We performed a comparison between CyberArk Endpoint Privilege Manager and Tanium based on real PeerSpot user reviews.
Find out in this report how the two Privileged Access Management (PAM) solutions compare in terms of features, pricing, service and support, easy of deployment, and ROI."The most valuable feature is that it does lifecycle management and that it will change to whatever the end target is."
"The feature called PTA, which stands for Privileged Threat Analytics keeps track of what admins are doing and works with Centimeters. If something fishy is going on with a user's credentials, it alerts the security team so they can act fast. Plus, it automates stuff like resetting credentials or blocking users. So, if there's a potential hack, CyberArk can change passwords and lock out users in a snap. It also gives you a heads-up if anything unusual is going on with server activities, like someone creating new users with uncontrolled credentials."
"The solution's technical support is good."
"I like that you can remove the admin rights from the user's computer and have control over the environment. That means you can delete the local admins and grant them proper privileges with the console. So, they will get proper permissions for applications they need, but we don't have to do it. In the domain where we don't have control, the user can only do specified actions, but not all of them."
"The most valuable features of CyberArk Endpoint Privilege Manager are password management, session management, onboarding rules, platform customization, and safety management."
"The solution is scalable."
"I am impressed with the product's seamless integration. The PAM wallet and enterprise password wallet are good also good."
"It offers great performance."
"Tanium has made the process of detecting threats more proactive with its detection. So, the process is easier and more efficient."
"Threat hunting is a very good feature on Tanium. We have just started using it and have not used it extensively."
"The most valuable features of this solution are the consolidation of all historical data on device endpoints, security drivers, firmware, and Software version gaps."
"The interrogation piece was the most valuable feature because it was very detailed."
"I like the tool's incident response and security patching."
"I like the fact that you can create patching campaigns depending on the area of your network that you want to address first. I like the ability it has to make several campaigns that work in parallel."
"I'm not so familiar with the tool but I like the interaction of the console to the picture. Patching is the primary model I have been focusing on for the last couple of weeks. So I have created a proof of concept environment and have been checking the available features."
"The solution is scalable and helps to understand how infrastructure works. It helps to improve the health of the organization."
"Compared to other tools like Linux, this solution isn't as user-friendly."
"The price of the solution should improve."
"The solution can be complex to use at times."
"It cannot be on-prem. It is only cloud-based. Sometimes, that's a restriction in terms of usage."
"CyberArk is a pretty heavy solution."
"Technical support is slow to respond when we run into issues."
"It's an old product and has many areas that can be improved."
"CyberArk Endpoint Privilege Manager is not suitable for the current situation because when you compare it to OTP, OTP is the strongest password solution. You can use it as a one-time password, but you have to log into the password manager itself and if you don't change your password, it will be the weakest link in the security. In OTP, you don't have that weakest link."
"I would like to have more integrations and custom plugins to input. Integration is always a big deal in a lot of different environments."
"It is not really additional functions, or the features that are needed, rather the complexity would be reduced based on the number of modules required to put together a comprehensive operational security and risk compliance model."
"Tanium's limitations should be improved because although it is a great tool, it is limited to only a few classes during a session."
"The solution lacks mobility."
"We had some issues with the solution's OS upgrade."
"The solution needs to improve the reporting and tracking capabilities."
"The main issues are the network connection because different customers have issues with their networks. It's difficult implementing this type of solution because the network is the main feature in the architecture for these types of solutions. Tanium could improve by creating some network optimization."
"They could improve the UI."
More CyberArk Endpoint Privilege Manager Pricing and Cost Advice →
CyberArk Endpoint Privilege Manager is ranked 6th in Privileged Access Management (PAM) with 26 reviews while Tanium is ranked 36th in Endpoint Protection Platform (EPP) with 15 reviews. CyberArk Endpoint Privilege Manager is rated 8.0, while Tanium is rated 7.4. The top reviewer of CyberArk Endpoint Privilege Manager writes "Offers integrated solutions and expands its capabilities through strategic acquisitions". On the other hand, the top reviewer of Tanium writes "Useful tool for vulnerability management and deploying applications, needing improvement in its OS upgrade". CyberArk Endpoint Privilege Manager is most compared with Microsoft Defender for Endpoint, BeyondTrust Endpoint Privilege Management, CrowdStrike Falcon, CyberArk Privileged Access Manager and SentinelOne Singularity Complete, whereas Tanium is most compared with CrowdStrike Falcon, Microsoft Defender for Endpoint, Microsoft Configuration Manager, Qualys VMDR and VMware Carbon Black Endpoint. See our CyberArk Endpoint Privilege Manager vs. Tanium report.
We monitor all Privileged Access Management (PAM) reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.