We performed a comparison between CyberArk Privileged Access Manager, Palo Alto Networks WildFire, and RiskIQ Illuminate based on real PeerSpot user reviews.
Find out what your peers are saying about CyberArk, Delinea, BeyondTrust and others in Privileged Access Management (PAM)."We know when passwords will be expiring so we can force users to change their passwords, as well as requiring specific password requirements for length, complexity, etc."
"Central Password Manager is useful for agentless automated password management through AD integration as well as endpoints for different devices."
"Lessens the risk with privileged access."
"I really like the PTA (Privileged Threat Analytics). I find this the best feature."
"All access to our servers by both staff and vendors is monitored and recorded."
"The regulation of accounts is by far the most needed and valuable part of the application."
"The automatic password management is the most important feature. The second most important feature is the ability to enforce dual control on the release of those passwords. The combination of these two features is the most important thing for us because we can show that we're in control of who uses any non-personal account, and when they do so."
"The most valuable feature is Special Monitoring."
"I like the analysis they apply to the unknown files, and I think they have good technology to use as a sandboxing tool. I didn't find something similar to WildFire in the marketplace."
"The scalability is acceptable."
"The most valuable features are all of the security features in terms of protection and SSL and VPN."
"The way that the solution quickly updates to adjust to threats is the solution's most valuable aspect. When there's a security attack, within five minutes, all Wildfire subscribers have access to updates so that all systems will be safe. Its threat prevention is way better than other vendor products."
"WildFire's application encryption is useful."
"The most valuable feature is the cloud-based protection against zero-day malware attacks."
"The most valuable feature is the Automatic Verdict, to recognize whether something is a threat, or not."
"Installing this product as a datacenter firewall for segregation and segmentation, and also configuring policies between zones has improved my organization."
"The solution is stable with 12 years of established historical data."
"I would like easier integrations for creating an online dashboard that executives would look at or are able to run reports from the tool."
"Their post-sale support area requires a big improvement. Customers cannot automate tickets directly with CyberArk. They have to come through the distributor or bring in partners who have access to the support portal. Basically, the support for post-sales implementation is there, but the role of CyberArk is very minimal. Customers have to rely on partners, which sometimes creates issues. Some of the vendors help you during the implementation process, but the CyberArk support team does not do that. They have 24/7 support for our region, but they help only if there is an emergency or there is a problem with their system. If the password vault is down or the system is down, they provide immediate attention. For almost everything else, they take more time to respond. They give low priority to service-related or migration-related questions."
"They are sometimes not flexible with things. For instance, from one day to another, there might be something that had been done years ago by CyberArk, then they say, "We do not support that." You then have to initiate a complaint and start working with them. Things might become complicated and months pass while you are working with them. Usually, they are good and fast, but sometimes they seem to be blocked with problems, e.g., you will suddenly be working with another team instead of the team that you were working with the day before."
"Sometimes the infrastructure team is hesitant to provide more resources."
"Initially, there was a lot of hiccups, because there were a lot of transitions due to manual installations."
"I would like to see is the policy export and import. When we expend, we do not want to just hand do a policy."
"PAM could be more user-friendly and CyberArk could update the documentation to include more real-world examples. You have to learn it yourself through trial and error. In particular, the online documentation should have more information about troubleshooting."
"There is room for improvement in the pricing model."
"In terms of what I'd like to see in the next release of Palo Alto Networks WildFire, each release is based on malware that has been identified. The key problem is an average of six months from the time malware is written to the time it's discovered and a signature is created for it. The only advice that I can give is for them to shorten that timeframe. I don't know how they would do it, but if they shorten that, for example, cut it in half, they'll make themselves more famous."
"The automation and responsiveness need improvement."
"The initial setup was a little bit complex, mainly due to the GUI console and management challenges."
"There are more specialized solutions that compete with Wildfire. Therefore, they need to work on their machine learning and AI to be more competitive."
"The data analytical system for deployment needs to improve."
"The system performance degrades after the solution has been deployed for some time. The data that it gives us becomes a little bit slow. When you try to get some data for troubleshooting, it seems like it's working hard to extract that data."
"The only problem with this solution is the cost. It's expensive."
"I think it would be nice for Palo Alto to work without the connection to the cloud. It is 100% powerful when connected to the cloud. But, if you disconnect from the cloud, you only get 40-50% power."
"A low-cost service to evaluate the risk score of a supply chain would be very helpful."
More CyberArk Privileged Access Manager Pricing and Cost Advice →
Earn 20 points