CyberArk Privileged Access Security vs Ixia ThreatARMOR

CyberArk Privileged Access Security is ranked 2nd in Advanced Threat Protection with 56 reviews vs Ixia ThreatARMOR which is ranked 15th in Advanced Threat Protection. The top reviewer of CyberArk Privileged Access Security writes "Gives us the security of all credentials in one place and lightens our administrative load". CyberArk Privileged Access Security is most compared with BeyondTrust PowerBroker, Cisco Identity Services Engine and Oracle Identity Manager (Oracle IAM). Ixia ThreatARMOR is most compared with FireEye Network Security, Palo Alto Networks WildFire and Cisco Stealthwatch Enterprise.
Cancel
You must select at least 2 products to compare!
+Add products to compare
Most Helpful Review
Use Ixia ThreatARMOR? Share your opinion.
Find out what your peers are saying about Palo Alto Networks, CyberArk, FireEye and others in Advanced Threat Protection.
287,901 professionals have used our research since 2012.

Quotes From Members Comparing CyberArk Privileged Access Security vs Ixia ThreatARMOR

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
Pricing and Cost Advice
With reducing the privileged account access, there has been a huge improvement. They are now bringing more accounts on a little at a time.If you are looking at implementing this solution, buy the training and go to it.Our risk is definitely significantly lower. Also, our resources are low.The cost is high compared to other products.CyberArk provides all the features bundled. This is compared to other vendors who provide them as a different license for each functionality.Cost efficiency is the number one thing that can be improved in my mind. This would change lots of companies minds on purchasing the product.It can be an expensive product.It is not a cheap solution. It is expensive as compared with other solutions. However, it is one of the best solutions in their domain.

Read more »

Information Not Available
report
Use our free recommendation engine to learn which Advanced Threat Protection solutions are best for your needs.
287,901 professionals have used our research since 2012.
Ranking
RANKING
Views
31,688
Comparisons
16,752
Reviews
56
Followers
1,608
Avg. Rating
8.6
Views
714
Comparisons
343
Reviews
0
Followers
66
Avg. Rating
N/A
Top Comparisons
Top ComparisonsSee more CyberArk Privileged Access Security competitors »See more Ixia ThreatARMOR competitors »
Also Known As
Also Known AsCyberArk Privileged Account Security, SSH Key Manager, Privileged Session Manager, Privileged Threat Analytics, Application Identity Manager, On-Demand Privileges Manager, Endpoint Privilege Manager
Website/Video
Website/VideoCyberArk
Ixia
Overview
Overview

CyberArk is the trusted expert in privileged account security. Designed from the ground up with a focus on security, CyberArk has developed a powerful, modular technology platform that provides the industry's most comprehensive Privileged Account Security Solution.

ThreatARMOR enhances security performance across your network, removing known bad IP addresses and traffic from not trusted countries.
By eliminating unwanted traffic, ThreatARMOR boosts the performance of your network security infrastructure.

OFFER
Learn more about CyberArk Privileged Access Security
Learn more about Ixia ThreatARMOR
Sample Customers
Sample CustomersRockwell AutomationHyper Box
Top Industries
Top Industries
REVIEWERS
Financial Services Firm
27%
Insurance Company
15%
Healthcare Company
12%
Retailer
9%
VISITORS READING REVIEWS
Financial Services Firm
29%
Insurance Company
9%
Comms Service Provider
7%
Energy/Utilities Company
7%
No Data Available
Company Size
Company Size
REVIEWERS
Small Business
21%
Midsize Enterprise
10%
Large Enterprise
69%
VISITORS READING REVIEWS
Small Business
17%
Midsize Enterprise
23%
Large Enterprise
60%
No Data Available
Find out what your peers are saying about Palo Alto Networks, CyberArk, FireEye and others in Advanced Threat Protection.
Download now
287,901 professionals have used our research since 2012.
We monitor all Advanced Threat Protection reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.

Sign Up with Email