Compare CA Privileged Access Manager vs. CyberArk Endpoint Privilege Manager

CA Privileged Access Manager is ranked 4th in Privileged Access Management with 6 reviews while CyberArk Endpoint Privilege Manager is ranked 27th in Endpoint Protection for Business with 3 reviews. CA Privileged Access Manager is rated 7.4, while CyberArk Endpoint Privilege Manager is rated 8.4. The top reviewer of CA Privileged Access Manager writes "We found the architecture to be scalable and very resilient. However, make sure the roadmap is responsive going forward". On the other hand, the top reviewer of CyberArk Endpoint Privilege Manager writes "Enables us to see how users use their access and lock down things that aren't appropriate". CA Privileged Access Manager is most compared with CyberArk PAS, Cisco ISE (Identity Services Engine) and Thycotic Secret Server, whereas CyberArk Endpoint Privilege Manager is most compared with BeyondTrust Endpoint Privilege Management, CrowdStrike and Carbon Black CB Defense.
Cancel
You must select at least 2 products to compare!
Most Helpful Review
Find out what your peers are saying about CyberArk, ARCON, BeyondTrust and others in Privileged Access Management. Updated: January 2020.
389,722 professionals have used our research since 2012.
Quotes From Members

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:

Pros
It reduces the viral attacks on my website. It also allows certain users access to see what happens daily.We have received good support from the tech support team.CA PAM is working well for us.The DB clustering is a really good benefit of using CA PAM.We can enforce complicated password policies and very important frequent password changes.The product is very scalable in terms of concurrent sessions that it can handle at a time, number of device it can support, accounts that it can manage, or number of nodes that you can deploy in a cluster.The key benefits are we improve our governance. We ensure we can build more trust in the way we run and operate our environment, and most of all is the accountability.One of the key things for us about the product is around its simplicity. Being able to put in the technology that allows the business to remove complexity and also allow the security improvements.

Read more »

It has drastically reduced the attack surface for local administrative rights and the chance of escalation of privilege. We've removed, at this point, close to 98 percent of the local administrative accounts on workstations. If there were an incident, it would stop at that point and we'd be able to know.Monitoring and recording are valuable features, particularly the recording.This is the number one product for privilege account security.

Read more »

Cons
The setup is complex.I would like this solution to be simpler. It should have a one-click access that works together with AWS.An improvement for this solution is that it should not be constantly based on user name and password. There should be a condition to edit and update your username.We experience stability issues after every patch upgrade. This is a place where CA needs to improve drastically.The service account management functionality needs to be extended to application pools, SQL database, PowerShell scripts, service account discovery, etc.Bring more technology into the portfolio and being able to collapse those products into a much more integrated way.They need to do a little bit more on the mainframe side.​

Read more »

We have had some major issues with the tool, but we have worked with the R&D teams and we have worked with support. There is room for improvement, especially on response times. But they're working on it and they're doing the best they can.I'd like to see the product include out of the box connectors.For an experienced system implementer it will take approximately one day. However, for somebody who is inexperienced it may take up to five days.

Read more »

Pricing and Cost Advice
It is reasonably priced.It is more expensive than other solutions on the market.I would prefer better licensing options for the 20-100 users we have at a given time.Pricing is fair compared to other top vendors.The licensing is simple and scalable.

Read more »

licensing for this solution is based on the number of APV (privileged users), and the number of sessions that you want to record.

Read more »

report
Use our free recommendation engine to learn which Privileged Access Management solutions are best for your needs.
389,722 professionals have used our research since 2012.
Ranking
Views
6,592
Comparisons
3,130
Reviews
8
Average Words per Review
411
Avg. Rating
7.9
Views
1,871
Comparisons
1,160
Reviews
3
Average Words per Review
644
Avg. Rating
8.3
Top Comparisons
Also Known As
CA PAM, Xceedium XsuiteViewfinity
Learn
CA (A Broadcom Company)
CyberArk
Overview

CA Privileged Access Manager is a simple-to-deploy, automated, proven solution for privileged access management in physical, virtual and cloud environments. It enhances security by protecting sensitive administrative credentials such as root and administrator passwords, controlling privileged user access, proactively enforcing policies and monitoring and recording privileged user activity across all IT resources.  It includes CA PAM Server Control (previously CA Privileged Identity Manager) for fine-grained protection of critical servers

CyberArk Viewfinity enables organizations to enforce least privilege policies for business and administrative users, as well as control applications to reduce the attack surface without halting productivity. The solution helps organizations revoke everyday local administrator privileges from business users while seamlessly elevating privileges when required by trusted applications. CyberArk Viewfinity also enables security teams to enforce granular least privilege policies for IT administrators, helping organizations effectively segregate duties on Windows servers. Complementing these privilege controls, the solution also delivers application controls, which are designed to manage and control which applications are permitted to run on endpoints and servers and prevent malicious applications from penetrating the environment.
Offer
Learn more about CA Privileged Access Manager
Learn more about CyberArk Endpoint Privilege Manager
Sample Customers
NEOVERA, Telesis, eSoftClearstream, McKesson, Boston Childrens Hospital
Top Industries
REVIEWERS
Financial Services Firm25%
Retailer19%
Logistics Company13%
Government13%
VISITORS READING REVIEWS
Software R&D Company25%
Financial Services Firm22%
Comms Service Provider15%
Retailer9%
No Data Available
Find out what your peers are saying about CyberArk, ARCON, BeyondTrust and others in Privileged Access Management. Updated: January 2020.
389,722 professionals have used our research since 2012.
We monitor all Privileged Access Management reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.