We performed a comparison between CyberArk Endpoint Privilege Manager and Intercept X Endpoint based on real PeerSpot user reviews.
Find out in this report how the two Privileged Access Management (PAM) solutions compare in terms of features, pricing, service and support, easy of deployment, and ROI."It offers great performance."
"Users can scale the solution."
"We were able to reduce the number of privileged accounts by 50%, which helped to simplify our privileged access management environment."
"The most valuable feature of the solution is its performance."
"It has drastically reduced the attack surface for local administrative rights and the chance of escalation of privilege. We've removed, at this point, close to 98 percent of the local administrative accounts on workstations. If there were an incident, it would stop at that point and we'd be able to know."
"The product is very flexible"
"The most valuable feature is that their database is completely encrypted and protected with multiple layers."
"I am impressed with the product's seamless integration. The PAM wallet and enterprise password wallet are good also good."
"All of the features are very important for anyone who is supporting a large number of computers."
"The most effective features of Intercept X Endpoint for threat prevention are ransomware protection, miscellaneous behavior detection, and network threat protection."
"The product efficiently prevents data leakages."
"I find the security heartbeat feature with synchronized security very useful. It's a very nice feature that allows you to basically switch off an endpoint. When an endpoint has got a virus or something like that, or it's infected or compromised, you can isolate it from the network, but only if you've got an XG Firewall as well. It also provides ease of use. It is the only antivirus that can recognize 25 out of the 36 ransomware and virus techniques that have been often used in terms of the behavior base using heuristics. It's beautiful, utterly amazing. No other antivirus can do that."
"The most valuable feature of Sophos Intercept X is cloud management."
"This solution can be used with any device, mobiles, desktops, or any appliances."
"This product integrates well with Sophos firewalls and should be seriously considered by Sophos Firewall clients."
"It is a stable solution. Stability-wise, I rate the solution a ten out of ten."
"CyberArk Endpoint Privilege Manager can be better by making its UI more consistent."
"It's an old product and has many areas that can be improved."
"It cannot be on-prem. It is only cloud-based. Sometimes, that's a restriction in terms of usage."
"The price of the solution should improve."
"The product needs a streamlined user interface; improvements to the user interface can enhance user experience and make the solution more intuitive to navigate."
"CyberArk Endpoint Privilege Manager is a perfect solution, but CyberArk Endpoint Privilege Manager for Linux has many issues. Another area for improvement in CyberArk Endpoint Privilege Manager, specifically for Windows, is that there's no way for you to check credential theft from a text file, such as a notepad file."
"The product's threat protection and defense capabilities need enhancement."
"Can be improved by allowing computers to be excluded from policies."
"To be a perfect product, the price would have to be a bit better."
"There are not any solutions that are a 10 out of 10. A 10 would be perfect protection with no impact on the performance of the device. This is not the case, there is some impact on the performance of the device."
"They might want to offer an MSP model for licensing, to offer the solution as a software as a service."
"It would be beneficial if you could expand support for Windows 7 and Windows Server 2008 without charging an additional fee."
"The initial setup was not very user-friendly."
"The detection and the AI capabilities should be improved upon."
"The problem is that if you have a lot of different components going on, each managed under a different umbrella, then you're going to be spending a lot of time hopping back and forth between the different components to see, "Well, I got hit here. What did my firewall see? I got hit in the firewall, the firewall says it allowed that attack in, did it land on anything to compromise any of my endpoints?""
"When there is an event generated by either the firewall or Intercept X, and the originating IP address is the same, these should be merged into a single event rather than two."
More CyberArk Endpoint Privilege Manager Pricing and Cost Advice →
CyberArk Endpoint Privilege Manager is ranked 6th in Privileged Access Management (PAM) with 28 reviews while Intercept X Endpoint is ranked 7th in Endpoint Protection Platform (EPP) with 101 reviews. CyberArk Endpoint Privilege Manager is rated 8.2, while Intercept X Endpoint is rated 8.4. The top reviewer of CyberArk Endpoint Privilege Manager writes "Offers integrated solutions and expands its capabilities through strategic acquisitions". On the other hand, the top reviewer of Intercept X Endpoint writes "A standard offering with good threat analysis but reduces machine performance". CyberArk Endpoint Privilege Manager is most compared with Microsoft Defender for Endpoint, BeyondTrust Endpoint Privilege Management, CrowdStrike Falcon, CyberArk Privileged Access Manager and Tanium, whereas Intercept X Endpoint is most compared with Microsoft Defender for Endpoint, CrowdStrike Falcon, Kaspersky Endpoint Security for Business, SentinelOne Singularity Complete and Fortinet FortiClient. See our CyberArk Endpoint Privilege Manager vs. Intercept X Endpoint report.
We monitor all Privileged Access Management (PAM) reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.