CyberArk Consultant at a tech services company with 11-50 employees
Reseller
Top 20
2024-02-26T15:50:02Z
Feb 26, 2024
CyberArk Endpoint Privilege Manager (EPM) 's most valuable feature is its ability to manage user application privileges and protect against ransomware attacks by controlling access to specific files and applications.
The feature called PTA, which stands for Privileged Threat Analytics keeps track of what admins are doing and works with Centimeters. If something fishy is going on with a user's credentials, it alerts the security team so they can act fast. Plus, it automates stuff like resetting credentials or blocking users. So, if there's a potential hack, CyberArk can change passwords and lock out users in a snap. It also gives you a heads-up if anything unusual is going on with server activities, like someone creating new users with uncontrolled credentials.
Learn what your peers think about CyberArk Endpoint Privilege Manager. Get advice and tips from experienced pros sharing their opinions. Updated: November 2024.
Senior Consultant at a consultancy with 51-200 employees
Consultant
2022-11-11T16:18:13Z
Nov 11, 2022
The most valuable features of CyberArk Endpoint Privilege Manager are password management, session management, onboarding rules, platform customization, and safety management.
IT Security Service Specialist at a manufacturing company with 10,001+ employees
Real User
2021-06-30T14:37:14Z
Jun 30, 2021
I like that you can remove the admin rights from the user's computer and have control over the environment. That means you can delete the local admins and grant them proper privileges with the console. So, they will get proper permissions for applications they need, but we don't have to do it. In the domain where we don't have control, the user can only do specified actions, but not all of them.
Enterprise Cyber Security Advisor at a energy/utilities company with 5,001-10,000 employees
Real User
2019-12-15T09:11:00Z
Dec 15, 2019
It has drastically reduced the attack surface for local administrative rights and the chance of escalation of privilege. We've removed, at this point, close to 98 percent of the local administrative accounts on workstations. If there were an incident, it would stop at that point and we'd be able to know.
CyberArk Endpoint Privilege Manager, a critical and foundational endpoint control addresses the underlying weaknesses of endpoint defenses against a privileged attacker and helps enterprises defend against these attacks through removing local admin rights, enforcing least privilege, and implementing foundational endpoint security controls across all Windows, macOS and Linux endpoints from hybrid to cloud environments.
Click here for a free 30 day trial: CyberArk Endpoint Privilege...
The most valuable feature of the solution is its performance.
CyberArk Endpoint Privilege Manager (EPM) 's most valuable feature is its ability to manage user application privileges and protect against ransomware attacks by controlling access to specific files and applications.
The feature called PTA, which stands for Privileged Threat Analytics keeps track of what admins are doing and works with Centimeters. If something fishy is going on with a user's credentials, it alerts the security team so they can act fast. Plus, it automates stuff like resetting credentials or blocking users. So, if there's a potential hack, CyberArk can change passwords and lock out users in a snap. It also gives you a heads-up if anything unusual is going on with server activities, like someone creating new users with uncontrolled credentials.
What sets CyberArk apart is its continuous innovation, staying ahead of the competition.
The solution allows me to give access and privileges to each user individually
We were able to reduce the number of privileged accounts by 50%, which helped to simplify our privileged access management environment.
The solution's technical support is good.
I am impressed with the product's seamless integration. The PAM wallet and enterprise password wallet are good also good.
We can do both server and endpoint protection.
The solution is scalable.
CyberArk Endpoint Privilege Manager is very easy to manage, which I like.
The solution also has a dashboard where you can see which software is suspicious, which I find valuable.
The most valuable features of CyberArk Endpoint Privilege Manager are password management, session management, onboarding rules, platform customization, and safety management.
It offers great performance.
The most valuable feature of CyberArk Endpoint Privilege Manager is its ability to reset passwords every time that it is needed or periodically.
The most valuable feature is that their database is completely encrypted and protected with multiple layers.
I like that you can remove the admin rights from the user's computer and have control over the environment. That means you can delete the local admins and grant them proper privileges with the console. So, they will get proper permissions for applications they need, but we don't have to do it. In the domain where we don't have control, the user can only do specified actions, but not all of them.
The department management aspect of the solution is the most valuable aspect.
The most valuable feature is that it does lifecycle management and that it will change to whatever the end target is.
It has drastically reduced the attack surface for local administrative rights and the chance of escalation of privilege. We've removed, at this point, close to 98 percent of the local administrative accounts on workstations. If there were an incident, it would stop at that point and we'd be able to know.
Monitoring and recording are valuable features, particularly the recording.
This is the number one product for privilege account security.