We performed a comparison between CyberArk Endpoint Privilege Manager and SailPoint IdentityIQ based on real PeerSpot user reviews.
Find out what your peers are saying about CyberArk, Delinea, BeyondTrust and others in Privileged Access Management (PAM)."The most valuable feature of CyberArk Endpoint Privilege Manager is its ability to reset passwords every time that it is needed or periodically."
"The feature called PTA, which stands for Privileged Threat Analytics keeps track of what admins are doing and works with Centimeters. If something fishy is going on with a user's credentials, it alerts the security team so they can act fast. Plus, it automates stuff like resetting credentials or blocking users. So, if there's a potential hack, CyberArk can change passwords and lock out users in a snap. It also gives you a heads-up if anything unusual is going on with server activities, like someone creating new users with uncontrolled credentials."
"The solution is scalable."
"It has drastically reduced the attack surface for local administrative rights and the chance of escalation of privilege. We've removed, at this point, close to 98 percent of the local administrative accounts on workstations. If there were an incident, it would stop at that point and we'd be able to know."
"We can do both server and endpoint protection."
"What sets CyberArk apart is its continuous innovation, staying ahead of the competition."
"I like that you can remove the admin rights from the user's computer and have control over the environment. That means you can delete the local admins and grant them proper privileges with the console. So, they will get proper permissions for applications they need, but we don't have to do it. In the domain where we don't have control, the user can only do specified actions, but not all of them."
"The password rotation and the session recording are the most valuable features."
"The compliance features are the most valuable features."
"This solution has made our team more effective. We need less manual approvals when someone new joins our company. There is less paperwork and fewer support tickets raised for access."
"I find the built-in connectors, lifecycle management, certification, and recertification features to be the most valuable."
"The solution is pretty stable and simple to use."
"We like the integration with other systems."
"IdentityIQ's best features are the hassle-free user experience and security."
"The first valuable feature of the solution is its interface. The second feature of the solution is the level of flexibility it provides."
"The solution is stable and reliable."
"It's an old product and has many areas that can be improved."
"It cannot be on-prem. It is only cloud-based. Sometimes, that's a restriction in terms of usage."
"CyberArk meets clients' need very spot-on. It covers everything customers ask for. As for improvements, honestly, the feedback's been really positive. I haven't heard any specific areas that need work."
"Compared to other tools like Linux, this solution isn't as user-friendly."
"We have had some major issues with the tool, but we have worked with the R&D teams and we have worked with support. There is room for improvement, especially on response times. But they're working on it and they're doing the best they can."
"CyberArk Endpoint Privilege Manager is not suitable for the current situation because when you compare it to OTP, OTP is the strongest password solution. You can use it as a one-time password, but you have to log into the password manager itself and if you don't change your password, it will be the weakest link in the security. In OTP, you don't have that weakest link."
"CyberArk Endpoint Privilege Manager is a perfect solution, but CyberArk Endpoint Privilege Manager for Linux has many issues. Another area for improvement in CyberArk Endpoint Privilege Manager, specifically for Windows, is that there's no way for you to check credential theft from a text file, such as a notepad file."
"For an experienced system implementer it will take approximately one day. However, for somebody who is inexperienced it may take up to five days."
"The connectors are far too manual. This needs to be automated a bit."
"What it doesn't do is provide notice in the event of a vulnerability or offense from the security."
"Regarding the scope for improvement in the solution, reporting is an area that can be a bit more UI-oriented."
"SailPoint IdentityIQ needs to improve its customization. It should also incorporate some standardized tools for implementation."
"It is not readily available and cannot be downloaded from the net."
"Needs to focus on automation wherein provisioning of work can be improved and access certification should be automated without the intervention from a manager for approval."
"Additional details during account aggregation failures to help quick troubleshooting."
"They should lower the price and technical support should be better."
More CyberArk Endpoint Privilege Manager Pricing and Cost Advice →
CyberArk Endpoint Privilege Manager is ranked 7th in Privileged Access Management (PAM) with 25 reviews while SailPoint IdentityIQ is ranked 1st in User Provisioning Software with 60 reviews. CyberArk Endpoint Privilege Manager is rated 8.0, while SailPoint IdentityIQ is rated 8.2. The top reviewer of CyberArk Endpoint Privilege Manager writes "Offers integrated solutions and expands its capabilities through strategic acquisitions". On the other hand, the top reviewer of SailPoint IdentityIQ writes "Flexible, easy to customize, and not too difficult to set up". CyberArk Endpoint Privilege Manager is most compared with Microsoft Defender for Endpoint, BeyondTrust Endpoint Privilege Management, CrowdStrike Falcon, CyberArk Privileged Access Manager and Tanium, whereas SailPoint IdentityIQ is most compared with Saviynt, Microsoft Entra ID, One Identity Manager, ForgeRock and Okta Workforce Identity.
We monitor all Privileged Access Management (PAM) reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.