We performed a comparison between CyberArk Privileged Access Manager and Microsoft Enterprise Mobility + Security based on real PeerSpot user reviews.
Find out what your peers are saying about CyberArk, Delinea, BeyondTrust and others in Privileged Access Management (PAM)."The biggest feature is the security of the overall solution. It's very secure. The vaulting technology and the number of security layers involved in the vault, where privileged accounts are actually stored, is the heart of the solution."
"The solution is scalable."
"All the features of CyberArk are useful for me, but the biggest one is that CyberArk has logs for all the features. That is important when there is a problem. You know where to look and you have the information. In cyber security, the most important aspect is information."
"It is useful for protecting passwords. If you need to do access security management, you can first use the CyberArk console, and after that, you can connect the firewall interface or firewall command line. Similarly, if you need to do an RDP session, you need to first log in to CyberArk before connecting to the Windows RDP session. This way, the admin doesn't know the password, and that password is changed immediately. To change the password, you first discover the old password in the network, and after that, you can change the password."
"What I found most valuable in CyberArk Privileged Access Manager is the Session Manager as it allows you to split the connection between the administrator site and the target site. I also found the Password Manager valuable as it lets you rotate the passwords of privileged users."
"CyberArk has resulted in a massive increase in our security footprint."
"The product has allowed us to improve both the management and access to privileged credentials, while also creating a full audit trail of all activities happening within isolated sessions of all tasks and activities taking place within the solution."
"It's secure and reliable. I especially appreciate that it's locked down and only allows access to authorized components."
"The solution offers excellent documentation that is easily available online."
"You can scale the solution up or down by department."
"The product is a unified solution and you don't require to purchase tools from different vendors. The system analyzes behavior and activity and takes steps for protection."
"A good feature that is present is MAM or Mobile Application Management. We can deploy this feature on the device, which is not managed by the organization. If I apply some security configuration on a personal device, the user would be really disappointed. What we do instead is that we give all access to the applications related to corporate and ask the users to use the application. We secure the application by putting the security features on the applications and not on the users' devices. This way, the users are happy, and we also meet our company's compliance standards. Then, everyone is happy."
"The product is centralized and we can use it for security purposes."
"The solution is very good at securing files. For example, if I forward a secure document, it's blocked from others, as I can send it with restrictions in relation to who can open it."
"Microsoft Mobility and EMS include Intune for Mobility, which provides mobile device management and mobile application management. With mobile device management, you can control the entire device in an organization."
"It is a stable solution...It is a scalable solution."
"The current interface is not very intuitive."
"The solution could improve by adding more connectors."
"Report creation could be improved. The policies could be more customized."
"Its pricing is a big challenge here. When it started, the product came in at a very low cost. Now, they are the leaders in the market, so the cost has grown and is quite huge."
"Stability is a huge concern right now. We are on a version which is very unstable. We have to upgrade to stabilize it. It is fine, but the problem is we have to hire CyberArk to do the upgrade. This costs money, and it is their bug."
"I'd like to see a more expansive SSH tunneling situation through PSMP. Right now you have an account that exists in the vault and you say, "I want to create a tunnel using this account." I'd like to see something that is not account-based where I could say, "I want to create a tunnel to this machine over here," and then authenticate through the PSMP and then your tunnel is set up. You wouldn't need to then authenticate to a machine."
"I would like to see is the policy export and import. When we expend, we do not want to just hand do a policy."
"It is web-based, but other competitors have apps. We need to get there. It is just smoother to have an app. You don't have all the bugs from having a browser, and people like them better, since you can get to them via mobile."
"Technical support could be improved. Sometimes they use a third party that's not so knowledgeable in the product and that can slow down things a bit."
"Its performance needs enhancement."
"The licensing is quite expensive."
"The licensing can be messy at times."
"The MDM part of the engine could be better."
"Microsoft's feature management is based on licenses. Microsoft follows ethical licensing and hence do not restrict the use of it."
"The auditing and reporting could be updated and upgraded. I would like to see light applications because they consume a lot of the device's memory at present."
"Microsoft Enterprise Mobility + Security is expensive."
More CyberArk Privileged Access Manager Pricing and Cost Advice →
More Microsoft Enterprise Mobility + Security Pricing and Cost Advice →
CyberArk Privileged Access Manager is ranked 1st in Privileged Access Management (PAM) with 144 reviews while Microsoft Enterprise Mobility + Security is ranked 10th in Enterprise Mobility Management (EMM) with 10 reviews. CyberArk Privileged Access Manager is rated 8.8, while Microsoft Enterprise Mobility + Security is rated 8.4. The top reviewer of CyberArk Privileged Access Manager writes "Lets you ensure relevant, compliant access in good time and with an audit trail, yet lacks clarity on MITRE ATT&CK". On the other hand, the top reviewer of Microsoft Enterprise Mobility + Security writes "Seamless integration and easy implementation ". CyberArk Privileged Access Manager is most compared with Cisco ISE (Identity Services Engine), Microsoft Entra ID, Delinea Secret Server, WALLIX Bastion and One Identity Safeguard, whereas Microsoft Enterprise Mobility + Security is most compared with Cisco ISE (Identity Services Engine), Microsoft Intune, ManageEngine Endpoint Central and Cisco Meraki Systems Manager (MDM+EMM).
We monitor all Privileged Access Management (PAM) reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.