The most valuable feature is that their database is completely encrypted and protected with multiple layers.
Manager at Happiest Minds Technologies
Secure database with distributed architecture
Pros and Cons
- "The most valuable feature is that their database is completely encrypted and protected with multiple layers."
- "Compared to other tools like Linux, this solution isn't as user-friendly."
What is most valuable?
What needs improvement?
Compared to other tools like Linux, this solution isn't as user-friendly. In the next release, CyberArk should add integration with PAM tools, blacklisting and whitelisting for applications, and adaptive MFA.
For how long have I used the solution?
I've been working with this solution for five years.
What do I think about the stability of the solution?
CyberArk is stable, but upgrading or patching requires a lot of downtime.
Buyer's Guide
CyberArk Endpoint Privilege Manager
December 2024
Learn what your peers think about CyberArk Endpoint Privilege Manager. Get advice and tips from experienced pros sharing their opinions. Updated: December 2024.
824,067 professionals have used our research since 2012.
What do I think about the scalability of the solution?
CyberArk is scalable - we can fit it to different environments from small to large because it has been designed in a distributed way.
How are customer service and support?
The technical support is quite good, but we have had issues with logs filling up and not always getting accurate resolutions.
How was the initial setup?
This initial setup is complex even for small organizations and requires at least five to six days to complete, more for bigger organizations.
What's my experience with pricing, setup cost, and licensing?
The cost for CyberArk is very high.
What other advice do I have?
I would give this solution a rating of eight out of ten.
Disclosure: My company has a business relationship with this vendor other than being a customer:
Professional Services Manager at PT Korelasi Persada Indonesia
Useful password reset, suitable for large enterprises, and stable
Pros and Cons
- "The most valuable feature of CyberArk Endpoint Privilege Manager is its ability to reset passwords every time that it is needed or periodically."
- "CyberArk Endpoint Privilege Manager is not suitable for the current situation because when you compare it to OTP, OTP is the strongest password solution. You can use it as a one-time password, but you have to log into the password manager itself and if you don't change your password, it will be the weakest link in the security. In OTP, you don't have that weakest link."
What is our primary use case?
CyberArk Endpoint Privilege Manager is used for compliance with password policies.
What is most valuable?
The most valuable feature of CyberArk Endpoint Privilege Manager is its ability to reset passwords every time that it is needed or periodically.
What needs improvement?
CyberArk Endpoint Privilege Manager is not suitable for the current situation because when you compare it to OTP, OTP is the strongest password solution. You can use it as a one-time password, but you have to log into the password manager itself and if you don't change your password, it will be the weakest link in the security. In OTP, you don't have that weakest link.
For how long have I used the solution?
I have been using CyberArk Endpoint Privilege Manager for approximately five years.
What do I think about the stability of the solution?
CyberArk Endpoint Privilege Manager is stable.
What do I think about the scalability of the solution?
The scalability of CyberArk Endpoint Privilege Manager is good. The capacity is not in high demand in the resources. When you set up a new server, you can use it for approximately 5,000 users of devices. When you buy the largest system, then you don't have to scale it anymore.
Best suited for medium to large enterprises.
How are customer service and support?
I have not used the support from CyberArk Endpoint Privilege Manager.
How was the initial setup?
The initial setup of CyberArk Endpoint Privilege Manager is straightforward.
What's my experience with pricing, setup cost, and licensing?
The price of CyberArk Endpoint Privilege Manager is expensive.
What other advice do I have?
My advice to others is that CyberArk Endpoint Privilege Manager is not for small to medium enterprises. It is best suited for medium to large enterprises because it is not cheap. When you want to implement the password manager and your CyberArk Endpoint Privilege Manager, you have to know what you are doing and what kind of a policy you want to implement in detail, otherwise, you will have no leverage in using the solution.
I rate CyberArk Endpoint Privilege Manager a nine out of ten.
Disclosure: My company has a business relationship with this vendor other than being a customer: Partner
Buyer's Guide
CyberArk Endpoint Privilege Manager
December 2024
Learn what your peers think about CyberArk Endpoint Privilege Manager. Get advice and tips from experienced pros sharing their opinions. Updated: December 2024.
824,067 professionals have used our research since 2012.
Channel Sales Manager at Cyber Knight Technologies FZ LLC
A solid enterprise product with good PAM vault
Pros and Cons
- "I am impressed with the product's seamless integration. The PAM wallet and enterprise password wallet are good also good."
- "The tool should be more user-friendly."
What is our primary use case?
We use the solution as a Privilege Access Manager to manage user's passwords.
What is most valuable?
I am impressed with the product's seamless integration. The PAM wallet and enterprise password wallet are good also good.
What needs improvement?
The tool should be more user-friendly.
For how long have I used the solution?
I have been using the product for one year.
What do I think about the stability of the solution?
The solution is stable.I would rate it an eight out of ten.
What do I think about the scalability of the solution?
The product is scalable. I would rate it an eight out of ten. There are about 35 users for the solution in my company. The users are mostly sales managers.
How are customer service and support?
The product's technical support is only average. They need to improve their response time.
How would you rate customer service and support?
Neutral
Which solution did I use previously and why did I switch?
I have used ARCON before. It is not as user-friendly compared to CyberArk. CyberArk has got more visibility compared to ARCON.
How was the initial setup?
The product's setup was complex. I would rate its setup a seven out of ten. The tool's architecture is difficult. The product's deployment takes one to two months to complete.
What's my experience with pricing, setup cost, and licensing?
The tool is priced high. I would rate its pricing an eight out of ten.
What other advice do I have?
I would rate the product an eight out of ten. The tool's performance is good. It is an enterprise product.
Disclosure: My company has a business relationship with this vendor other than being a customer:
Regional Product Manager at a tech services company with 501-1,000 employees
Has an easy initial setup process, but it could be more affordable
Pros and Cons
- "The solution's technical support is good."
- "The solution's pricing could be better."
What needs improvement?
The solution's pricing could be better.
For how long have I used the solution?
I have been working with the solution for about six years.
How are customer service and support?
The solution's technical support is good. We have a team of qualified and certified support engineers.
How was the initial setup?
The solution's initial setup process is straightforward.
What's my experience with pricing, setup cost, and licensing?
It is an expensive solution.
What other advice do I have?
I rate the solution a seven out of ten.
Disclosure: My company has a business relationship with this vendor other than being a customer: Distributor
Product Consultant at M.Tech
High performance levels, reliable, and secure
Pros and Cons
- "The most valuable feature of CyberArk Endpoint Privilege Manager is its high performance, it's the best identity security platform. The security is good. It's easy to showcase the feature and capabilities and compare it with other competitors. It competes well with other solutions. Additionally, it is a complete solution."
- "The solution can be complex to use at times."
What is our primary use case?
There are a lot of companies that have servers that want to monitor their members if they do something that violates their policy.
What is most valuable?
The most valuable feature of CyberArk Endpoint Privilege Manager is its high performance, it's the best identity security platform. The security is good. It's easy to showcase the feature and capabilities and compare it with other competitors. It competes well with other solutions. Additionally, it is a complete solution.
What needs improvement?
The solution can be complex to use at times.
CyberArk Endpoint Privilege Manager has a lot of integrated APIs. Some of them are outdated and could be improved.
For how long have I used the solution?
I have been using CyberArk Endpoint Privilege Manager for approximately one year.
What do I think about the stability of the solution?
I rate the stability of CyberArk Endpoint Privilege Manager a seven out of ten.
What do I think about the scalability of the solution?
I rate the scalability of CyberArk Endpoint Privilege Manager a seven out of ten.
How are customer service and support?
The support from CyberArk Endpoint Privilege Manager is good.
How was the initial setup?
The initial setup of CyberArk Endpoint Privilege Manager can be complex. It took approximately six hours to complete the installation.
I rate the initial setup of CyberArk Endpoint Privilege Manager a seven out of ten.
What's my experience with pricing, setup cost, and licensing?
The solution requires an annual license to use it. There can be some extra costs in some cases.
What other advice do I have?
I would recommend this solution to others.
I rate CyberArk Endpoint Privilege Manager a nine out of ten.
Disclosure: My company has a business relationship with this vendor other than being a customer: Reseller
Tech Support at a tech services company with 11-50 employees
DNS Scanning allows for the reporting of account location information
Pros and Cons
- "This is the number one product for privilege account security."
- "For an experienced system implementer it will take approximately one day. However, for somebody who is inexperienced it may take up to five days."
What is our primary use case?
Our primary use case for this solution is to manage enterprise passwords and monitor session connections.
How has it helped my organization?
Prior to using this solution, we did not know where our accounts were being created. The DNS scanning is a very good tool that allows us to manage existing accounts.
What is most valuable?
While I find all of the features valuable, one of them that stands out is the DNS scanning. This provides information with respect to the locations of accounts that are created. We then get an overview of the location information.
What needs improvement?
What I would really like to see improved is the AIM (Application Identity Manager). I think that it could be simpler to use, and much more straight forward.
In terms of additional features, I cannot think of any that I would like to see implemented at the moment.
For how long have I used the solution?
Three to five years.
What do I think about the stability of the solution?
I find the product to be very stable.
What do I think about the scalability of the solution?
This product is very, very scalable. Currently we have about one hundred users, and we have plans to increase the usage.
How are customer service and technical support?
I found the technical support to be good. They are always available and ready to answer questions and provide support.
Which solution did I use previously and why did I switch?
No, beyond evaluating other solutions we did not use a different one.
How was the initial setup?
I found the initial setup to be quite complex. You really have to pay attention to detail during the process, because any mistake will render the installation and setup useless.
For an experienced system implementer it will take approximately one day. However, for somebody who is inexperienced it may take up to five days.
Once the deployment is complete, no staff is required for maintaining the solution. Everything is pretty much straight forward.
What about the implementation team?
We take care of the implementation for our customers.
What was our ROI?
We have indeed seen a return on investment with this solution. I cannot put a monetary value on it, but it is valuable information that we are protecting. If it were to be leaked then it would result in damage to reputation, as well as a loss in confidence.
What's my experience with pricing, setup cost, and licensing?
As I am the technical contact for this product, I do not have direct knowledge of the pricing. However, I can say that the licensing for this solution is based on the number of APV (privileged users), and the number of sessions that you want to record.
Which other solutions did I evaluate?
Yes, we evaluated three other products before choosing this one. They were Security from CA, BeyondTrust, and ObserveIT.
What other advice do I have?
This is the number one product for privilege account security.
I suggest getting the best help available when it comes time to implement and deploy this solution. Once this is complete, everything else will fall into place.
I would rate this product eight out of ten. It is very good, but there is always room for improvement.
Disclosure: I am a real user, and this review is based on my own experience and opinions.
Information Security Senior Engineer at a tech vendor with 10,001+ employees
It identifies the original source, and all instances of malicious applications in the environment.
Valuable Features
It has removed the need for the local admin.
Improvements to My Organization
It identifies the original source, and all instances of malicious applications in the environment.
Room for Improvement
Some technical admins create crazy rules, which allow the staff to run anything they want. Currently I'm reviewing our Viewfinity rules and I have noticed different kinds of rules, such as permitting any installation from "download folder." I would suggest that Viewfinity add a new feature which refuses these rules.
Use of Solution
I've used it for four years.
Deployment Issues
There have been no issues with the deployment.
Stability Issues
There have been no issues with its stability.
Scalability Issues
There have been no issues with the scalability.
Customer Service and Technical Support
Customer Service:
9/10
Technical Support:8/10
Initial Setup
It was complex to introduction the product to the end-users and the technical team.
ROI
We have better product management, review, and the training of our admins.
Other Solutions Considered
We're comparing Viewfinity to Bit9.
Other Advice
Keep the product managed by specialists and create global rules.
Disclosure: I am a real user, and this review is based on my own experience and opinions.
Buyer's Guide
Download our free CyberArk Endpoint Privilege Manager Report and get advice and tips from experienced pros
sharing their opinions.
Updated: December 2024
Product Categories
Privileged Access Management (PAM) Endpoint Compliance Anti-Malware Tools Application Control Ransomware ProtectionPopular Comparisons
CyberArk Privileged Access Manager
Delinea Secret Server
BeyondTrust Endpoint Privilege Management
WALLIX Bastion
One Identity Safeguard
ManageEngine PAM360
Buyer's Guide
Download our free CyberArk Endpoint Privilege Manager Report and get advice and tips from experienced pros
sharing their opinions.
Quick Links
Learn More: Questions:
- When evaluating Privileged Identity Management, what aspect do you think is the most important to look for?
- Which is the best Privileged Account Management solution?
- What are the top 5 PAM solutions that can be implemented which cover both hybrid and cloud?
- What are the top 5 PAM solutions?
- How will AI and ML help or work with PIM/PAM?
- Is BeyondTrust Endpoint Privilege Management really expensive compared to other tools or software?
- What is the difference between PAM and PAS?
- What is the difference between IDAM , PIM and PAM?
- Which PAM tool do you prefer: CyberArk Privileged Access Manager, One Identity Safeguard, Delinea Secret Server, or BeyondTrust Privileged Remote A
- What is the best approach to limiting privileges for administrators?
Thank you for the review!