Most Helpful Review
We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
"The solution is very stable. I would estimate it's 99.9% stable, if not more."
"We have full control over what our employees can do with the devices we provide them, to provide a secure and reliable network infrastructure."
"This solution is quite stable."
"We are maintaining compliance in PCI, SOX and HIPPA, which is a big thing. Auditors really like it, and it has made us stay compliant."
"We are able to know who is accessing what and when; having accountability."
"There are no issues with scalability. Our clients are very happy to use the product."
"For a while, there were individual IDs having privileged access. We wanted to restrict that. We implemented the solution so that it can be more of internal control. We can have session recordings happening and reduce our attacks."
"The Password Upload Utility tool makes it easier when setting up a Safe that contains multiple accounts and has cut down the amount of time that it takes to complete the task."
"When we started with RPA, there was a requirement that every credential and the bots themselves be protected through the PAM system. From the get-go, we've had CyberArk in the middle... We've got a pretty robust RPA implementation with our PAM platform. Users, bots, the credentials — everything is managed via our PAM solution."
"Right off the bat, the most valuable feature is the DNA scan. It gives us the ability to scan our environment and find the accounts that we're going to need to take under control."
"Technical support is something that needs improvement."
"I think that the pricing for the Check Point products should be reconsidered, as we found it to be quite expensive to purchase and to maintain."
"I think having a distributed architecture would certainly help this solution."
"Make it easier to deploy."
"The initial setup of CyberArk is a challenge if you do not have prior experience with it."
"Integration with the ticketing system should allow any number of fields to be used for validation before allowing a user to be evaluated and able to access a server."
"Currently, in Secure Connect, an end user is required to enter account information manually, and cannot save any of this information for future use."
"The one place where we found that this product really needs to improve is the cloud. Simple integrations don't exist, even today. We don't have anything specific on CyberArk for managing, SaaS products, SaaS vendors, SaaS credentials. I understand it's a vendor-based thing and that they have to coordinate with the other vendors to be able to do that, and there are integrations coming. But these are the major places where CyberArk definitely needs to invest some more time."
"It's a big program. To scale excessively, locally, on an on-prem application, takes a lot of servers."
"CyberArk has to continue to evolve with that threat landscape to make sure that they're still protecting those credentials that are owned by those that have privileged accounts in the firms."
Pricing and Cost Advice
"Choosing the correct set of licenses is essential because, without the additional software blade licenses, the Check Point gateways are just a stateful firewall."
"In comparison to other products on the market, CyberArk is a more costly product."
Questions from the Community
Top Answer: The solution is very stable. I would estimate it's 99.9% stable, if not more.
Top Answer: We recently upgraded to the latest release of the new version, IP40. Since it is new, whatever features that were not there in the IP30 version, have been added to IP40. Right now, we are gradually… more »
Top Answer: We primarily implement the solution for our clients.
Top Answer: Right off the bat, the most valuable feature is the DNA scan. It gives us the ability to scan our environment and find the accounts that we're going to need to take under control.
Top Answer: Privileged Access Management is a business transformation program. It forces business to look at their overall operating model for system administrative and application based access, and develop a… more »
out of 23 in Advanced Threat Protection
Average Words per Review
out of 30 in Privileged Access Management
Average Words per Review
Compared 35% of the time.
Compared 24% of the time.
Compared 7% of the time.
Compared 14% of the time.
Compared 10% of the time.
Compared 9% of the time.
Compared 8% of the time.
Compared 7% of the time.
Also Known As
|R80, Infinity||CyberArk Privileged Access Security, CyberArk Privileged Account Security, SSH Key Manager, Privileged Session Manager, Privileged Threat Analytics, Application Identity Manager, On-Demand Privileges Manager, Endpoint Privilege Manager|
Check Point Infinity is the only fully consolidated cyber security architecture that provides unprecedented protection against Gen V mega-cyber attacks as well as future cyber threats across all networks, endpoint, cloud and mobile. The architecture is designed to resolve the complexities of growing connectivity and inefficient security. Learn more about Check Point Infinity
CyberArk is the trusted expert in privileged account security. Designed from the ground up with a focus on security, CyberArk has developed a powerful, modular technology platform that provides the industry's most comprehensive Privileged Account Security Solution.
Learn more about Check Point Infinity
Learn more about CyberArk PAS
|Edel AG||Rockwell Automation|
No Data Available
Financial Services Firm25%
Comms Service Provider8%
Computer Software Company33%
Comms Service Provider19%
Financial Services Firm7%
No Data Available
Check Point Infinity is ranked 9th in Advanced Threat Protection with 2 reviews while CyberArk PAS is ranked 1st in Privileged Access Management with 22 reviews. Check Point Infinity is rated 9.6, while CyberArk PAS is rated 9.0. The top reviewer of Check Point Infinity writes "Offers a unified security approach that provides full control over users and what they can do". On the other hand, the top reviewer of CyberArk PAS writes "Provides simplicity and ease of implementation for the right level of security controls". Check Point Infinity is most compared with Cisco Stealthwatch, Palo Alto Networks VM-Series and Skybox Security Suite, whereas CyberArk PAS is most compared with BeyondTrust Endpoint Privilege Management, Thycotic Secret Server, Microsoft Azure Active Directory Premium, Cisco ISE (Identity Services Engine) and SailPoint IdentityIQ.
See our list of .
We monitor all Advanced Threat Protection reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.