We performed a comparison between CyberArk Endpoint Privilege Manager and CylancePROTECT based on real PeerSpot user reviews.
Find out in this report how the two Privileged Access Management (PAM) solutions compare in terms of features, pricing, service and support, easy of deployment, and ROI."It offers great performance."
"The solution's technical support is good."
"The most valuable feature of CyberArk Endpoint Privilege Manager is its high performance, it's the best identity security platform. The security is good. It's easy to showcase the feature and capabilities and compare it with other competitors. It competes well with other solutions. Additionally, it is a complete solution."
"The password rotation and the session recording are the most valuable features."
"The most valuable features of CyberArk Endpoint Privilege Manager are password management, session management, onboarding rules, platform customization, and safety management."
"It has drastically reduced the attack surface for local administrative rights and the chance of escalation of privilege. We've removed, at this point, close to 98 percent of the local administrative accounts on workstations. If there were an incident, it would stop at that point and we'd be able to know."
"This is the number one product for privilege account security."
"We were able to reduce the number of privileged accounts by 50%, which helped to simplify our privileged access management environment."
"CylancePROTECT is very stable - we've had no issues with performance and no errors or bugs."
"I find the actual overall endpoint malware protection the most valuable feature of CylancePROTECT."
"The solution is easy to deploy."
"It actively monitors the behavior and activity of processes and will, without hesitation, terminate at root anything it determines to be suspect."
"Endpoints are protected in real-time without the need of a centralized server."
"The most valuable features of CylancePROTECT are its powerful machine-learning capabilities and predictive intelligence."
"What I like best about CylancePROTECT is its accuracy, as it doesn't give many false positives."
"It is a good endpoint solution. It is very easy to manage and detect the threat immediately. It will take the necessary actions."
"CyberArk is a pretty heavy solution."
"We have had some major issues with the tool, but we have worked with the R&D teams and we have worked with support. There is room for improvement, especially on response times. But they're working on it and they're doing the best they can."
"The solution's pricing could be better."
"CyberArk meets clients' need very spot-on. It covers everything customers ask for. As for improvements, honestly, the feedback's been really positive. I haven't heard any specific areas that need work."
"They need much better integration with Azure AD."
"It is hard to deal with technical support if you are not certified."
"Performance could be better. We have a couple of problems with CyberArk right now. One of the problems is performance in our environment. Support also takes a long time to respond. If the user already has local admin rights, then I can't collect any events in the console from this device. There are also some options in CyberArk that are not working properly, and are not helpful in this case. I can't collect any information to create a proper policy for the device. I have to investigate everything manually, or even disable the local admin from the device. I can collect the events only after this, and it's very time consuming. In my case, it's a waste of resources."
"CyberArk Endpoint Privilege Manager is not suitable for the current situation because when you compare it to OTP, OTP is the strongest password solution. You can use it as a one-time password, but you have to log into the password manager itself and if you don't change your password, it will be the weakest link in the security. In OTP, you don't have that weakest link."
"The solution should implement AI in the product."
"The product needs to continue to offer better alerts. In particular, around false positives. It needs to reduce them from happening."
"Having worked with SentinelOne, Cylance is good, however, it probably needs to add a feature similar to SentinelOne's rollback functionality. With this feature, if you get infected, with a click, you can go back to the pre-infection state. If Cylance could add this functionality to their offering as well, that would be ideal."
"I'd like them to do software distribution too, but they said that that's architecturally not at the product line."
"I would like to see a better UI in terms of sifting through more specific data and providing analytics. A little bit more would be nice."
"It should provide more details about the events that they have detected."
"The price for this EPP platform is expensive and could be improved."
"The solution’s technical support could be improved."
More CyberArk Endpoint Privilege Manager Pricing and Cost Advice →
CyberArk Endpoint Privilege Manager is ranked 6th in Privileged Access Management (PAM) with 28 reviews while CylancePROTECT is ranked 23rd in Endpoint Protection Platform (EPP) with 40 reviews. CyberArk Endpoint Privilege Manager is rated 8.2, while CylancePROTECT is rated 8.0. The top reviewer of CyberArk Endpoint Privilege Manager writes "Offers integrated solutions and expands its capabilities through strategic acquisitions". On the other hand, the top reviewer of CylancePROTECT writes "Ensures advanced AI-driven threat detection to provide robust endpoint security, effectively preventing both known and unknown threats with minimal impact on system performance". CyberArk Endpoint Privilege Manager is most compared with BeyondTrust Endpoint Privilege Management, Microsoft Defender for Endpoint, CrowdStrike Falcon, CyberArk Privileged Access Manager and Tanium, whereas CylancePROTECT is most compared with Microsoft Defender for Endpoint, CrowdStrike Falcon, SentinelOne Singularity Complete, Cortex XDR by Palo Alto Networks and VMware Carbon Black Endpoint. See our CyberArk Endpoint Privilege Manager vs. CylancePROTECT report.
We monitor all Privileged Access Management (PAM) reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.