Compare CyberArk PAS vs. FireEye Network Security

CyberArk PAS is ranked 1st in Advanced Threat Protection with 54 reviews while FireEye Network Security which is ranked 4th in Advanced Threat Protection with 14 reviews. CyberArk PAS is rated 9.0, while FireEye Network Security is rated 9.0. The top reviewer of CyberArk PAS writes "Gives us the security of all credentials in one place and lightens our administrative load". On the other hand, the top reviewer of FireEye Network Security writes "It has significantly decreased our mean time in being able to identify and detect malicious threats". CyberArk PAS is most compared with SailPoint IdentityIQ, BeyondTrust Endpoint Privilege Management and Cisco ISE (Identity Services Engine), whereas FireEye Network Security is most compared with Palo Alto Networks WildFire, Cisco Stealthwatch and Symantec Advanced Threat Protection. See our CyberArk PAS vs. FireEye Network Security report.
Cancel
You must select at least 2 products to compare!
Most Helpful Review
Find out what your peers are saying about CyberArk PAS vs. FireEye Network Security and other solutions. Updated: July 2019.
354,290 professionals have used our research since 2012.
Quotes From Members

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:

Pros
For a while, there were individual IDs having privileged access. We wanted to restrict that. We implemented the solution so that it can be more of internal control. We can have session recordings happening and reduce our attacks.The Password Upload Utility tool makes it easier when setting up a Safe that contains multiple accounts and has cut down the amount of time that it takes to complete the task.There are no issues with scalability. Our clients are very happy to use the product.We are maintaining compliance in PCI, SOX and HIPPA, which is a big thing. Auditors really like it, and it has made us stay compliant.We are able to know who is accessing what and when; having accountability.This solution is quite stable.The most valuable feature is that it always provides flexibility, password quality and one-time user check-in and check-out.I really like the PTA (Privileged Threat Analytics). I find this the best feature.

Read more »

If we are receiving spam emails, or other types of malicious email coming from a particular email ID, then we are able to block them using this solution.The product has helped improve our organization by being easy to use and integrate. This saves time, trouble and money.The most valuable network security feature is the network sandbox solution. This sandbox feature works on traffic flow.Initially, we didn't have much visibility around what is occurring at our applications lower level. For instance, if we are exposed to any malicious attacks or SQL injections. But now we've integrated FireEye with Splunk, so now we get lots of triggers based on policy content associated with FireEye. The solution has allowed for growth and improvement in our information security and security operations teams.The most valuable feature is the view into the application.Application categorization is the most valuable feature for us. Application filtering is very interesting because other products don't give you full application filtering capabilities.It allows us to be more hands off in checking on emails and networking traffic. We can set up a bunch of different alerts and have it alert us.The scalability has not been a problem. We have deployed the product in very high bandwidth networks. We have never had a problem with the FireEye product causing latency issues within our networks.

Read more »

Cons
Integration with the ticketing system should allow any number of fields to be used for validation before allowing a user to be evaluated and able to access a server.Currently, in Secure Connect, an end user is required to enter account information manually, and cannot save any of this information for future use.The initial setup of CyberArk is a challenge if you do not have prior experience with it.Make it easier to deploy.I think having a distributed architecture would certainly help this solution.There was a functionality of the solution that was missing. I had noticed it in Beyond Trust, but not in this solution. But, recently they have incorporated something similar.If we could have some kind of out-of-the box feature that you can simply say "no" so they don't have to go into a development mode, that would a really helpful feature.Tech support staff can be more proactive.

Read more »

It would be a good idea if we could get an option to block based upon the content of an email, or the content of a file attachment.As far as future inclusions, it would be useful to display more threat intelligence, such as the actual area of the threat and the origin of the web crawling (Tor and Dark Web).They could also increase or improve the scalability because to my knowledge the biggest bandwidth can only support up to 10 gigs of input.Improvements could be achieved through greater integration capabilities with different firewall solutions. Integrating with the dashboard itself for different firewalls so users can also pull tags into their firewall dashboard.A better depth of view, being able to see deeper into the management process, is what I'd like to see.Based on what we deployed, they should emphasize the application filtering and the web center. We need to look deeper into the SSM inspection. If we get the full solution with that module, we don't need to get the SSM database from another supplier.I would love to see better reporting. Because you can't export some of the reports in proper formats, it is hard to extract the data from reports.The initial setup was complex because of the nature of our environment. When it comes to the type of applications and functions which we were looking at in terms of identifying malicious threats, there would be some level of complexity, if we were doing it right.

Read more »

Pricing and Cost Advice
In comparison to other products on the market, CyberArk is a more costly product.This solution is considered to be more expensive than others out there on the market today.I do not have any opinions to add about the pricing of the product.No, I do not have any advice on the price of the product.Network and security licenses are currently being managed by other outsource vendors, so they are facing some type of problems in the digital aspect.With reducing the privileged account access, there has been a huge improvement. They are now bringing more accounts on a little at a time.If you are looking at implementing this solution, buy the training and go to it.Our risk is definitely significantly lower. Also, our resources are low.

Read more »

When I compare this solution to its competitors in the market, I find that it is a little expensive.FireEye is comparable to other products, such as HX, but seems expensive. It may cause us to look at other products in the market.The current pricing is much better than before because they now offer product-related promotions along with some changes in product licensing. The new pricing model is better than before.We're partners with Cisco so we get a reasonable price. It's cheaper than Palo Alto in terms of licensing.Because of what the FireEye product does, it has significantly decreased our mean time in being able to identify and detect malicious threats. The company that I work with is a very mature organization, and we have seen the meantime to analysis decrease by at least tenfold.There are some additional services that I understand the vendor provides, but our approach was to package all of the features that we were looking to use into the product.The pricing is a little high.Pricing and licensing are reasonable compared to competitors.

Read more »

report
Use our free recommendation engine to learn which Advanced Threat Protection solutions are best for your needs.
354,290 professionals have used our research since 2012.
Ranking
Views
46,170
Comparisons
15,734
Reviews
53
Average Words per Review
563
Avg. Rating
8.9
Views
25,234
Comparisons
8,213
Reviews
12
Average Words per Review
354
Avg. Rating
7.8
Top Comparisons
Compared 11% of the time.
Also Known As
CyberArk Privileged Access Security, CyberArk Privileged Account Security, SSH Key Manager, Privileged Session Manager, Privileged Threat Analytics, Application Identity Manager, On-Demand Privileges Manager, Endpoint Privilege ManagerFireEye
Learn
CyberArk
FireEye
Overview

CyberArk is the trusted expert in privileged account security. Designed from the ground up with a focus on security, CyberArk has developed a powerful, modular technology platform that provides the industry's most comprehensive Privileged Account Security Solution.

FireEye Network Security is an advanced threat protection and breach detection platform that provides industry leading threat visibility and protection against the world’s most sophisticated and damaging attacks. By leveraging FireEye’s unique technologies and threat intelligence, FireEye Network Security detects what other security solutions miss, providing holistic security from the perimeter to the network core.

Offer
Learn more about CyberArk PAS
Learn more about FireEye Network Security
Sample Customers
Rockwell AutomationFFRDC, Finansbank, Japan Advanced Institute of Science and Technology, Investis, Kelsey-Seybold Clinic, Bank of Thailand, City of Miramar, Citizens National Bank, D-Wave Systems
Top Industries
REVIEWERS
Financial Services Firm28%
Insurance Company15%
Healthcare Company10%
Comms Service Provider8%
VISITORS READING REVIEWS
Financial Services Firm33%
Retailer15%
Comms Service Provider11%
Energy/Utilities Company9%
REVIEWERS
Financial Services Firm36%
University18%
Manufacturing Company18%
Comms Service Provider9%
Company Size
REVIEWERS
Small Business17%
Midsize Enterprise11%
Large Enterprise72%
VISITORS READING REVIEWS
Small Business11%
Midsize Enterprise12%
Large Enterprise76%
REVIEWERS
Small Business36%
Midsize Enterprise29%
Large Enterprise36%
Find out what your peers are saying about CyberArk PAS vs. FireEye Network Security and other solutions. Updated: July 2019.
354,290 professionals have used our research since 2012.
We monitor all Advanced Threat Protection reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.
Sign Up with Email