Try our new research platform with insights from 80,000+ expert users
Security Engineer at DIL
Real User
A strong part of our zero-trust architecture that makes it easy to manage privileged access
Pros and Cons
  • "The password rotation and the session recording are the most valuable features."
  • "One area that has room for improvement is in managing the credentials for network devices."

How has it helped my organization?

The solution reduces the stress of managing privileged accounts that log into servers and network devices. We're also looking to onboard service accounts, and the solution takes care of the rotation while meeting the password policy and auditing and recording user sessions. The solution manages privilege sessions. The solution is also part of a zero-trust architecture where we see what admin users do on the servers.

What is most valuable?

The password rotation and the session recording are the most valuable features. Likewise, password management for service accounts is a very nice feature.

What needs improvement?

One area that has room for improvement is in managing the credentials for network devices. The solution works fine for servers running Windows 10, but it's not very functional or smooth in operation for servers running Linux and Unix operating systems. There could also be some improvement in integrating with a number of solutions. Though CyberArk keeps developing, improving, or increasing its integrations with other solutions, it could do better.

I would also like the initial setup to be easier because we have to engage the services of a partner when setting up the solution. Moreover, the documentation for setup is restricted to partners only. You can get training on the administration of the solution, but the setup and getting some support documents are reserved for partners only. If there were a better way to get this information out there or to make it more accessible, that would reduce the complexity of setting up the solution.

For how long have I used the solution?

We've worked with this solution for three years.

Buyer's Guide
CyberArk Endpoint Privilege Manager
February 2025
Learn what your peers think about CyberArk Endpoint Privilege Manager. Get advice and tips from experienced pros sharing their opinions. Updated: February 2025.
838,713 professionals have used our research since 2012.

What do I think about the stability of the solution?

I rate the solution's stability an eight out of ten.

What do I think about the scalability of the solution?

The solution is highly valuable, but it depends on the license. To scale the architecture, you can just increase your resources. I rate the solution's scalability an eight out of ten. I have about 50 users for this solution, using it 24/7.

How are customer service and support?

CyberArk's technical support can be very prompt, and I am satisfied with their services.

How would you rate customer service and support?

Positive

How was the initial setup?

I rate the initial setup a five out of ten. The solution was not so easy to set up. It has several components with communication between them and server hardening, so the setup is not exactly easy. But there is straightforward documentation, so we can work with that. However, that is reserved for partners.

All conditions being equal, it takes three weeks to deploy the solution. But it took longer for us because there were some constraints within the environment, so it took three weeks to one month.

When deploying the solution, we had to evaluate our environment, get all our privileged accounts, and decide on the architecture we wanted to go with. Since we deployed the solution on-premises, we had to provision servers for different components of the solution before installing each component on the servers and then installing the vault.

What about the implementation team?

Right now, as an individual, I can't just say I'm getting CyberArk and setting it up myself. I need to get the services of a partner. A lot of the documentation is reserved for partners.

We needed two people to deploy the solution, and we currently just need one admin for maintenance. We would need two for a larger business.

What's my experience with pricing, setup cost, and licensing?

I rate the solution's pricing an eight out of ten since the price can be too high for smaller businesses. There is an annual support license that needs to be purchased additionally.

What other advice do I have?

It's a great solution and is really functional. It's not a solution that covers a lot of needs. It has a niche area, and they do excellently with that. I recommend CyberArk Endpoint Privilege Manager and rate it a nine out of ten.

I'm still trying to maximize and explore the solution's capabilities. It does quite a lot, but I have not been able to utilize the solution that well. It takes time for users to accept changes and get used to the solution.

Which deployment model are you using for this solution?

On-premises
Disclosure: I am a real user, and this review is based on my own experience and opinions.
PeerSpot user
Oluwajuwon Olorunlona - PeerSpot reviewer
Cyber Security Engineer at eprocessconsulting
Real User
Easy to manage, has an application whitelisting feature and a dashboard that shows you which software is suspicious, but there's no way to check credential theft from a text file
Pros and Cons
  • "CyberArk Endpoint Privilege Manager is very easy to manage, which I like. The solution also has a dashboard where you can see which software is suspicious, which I find valuable."
  • "CyberArk Endpoint Privilege Manager is a perfect solution, but CyberArk Endpoint Privilege Manager for Linux has many issues. Another area for improvement in CyberArk Endpoint Privilege Manager, specifically for Windows, is that there's no way for you to check credential theft from a text file, such as a notepad file."

What is our primary use case?

My primary use case for CyberArk Endpoint Privilege Manager is malware prevention. The solution enables malware detonation, which helps you solve ransomware problems. For example, suppose an unknown application comes into your environment, and you have installed a CyberArk Endpoint Privilege Manager agent. In that case, the solution will filter the unknown traffic from an unknown publisher and stop it from infiltrating. The solution dashboard also lets you know that specific software is suspicious. Still, it depends on the category, but malware prevention is one use case of CyberArk Endpoint Privilege Manager.

Classifying a trusted or whitelisted application is also a use case of the solution.

Another use case of CyberArk Endpoint Privilege Manager is stopping credential theft. For example, you have credential stores all around, whether you know it or not. You have credential stores in web browsers like Chrome and Microsoft Edge. The solution protects you against an attacker that has already gained access to your environment, an internal person that leverages your system and wants to go to your web browser, or probably there's a browser path attack where the person has access to your browser. He can check your credential store, but if CyberArk Endpoint Privilege Manager is in place, that situation will be prevented.

Just-In-Time Access is another use case of the solution. For example, there's no administrator privilege on the system, but let's say a database administrator or application administrator wants to use the credential. You can provide that person with Just-In-Time Access so he can use the credential for thirty minutes, then that credential expires once the time is up.

CyberArk Endpoint Privilege Manager also separates the privileges. For example, a team of application managers receives access to specific software that the network team can't access.

What is most valuable?

CyberArk Endpoint Privilege Manager is very easy to manage, which I like.

I also found credential detection the most valuable feature of the solution. For example, if I put a credential on my desktop and name the file administrator credential, and a person has access to my system and clicks the file under the history section of the system to steal the credential, CyberArk Endpoint Privilege Manager will flag that activity.

The solution also has a dashboard where you can see which software is suspicious, which I find valuable.

Other valuable features of CyberArk Endpoint Privilege Manager include application whitelisting and Just-In-Time Access.

What needs improvement?

CyberArk Endpoint Privilege Manager is a perfect solution, but CyberArk Endpoint Privilege Manager for Linux has many issues. One issue I observed while using it is that it needs to synchronize from an agent to a cloud because the agent does not update configurations or settings from the cloud. When I change some settings on the cloud, the changes don't synchronize into the system, and the policies won't come back unless I reinstall all the services. This is an area for improvement in CyberArk Endpoint Privilege Manager.

Another area for improvement in CyberArk Endpoint Privilege Manager, specifically for Windows, is that there's no way for you to check credential theft from a text file, such as a notepad file. Suppose I have a text file that contains passwords, for instance. In that case, I'm doing an application configuration that needs a password. CyberArk Endpoint Privilege Manager won't be able to help you locate that file, which means there's still an opportunity for an attacker to look into that text file and steal the passwords.

You can leverage the CyberArk Application Access Manager with CyberArk Endpoint Privilege Manager, but that aspect also needs improvement.

An additional feature I want to see in CyberArk Endpoint Privilege Manager is XDR, where you can trace how an attack can happen on an endpoint, how traffic was initiated, or if a person tried to access your computer and whether he was denied or allowed. CyberArk Endpoint Privilege Manager should be able to track such activities. The solution should allow you to see a specific event ID and use it to correlate whatever activity the malicious person was trying to do.

For how long have I used the solution?

I've been familiar with CyberArk Endpoint Privilege Manager for nearly two years, but I haven't been steadily working on it. For example, I've not worked with the solution for three months, then I'll work on it for two months, then I'll stop working with it again, but I'm very familiar with CyberArk Endpoint Privilege Manager.

I last worked with CyberArk Endpoint Privilege Manager three months ago.

What do I think about the stability of the solution?

CyberArk Endpoint Privilege Manager is stable, particularly for the Windows version, not the Linux version. The solution is an eight out of ten for me, stability-wise.

How are customer service and support?

I've contacted CyberArk Endpoint Privilege Manager technical support, and I'd rate support as seven out of ten.

Response time is three out of five.

Regarding how knowledgeable the level one support of CyberArk Endpoint Privilege Manager is, it always seems like the support person doesn't know what he's doing. I've already done what he was asking me to do. I'm not a CyberArk Endpoint Privilege Manager novice, so support is frustrating and a waste of time. Though the issue will be resolved eventually, CyberArk Endpoint Privilege Manager has already wasted my time, and that's uncool.

How would you rate customer service and support?

Neutral

Which solution did I use previously and why did I switch?

CyberArk Endpoint Privilege Manager is the best solution. However, One Identity Safeguard is trying as a solution, and it has special features which make it almost equal to CyberArk Endpoint Privilege Manager. Still, CyberArk Endpoint Privilege Manager is the best.

CyberArk has been in the market for a long time and keeps improving. CyberArk Endpoint Privilege Manager has a hundred percent effectiveness against ransomware, which you can't get anywhere. The CyberArk team researched and knows the angle, the flaws, and the central point of attack. An attacker usually infiltrates or compromises your system by elevating the credentials or permissions and then leveraging that elevation to compromise the system. CyberArk Endpoint Privilege Manager removes User Access Control on the endpoint, so it takes away the attacker's means to elevate permissions, so CyberArk Endpoint Privilege Manager is simply the best.

How was the initial setup?

Setting up CyberArk Endpoint Privilege Manager was pretty straightforward.

What's my experience with pricing, setup cost, and licensing?

CyberArk Endpoint Privilege Manager has a very high price, so it's a one out of ten for me in terms of pricing.

What other advice do I have?

I've used CyberArk Privileged Access Manager and One Identity Safeguard. I also have experience with CyberArk Endpoint Privilege Manager, One Identity Safeguard for Privileged Passwords, and One Identity Safeguard for Privileged Sessions.

CyberArk Endpoint Privilege Manager is cloud-based, but its agent is on-premises. The on-premise version is no longer supported, but it will still be supported if you're an old customer with an on-premise version. However, by 2024, CyberArk will no longer support the on-premises version of CyberArk Endpoint Privilege Manager.

Right now, there's no CyberArk Endpoint Privilege Manager within my company. I created quotes for customers to try the solution, but it's expensive. I just gathered my colleagues to simulate my use cases, and that's it.

What I'd tell others about CyberArk Endpoint Privilege Manager is that if you have the budget, you definitely should get it. The solution is excellent, and it's as if you're insured because CyberArk Endpoint Privilege Manager provides security. This is the advice I'd give anyone trying to implement CyberArk Endpoint Privilege Manager.

I'm rating the solution as seven out of ten because there's room for improvement in the Linux version, and the pricing needs to be more flexible.

My company is a CyberArk partner.

Which deployment model are you using for this solution?

On-premises
Disclosure: My company has a business relationship with this vendor other than being a customer: Partner
PeerSpot user
Buyer's Guide
CyberArk Endpoint Privilege Manager
February 2025
Learn what your peers think about CyberArk Endpoint Privilege Manager. Get advice and tips from experienced pros sharing their opinions. Updated: February 2025.
838,713 professionals have used our research since 2012.
reviewer1268721 - PeerSpot reviewer
Senior Consultant at a consultancy with 51-200 employees
Consultant
Highly scalable, excellent interface, and helpful documentation
Pros and Cons
  • "The most valuable features of CyberArk Endpoint Privilege Manager are password management, session management, onboarding rules, platform customization, and safety management."
  • "The price of the solution should improve."

What is our primary use case?

CyberArk Endpoint Privilege Manager can be deployed across all platforms, such as AWS, GCP, and Ali Baba. 

The solution is used for management, multi-site failover, satellite vaulting, distributed architecture, custom CPM, PSM deployment, custom CCP, and CCP deployment.

What is most valuable?

The most valuable features of CyberArk Endpoint Privilege Manager are password management, session management, onboarding rules, platform customization, and safety management.

CyberArk Endpoint Privilege Manager was presently revised, which included a new interface, rebranding, improve documentation, and an excellent user panel that supports multiple integrations.

What needs improvement?

The price of the solution should improve.

For how long have I used the solution?

I have been using CyberArk Endpoint Privilege Manager for approximately three years.

What do I think about the stability of the solution?

The stability of CyberArk Endpoint Privilege Manager is excellent. It has an uptime of 99.99 percent.

What do I think about the scalability of the solution?

My clients have scaled CyberArk Endpoint Privilege Manager. They have a distributed architecture and satellite vaulting, which allows scalability to be flexible.

I rate the scalability of CyberArk Endpoint Privilege Manager five out of five.

We have approximately 30 people using the solution.

How are customer service and support?

The support from CyberArk Endpoint Privilege Manager is excellent. We have good support in our SLAs, it is for five days.

Which solution did I use previously and why did I switch?

I work with the competitor of CyberArk Endpoint Privilege Manager, Beyond Trust. If I was to change something it wouldn't be CyberArk Endpoint Privilege Manager, it would just be Beyond Trust. There's a reason why there are features in CyberArk Endpoint Privilege Manager, it works in CyberArk Endpoint Privilege Manager. The same goes with Beyond Trust, there are features that only work in Beyond Trust and wouldn't work in CyberArk Endpoint Privilege Manager. For example, the introduction of smart rules, wouldn't make sense because CyberArk Endpoint Privilege Manager,  doesn't work with smart rules.

How was the initial setup?

I rate the initial setup of CyberArk Endpoint Privilege Manager as straightforward. However, I use the solution every day. The process of implementation took approximately one day.

The implementation strategy was reviewing architecture, deploying architecture, installing components, deploying components, configuring components, onboarding accounts, managing accounts, configuring platforms, managing platforms, configuring safes, and onboarding safes. 

We had a company-wide deployment of this solution.

What about the implementation team?

We did the implementation of the solution in-house, but the SaaS-based part of the solution is done by the vendor. We had approximately five people who did the implementation.

What's my experience with pricing, setup cost, and licensing?

The price of CyberArk Endpoint Privilege Manager is expensive. The solution is priced based on the number of accounts onboarded and the number of concurrent sessions. Everyone else is included in the price, such as support.

I rate the price of CyberArk Endpoint Privilege Manager a one out of five.

What other advice do I have?

I rate CyberArk Endpoint Privilege Manager an eight out of ten.

Which deployment model are you using for this solution?

Public Cloud
Disclosure: My company has a business relationship with this vendor other than being a customer: Partner
PeerSpot user
Aparna Solanki - PeerSpot reviewer
Security Consultant at SNSIN
Consultant
Top 10
Along with good efficiency and reliability, it also offers great performance
Pros and Cons
  • "The most valuable feature of the solution is its performance."
  • "The price of the product is an area of concern where improvements are required. The product's price should be made more flexible."

What is our primary use case?

I use the solution in my company since its PAM features are used for privileged accounts.

What is most valuable?

The most valuable feature of the solution is its performance. I would describe it as a seamless solution.

What needs improvement?

The price of the product is an area of concern where improvements are required. The product's price should be made more flexible.

The tool's UI could be better and more user-friendly.

For how long have I used the solution?

I have been using CyberArk Endpoint Privilege Manager for a year. My company has a partnership with CyberArk.

What do I think about the stability of the solution?

Stability-wise, I rate the solution an eight out of ten.

What do I think about the scalability of the solution?

Scalability is fine since many people can use it even with a minimum number of licenses.

Around five people in my company use the tool.

How are customer service and support?

My company has not contacted the product's technical support since our internal team took care of the deployment process.

How was the initial setup?

The product's initial setup phase is fine. The on-premises architecture is a bit tough.

The product's deployment phase focuses on consolidating everything in a single platform.

Around two people are required to deploy and maintain the product.

What was our ROI?

The value or the benefits derived from the use of the product revolve around the fact that it is a reliable tool. Though it may come across as a complex product, its customers can rely on its efficiency.

What's my experience with pricing, setup cost, and licensing?

The product's license is easy to procure.

What other advice do I have?

I am aware of CyberArk's PAM part and CyberArk Identity.

I find the solution to be more effective since it is better than its competitors. The brand value offered by the product is very good.

There are no application control capabilities offered by the tool, but I know that enforcing privilege access control is pretty fast.

The product is reliable and stable. The solution's brand value is good. The solution is better than the products offered by its competitors.

My company is aware of the fact that CyberArk offers integration with other security tools in the market, but we have not dealt with such a complex implementation yet.

I rate the tool an eight out of ten.

Disclosure: My company has a business relationship with this vendor other than being a customer: Partner
PeerSpot user
Omar_Jaimes - PeerSpot reviewer
Cybersecurity Architecture Manager at Data Warden
Real User
Easy to deploy and great for blacklisting and whitelisting
Pros and Cons
  • "Users can scale the solution."
  • "It is hard to deal with technical support if you are not certified."

What is our primary use case?

Inside we have a lot of applications, including three or four critical applications. With this application, remote users cannot run another application if you do not grant access to these applications. For example, if you want users to use Word or PowerPoint, you can allow usage of those and block usage of other things. If you want to run one application and you need to get permission, you send a ticket to ask for authorization to use it. That way, the company can control the access of every user.

What is most valuable?

I like that we have the power to blacklist, whitelist, and greylist applications.

It is really easy to deploy.

The solution is mostly stable. 

Users can scale the solution. 

What needs improvement?

We'd like the solution to work with AIX operating systems and custom distributions like Linux. 

We would prefer increased stability.

It is hard to deal with technical support if you are not certified. 

For how long have I used the solution?

I've been using the solution for one year.

What do I think about the stability of the solution?

More or less, the solution is stable. About three weeks ago, we witnessed latency with the solution. It could be a bit more stable. 

What do I think about the scalability of the solution?

If you want to deploy some agents, you can buy more licenses for the solution. It's a service only. You can add another agent. With ease and scale as you like.

We have about 100 users on the product right now.  

At this time, we will not increase usage. 

How are customer service and support?

If you do not have certification, you cannot send a ticket. This makes dealing with technical support difficult. 

Which solution did I use previously and why did I switch?

I did not previously use a different solution. 

How was the initial setup?

You can implement this product on-premise. With the next-generation versions, you can just download an agent and deploy it on your machines. It really is easy to deploy.

We have three people on staff that are capable of managing the solution as needed. 

What about the implementation team?

We had a consultant assist us with the implementation process. 

What was our ROI?

We have seen an ROI of around $10,000 so far.

What's my experience with pricing, setup cost, and licensing?

We pay about $17 per user.

Which other solutions did I evaluate?

I'm not aware of any other similar solutions and did not evaluate any others. 

What other advice do I have?

This is a SaaS solution. 

If you don't have a solution that you can deploy a massive agent to, it isn't easy to implement individually. 

I'd rate the solution nine out of ten.

Disclosure: I am a real user, and this review is based on my own experience and opinions.
PeerSpot user
Kaspars Vasilevskis - PeerSpot reviewer
Security Delivery Associate Manager at Accenture
Real User
Top 5
Offers integrated solutions and expands its capabilities through strategic acquisitions
Pros and Cons
  • "What sets CyberArk apart is its continuous innovation, staying ahead of the competition."
  • "CyberArk Endpoint Privilege Manager can be better by making its UI more consistent."

What is most valuable?

What sets CyberArk apart is its continuous innovation, staying ahead of the competition. It not only offers integrated solutions but also expands its capabilities through strategic acquisitions.

What needs improvement?

In terms of improvement, CyberArk Endpoint Privilege Manager can be better by making its UI more consistent. Right now, there is a mix of a new, user-friendly look and an older interface with some functions. This mix can confuse users and affect how smoothly everything works together. Making the interface more uniform would make things easier and more efficient for everyone.

For how long have I used the solution?

I have been using CyberArk Endpoint Privilege Manager for almost five years.

What do I think about the stability of the solution?

I would rate the stability of the solution as a nine out of ten.

What do I think about the scalability of the solution?

The solution is highly scalable. I would rate the scalability as a nine out of ten.

How are customer service and support?

I would give CyberArk's tech support a nine out of ten. They have made it so only certified experts can raise support tickets, ensuring that the person seeking help knows the product. This often leads to quicker problem-solving. While I haven't needed support much, others say CyberArk is responsive, even handling custom requests overnight in some cases. Overall, their support is solid.

How would you rate customer service and support?

Positive

How was the initial setup?

Setting up CyberArk Endpoint Privilege Manager was challenging for me due to the involvement of multiple components. The process required a good understanding of each component and its configuration. It is not a straightforward setup, and familiarity with the system is crucial to ensure everything is correctly configured. I would rate the easiness of the initial setup as a six out of ten. The deployment of CyberArk Endpoint Privilege Manager takes about a day. It is not as quick as some Linux, which can be up and running in just a couple of hours. CyberArk's deployment is more complex due to the various components that need to be set up and validated to ensure they work together seamlessly. Once the deployment is complete, you can then proceed with tasks like account onboarding.

What was our ROI?

The investment in CyberArk is worthwhile. It significantly elevates security measures, reducing the vulnerability to breaches.

What's my experience with pricing, setup cost, and licensing?

CyberArk is mostly used by big companies, especially in finance and banking. It is not really for small businesses because the investment is quite large. I have seen cases where substantial discounts were given, but that is usually for big enterprises. CyberArk has extra costs for professional services on top of the standard fee. These services are a bit pricey, and unlike some competitors, CyberArk doesn't focus heavily on them. While helpful, be prepared for an additional expense if you opt for these services. I would give it an eight out of ten in terms of costliness.

What other advice do I have?

Overall, I would rate CyberArk Endpoint Privilege Manager as an eight out of ten.

Disclosure: My company has a business relationship with this vendor other than being a customer: Partner
PeerSpot user
S Azeem - PeerSpot reviewer
Technology Manager at a computer software company with 201-500 employees
Real User
Top 5Leaderboard
The solution allows me to easily grant privileges and access to users
Pros and Cons
  • "The solution allows me to give access and privileges to each user individually"
  • "CyberArk has some performance issues. For example, servers could not handle the solution when we first took CyberArk Endpoint Privilege Manager."

What is our primary use case?

We use the solution for cyber security to block unwanted things and ensure endpoint security. We also use the solution to collect user analytics.

What is most valuable?

Based on a customer's requirements, the solution allows me to give access and privileges to each user individually. CyberArk also allows granular blocking permissions.

CyberArk has better features than other vendors' products, such as a password vault.

What needs improvement?

CyberArk has some performance issues. For example, servers could not handle the solution when we first took CyberArk Endpoint Privilege Manager.

But to solve the problem, I first examine why the services take so much time to install. After that, I look at where we start the services. After that, if we need any patches there, I'll contact CyberArk.

It would be good if, based on an analysis of the user behavior from the logs we collect, we can see if a user has been accessing some other things. We need better reporting tools for those use cases.

For how long have I used the solution?

I have worked with this solution for three years.

How are customer service and support?

CyberArk's technical support is great. They immediately give support to everybody.

How would you rate customer service and support?

Positive

Which solution did I use previously and why did I switch?

I've used Arcon User Behavior Analytics. And with endpoint security, we have used ManageEngine Endpoint Security. CyberArk's advantage over its competitors is its granular access. You can give specific access.

However, we work with all the solutions and provide one or the other based on what the customer requires. We will make a POC accordingly.

How was the initial setup?

The solution's implementation process is a bit complex compared to other products. But every product has some challenges based on the customer's environment. However, we don't face any challenges because we understand the customer's environment and assess the scope of work.

As for difficulties we face while deploying CyberArk PAM, sometimes the agent won't install on the client's server. But if I report that to CyberArk, they give the required patches, and the solution works fine.

The time we take to deploy CyberArk PAM is based on the number of endpoints. If we have about 200 users, it takes two or three weeks to deploy.

What about the implementation team?

We usually need two or three people to deploy the solution. One will be L2, and the other will be L1.

What's my experience with pricing, setup cost, and licensing?

The solution's pricing is reasonable compared to other vendors' products.

What other advice do I have?

I rate CyberArk Endpoint Privilege Manager an eight out of ten.

Disclosure: My company has a business relationship with this vendor other than being a customer: Partner
PeerSpot user
Karthik Raja - PeerSpot reviewer
Co-Founder at Unique Performance Techsoft Pvt Ltd
Reseller
Top 10
Useful for privilege management and threat detection
Pros and Cons
  • "The biggest benefit of CyberArk EPM for our customers is control over privileged access for endpoints. Endpoints are often the starting point for attackers to enter and move within a network. CyberArk EPM bridges the gap between security and operations teams. Operations teams are happy because work isn't stopped due to admin rights issues, while security teams are satisfied that full admin rights aren't given to all users."
  • "My recommendation for improvement is to add functionality for when users request access to an application. There's a pop-up UI, but it's not very customizable. I suggest creating a UI where we can write scripts or use SDKs to enhance it. This could automatically create tickets in a system like ServiceNow when users request an application. If a manager approves, we could automatically push policies to those users."

What is our primary use case?

Our customers mainly use CyberArk EPM to remove admin privileges from end-user systems, especially for developers and IT people who need admin rights on their desktops. It resolves this issue by only giving admin rights for specific use cases and applications rather than full admin rights for the whole system. This keeps users happy while maintaining security.

Additionally, the tool provides insight into what software users use, has threat detection mechanisms to prevent credential harvesting, and offers proactive monitoring.

The main industries using CyberArk EPM are IT-enabled services and software development companies—mostly technology companies where users typically need full admin rights. The manufacturing and banking industries already tend to have more controlled environments, so they use them less.

What is most valuable?

The biggest benefit of CyberArk EPM for our customers is control over privileged access for endpoints. Endpoints are often the starting point for attackers to enter and move within a network. CyberArk EPM bridges the gap between security and operations teams. Operations teams are happy because work isn't stopped due to admin rights issues, while security teams are satisfied that full admin rights aren't given to all users.

The threat detection capability impacts security posture. Many web browsers and WinSCP applications can save passwords, but not always securely. Attackers could potentially tamper with and harvest these credentials. CyberArk EPM protects against this by continuously monitoring and blocking access attempts to these stored credentials, such as those in browser caches. This prevents malware or attackers from accessing these vulnerable credential stores.

What needs improvement?

My recommendation for improvement is to add functionality for when users request access to an application. There's a pop-up UI, but it's not very customizable. I suggest creating a UI where we can write scripts or use SDKs to enhance it. This could automatically create tickets in a system like ServiceNow when users request an application. If a manager approves, we could automatically push policies to those users.

What do I think about the stability of the solution?

CyberArk EPM is very stable stability-wise. Though the network is unavailable, policies still work from the offline cache. The agent uses a small memory footprint and doesn't crash much. I'd rate stability as eight out of ten.

What do I think about the scalability of the solution?

I'd also rate the solution an eight out of ten for scalability. Because it is cloud-based, customers don't have to worry about capacity.

How are customer service and support?

It's difficult to get support, especially for issues affecting only one or two users. CyberArk support mainly focuses on priority one tickets, which affect all users. Support needs improvement in terms of easier access and quality. Generating and uploading logs takes a lot of time, and the process moves through different levels in the organization.

How would you rate customer service and support?

Neutral

How was the initial setup?

There are challenges during the implementation of CyberArk EPM. It's a phased process. First, we install the agent on all endpoint computers. Then, we monitor what applications users use and which request admin rights. The tool generates reports on this. We work with the security team to create policies based on these reports. These policies define which applications users can have elevated admin rights and which ones to block. We then push these policies to the users. New application requests come in over time. The main challenge isn't the product itself but working with multiple teams. We need to understand different kinds of software and end-user systems to create the right policies. So, the hardest part is coordinating with various teams.

Setting up the solution is very easy. It's cloud-based, so it's already set up in the cloud. Customers need to buy licenses and use them. I'd rate the setup difficulty as eight out of ten, with ten being easy.

What's my experience with pricing, setup cost, and licensing?

The tool's pricing is reasonable for customers.

What other advice do I have?

I advise those who want to use CyberArk EPM to get a good consultant. They need to analyze their environment and generate reports. There should be many whiteboarding sessions and discussions to develop steps for policy creation. A lot of paperwork needs to be done before starting to use it. Overall, I'd rate CyberArk EPM as nine out of ten. It's a very good product.

Disclosure: My company has a business relationship with this vendor other than being a customer:
Flag as inappropriate
PeerSpot user
Buyer's Guide
Download our free CyberArk Endpoint Privilege Manager Report and get advice and tips from experienced pros sharing their opinions.
Updated: February 2025
Buyer's Guide
Download our free CyberArk Endpoint Privilege Manager Report and get advice and tips from experienced pros sharing their opinions.