We performed a comparison between CyberArk Endpoint Privilege Manager and ManageEngine PAM360 based on real PeerSpot user reviews.
Find out in this report how the two Privileged Access Management (PAM) solutions compare in terms of features, pricing, service and support, easy of deployment, and ROI."I like that you can remove the admin rights from the user's computer and have control over the environment. That means you can delete the local admins and grant them proper privileges with the console. So, they will get proper permissions for applications they need, but we don't have to do it. In the domain where we don't have control, the user can only do specified actions, but not all of them."
"I am impressed with the product's seamless integration. The PAM wallet and enterprise password wallet are good also good."
"This is the number one product for privilege account security."
"The password rotation and the session recording are the most valuable features."
"Users can scale the solution."
"The solution allows me to give access and privileges to each user individually"
"The product is very flexible"
"The most valuable features of CyberArk Endpoint Privilege Manager are password management, session management, onboarding rules, platform customization, and safety management."
"Deployment is very quick, and only a one-time installation process is required for ManageEngine PAM360."
"We can use it remotely as well."
"They need much better integration with Azure AD."
"CyberArk Endpoint Privilege Manager is not suitable for the current situation because when you compare it to OTP, OTP is the strongest password solution. You can use it as a one-time password, but you have to log into the password manager itself and if you don't change your password, it will be the weakest link in the security. In OTP, you don't have that weakest link."
"The turnaround time of the support team is an area of concern where improvements are required."
"The tool should be more user-friendly."
"CyberArk Endpoint Privilege Manager is a perfect solution, but CyberArk Endpoint Privilege Manager for Linux has many issues. Another area for improvement in CyberArk Endpoint Privilege Manager, specifically for Windows, is that there's no way for you to check credential theft from a text file, such as a notepad file."
"For an experienced system implementer it will take approximately one day. However, for somebody who is inexperienced it may take up to five days."
"The price of the product is an area of concern where improvements are required. The product's price should be made more flexible."
"CyberArk is a pretty heavy solution."
"If you want a cost effective solution and very competitive pricing, you should go with this product."
"I would rate the scalability at five out of ten. It's average."
"I don't see any features associated with multi-factor authentication in ManageEngine PAM360."
"There could be improvement in latency and accessing resources for the product."
More CyberArk Endpoint Privilege Manager Pricing and Cost Advice →
CyberArk Endpoint Privilege Manager is ranked 6th in Privileged Access Management (PAM) with 28 reviews while ManageEngine PAM360 is ranked 16th in Privileged Access Management (PAM) with 3 reviews. CyberArk Endpoint Privilege Manager is rated 8.2, while ManageEngine PAM360 is rated 6.0. The top reviewer of CyberArk Endpoint Privilege Manager writes "Offers integrated solutions and expands its capabilities through strategic acquisitions". On the other hand, the top reviewer of ManageEngine PAM360 writes " An easy-to-deploy and affordable tool for access control monitoring". CyberArk Endpoint Privilege Manager is most compared with BeyondTrust Endpoint Privilege Management, Microsoft Defender for Endpoint, CrowdStrike Falcon, CyberArk Privileged Access Manager and Tanium, whereas ManageEngine PAM360 is most compared with CyberArk Privileged Access Manager, Delinea Secret Server, ARCON Privileged Access Management and WALLIX Bastion. See our CyberArk Endpoint Privilege Manager vs. ManageEngine PAM360 report.
See our list of best Privileged Access Management (PAM) vendors.
We monitor all Privileged Access Management (PAM) reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.