Try our new research platform with insights from 80,000+ expert users
CyberArk Endpoint Privilege Manager Logo

CyberArk Endpoint Privilege Manager pros and cons

Vendor: CyberArk
4.1 out of 5
674 followers
Post review

Pros & Cons summary

Buyer's Guide

Get pricing advice, tips, use cases and valuable features from real users of this product.
Get the report

Prominent pros & cons

PROS

CyberArk Endpoint Privilege Manager drastically reduces the attack surface by removing local administrative accounts and offers powerful lifecycle management features.
The database of CyberArk Endpoint Privilege Manager is fully encrypted and protected with multiple layers, elevating its security capabilities.
CyberArk Endpoint Privilege Manager has standout features such as password management, session management, and platform customization, all aimed at enhancing user security.
With a high-performance rating, CyberArk Endpoint Privilege Manager sets itself as a strong competitor in identity security platforms.
CyberArk Endpoint Privilege Manager excels in scalability and flexibility, effectively controlling privileged access and protecting against ransomware attacks.

CONS

CyberArk Endpoint Privilege Manager's installation process can be complex, especially for those who are inexperienced.
Technical support for CyberArk Endpoint Privilege Manager has slow response times, impacting issue resolution.
CyberArk Endpoint Privilege Manager has performance issues in certain environments, affecting overall efficiency.
The pricing for CyberArk Endpoint Privilege Manager is high, and there are concerns about its affordability.
CyberArk Endpoint Privilege Manager's administration process, particularly concerning policy and application setup, can be simplified to enhance usability.
 

CyberArk Endpoint Privilege Manager Pros review quotes

Oluwajuwon Olorunlona - PeerSpot reviewer
Dec 8, 2022
CyberArk Endpoint Privilege Manager is very easy to manage, which I like. The solution also has a dashboard where you can see which software is suspicious, which I find valuable.
AP
Jan 13, 2023
The solution is scalable.
reviewer2600361 - PeerSpot reviewer
Dec 9, 2024
The most valuable feature of CyberArk Endpoint Privilege Manager is its scalability.
Learn what your peers think about CyberArk Endpoint Privilege Manager. Get advice and tips from experienced pros sharing their opinions. Updated: December 2024.
824,053 professionals have used our research since 2012.
WG
May 19, 2020
It has drastically reduced the attack surface for local administrative rights and the chance of escalation of privilege. We've removed, at this point, close to 98 percent of the local administrative accounts on workstations. If there were an incident, it would stop at that point and we'd be able to know.
reviewer1614768 - PeerSpot reviewer
Jun 30, 2021
I like that you can remove the admin rights from the user's computer and have control over the environment. That means you can delete the local admins and grant them proper privileges with the console. So, they will get proper permissions for applications they need, but we don't have to do it. In the domain where we don't have control, the user can only do specified actions, but not all of them.
Anish R - PeerSpot reviewer
Nov 16, 2022
I have always found that CyberArk is a very tight, foolproof product compared to most other products available.
Karthik Raja - PeerSpot reviewer
Aug 19, 2024
The biggest benefit of CyberArk EPM for our customers is control over privileged access for endpoints. Endpoints are often the starting point for attackers to enter and move within a network. CyberArk EPM bridges the gap between security and operations teams. Operations teams are happy because work isn't stopped due to admin rights issues, while security teams are satisfied that full admin rights aren't given to all users.
EN
Aug 15, 2023
The password rotation and the session recording are the most valuable features.
reviewer2539296 - PeerSpot reviewer
Aug 30, 2024
The tool is an endpoint management system. It monitors everything a standard user does and helps elevate privileges when necessary for advanced users. It keeps an auditable trail of all activities. Practically, it stops and blocks potentially hazardous user behavior, whether intentional or unintentional. Certain companies must use endpoint management software because of national or international rules or ISO norms.
Ike-Ekweruo - PeerSpot reviewer
Feb 26, 2024
CyberArk Endpoint Privilege Manager (EPM) 's most valuable feature is its ability to manage user application privileges and protect against ransomware attacks by controlling access to specific files and applications.
 

CyberArk Endpoint Privilege Manager Cons review quotes

Oluwajuwon Olorunlona - PeerSpot reviewer
Dec 8, 2022
CyberArk Endpoint Privilege Manager is a perfect solution, but CyberArk Endpoint Privilege Manager for Linux has many issues. Another area for improvement in CyberArk Endpoint Privilege Manager, specifically for Windows, is that there's no way for you to check credential theft from a text file, such as a notepad file.
AP
Jan 13, 2023
The installation process is pretty difficult.
reviewer2600361 - PeerSpot reviewer
Dec 9, 2024
CyberArk Endpoint Privilege Manager could be improved by simplifying the administration process, specifically when setting up policies and applications.
Learn what your peers think about CyberArk Endpoint Privilege Manager. Get advice and tips from experienced pros sharing their opinions. Updated: December 2024.
824,053 professionals have used our research since 2012.
WG
May 19, 2020
We have had some major issues with the tool, but we have worked with the R&D teams and we have worked with support. There is room for improvement, especially on response times. But they're working on it and they're doing the best they can.
reviewer1614768 - PeerSpot reviewer
Jun 30, 2021
Performance could be better. We have a couple of problems with CyberArk right now. One of the problems is performance in our environment. Support also takes a long time to respond. If the user already has local admin rights, then I can't collect any events in the console from this device. There are also some options in CyberArk that are not working properly, and are not helpful in this case. I can't collect any information to create a proper policy for the device. I have to investigate everything manually, or even disable the local admin from the device. I can collect the events only after this, and it's very time consuming. In my case, it's a waste of resources.
Anish R - PeerSpot reviewer
Nov 16, 2022
CyberArk is a pretty heavy solution.
Karthik Raja - PeerSpot reviewer
Aug 19, 2024
My recommendation for improvement is to add functionality for when users request access to an application. There's a pop-up UI, but it's not very customizable. I suggest creating a UI where we can write scripts or use SDKs to enhance it. This could automatically create tickets in a system like ServiceNow when users request an application. If a manager approves, we could automatically push policies to those users.
EN
Aug 15, 2023
One area that has room for improvement is in managing the credentials for network devices.
reviewer2539296 - PeerSpot reviewer
Aug 30, 2024
The product is expensive.
Ike-Ekweruo - PeerSpot reviewer
Feb 26, 2024
The product's threat protection and defense capabilities need enhancement.