To help you compare the best advanced threat protection solutions, IT Central Station ranked them based on hundreds of real user reviews from our esteemed community of enterprise technology professionals. You'll find comparisons of pricing, performance, features, stability and many other criteria. Read below to find out what your peers have to say about top advanced threat protection vendors such as Palo Alto Networks, CyberArk, FireEye, RSA and others.
The total ranking of a product, represented by the bar length, is based on a weighted aggregate score.
The score is calculated as follows: The product with the highest count in each area gets the highest available score.
(20 points for Reviews; 16 points for Views, Comparisons, and Followers.)
Every other product gets assigned points based on its total in proportion to the #1 product in
that area. For example, if a product has 80% of the number of reviews compared to the product
with the most reviews then the product's score for reviews would be 20% (weighting factor) *
80% = 16. For Average Rating, the maximum score is 32 points awarded linearly based on our
rating scale of 1-10. If a product has fewer than ten reviews, the point contribution
for Average Rating is reduced (one-third reduction in points for products with 5-9 reviews;
two-thirds reduction for products with fewer than five reviews). Reviews that are more than 24 months old,
as well as those written by resellers, are completely excluded from the ranking algorithm.
The granularity which is used to confirm applications based in users. When you have VMware NSX, it is easy to deploy this virtual firewall because it is fully integrated with the VM solution. If I want to segment any type of network inside... more»
When talking about the VM or the virtual firewall, it is mostly about the sessioncapacities that it can handle. In the early version of the firewall, the session or traffic that it could inspect was low. In quite a few releases, they have... more»
The reporting. There are various reports that come with the box or with VMware, but you can only run them daily. If you want to generate a report from this week or the past month, you have to create a custom report. It is not that difficult,... more»
I think that one of the advantages of the CyberArk PAS suite is that it is modular. On top of the basics, you can implement modules to: * Manage (verify, change and reset) privileged passwords and SSH keys * Manage (isolate and monitor)... more»
I see companies that already have thought about their privileged accounts, while others have not? And so on. Thinking about these things helps customers to organize their data/privilege accounts in the CyberArk solution. It then helps the... more»
With every version, I can see that the product wins on functionality and user experience. On the latter though, I hear from customers that on the UI level, things could be better. CyberArk continuously asks for feedback on the product (e.g.,... more»
As a security engineer, I mostly implement the Enterprise Password Vault Suite (Vault Server, Central Policy Manager, Password Vault Web Access) as this is the base upon which every additional component is built. I am using and implementing... more»
When implementing CyberArk, I see that a lot of security issues are addressed by the solution. For example, audit issues for privileged (non-personal) accounts, which have a sufficient amount of impact on the organization when being... more»
In every product, there is room for improvement. Within CyberArk, I would like to see more support for personal accounts. It can be done right now, but I can imagine changing a few aspects would make this easier and more foolproof. Next to... more»
This tool is in Leader's quadrant in Gartner Quadrant report. Not just because it has more features than other but also it improves the way organization function. CyberArk can be used as many as you can think of. Such Granular ways of... more»
Since this tool major utilizing modules are PAM and PSM, hence AIM and OPM are least considered by client. Client is somehow reluctant to use these features. Yes, i do agree that these Modules are not that friendly but also CyberArk do not... more»
Threat management. That is very important, obviously. There has been a lot of press about hacking, virus vulnerabilities, the cron bug, etc. It is very important that we detect these as soon as it happens, so we can implement measures before... more»
We now have a lot more details about what our users are doing on the network. Whereas before, we did not know certain things they were accessing, websites they were going to, and what vulnerabilities were potentially being introduced into our... more»
The interface, maybe. It is all Java-based and I would prefer an HTML5 interface. It would make things a bit quicker. It is not that it is really bad once you are in, it is just another Java-based application that is not amazing. I am not... more»
Account discovery, account rotation, and account management features make it a well-rounded application. Account discovery allows for auto-detection to search for new accounts in a specific environment such as an LDAP domain. This allows... more»
In the past, standard practice was to assign role-based rights to standard accounts. Moving away from this structure allows us to require that all heightened access accounts be “checked out” and only operate within a set window. CyberArk... more»
Like any software, improvements and upgrades are a necessity. As CyberArk is used by many Fortune 100 and Global 2000 companies, they offer custom solutions that need to be continuously improved as the company changes. I am looking forward to... more»
Every feature of this product - Password Management, Session Management and so on has its own value depending on different use cases, but I like: * It's a clientless product and does not require any third-party product for any of its... more»
Due to regular growth of an organization infrastructure, managing passwords within the organization becomes extremely difficult. In larger organizations with a large user and infrastructure base, it can be very difficult to ensure that the... more»
CyberArk has evolved a lot in the last 16 years and has nearly all the features required for effective operation. The only area for improvement is using a native client while connecting to the target device instead of the current method of... more»
We saw Lockey very early on and caught it via behavioral signatures on the traditional AV. We already had parts of the payload downloaded because the traditional AV behavioral signatures were not blocking everything. We had removed the... more»
The engineering team continues to add useful features, like the ability to search for files and hashes across the environment. At the moment, I am very happy with the product. Not a deal killer, but making the portal mobile friendly would be... more»
Full packet capture: A must in an SOC Possibility to investigate incidents based on logs and raw packets, such as extracting files sent over the network Built-in Incident Management module for small security/SOC teams Advanced correlation... more»
We can monitor all traffic to/from our company. It is possible to track end user behaviour. With RSA NetWitness Endpoint, we are able to monitor not only the network, but also what’s happening on endpoints, i.e., behaviour analytics for... more»
Integration with external tools should be built-in, such as an external sandbox for files. We can import data using external feeds, using STIX or CVS files. The REST API is poor The system architecture is complex and sometimes it’s hard to... more»
I am an integrator. Palo Alto Networks has improved my position in the cyber security market here in Paraguay. It is easy to sell. Basically, I just need to implement the demo and the program starts itself. So, it has improved our position in... more»
The Password Upload Utility tool makes it easier when setting up a Safe that contains multiple accounts and has cut down the amount of time that it takes to complete the task. Using the PSMP to connect to a privileged target without having to... more»
By using this product, it has placed a new culture in my company by making employees more aware of IT compliance and cyber security. It has also placed us in a position to meet NERC CIP v6 requirements.
I would like to see a product enhancement with the Secure Connect feature. Today, there is no functionality to create "Accounts" using Secure Connect to permanently store a user's working tab. It is a tedious manual process of entering host... more»
* The ability to isolate sessions to protect the target system. * Automates password management to remove the human chain weakness. * Creates a full audit chain to ensure privilege management is responsibly done * Creates an environment in... more»
With the ability to better control access to systems and privileged accounts, we no longer need to manage privilege accounts per user. We are able to manage privilege accounts for the service, which is automatically managed by the CPM as part... more»
The web interface has come a long way, but the PrivateArk client seems clunky and not intuitive. It could use an update to be brought up to speed with the usability of PVWA. Whilst the client is completely functional, it's been around for a... more»
RSA NetWitness is a SIEM and real-time network traffic solution. It collects logs/packets and applies a set of alerting, reporting and analysis rules on them. Thus, it provides the enterprise with a full visibility of the networks and... more»
As mentioned elsewhere, this product provides full visibility for the activities in the networks and systems. For example, it provides detection of the attacks in early stages (brute-force attacks), by which the attackers try to gain access... more»
The password management component (CPM) is the most valuable. This enables companies to automate password management on target systems gaining a more secure access management approach. Another major component is the PSM, which enables session... more»
Implementing CyberArk is not only "rolling out" a tool. It also will force the company to have a good look at the access management strategy, improve security processes and clean data. Implementation of CyberArk will increase the insight the... more»
Allthough it's highly configurable, the user interface could use a do-over. The current interface doesn't scale that well, has some screens still in the old layout, while others are in the new ones and consistency in layout between pages... more»
* Ability to provide native experience for users to login to privilege accounts. They do not need to go through a portal to access servers and accounts. * Agentless solution which is easy to customise to any platform having network... more»
* Automatic password management, which will automatically change passwords based on compliance requirements. * DVR like video recording and text-based recording for easier audits. * Easily scan the network for all privilege accounts and has... more»
Reliable in terms of no data loss. Plays a huge role in device health checks (Event Source Monitor). Provides FSEs relevant information prior to end user problem solutions (if data sources are integrated and parsed properly).
Advance monitoring and alerting feature is not stable (Event Stream Analysis). Does not allow certain use cases running parallel. The reporting module: If only their dashboards resembled anything you would see on any BI reporting tools.
* Password management and accountability for Privileged accounts * Identify, protect and monitor the usage of Privileged accounts * Record and control privileged sessions on critical systems i.e. Windows, Unix, DBs * Application credentials... more»
Privileged accounts represent the largest security vulnerability an organization faces today. Most organisations are not aware of the total number of privilege accounts. Compromising privilege accounts leads to various breaches. With this... more»
The ability to create custom connector components is the most valuable feature of the product. Once the organisation matures in their privileged access strategy, CyberArk’s customisation capability allows you to target application-level... more»
It has improved our organization by being able to consolidate several privileged access technologies into a unified tool. Session recording and auditing capability, and approval workflows allow a high degree of control over the organisation’s... more»
* Authentication to the solution: Authentication to the PVWA utilises integration to IIS. Therefore, it is not as strong as desired. * Reporting capability and customisation: Reporting utilises predefined templates with limited customisation... more»
With the Privileged Session Manager, we can monitor sessions in real time and terminate the session if there's any unnecessary activity found. For example: We give access to user to access the server only to update patches, but if we find any... more»
Actually my company/previous company does not use this product, but we sold it to our customer. This product helped our customer manage their privileged accounts. It’s easier to them to manage and control the privileged accounts.
It needs more plugin connectors for all devices. CyberArk currently can manage or make it easier to manage about 80% of our total devices. The rest still need R&D to develop the plugin. If CyberArk had more plugin connectors, the customer... more»
Technology Architect at a renewables & environment company with 51-200 employees
Feb 22 2017
What do you think of CyberArk Privileged Account Security?
EPV: Enterprise Password Vault PSM: Privileged Session Manager AIM: Application Identity Manager The latest version of the product is mature and there is more functionality than we need.
• Improvements to My Organization
Improved security Reduced the overhead to protect enterprise data from delays Receives logs about all activities Compliance with several standards
• Use of Solution
I’m not the end-user. As a solutions architect (consultant), I designed and planned the solution in a very complex network environment.
• Stability Issues
We have not encountered any stability issues. After more than six years with my first CyberArk client, everything works great.
• Scalability Issues
We have not encountered any scalability issues. The solution was...
What do users say about their their security information and event management (SIEM) tools?
What added value do SIEM tools give security professionals and network engineers?
Are users satisfied with the advanced threat protection capabilities? Do the log management features meet their... more»
Expertise in developing Web Based Application, Database Applications and Desktop Applications
Working experience in distributed environment and distributed applications
Expertise in ISA Configuration, Network Security include:·
After an experience of 7 years in the IT gaming field, the next period was filled with a lot of new informations and oportunities of developement.
Working for a leading system integrator and provider of IT services, has many advantages as access to new technologies, and the ability to learn new... more>>
CyberArk PAS Solution Professional | Project Manager
An experienced professional with expertise in CyberArk PAS suite solution implementation, Project Management, Infrastructure Technologies and Enterprise Security Solutions.
CyberArk PAS v7.2, v8.2 and v9.7
-Application / Solution Design
LinkTo ►► email@example.com ◄◄
All invitations to connect on LinkedIn are welcome - LION - 7K+ Never I D K
Mohammad is a seasoned IT Security Professional with 10+ years of hands on IT experience, He has actively worked on multiple IT Security & Infrastructure Projects for major... more>>
Senior Consultant - Information Security Engineering
CISSP with 15+ years of enterprise-level experience in Information Security and Identity & Access Management, specializing in Directory Services, Provisioning, Single Sign-on technologies, RBAC, Access Governance, Privileged Identity Management (certified in CyberArk), File Integrity... more>>
Information Technology and IT Security professional with 7.6 year experience in planning, solution designing implementation/deployment of Privileged Identity management, Security Support and Operations, Process implementation and documentations, LDAP Directories, Privilege Single Sign-On (PSSO),... more>>
Throughout my work experience, I developed self-learning skills. Having to support the technical documentation and working tools such as firewall, IPS, network switches, vmware, I have managed to acquire knowledge for its management,
whether for project recommendation and implementation and... more>>
Have 5 years of diverse experience in compliance, consulting, security tool implementation, configuration, IT Security and operations. Creative professional, proficient in prioritizing and completing tasks in a timely manner, yet flexible to multitask when necessary. Customer focused with diverse... more>>
• Proficiency in business process mapping, requirement study, client interaction for finalizing requirements and defining functional specifications for application implementation
• An effective communicator with relationship management and problem solving skills
• Ability to... more>>
Not sure which Advanced Threat Protection solution is right for you?Download our free Advanced Threat Protection Report and find out what your peers are saying about Palo Alto Networks, CyberArk, Cisco, and more!