We performed a comparison between CyberArk Endpoint Privilege Manager and Symantec Privileged Access Manager based on real PeerSpot user reviews.
Find out in this report how the two Privileged Access Management (PAM) solutions compare in terms of features, pricing, service and support, easy of deployment, and ROI."We were able to reduce the number of privileged accounts by 50%, which helped to simplify our privileged access management environment."
"It has drastically reduced the attack surface for local administrative rights and the chance of escalation of privilege. We've removed, at this point, close to 98 percent of the local administrative accounts on workstations. If there were an incident, it would stop at that point and we'd be able to know."
"It offers great performance."
"The most valuable feature is that it does lifecycle management and that it will change to whatever the end target is."
"The solution is scalable."
"The feature called PTA, which stands for Privileged Threat Analytics keeps track of what admins are doing and works with Centimeters. If something fishy is going on with a user's credentials, it alerts the security team so they can act fast. Plus, it automates stuff like resetting credentials or blocking users. So, if there's a potential hack, CyberArk can change passwords and lock out users in a snap. It also gives you a heads-up if anything unusual is going on with server activities, like someone creating new users with uncontrolled credentials."
"This is the number one product for privilege account security."
"We can do both server and endpoint protection."
"It is great for identity governance."
"One of the key things for us about the product is around its simplicity. Being able to put in the technology that allows the business to remove complexity and also allow the security improvements."
"The product is very scalable in terms of concurrent sessions that it can handle at a time, number of device it can support, accounts that it can manage, or number of nodes that you can deploy in a cluster."
"For me, it is the robust API which is the most valuable feature. This allows for low maintenance costs and allows applications to automatically connect. This is great to automate security of the DevOps pipeline for shared secrets across environments. Also, being on Linux and a virtual appliance is great."
"Comprehensive coverage of the required features for the PAM solution."
"The interface is very friendly, colorful, and bold."
"The RDP-gateway: For limiting which server an operator can access."
"It's easy to use and easy to configure."
"One area that has room for improvement is in managing the credentials for network devices."
"The price of the solution should improve."
"The tool should be more user-friendly."
"The product needs a streamlined user interface; improvements to the user interface can enhance user experience and make the solution more intuitive to navigate."
"Performance could be better. We have a couple of problems with CyberArk right now. One of the problems is performance in our environment. Support also takes a long time to respond. If the user already has local admin rights, then I can't collect any events in the console from this device. There are also some options in CyberArk that are not working properly, and are not helpful in this case. I can't collect any information to create a proper policy for the device. I have to investigate everything manually, or even disable the local admin from the device. I can collect the events only after this, and it's very time consuming. In my case, it's a waste of resources."
"CyberArk has some performance issues. For example, servers could not handle the solution when we first took CyberArk Endpoint Privilege Manager."
"We have had some major issues with the tool, but we have worked with the R&D teams and we have worked with support. There is room for improvement, especially on response times. But they're working on it and they're doing the best they can."
"It is hard to deal with technical support if you are not certified."
"An improvement for this solution is that it should not be constantly based on user name and password. There should be a condition to edit and update your username."
"Instead of just giving passwords to the user based on job function, from auditing perspective, turn that cycle around. That would really help from an auditing standpoint."
"Bring more technology into the portfolio and being able to collapse those products into a much more integrated way."
"The response time for support could be faster. Some features should be added: cloud-based, VPN-less, more secure, and it should be adjusted in a hybrid environment."
"We have to do a lot of manual work to automate features."
"The setup is complex."
"I wish it could create local accounts on desktops."
"It's difficult to locate the reports, there are limits on what reports can be run from the GUI, and the report formats are lacking."
More CyberArk Endpoint Privilege Manager Pricing and Cost Advice →
More Symantec Privileged Access Manager Pricing and Cost Advice →
CyberArk Endpoint Privilege Manager is ranked 7th in Privileged Access Management (PAM) with 19 reviews while Symantec Privileged Access Manager is ranked 18th in Privileged Access Management (PAM) with 3 reviews. CyberArk Endpoint Privilege Manager is rated 8.0, while Symantec Privileged Access Manager is rated 7.8. The top reviewer of CyberArk Endpoint Privilege Manager writes "Easy to manage, has an application whitelisting feature and a dashboard that shows you which software is suspicious, but there's no way to check credential theft from a text file". On the other hand, the top reviewer of Symantec Privileged Access Manager writes "Allows IT and consultants to access the infrastructure environment but needs more security and better support". CyberArk Endpoint Privilege Manager is most compared with Microsoft Defender for Endpoint, BeyondTrust Endpoint Privilege Management, CrowdStrike Falcon, CyberArk Privileged Access Manager and Tanium, whereas Symantec Privileged Access Manager is most compared with CyberArk Privileged Access Manager, Cisco ISE (Identity Services Engine), BeyondTrust Endpoint Privilege Management, ARCON Privileged Access Management and Delinea Secret Server. See our CyberArk Endpoint Privilege Manager vs. Symantec Privileged Access Manager report.
See our list of best Privileged Access Management (PAM) vendors.
We monitor all Privileged Access Management (PAM) reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.