We performed a comparison between CyberArk Privileged Access Manager and Palo Alto Networks WildFire based on real PeerSpot user reviews.
Find out in this report how the two Privileged Access Management (PAM) solutions compare in terms of features, pricing, service and support, easy of deployment, and ROI."Its' quite stable."
"The solution is scalable."
"The fact that I can put my vault here in a central location on one net for example, and I'll have a CPM in California, a CPM in Texas, a CPM in New York, a CPM in Florida, and actually be able to grow with my company and not necessarily have to continue to grow my vault until I get to a certain number accounts - yet I can still manage everything across the country, if not the world - I love that. I love the flexibility and the capability of being able to pull those components out."
"Automatic password management, which will automatically change passwords based on compliance requirements."
"Rather than multiple tools for maintaining regulatory compliance around passwords and privileged accounts, we have centralized as much as possible with CyberArk. This is now a one stop shop for end users to access their elevated credentials."
"We found the initial setup to be easy."
"Password rotation is the most valuable feature"
"The product is for hardening access and making the organization more secure, therefore reducing chances of a breach."
"The most valuable feature of this solution is how it keeps up-to-date with viruses."
"It is stable and pretty much scalable."
"With this product, we receive the best monitoring and reports."
"The analysis is very fast."
"A good tool for file scanning and email threat detection, especially when it comes to attachments and communications."
"Scalable ATP solution that's quick to set up. It demonstrates good performance and stability."
"It has a user-friendly interface."
"It catches modified signatures of known viruses."
"What could be improved in CyberArk Privileged Access Manager is the licensing model. It should be more flexible in terms of the users. Currently, it's based on the number of users, but many users only log in once in four months or once in five months. It would be great if the licensing model could be modified based on user needs. We even have users who have not logged in even once."
"One of our current issues is a publishing issue. If we whitelist Google Chrome, all the events of Google Chrome should be gone. It is not happening."
"I'd like to see a more expansive SSH tunneling situation through PSMP. Right now you have an account that exists in the vault and you say, "I want to create a tunnel using this account." I'd like to see something that is not account-based where I could say, "I want to create a tunnel to this machine over here," and then authenticate through the PSMP and then your tunnel is set up. You wouldn't need to then authenticate to a machine."
"I would like easier integrations for creating an online dashboard that executives would look at or are able to run reports from the tool."
"There is a learning curve when it comes to planning out the deployment strategy, but once it is defined, it runs itself."
"Initially, there was a lot of hiccups, because there were a lot of transitions due to manual installations."
"CyberArk has to continue to evolve with that threat landscape to make sure that they're still protecting those credentials that are owned by those that have privileged accounts in the firms."
"Their post-sale support area requires a big improvement. Customers cannot automate tickets directly with CyberArk. They have to come through the distributor or bring in partners who have access to the support portal. Basically, the support for post-sales implementation is there, but the role of CyberArk is very minimal. Customers have to rely on partners, which sometimes creates issues. Some of the vendors help you during the implementation process, but the CyberArk support team does not do that. They have 24/7 support for our region, but they help only if there is an emergency or there is a problem with their system. If the password vault is down or the system is down, they provide immediate attention. For almost everything else, they take more time to respond. They give low priority to service-related or migration-related questions."
"High availability features are lacking."
"Palo Alto Networks WildFire could improve by adding support for manual submission of suspicious files and URLs. Additionally, it would be an advantage to add rule-based analysis. Currently, it uses only static and AI. We need to be able to analyze archive files."
"The data analytical system for deployment needs to improve."
"I don't think it needs to improve anything, except maybe the speed to deploy the changes."
"As a firewall and 360 degrees of security, there needs to be more maturity."
"Our main concern is that everything has to be synced with the WildFire Cloud and has to be checked through the subscription."
"The technical support response needs improvement."
"The cost of this solution could still be improved, in particular, giving product discounts for charitable causes."
More CyberArk Privileged Access Manager Pricing and Cost Advice →
CyberArk Privileged Access Manager is ranked 1st in Privileged Access Management (PAM) with 144 reviews while Palo Alto Networks WildFire is ranked 3rd in Advanced Threat Protection (ATP) with 58 reviews. CyberArk Privileged Access Manager is rated 8.8, while Palo Alto Networks WildFire is rated 8.4. The top reviewer of CyberArk Privileged Access Manager writes "Lets you ensure relevant, compliant access in good time and with an audit trail, yet lacks clarity on MITRE ATT&CK". On the other hand, the top reviewer of Palo Alto Networks WildFire writes "Good technical support and provides automatic analysis that saves us time in filtering email". CyberArk Privileged Access Manager is most compared with Cisco ISE (Identity Services Engine), Microsoft Entra ID, Delinea Secret Server, WALLIX Bastion and One Identity Safeguard, whereas Palo Alto Networks WildFire is most compared with Cisco Secure Firewall, Fortinet FortiGate, Juniper SRX Series Firewall and Proofpoint Email Protection. See our CyberArk Privileged Access Manager vs. Palo Alto Networks WildFire report.
We monitor all Privileged Access Management (PAM) reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.