User Reviews of CyberArk Endpoint Privilege Manager & CyberArk Privileged Access Manager

Updated March 2024

Would you like to learn about products from people using them now? Simplify your research with trusted advice from people like you.

Download our FREE report comparing CyberArk Endpoint Privilege Manager and CyberArk Privileged Access Manager based on reviews, features, and more!

Where should we email your report?






CyberArk Endpoint Privilege Manager review

Kaspars Vasilevskis
Kaspars Vasilevskis
Security Delivery Associate Manager at Accenture
Offers integrated solutions and expands its capabilities through strategic...
Setting up CyberArk Endpoint Privilege Manager was challenging for me due to the involvement of multiple components. The process required a good understanding of each component and its configuration. It is not a straightforward setup, and familiarity with the system is crucial to ensure everything is correctly configured. I would rate the...
CyberArk Privileged Access Manager review

SatishIyer
SatishIyer
Assistant Vice President at a financial services firm with 10,001+ employees
Lets you ensure relevant, compliant access in good time and with an audit trail,...
When I was a component owner for PAM's Privileged Threat Analytics (PTA) component, what I wanted was a clear mapping to the MITRE ATT&CK framework, a framework which has a comprehensive list of use cases. We reached out to the vendor and asked them how much coverage they have of the uses cases found on MITRE, which would have given us a...

Since 2012, we've had 768,415 professionals use our research.

As seen in