We performed a comparison between CyberArk Endpoint Privilege Manager, Keeper, and VMware Carbon Black Endpoint based on real PeerSpot user reviews.
Find out what your peers are saying about CyberArk, Delinea, BeyondTrust and others in Privileged Access Management (PAM)."The most valuable features of CyberArk Endpoint Privilege Manager are password management, session management, onboarding rules, platform customization, and safety management."
"The department management aspect of the solution is the most valuable aspect."
"The product is stable."
"It offers great performance."
"CyberArk Endpoint Privilege Manager is very easy to manage, which I like. The solution also has a dashboard where you can see which software is suspicious, which I find valuable."
"What sets CyberArk apart is its continuous innovation, staying ahead of the competition."
"The most valuable feature of the solution is its performance."
"I like that you can remove the admin rights from the user's computer and have control over the environment. That means you can delete the local admins and grant them proper privileges with the console. So, they will get proper permissions for applications they need, but we don't have to do it. In the domain where we don't have control, the user can only do specified actions, but not all of them."
"Possibility to login using the fingerprint sensor on Android/iPhone."
"Enables IT department to force very complex passwords for certain users."
"Support is very quick to respond, and they have fixed any issues that I have had."
"A useful solution for storing encryption keys, programming and developing a SaaS platform."
"Keeper Bridge."
"I like Keeper's mobility and its accessibility."
"I like a couple of things about this solution. Being able to share passwords with other people is valuable. You can see if the information is out on the dark web and whether you have weak passwords and the last time they were changed. You could also have the 2FA or MFA codes embedded in the application so that you don't have to use your phone or any other 2FA device, which is something very important."
"I can access my passwords from any Internet connected device."
"The initial setup is pretty straightforward."
"Carbon Black Cb Defense improved our endpoint level security. It helped to identify endpoint and infrastructure loopholes."
"The biggest feature out of CarbonBlack is its ability to dive in with more depth. You can look at the entire kill chain and understand, not only if an alarm or identified incident is truly a true security issue versus a false positive, and it allows us to backtrack and figure out why it actually happened and how it got into the environment."
"Some of the valuable features I have found are the online documentation of the solution is well organized and thorough. I like the simplicity of bypass and the visualization of the active components."
"Provides visibility into the chain of attack and threats that use valid operating system processes to execute attacks."
"The feature I found most valuable in Carbon Black CB Defense is the ongoing monitoring feature that works by emailing updates about any detections found."
"We have another piece of that infrastructure that does what they call threat emulation. It's like sandboxing where it takes files that it doesn't know about, puts them in a VM-type environment, and it kicks them off to see if there's any malware or tendencies that might look like malware, that kind of thing."
"The initial setup is very easy."
"One area that has room for improvement is in managing the credentials for network devices."
"Performance could be better. We have a couple of problems with CyberArk right now. One of the problems is performance in our environment. Support also takes a long time to respond. If the user already has local admin rights, then I can't collect any events in the console from this device. There are also some options in CyberArk that are not working properly, and are not helpful in this case. I can't collect any information to create a proper policy for the device. I have to investigate everything manually, or even disable the local admin from the device. I can collect the events only after this, and it's very time consuming. In my case, it's a waste of resources."
"CyberArk meets clients' need very spot-on. It covers everything customers ask for. As for improvements, honestly, the feedback's been really positive. I haven't heard any specific areas that need work."
"The installation process is pretty difficult."
"Technical support is slow to respond when we run into issues."
"The price of the solution should improve."
"We have had some major issues with the tool, but we have worked with the R&D teams and we have worked with support. There is room for improvement, especially on response times. But they're working on it and they're doing the best they can."
"The tool should be more user-friendly."
"Maybe a sort of category organizer to help with organizing passwords for different things, such as banking, medical, shopping, and school."
"The technical support for this solution could be faster support and improved if they had a better understanding of my questions."
"I would add a category for personal documents or photos of ID cards."
"Ability to set up password profiles that can predefine custom fields and password complexity."
"The user experience and the mobile app could be improved."
"Search functions are sometimes weird."
"Needs to provide an API to be integrated with the information systems and offer secure file hosting service with sharing and editing capabilities."
"I would love it if you didn't have to re-authenticate when you start up a new browser."
"The solution has to mature on container security and a lot of cloud environment security."
"The device control feature could also be compatible with the user’s profile as well."
"Carbon Black CB Defense has helped improve my organization by allowing us to have better data so that we can do correlation and get visibility into the alerts."
"In the past, we've seen some stability issues in the latest version releases. We tend to hang back one version just to make sure issues are fully resolved to avoid user disruption."
"Right now, Carbon Black CB Defense doesn't support cloud computing and Kubernetes."
"There's some disparity between the on-premise and the cloud type of application."
"CB Defense could be more compatible with Linux, and its cloud provision could be improved."
"There could be more knowledge. I think they made a mistake when they took away the Check Point integration, because it provides more automation and also more threat intelligence."
More CyberArk Endpoint Privilege Manager Pricing and Cost Advice →