We performed a comparison between CyberArk Privileged Access Manager and Digital Guardian based on real PeerSpot user reviews.
Find out in this report how the two Privileged Access Management (PAM) solutions compare in terms of features, pricing, service and support, easy of deployment, and ROI."It is a robust product."
"We are able to centrally manage credentials, touch applications, and rotate passwords."
"We like it for the ability to automatically change passwords. At least for my group, that's the best thing."
"The solution is scalable."
"The most valuable feature is that it always provides flexibility, password quality and one-time user check-in and check-out."
"For a while, there were individual IDs having privileged access. We wanted to restrict that. We implemented the solution so that it can be more of internal control. We can have session recordings happening and reduce our attacks."
"Password rotation, session recording & isolation and on-demand privileges."
"Ensures accounts are managed according to corporate policies."
"In Digital Guardian, they have the cloud correlation servers that give you visibility work like EBR and the correlation server works very well for security analysis."
"It has been scalable."
"The technical support is really terrific."
"The most valuable feature of Digital Guardian is its reputation. They have scored high on the Gartner Magic Quadrant."
"Some of the features that are highly appreciated are its robust data loss prevention capabilities, flexible deployment options, and the ability to monitor data transfer across multiple vectors."
"There is a built-in endpoint detection response that helps save money."
"We have been able to monitor access to files from each of our workstations."
"It has the added advantage of offering forensic analysis."
"Report creation could be improved. The policies could be more customized."
"I would love them to improve their UI customizing features."
"The current user interface is a little dated. However, I hear there are changes coming in the next version."
"The lead product has a slow process. There are some reports and requirements from CyberArk which are not readily available as an applicable solution. We have made consistent management requests in the logs."
"This is probably a common thing, but they do ask for a lot of log files, a lot of information. They ask you to provide a lot of information to them before they're willing to give you anything at all upfront. It would be better if they were a little more give-and-take upfront: "Why don't you try these couple of things while we take your log files and stuff and go research them?" A little bit of that might be more helpful."
"The PTA could be improved. Currently, companies often have multiple domains and sometimes it's difficult to implement CyberArk in this kind of infrastructure. For example, you can add CPM (Central Policy Manager) and PSM (Privileged Session Manager and PVWA (Password Vault Web Access) for access, but if you want to add PTA (Privileged Threat Analysis) to scan Vault logs, it is difficult because this component may be adding multiple domain environments."
"There is some stuff that we still have not fully integrated, which is our AIM solution. We are having all types of issues with it. I have been working with Level 3 support on it, but otherwise, from a functionality perspective, everything has been working except for the AIM solution."
"I'm not a fan of technical support with CyberArk. It's like jumping through red tape and hoops. Quite frankly, it's almost like when you call CyberArk you get the Help Desk or the level-one. I'm a level-one. I got the CCD, I know how to do the initial troubleshooting. When I call CyberArk it's because I can't figure the problem out. So I need a level-two, three, four. I don't need you to tell me, "Hey, open a ticket and then give me logs.""
"Some features on Mac and Linux are not complete currently. For example, some device control features haven't been transferred over to the other systems. If they could have their Windows features also available on Mac and Linux, that would be perfect. Some of our customers have a Mac environment for their RD environment. Having the solution fully capable of handling everything in a Mac environment is crucial."
"The initial setup is a bit more complex than other solutions."
"The solution has complexities around policy creation and deployment."
"If the client uses Windows 10 or 11 and Microsoft updates the operating system's version, Digital Guardian must update their product to match compatibility."
"There are a lot of issues with the current version of the Endpoint agent. It's not stable, it's resource-consuming, and there are some performance issues. If they could improve the stability of the agent it would be great."
"It would be helpful if there was an on-premise version of the solution for companies that cannot use the cloud, such as government sectors."
"Digital Guardian is an excellent solution but our experience with the partner has been the most horrible experience we have ever had with any partner."
"Technical support could be better."
More CyberArk Privileged Access Manager Pricing and Cost Advice →
CyberArk Privileged Access Manager is ranked 1st in Privileged Access Management (PAM) with 142 reviews while Digital Guardian is ranked 10th in Data Loss Prevention (DLP) with 11 reviews. CyberArk Privileged Access Manager is rated 8.8, while Digital Guardian is rated 7.4. The top reviewer of CyberArk Privileged Access Manager writes "Lets you ensure relevant, compliant access in good time and with an audit trail, yet lacks clarity on MITRE ATT&CK". On the other hand, the top reviewer of Digital Guardian writes "Great data classification and data discover with built-in endpoint detection and response". CyberArk Privileged Access Manager is most compared with Cisco ISE (Identity Services Engine), Microsoft Entra ID, Delinea Secret Server, WALLIX Bastion and One Identity Safeguard, whereas Digital Guardian is most compared with Forcepoint Data Loss Prevention, Symantec Data Loss Prevention, Microsoft Purview Data Loss Prevention, Microsoft Defender for Endpoint and CrowdStrike Falcon. See our CyberArk Privileged Access Manager vs. Digital Guardian report.
We monitor all Privileged Access Management (PAM) reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.