We performed a comparison between CyberArk Privileged Access Manager and SonicWall Capture Advanced Threat Protection based on real PeerSpot user reviews.
Find out in this report how the two Privileged Access Management (PAM) solutions compare in terms of features, pricing, service and support, easy of deployment, and ROI."We also use CyberArk’s Secrets Manager. Because AWS is the biggest area for us, we have accounts in AWS that are being rotated by CyberArk. We also have a manual process for the most sensitive of our AWS accounts, like root accounts. We've used Secrets Manager on those and that has resulted in a significant risk reduction, as well."
"The password vault and session monitoring are useful."
"It's secure and reliable. I especially appreciate that it's locked down and only allows access to authorized components."
"The most valuable feature of CyberArk Privileged Access Manager is the vault. I am satisfied with the interface and the documentation."
"The technical support for this solution is very good. If I was to rate it on a scale of one to five, I would give it a five."
"The Password Upload Utility tool makes it easier when setting up a Safe that contains multiple accounts and has cut down the amount of time that it takes to complete the task."
"We've written over a hundred custom connectors ourselves that allow us to do all types of privileged session management for various applications. On top of that, the rest of the API-based central credential providers allow us to get away from credentials that may be hard-coded in the script or some application."
"It enables companies to automate password management on target systems gaining a more secure access management approach."
"The reporting that you get from it is the most valuable feature. You can see it via the appliance itself, and also via the MySonicWall account for the registered device. You are able to select the file if it's malicious, and you can select it in the reporting and see what triggered it, and things like that. I found that to be quite useful."
"It also has an easy configuration. The feedback that we get from our customers is that it's a good product."
"I like this setup for a firewall. You can set things up very easily and you can automate items as well. It's a very robust firewall solution for enterprise as well as small businesses."
"Provides good protection and security."
"The stability of the solution is good. We haven't had any breaches or crashes. It's been very stable for us."
"We use it for protection against viruses and ransomware attacks."
"We get alert messages whenever there is a new threat. We are notified at the firewall level that things are blocked, which keeps us in our comfort zone."
"The ATP (Advanced Threat Protection) on scanning is the most valuable feature."
"The solution could improve by adding more connectors."
"We would like to expand the usage of the auto discovery accounts feed, then on our end, tie in the REST API for automation."
"There is some stuff that we still have not fully integrated, which is our AIM solution. We are having all types of issues with it. I have been working with Level 3 support on it, but otherwise, from a functionality perspective, everything has been working except for the AIM solution."
"CyberArk Privileged Access Manager could improve the integration docking, it should have more layers. For example, integration with OpenShift."
"It's a big program. To scale excessively, locally, on an on-prem application, takes a lot of servers."
"I think having a distributed architecture would certainly help this solution."
"Tech support staff can be more proactive."
"New functionalities and discovered bugs take longer to patch. We would greatly appreciate quicker development of security patches and bug corrections."
"It does fare well against enterprise products."
"Could provide online training to allow customers to learn more about the product."
"SonicWall should promote their roadmap and improve their marketing to customers."
"We would like to get immediate alerts from the alerting system without using third-parties."
"I would say the solution needs a much simpler user interface, but the functionality of the firewall is quite extensive. You need the user interface to be that way. However, if there was a way to make the user interface a little easier, that would be great."
"Having an on-premise solution as well would be an option for some people, but they'll want to use a cloud solution for their sandboxing. Certain sites would want to keep all the checks done on an on-premise appliance. All the checking, rather than sending that up into a cloud engine."
"I would like to have better documentation before starting with deployment because the deployment is a bit complex."
"The setup needs improvement. It needs to be made more user-friendly."
More CyberArk Privileged Access Manager Pricing and Cost Advice →
More SonicWall Capture Advanced Threat Protection Pricing and Cost Advice →
Earn 20 points
CyberArk Privileged Access Manager is ranked 1st in Privileged Access Management (PAM) with 142 reviews while SonicWall Capture Advanced Threat Protection is ranked 26th in Advanced Threat Protection (ATP). CyberArk Privileged Access Manager is rated 8.8, while SonicWall Capture Advanced Threat Protection is rated 7.8. The top reviewer of CyberArk Privileged Access Manager writes "Lets you ensure relevant, compliant access in good time and with an audit trail, yet lacks clarity on MITRE ATT&CK". On the other hand, the top reviewer of SonicWall Capture Advanced Threat Protection writes "When compared to other solutions, it is cheaper and more economical". CyberArk Privileged Access Manager is most compared with Cisco ISE (Identity Services Engine), Microsoft Entra ID, Delinea Secret Server, WALLIX Bastion and One Identity Safeguard, whereas SonicWall Capture Advanced Threat Protection is most compared with Palo Alto Networks WildFire, Fortinet FortiSandbox and Microsoft Defender for Office 365. See our CyberArk Privileged Access Manager vs. SonicWall Capture Advanced Threat Protection report.
We monitor all Privileged Access Management (PAM) reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.