.
Learn what your peers think about CyberArk Endpoint Privilege Manager. Get advice and tips from experienced pros sharing their opinions. Updated: November 2024.
816,406 professionals have used our research since 2012.
reviewer1614768 - PeerSpot reviewer
Jun 30, 2021
Performance could be better. We have a couple of problems with CyberArk right now. One of the problems is performance in our environment. Support also takes a long time to respond. If the user already has local admin rights, then I can't collect any events in the console from this device. There are also some options in CyberArk that are not working properly, and are not helpful in this case. I can't collect any information to create a proper policy for the device. I have to investigate everything manually, or even disable the local admin from the device. I can collect the events only after this, and it's very time consuming. In my case, it's a waste of resources.
Anish R - PeerSpot reviewer
Nov 16, 2022
CyberArk is a pretty heavy solution.
Karthik Raja - PeerSpot reviewer
Aug 19, 2024
My recommendation for improvement is to add functionality for when users request access to an application. There's a pop-up UI, but it's not very customizable. I suggest creating a UI where we can write scripts or use SDKs to enhance it. This could automatically create tickets in a system like ServiceNow when users request an application. If a manager approves, we could automatically push policies to those users.
EN
Aug 15, 2023
One area that has room for improvement is in managing the credentials for network devices.
reviewer2539296 - PeerSpot reviewer
Aug 30, 2024
The product is expensive.
Ike-Ekweruo - PeerSpot reviewer
Feb 26, 2024
The product's threat protection and defense capabilities need enhancement.
David Morimanno - PeerSpot reviewer
Aug 25, 2023
The product needs a streamlined user interface; improvements to the user interface can enhance user experience and make the solution more intuitive to navigate.