We performed a comparison between CyberArk Endpoint Privilege Manager and ESET Endpoint Protection Platform based on real PeerSpot user reviews.
Find out in this report how the two Privileged Access Management (PAM) solutions compare in terms of features, pricing, service and support, easy of deployment, and ROI."The solution's technical support is good."
"The product is stable."
"What sets CyberArk apart is its continuous innovation, staying ahead of the competition."
"It offers great performance."
"I have always found that CyberArk is a very tight, foolproof product compared to most other products available."
"This is the number one product for privilege account security."
"The solution is scalable."
"We can do both server and endpoint protection."
"ESET Endpoint Security's best feature is that it's invisible until it detects a problem."
"In terms of the current global landscape, it is a great solution."
"It has been working fine. It lets you know when it finds things. We didn't have any incident where the place had to shut down or was taken over by anything. We haven't had any issues that we know of."
"The most valuable feature of ESET Endpoint Security is the antivirus for the endpoints."
"The performance of the solution is very good it does not impact my hardware and is user-friendly."
"The tool protects everything."
"ESET Endpoint Security is stable, I did not have any issues with it."
"The solution is very lightweight and does not consume that much processor in terms of CPU utilization. The centralized management system is very good."
"CyberArk Endpoint Privilege Manager is not suitable for the current situation because when you compare it to OTP, OTP is the strongest password solution. You can use it as a one-time password, but you have to log into the password manager itself and if you don't change your password, it will be the weakest link in the security. In OTP, you don't have that weakest link."
"CyberArk meets clients' need very spot-on. It covers everything customers ask for. As for improvements, honestly, the feedback's been really positive. I haven't heard any specific areas that need work."
"They need much better integration with Azure AD."
"The product needs a streamlined user interface; improvements to the user interface can enhance user experience and make the solution more intuitive to navigate."
"It is hard to deal with technical support if you are not certified."
"CyberArk Endpoint Privilege Manager is a perfect solution, but CyberArk Endpoint Privilege Manager for Linux has many issues. Another area for improvement in CyberArk Endpoint Privilege Manager, specifically for Windows, is that there's no way for you to check credential theft from a text file, such as a notepad file."
"The solution's pricing could be better."
"Can be improved by allowing computers to be excluded from policies."
"The user interface of ESET Endpoint Security could be more user-friendly and more features could be added."
"ESET Endpoint Security lacks some advanced functionalities and features which would be useful to be interconnected with the solutions we use, such as Microsoft 365."
"In terms of what is lacking in ESET, it really would need more features for the users when they are working outside of the corporate network."
"The proactive feature is excellent, but I do not believe ESET will make any changes to this feature in the future."
"The solution’s console management and scalability should be improved."
"It would be useful if they could automate the deployment more."
"The use of SQL Server can be improved. At times, there is a bit of challenge while linking it with the Javascript. ESET Endpoint Security requires modern technology or modern equipment on site. You will find it difficult to use ESET Endpoint Security with dual-core machines. If they can add the cloud management feature to their product, it will be much easier. If you look at this COVID situation that we are in right now, people are working from home, so you need to control the computers wherever you are. For example, if you are using any email setup and you are hosting it on your own, all the email traffic will be going through the same network. You need to protect all of your computers from the attack. It is best if you can do it remotely rather than having an IT person to come onsite to manage all computers and metrics etc, which isn't a smart way to do it."
"Sometimes, ESET sends alerts within my own network that cause confusion. That is, it might warn about contamination, or that the VM has crashed, but it doesn't go further than that. It just shows me the alert and sometimes I am not sure what to do about it."
More CyberArk Endpoint Privilege Manager Pricing and Cost Advice →
More ESET Endpoint Protection Platform Pricing and Cost Advice →
CyberArk Endpoint Privilege Manager is ranked 6th in Privileged Access Management (PAM) with 27 reviews while ESET Endpoint Protection Platform is ranked 11th in Endpoint Protection Platform (EPP) with 96 reviews. CyberArk Endpoint Privilege Manager is rated 8.0, while ESET Endpoint Protection Platform is rated 8.2. The top reviewer of CyberArk Endpoint Privilege Manager writes "Offers integrated solutions and expands its capabilities through strategic acquisitions". On the other hand, the top reviewer of ESET Endpoint Protection Platform writes "Easy to set up with good security and rapidly improving capabilities". CyberArk Endpoint Privilege Manager is most compared with Microsoft Defender for Endpoint, BeyondTrust Endpoint Privilege Management, CrowdStrike Falcon, CyberArk Privileged Access Manager and Tanium, whereas ESET Endpoint Protection Platform is most compared with Microsoft Defender for Endpoint, Kaspersky Endpoint Security for Business, CrowdStrike Falcon, SentinelOne Singularity Complete and Check Point Harmony Endpoint. See our CyberArk Endpoint Privilege Manager vs. ESET Endpoint Protection Platform report.
We monitor all Privileged Access Management (PAM) reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.