We performed a comparison between CyberArk Privileged Access Manager and Microsoft Enterprise Mobility + Security based on real PeerSpot user reviews.
Find out what your peers are saying about CyberArk, Delinea, BeyondTrust and others in Privileged Access Management (PAM)."Technical support has been very responsive in navigating challenges. It is very easy to open a ticket."
"We have been able to manage application credentials in CyberArk, whether they come as a custom plugin or straight out-of-the-box."
"With CyberArk, you can be fully confident that your existing accounts are secure. You will be 100 percent"
"I'm no longer the product owner for PAM, but I can say that the most useful feature is the vault functionality, which keeps all your passwords secure in a digital vault."
"It is very simple to use."
"We also use CyberArk’s Secrets Manager. Because AWS is the biggest area for us, we have accounts in AWS that are being rotated by CyberArk. We also have a manual process for the most sensitive of our AWS accounts, like root accounts. We've used Secrets Manager on those and that has resulted in a significant risk reduction, as well."
"You can gradually implement CyberArk, starting with more easily attainable goals."
"We are able to rotate credentials and have privileged account access."
"Microsoft Mobility and EMS include Intune for Mobility, which provides mobile device management and mobile application management. With mobile device management, you can control the entire device in an organization."
"It is a stable solution...It is a scalable solution."
"The product is centralized and we can use it for security purposes."
"A good feature that is present is MAM or Mobile Application Management. We can deploy this feature on the device, which is not managed by the organization. If I apply some security configuration on a personal device, the user would be really disappointed. What we do instead is that we give all access to the applications related to corporate and ask the users to use the application. We secure the application by putting the security features on the applications and not on the users' devices. This way, the users are happy, and we also meet our company's compliance standards. Then, everyone is happy."
"The solution is scalable."
"The solution is very good at securing files. For example, if I forward a secure document, it's blocked from others, as I can send it with restrictions in relation to who can open it."
"The solution offers excellent documentation that is easily available online."
"The product is a unified solution and you don't require to purchase tools from different vendors. The system analyzes behavior and activity and takes steps for protection."
"It should be easier to install. It is a comprehensive product, which makes it difficult to install. You need to have their consulting services in order to get it all installed and set up correctly because there is so much going on. It would be nice if there were an easier way to do the installation without professional services. I suspect they get a fair amount of their money from professional services. So, there is not a huge incentive."
"As a customer, I might need a plugin for a specific product, or an application, and CyberArk might have already worked with some other client on it. There has to be some platform where it is available for everybody else to go and grab it, instead of my having to reinvent the wheel."
"The turnaround time for technical support is lengthy."
"We had an issue with the Copy feature... Apparently, in version 10, that Copy feature does not work. You actually have to click Show and then copy the password from within Show and then paste it. We've had a million tickets and we had to figure out a workaround to it."
"I think having a distributed architecture would certainly help this solution."
"It can be made user-friendly, in the sense of the console is pretty outdated."
"It is web-based, but other competitors have apps. We need to get there. It is just smoother to have an app. You don't have all the bugs from having a browser, and people like them better, since you can get to them via mobile."
"We would like to expand the usage of the auto discovery accounts feed, then on our end, tie in the REST API for automation."
"The MDM part of the engine could be better."
"We did the deployment with the help of Microsoft's consultants. But sometimes, we found it difficult to educate the application developers to integrate."
"The licensing is quite expensive."
"Microsoft's feature management is based on licenses. Microsoft follows ethical licensing and hence do not restrict the use of it."
"There are certain shortcomings in the licensing model of the product where improvements are required."
"Its performance needs enhancement."
"Microsoft Enterprise Mobility + Security is expensive."
"Technical support could be improved. Sometimes they use a third party that's not so knowledgeable in the product and that can slow down things a bit."
More CyberArk Privileged Access Manager Pricing and Cost Advice →
More Microsoft Enterprise Mobility + Security Pricing and Cost Advice →
CyberArk Privileged Access Manager is ranked 1st in Privileged Access Management (PAM) with 142 reviews while Microsoft Enterprise Mobility + Security is ranked 10th in Enterprise Mobility Management (EMM) with 10 reviews. CyberArk Privileged Access Manager is rated 8.8, while Microsoft Enterprise Mobility + Security is rated 8.4. The top reviewer of CyberArk Privileged Access Manager writes "Lets you ensure relevant, compliant access in good time and with an audit trail, yet lacks clarity on MITRE ATT&CK". On the other hand, the top reviewer of Microsoft Enterprise Mobility + Security writes "Seamless integration and easy implementation ". CyberArk Privileged Access Manager is most compared with Cisco ISE (Identity Services Engine), Microsoft Entra ID, Delinea Secret Server, WALLIX Bastion and One Identity Safeguard, whereas Microsoft Enterprise Mobility + Security is most compared with Cisco ISE (Identity Services Engine), Microsoft Intune, ManageEngine Endpoint Central and Cisco Meraki Systems Manager (MDM+EMM).
We monitor all Privileged Access Management (PAM) reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.