We performed a comparison between CyberArk Endpoint Privilege Manager and Trend Micro Apex One based on real PeerSpot user reviews.
Find out in this report how the two Privileged Access Management (PAM) solutions compare in terms of features, pricing, service and support, easy of deployment, and ROI."CyberArk Endpoint Privilege Manager (EPM) 's most valuable feature is its ability to manage user application privileges and protect against ransomware attacks by controlling access to specific files and applications."
"The product is stable."
"I have always found that CyberArk is a very tight, foolproof product compared to most other products available."
"The most valuable feature is that their database is completely encrypted and protected with multiple layers."
"The most valuable features of CyberArk Endpoint Privilege Manager are password management, session management, onboarding rules, platform customization, and safety management."
"We can do both server and endpoint protection."
"You can use it to strip users of their local admin rights and, at the same time, elevate applications for them."
"We were able to reduce the number of privileged accounts by 50%, which helped to simplify our privileged access management environment."
"The most valuable features are reporting and where we have the ability to report back and provide information when an item is quarantined or not quarantined."
"The solution offers good community support."
"I think this is the best solution in the category of endpoint protection, it's really excellent. It's better than McAfee."
"It is available on our OS platform and will automatically scan our machines daily or weekly."
"The DDAN and the sand boxing features are very good and accurate."
"Email security is the most valuable feature."
"The monitoring is very good."
"I have found Trend Micro Apex One to be secure."
"CyberArk Endpoint Privilege Manager is a perfect solution, but CyberArk Endpoint Privilege Manager for Linux has many issues. Another area for improvement in CyberArk Endpoint Privilege Manager, specifically for Windows, is that there's no way for you to check credential theft from a text file, such as a notepad file."
"It is hard to deal with technical support if you are not certified."
"It cannot be on-prem. It is only cloud-based. Sometimes, that's a restriction in terms of usage."
"We have had some major issues with the tool, but we have worked with the R&D teams and we have worked with support. There is room for improvement, especially on response times. But they're working on it and they're doing the best they can."
"CyberArk is a pretty heavy solution."
"The solution can be complex to use at times."
"CyberArk Endpoint Privilege Manager is not suitable for the current situation because when you compare it to OTP, OTP is the strongest password solution. You can use it as a one-time password, but you have to log into the password manager itself and if you don't change your password, it will be the weakest link in the security. In OTP, you don't have that weakest link."
"For an experienced system implementer it will take approximately one day. However, for somebody who is inexperienced it may take up to five days."
"The scans in Trend Micro Apex One take a very long time and it takes up my system resources. I do not receive alerts. These areas could improve."
"The solution could be more proactive by using AI to assess the production landscape and compete with other products."
"I would like to see a sandboxing feature in the next release - which is currently something being supported by a third party - in addition to EDR capability on the cloud applications."
"Some of our customers need to add cache file signatures in Trend Micro Apex One, but it is currently not a supported feature."
"The portal is a little bit slow in loading. The cloud portal or management control should be a little faster. There seems to be a lot of load on their servers over there. Maybe they are using one server for multiple customers. It would be great if they can increase server performance in the cloud. Its technical support and reporting can be improved. There is no proper reporting, and there is no PDF or things like that. They should include detailed reporting. An attack happened at a client's site, but we couldn't get the report on the same day. We were unable to provide a detailed report to our client. We approached the technical support, and even they didn't give proper answers. They need to improve the reporting capabilities, or the technical team should support us in providing these reports. They should include reporting in the solution. They should also insert sandbox analysis in Apex One."
"The UI has room for improvement."
"Its pricing should be improved. In some cases, the user interface was not ready for our proof of concept. It wasn't a beta phase service."
"There is room for improvement in next-gen attacks protection."
More CyberArk Endpoint Privilege Manager Pricing and Cost Advice →
CyberArk Endpoint Privilege Manager is ranked 6th in Privileged Access Management (PAM) with 26 reviews while Trend Micro Apex One is ranked 6th in Endpoint Protection Platform (EPP) with 124 reviews. CyberArk Endpoint Privilege Manager is rated 8.0, while Trend Micro Apex One is rated 8.2. The top reviewer of CyberArk Endpoint Privilege Manager writes "Offers integrated solutions and expands its capabilities through strategic acquisitions". On the other hand, the top reviewer of Trend Micro Apex One writes "Good monitoring and server protection with helpful machine learning". CyberArk Endpoint Privilege Manager is most compared with Microsoft Defender for Endpoint, BeyondTrust Endpoint Privilege Management, CrowdStrike Falcon, CyberArk Privileged Access Manager and Ivanti Endpoint Security for Endpoint Manager, whereas Trend Micro Apex One is most compared with Trend Micro Deep Security, Microsoft Defender for Endpoint, Cortex XDR by Palo Alto Networks, Trend Micro Smart Protection and CrowdStrike Falcon. See our CyberArk Endpoint Privilege Manager vs. Trend Micro Apex One report.
We monitor all Privileged Access Management (PAM) reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.