Find out what your peers are saying about Palo Alto Networks, CyberArk, Cisco and others in Advanced Threat Protection.
278,683 professionals have used our research since 2012.
Find out what your peers are saying about Palo Alto Networks, CyberArk, Cisco and others in Advanced Threat Protection.
278,683 professionals have used our research since 2012.
Chart Key
Average Rating
Average rating based on reviews
Views
Number of total page views
Comparisons
Number of times compared to another product
Reviews
Total number of reviews on IT Central Station
Followers
Number of followers on IT Central Station
The total ranking of a product, represented by the bar length, is based on a weighted aggregate score. The score is calculated as follows: The product with the highest count in each area gets the highest available score. (20 points for Reviews; 16 points for Views, Comparisons, and Followers.) Every other product gets assigned points based on its total in proportion to the #1 product in that area. For example, if a product has 80% of the number of reviews compared to the product with the most reviews then the product's score for reviews would be 20% (weighting factor) * 80% = 16. For Average Rating, the maximum score is 32 points awarded linearly based on our rating scale of 1-10. If a product has fewer than ten reviews, the point contribution for Average Rating is reduced (one-third reduction in points for products with 5-9 reviews; two-thirds reduction for products with fewer than five reviews). Reviews that are more than 24 months old, as well as those written by resellers, are completely excluded from the ranking algorithm.

Best Advanced Threat Protection Solutions

Read reviews of Advanced Threat Protection that are trending in the IT Central Station community:
Your trust is our top concern, so companies can't alter or remove reviews.
Real User
Support Engineer & IT Professional at SISAP
Mar 26 2018

What is most valuable?

The granularity which is used to confirm applications based in users. When you have VMware NSX, it is easy to deploy this virtual firewall because it is fully integrated with the VM solution. If I want to segment any type of network inside... more»

How has it helped my organization?

When talking about the VM or the virtual firewall, it is mostly about the sessioncapacities that it can handle. In the early version of the firewall, the session or traffic that it could inspect was low. In quite a few releases, they have... more»

What needs improvement?

The reporting. There are various reports that come with the box or with VMware, but you can only run them daily. If you want to generate a report from this week or the past month, you have to create a custom report. It is not that difficult,... more»
Real User
Consultant at a tech company with 1,001-5,000 employees
Sep 25 2016

What is most valuable?

I think that one of the advantages of the CyberArk PAS suite is that it is modular. On top of the basics, you can implement modules to: * Manage (verify, change and reset) privileged passwords and SSH keys * Manage (isolate and monitor)... more»

How has it helped my organization?

I see companies that already have thought about their privileged accounts, while others have not? And so on. Thinking about these things helps customers to organize their data/privilege accounts in the CyberArk solution. It then helps the... more»

What needs improvement?

With every version, I can see that the product wins on functionality and user experience. On the latter though, I hear from customers that on the UI level, things could be better. CyberArk continuously asks for feedback on the product (e.g.,... more»
Find out what your peers are saying about Palo Alto Networks, CyberArk, Cisco and others in Advanced Threat Protection.
278,683 professionals have used our research since 2012.
Real User
Security Expert at SecurIT
Sep 13 2016

What is most valuable?

As a security engineer, I mostly implement the Enterprise Password Vault Suite (Vault Server, Central Policy Manager, Password Vault Web Access) as this is the base upon which every additional component is built. I am using and implementing... more»

How has it helped my organization?

When implementing CyberArk, I see that a lot of security issues are addressed by the solution. For example, audit issues for privileged (non-personal) accounts, which have a sufficient amount of impact on the organization when being... more»

What needs improvement?

In every product, there is room for improvement. Within CyberArk, I would like to see more support for personal accounts. It can be done right now, but I can imagine changing a few aspects would make this easier and more foolproof. Next to... more»
Consultant
Cyber Security Consultant at a tech services company with 1,001-5,000 employees
Feb 14 2017

What is most valuable?

* Client-less feature * Flexible architecture support * High level of customization for maximize utilization * User friendly and Flexibility of multiple choice * Adhere to Security Compliance

How has it helped my organization?

This tool is in Leader's quadrant in Gartner Quadrant report. Not just because it has more features than other but also it improves the way organization function. CyberArk can be used as many as you can think of. Such Granular ways of... more»

What needs improvement?

Since this tool major utilizing modules are PAM and PSM, hence AIM and OPM are least considered by client. Client is somehow reluctant to use these features. Yes, i do agree that these Modules are not that friendly but also CyberArk do not... more»
Real User
Technical Lead Infrastructure at a healthcare company with 201-500 employees
Feb 05 2018

What is most valuable?

Threat management. That is very important, obviously. There has been a lot of press about hacking, virus vulnerabilities, the cron bug, etc. It is very important that we detect these as soon as it happens, so we can implement measures before... more»

How has it helped my organization?

We now have a lot more details about what our users are doing on the network. Whereas before, we did not know certain things they were accessing, websites they were going to, and what vulnerabilities were potentially being introduced into our... more»

What needs improvement?

The interface, maybe. It is all Java-based and I would prefer an HTML5 interface. It would make things a bit quicker. It is not that it is really bad once you are in, it is just another Java-based application that is not amazing. I am not... more»
Real User
Information Security Advisor at a insurance company with 1,001-5,000 employees
Sep 25 2016

What is most valuable?

Account discovery, account rotation, and account management features make it a well-rounded application. Account discovery allows for auto-detection to search for new accounts in a specific environment such as an LDAP domain. This allows... more»

How has it helped my organization?

In the past, standard practice was to assign role-based rights to standard accounts. Moving away from this structure allows us to require that all heightened access accounts be “checked out” and only operate within a set window. CyberArk... more»

What needs improvement?

Like any software, improvements and upgrades are a necessity. As CyberArk is used by many Fortune 100 and Global 2000 companies, they offer custom solutions that need to be continuously improved as the company changes. I am looking forward to... more»
Consultant
IT Security Consultant at a tech services company with 1,001-5,000 employees
Sep 11 2016

What is most valuable?

Every feature of this product - Password Management, Session Management and so on has its own value depending on different use cases, but I like: * It's a clientless product and does not require any third-party product for any of its... more»

How has it helped my organization?

Due to regular growth of an organization infrastructure, managing passwords within the organization becomes extremely difficult. In larger organizations with a large user and infrastructure base, it can be very difficult to ensure that the... more»

What needs improvement?

CyberArk has evolved a lot in the last 16 years and has nearly all the features required for effective operation. The only area for improvement is using a native client while connecting to the target device instead of the current method of... more»
enSilo
Real User
CISO at a financial services firm with 201-500 employees
Sep 17 2017

What is most valuable?

NGAV and EDR features are outstanding.

How has it helped my organization?

We saw Lockey very early on and caught it via behavioral signatures on the traditional AV. We already had parts of the payload downloaded because the traditional AV behavioral signatures were not blocking everything. We had removed the... more»

What needs improvement?

The engineering team continues to add useful features, like the ability to search for files and hashes across the environment. At the moment, I am very happy with the product. Not a deal killer, but making the portal mobile friendly would be... more»
Real User
Direct Sales Director at a tech services company with 501-1,000 employees
May 11 2017

What is most valuable?

Full packet capture: A must in an SOC Possibility to investigate incidents based on logs and raw packets, such as extracting files sent over the network Built-in Incident Management module for small security/SOC teams Advanced correlation... more»

How has it helped my organization?

We can monitor all traffic to/from our company. It is possible to track end user behaviour. With RSA NetWitness Endpoint, we are able to monitor not only the network, but also what’s happening on endpoints, i.e., behaviour analytics for... more»

What needs improvement?

Integration with external tools should be built-in, such as an external sandbox for files. We can import data using external feeds, using STIX or CVS files. The REST API is poor The system architecture is complex and sometimes it’s hard to... more»
Real User
System Engineer at a tech consulting company with 501-1,000 employees
Mar 12 2018

What is most valuable?

* Its strong intelligence is the feature that I like the most. * A solid operating system with all the necessary data center security features. * Easy to manage.

How has it helped my organization?

I am an integrator. Palo Alto Networks has improved my position in the cyber security market here in Paraguay. It is easy to sell. Basically, I just need to implement the demo and the program starts itself. So, it has improved our position in... more»

What needs improvement?

When you have a client compare box against box, a lot of times Palo Alto is a bit more expensive, but its network firewalls have a very rich ratio.
Real User
Systems Admin Analyst 3 at CPS Energy
May 16 2018

What is most valuable?

The Password Upload Utility tool makes it easier when setting up a Safe that contains multiple accounts and has cut down the amount of time that it takes to complete the task. Using the PSMP to connect to a privileged target without having to... more»

How has it helped my organization?

By using this product, it has placed a new culture in my company by making employees more aware of IT compliance and cyber security. It has also placed us in a position to meet NERC CIP v6 requirements.

What needs improvement?

I would like to see a product enhancement with the Secure Connect feature. Today, there is no functionality to create "Accounts" using Secure Connect to permanently store a user's working tab. It is a tedious manual process of entering host... more»
Real User
Head of Technical Services at a tech services company with 51-200 employees
Jun 07 2017

What is most valuable?

* The ability to isolate sessions to protect the target system. * Automates password management to remove the human chain weakness. * Creates a full audit chain to ensure privilege management is responsibly done * Creates an environment in... more»

How has it helped my organization?

With the ability to better control access to systems and privileged accounts, we no longer need to manage privilege accounts per user. We are able to manage privilege accounts for the service, which is automatically managed by the CPM as part... more»

What needs improvement?

The web interface has come a long way, but the PrivateArk client seems clunky and not intuitive. It could use an update to be brought up to speed with the usability of PVWA. Whilst the client is completely functional, it's been around for a... more»
Real User
Founder & CEO at a tech services company with 11-50 employees
May 24 2017

What is most valuable?

RSA NetWitness is a SIEM and real-time network traffic solution. It collects logs/packets and applies a set of alerting, reporting and analysis rules on them. Thus, it provides the enterprise with a full visibility of the networks and... more»

How has it helped my organization?

As mentioned elsewhere, this product provides full visibility for the activities in the networks and systems. For example, it provides detection of the attacks in early stages (brute-force attacks), by which the attackers try to gain access... more»

What needs improvement?

* Out-of-the-box alerts and investigation rules * Health monitoring of the event sources and devices * Threat intelligence for data accuracy
Consultant
CyberArk Consultant at a comms service provider with 10,001+ employees
Jun 14 2017

What is most valuable?

The password management component (CPM) is the most valuable. This enables companies to automate password management on target systems gaining a more secure access management approach. Another major component is the PSM, which enables session... more»

How has it helped my organization?

Implementing CyberArk is not only "rolling out" a tool. It also will force the company to have a good look at the access management strategy, improve security processes and clean data. Implementation of CyberArk will increase the insight the... more»

What needs improvement?

Allthough it's highly configurable, the user interface could use a do-over. The current interface doesn't scale that well, has some screens still in the old layout, while others are in the new ones and consistency in layout between pages... more»
Real User
Technical Director at Unique Performance Techsoft Pvt Ltd
May 23 2018

What is most valuable?

* Ability to provide native experience for users to login to privilege accounts. They do not need to go through a portal to access servers and accounts. * Agentless solution which is easy to customise to any platform having network... more»

How has it helped my organization?

* Automatic password management, which will automatically change passwords based on compliance requirements. * DVR like video recording and text-based recording for easier audits. * Easily scan the network for all privilege accounts and has... more»

What needs improvement?

This product needs professional consulting services to onboard accounts effectively based user profiles.
Consultant
ACD - Level 3 Analyst at a tech services company with 10,001+ employees
Aug 28 2017

What is most valuable?

* Packet Solution: Allows analyst proactive hunting and alerting on daily sophisticated APTs. * Broker service: Aggregate multiple concentrator devices deployed in various sites which accelerates analyst’s duties. * Archiver – Does log... more»

How has it helped my organization?

Reliable in terms of no data loss. Plays a huge role in device health checks (Event Source Monitor). Provides FSEs relevant information prior to end user problem solutions (if data sources are integrated and parsed properly).

What needs improvement?

Advance monitoring and alerting feature is not stable (Event Stream Analysis). Does not allow certain use cases running parallel. The reporting module: If only their dashboards resembled anything you would see on any BI reporting tools.
Real User
Senior Executive Information Security at a manufacturing company with 1,001-5,000 employees
Aug 17 2016

What is most valuable?

* Password management and accountability for Privileged accounts * Identify, protect and monitor the usage of Privileged accounts * Record and control privileged sessions on critical systems i.e. Windows, Unix, DBs * Application credentials... more»

How has it helped my organization?

Privileged accounts represent the largest security vulnerability an organization faces today. Most organisations are not aware of the total number of privilege accounts. Compromising privilege accounts leads to various breaches. With this... more»

What needs improvement?

Integration of this tool with SAML is a problem, as there is a bug. We’d like to be able to integrate AWS accounts in CyberArk.
Consultant
Security Technical Consultant at a tech services company with 1,001-5,000 employees
Sep 19 2016

What is most valuable?

The ability to create custom connector components is the most valuable feature of the product. Once the organisation matures in their privileged access strategy, CyberArk’s customisation capability allows you to target application-level... more»

How has it helped my organization?

It has improved our organization by being able to consolidate several privileged access technologies into a unified tool. Session recording and auditing capability, and approval workflows allow a high degree of control over the organisation’s... more»

What needs improvement?

* Authentication to the solution: Authentication to the PVWA utilises integration to IIS. Therefore, it is not as strong as desired. * Reporting capability and customisation: Reporting utilises predefined templates with limited customisation... more»
Real User
Technical Manager, System Division at a tech services company with 501-1,000 employees
Aug 31 2016

What is most valuable?

With the Privileged Session Manager, we can monitor sessions in real time and terminate the session if there's any unnecessary activity found. For example: We give access to user to access the server only to update patches, but if we find any... more»

How has it helped my organization?

Actually my company/previous company does not use this product, but we sold it to our customer. This product helped our customer manage their privileged accounts. It’s easier to them to manage and control the privileged accounts.

What needs improvement?

It needs more plugin connectors for all devices. CyberArk currently can manage or make it easier to manage about 80% of our total devices. The rest still need R&D to develop the plugin. If CyberArk had more plugin connectors, the customer... more»
Real User
Technology Architect at a renewables & environment company with 51-200 employees
Feb 22 2017

What do you think of CyberArk Privileged Account Security?

Valuable Features EPV: Enterprise Password Vault PSM: Privileged Session Manager AIM: Application Identity Manager The latest version of the product is mature and there is more functionality than we need. • Improvements to My Organization Improved security Reduced the overhead to protect enterprise data from delays Receives logs about all activities Compliance with several standards • Use of Solution I’m not the end-user. As a solutions architect (consultant), I designed and planned the solution in a very complex network environment. • Stability Issues We have not encountered any stability issues. After more than six years with my first CyberArk client, everything works great. • Scalability Issues We have not encountered any scalability issues. The solution was...
Find out what your peers are saying about Palo Alto Networks, CyberArk, Cisco and others in Advanced Threat Protection.
278,683 professionals have used our research since 2012.

Advanced Threat Protection Articles

Content and Community Manager
IT Central Station
What do users say about their their security information and event management (SIEM) tools? What added value do SIEM tools give security professionals and network engineers?  Are users satisfied with the advanced threat protection capabilities? Do the log management features meet their... more»
Satheesh PanickerLogRhythm is missing in the list
332
Senior Information Security Consultant
Expertise in developing Web Based Application, Database Applications and Desktop Applications Working experience in distributed environment and distributed applications Expertise in ISA Configuration, Network Security include:· Penetration Testing· Stress... more>>
6,767

3
TOP 5POPULAR
ITSM & AntiFraud Consultant
After an experience of 7 years in the IT gaming field, the next period was filled with a lot of new informations and oportunities of developement. Working for a leading system integrator and provider of IT services, has many advantages as access to new technologies, and the ability to learn new... more>>
Reviewed McAfee Complete Endpoint Protection: If a client needs new components, ePO helps them to...
115
CyberArk PAS Solution Professional | Project Manager
An experienced professional with expertise in CyberArk PAS suite solution implementation, Project Management, Infrastructure Technologies and Enterprise Security Solutions. CyberArk PAS v7.2, v8.2 and v9.7 -Application / Solution Design -Implementation Security Solutions: -Identity... more>>
Reviewed CyberArk Privileged Account Security: Provides automatic password management. We can...
19
CyberArk Consultant
LinkTo ►► yuqaili@hotmail.com ◄◄ All invitations to connect on LinkedIn are welcome - LION - 7K+ Never I D K Mohammad is a seasoned IT Security Professional with 10+ years of hands on IT experience, He has actively worked on multiple IT Security & Infrastructure Projects for major... more>>
Reviewed CyberArk Privileged Account Security: Helped us to identify, store, protect, and monitor...
9
Global Privilege Access Management Technical Architect
CyberArk Privilege Access Management Architect
Reviewed CyberArk Privileged Account Security: All access to our servers, by both staff and...
19
Senior Consultant - Information Security Engineering
CISSP with 15+ years of enterprise-level experience in Information Security and Identity & Access Management, specializing in Directory Services, Provisioning, Single Sign-on technologies, RBAC, Access Governance, Privileged Identity Management (certified in CyberArk), File Integrity... more>>
Reviewed CyberArk Privileged Account Security: Can provide transparent connection to targeted...
36
TOP 10
Security Consultant
Very Interesting, innovating and love to find 5000 different ways to do one thing.
327
IT Security Consultant
Information Technology and IT Security professional with 7.6 year experience in planning, solution designing implementation/deployment of Privileged Identity management, Security Support and Operations, Process implementation and documentations, LDAP Directories, Privilege Single Sign-On (PSSO),... more>>
Reviewed CyberArk Privileged Account Security: It is clientless, and does not require any...
1,923
POPULAR
Presales Technical Consultant
Throughout my work experience, I developed self-learning skills. Having to support the technical documentation and working tools such as firewall, IPS, network switches, vmware, I have managed to acquire knowledge for its management, whether for project recommendation and implementation and... more>>
Reviewed Palo Alto Networks WildFire: The way that the product process or handle the...
281
Cyber Security Consultant
Have 5 years of diverse experience in compliance, consulting, security tool implementation, configuration, IT Security and operations. Creative professional, proficient in prioritizing and completing tasks in a timely manner, yet flexible to multitask when necessary. Customer focused with diverse... more>>
Reviewed CyberArk Privileged Account Security: I can customize it to meet our customers'...
147
Senior Consultant
KEY STRENGHS • Proficiency in business process mapping, requirement study, client interaction for finalizing requirements and defining functional specifications for application implementation • An effective communicator with relationship management and problem solving skills • Ability to... more>>
Reviewed CyberArk Privileged Account Security: The combination of CPM and PSM resolves a lot of use...

Sign Up with Email