We performed a comparison between CyberArk Endpoint Privilege Manager and Ivanti Endpoint Security for Endpoint Manager based on real PeerSpot user reviews.
Find out what your peers are saying about CyberArk, Delinea, BeyondTrust and others in Privileged Access Management (PAM)."The department management aspect of the solution is the most valuable aspect."
"It offers great performance."
"What sets CyberArk apart is its continuous innovation, staying ahead of the competition."
"The most valuable features of CyberArk Endpoint Privilege Manager are password management, session management, onboarding rules, platform customization, and safety management."
"I have always found that CyberArk is a very tight, foolproof product compared to most other products available."
"You can use it to strip users of their local admin rights and, at the same time, elevate applications for them."
"The solution allows me to give access and privileges to each user individually"
"CyberArk Endpoint Privilege Manager is very easy to manage, which I like. The solution also has a dashboard where you can see which software is suspicious, which I find valuable."
"Patching and remediation are the strongest features."
"The key differentiator is that it manages mobile devices and laptops in the same console. Windows and Linux are on the same console. This is the only product that does this. It's really the best in the industry."
"The most valuable features of the solution are accessing the data through the mobiles and meeting with the compliance for security best practices."
"The best part about Ivanti and Matrix 42 is that they are low-code solution builders with drag-and-drop capabilities regarding service management."
"It provides security features for unified endpoint management."
"The most valuable feature of Ivanti Endpoint Security for Endpoint Manager, which my company mainly uses, is patching. Another valuable feature of Ivanti Endpoint Security for Endpoint Manager is that it allows you to view the inventory list of the different machines."
"The solution's most valuable features are its patch management functionality and provisioning."
"The price of the solution should improve."
"Compared to other tools like Linux, this solution isn't as user-friendly."
"The solution is very expensive."
"The solution's pricing could be better."
"CyberArk Endpoint Privilege Manager is a perfect solution, but CyberArk Endpoint Privilege Manager for Linux has many issues. Another area for improvement in CyberArk Endpoint Privilege Manager, specifically for Windows, is that there's no way for you to check credential theft from a text file, such as a notepad file."
"CyberArk Endpoint Privilege Manager can be better by making its UI more consistent."
"Can be improved by allowing computers to be excluded from policies."
"Performance could be better. We have a couple of problems with CyberArk right now. One of the problems is performance in our environment. Support also takes a long time to respond. If the user already has local admin rights, then I can't collect any events in the console from this device. There are also some options in CyberArk that are not working properly, and are not helpful in this case. I can't collect any information to create a proper policy for the device. I have to investigate everything manually, or even disable the local admin from the device. I can collect the events only after this, and it's very time consuming. In my case, it's a waste of resources."
"The solution needs a complete overhaul or makeover. It gets stuck sometimes because they're focusing on the cloud UEM stuff rather than paying as much attention to that particular piece. The ease of use could be improved. It combines many different functionalities that you would need multiple servers like SCCM. If I wanted to train people, I’d move to a higher level from an Apache architect. There are five or six different products. So, training functional staff to use the product can be challenging because it can sometimes be cumbersome. Reporting is challenging. We use Avanti extraction to report off an endpoint. We don't use the reporting because of the need for more functionality, granularity, or customization."
"If I want to integrate the solution with any other solution, pushing the policies from the Ivanti side is a bit tough."
"The product's blocking definition needs improvement."
"Ivanti Endpoint Security for Endpoint Manager's support provided to its users by the vendor is one area that needs to improve."
"When you open a new mobile, you automatically come onboard the mobile on the Ivanti platform but it needs some improvements."
"One of the features that Ivanti could improve is patching for non-Windows settings, such as Linux and Ubuntu."
"An area for improvement in Ivanti Endpoint Security for Endpoint Manager is reporting. It's lacking. For example, Ivanti Endpoint Security for Endpoint Manager reports should tell you if the agent is up to date, if the security patch is updated, etc."
More CyberArk Endpoint Privilege Manager Pricing and Cost Advice →
More Ivanti Endpoint Security for Endpoint Manager Pricing and Cost Advice →
CyberArk Endpoint Privilege Manager is ranked 7th in Privileged Access Management (PAM) with 25 reviews while Ivanti Endpoint Security for Endpoint Manager is ranked 45th in EPP (Endpoint Protection for Business) with 7 reviews. CyberArk Endpoint Privilege Manager is rated 8.0, while Ivanti Endpoint Security for Endpoint Manager is rated 8.6. The top reviewer of CyberArk Endpoint Privilege Manager writes "Offers integrated solutions and expands its capabilities through strategic acquisitions". On the other hand, the top reviewer of Ivanti Endpoint Security for Endpoint Manager writes "A security solution to manage devices with patching and remediation feature". CyberArk Endpoint Privilege Manager is most compared with Microsoft Defender for Endpoint, BeyondTrust Endpoint Privilege Management, CrowdStrike Falcon, CyberArk Privileged Access Manager and Cisco ISE (Identity Services Engine), whereas Ivanti Endpoint Security for Endpoint Manager is most compared with BigFix, Tanium, Microsoft Defender for Endpoint, Trellix Endpoint Security and CrowdStrike Falcon.
We monitor all Privileged Access Management (PAM) reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.