CyberArk Privileged Access Security vs TSFactory RecordTS

CyberArk Privileged Access Security is ranked 1st in User Activity Monitoring with 56 reviews vs TSFactory RecordTS which is ranked 5th in User Activity Monitoring with 1 review. The top reviewer of CyberArk Privileged Access Security writes "Gives us the security of all credentials in one place and lightens our administrative load". The top reviewer of TSFactory RecordTS writes "Utilize support for installation. They are quick to respond, and quick at getting to the bottom of issues". CyberArk Privileged Access Security is most compared with BeyondTrust PowerBroker, Cisco Identity Services Engine and Oracle Identity Manager (Oracle IAM). TSFactory RecordTS is most compared with Ekran System, ObserveIT and CyberArk Privileged Access Security.
Cancel
You must select at least 2 products to compare!
+Add products to compare
Most Helpful Review

Have A Question About User Activity Monitoring?

Our experts can help. 287,901 professionals have used our research on 6,458 solutions.

Quotes From Members Comparing CyberArk Privileged Access Security vs TSFactory RecordTS

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
Pros
The voice technology is very good.It is very simple to use.CyberArk is not just an IT security or cybersecurity tool. It's also an administrator tool. I had a fair number of systems where the passwords were not fully managed by CyberArk yet, and they were expiring every 30 or 45 days. I was able to get management turned on for those accounts. From an administrator perspective, I didn't have to go back into those systems and manually change those passwords anymore. CyberArk... lightened the load on our administrative work.You can write different types of policies for custom business needs or any developer needs. If they need certain functions allocated, they can be customized easily.We can make a policy that affects everybody instantly.We have accomplished our security goals. We have two-factor authenticated and vaulted our important accounts, so people can't just steal stuff from us.The flexibility of integrating with other technologies is important because of a lot of applications - a lot of COTS products - are not supported when we are bringing the application IDs. The CyberArk platform provides a lot of opportunities to do customization.We are maintaining compliance in PCI, SOX and HIPPA, which is a big thing. Auditors really like it, and it has made us stay compliant.

Read more »

We have used the Remote Desktop Protocol (RDP) and Citrix session recording features, and have found them to be extremely valuable.

Read more »

Cons
The initial setup was somewhat complex.This is probably a common thing, but they do ask for a lot of log files, a lot of information. They ask you to provide a lot of information to them before they're willing to give you anything at all upfront. It would be better if they were a little more give-and-take upfront: "Why don't you try these couple of things while we take your log files and stuff and go research them?" A little bit of that might be more helpful.The interface on version 9 looks old.One of our current issues is a publishing issue. If we whitelist Google Chrome, all the events of Google Chrome should be gone. It is not happening.CyberArk has a lot on the privileged access side but they have to concentrate more on the application side as well.Make it easier to deploy.There is some stuff that we still have not fully integrated, which is our AIM solution. We are having all types of issues with it. I have been working with Level 3 support on it, but otherwise, from a functionality perspective, everything has been working except for the AIM solution. We had an issue with the Copy feature... Apparently, in version 10, that Copy feature does not work. You actually have to click Show and then copy the password from within Show and then paste it. We've had a million tickets and we had to figure out a workaround to it.

Read more »

A built in utility that alerts when connections are made, either via RDP or ICA.

Read more »

Pricing and Cost Advice
With reducing the privileged account access, there has been a huge improvement. They are now bringing more accounts on a little at a time.If you are looking at implementing this solution, buy the training and go to it.Our risk is definitely significantly lower. Also, our resources are low.The cost is high compared to other products.CyberArk provides all the features bundled. This is compared to other vendors who provide them as a different license for each functionality.Cost efficiency is the number one thing that can be improved in my mind. This would change lots of companies minds on purchasing the product.It can be an expensive product.It is not a cheap solution. It is expensive as compared with other solutions. However, it is one of the best solutions in their domain.

Read more »

We went with subscription licensing. It paid off big time for us as we installed the V.3, and just received V.4 without paying for the upgrade.

Read more »

report
Use our free recommendation engine to learn which User Activity Monitoring solutions are best for your needs.
287,901 professionals have used our research since 2012.
Ranking
RANKING
Views
31,688
Comparisons
16,752
Reviews
56
Followers
1,608
Avg. Rating
8.6
Views
368
Comparisons
138
Reviews
1
Followers
32
Avg. Rating
9.0
Top Comparisons
Top ComparisonsSee more CyberArk Privileged Access Security competitors »
Compared 46% of the time.
Compared 41% of the time.
See more TSFactory RecordTS competitors »
Also Known As
Also Known AsCyberArk Privileged Account Security, SSH Key Manager, Privileged Session Manager, Privileged Threat Analytics, Application Identity Manager, On-Demand Privileges Manager, Endpoint Privilege Manager
Website/Video
Website/VideoCyberArk
TSFactory
Overview
Overview

CyberArk is the trusted expert in privileged account security. Designed from the ground up with a focus on security, CyberArk has developed a powerful, modular technology platform that provides the industry's most comprehensive Privileged Account Security Solution.

Security and Compliancy Assistance

Recording sessions allows you to monitor access to files or programs that contain sensitive or confidential information; for example financial data, customer information, or personnel records. This information can be used to confirm you are meeting compliancy and security requirements.

Built for the Cloud and Virtualized Environments

From the ground up, RecordTS was designed to work in hosted environments, making it a tightly integrated solution to monitor remote access to your cloud infrastructure. RecordTS works well with VMware, Hyper-V, XenServer and other virtual hosting environments built on Windows Server and Workstation virtual machines.

High Reliability Architecture

In the event your network or database become unstable, your session data will be buffered and stored locally until stability can be restored. There are internal mechanisms (drain mode) to accommodate controlled, graceful system reboots as well as support for session reliability and quick start so users are not left waiting to reconnect to their active sessions.

Enterprise Design for Scalability

Whether you are recording one machine or ten thousand, RecordTS can handle the job. With its robust distributed, centrally managed architecture, deploying session recording to a large infrastructure is as simple as 1-2-3.

OFFER
Learn more about CyberArk Privileged Access Security
Learn more about TSFactory RecordTS
Sample Customers
Sample CustomersRockwell AutomationBASF, Cerner, Covance, Credit Suisse, Fiserv, GE Healthcare, ING, International Culinary Center, Mitsubishi, Shell, Siemens, Swift, Spectrum, Tyson
Top Industries
Top Industries
REVIEWERS
Financial Services Firm
27%
Insurance Company
15%
Healthcare Company
12%
Retailer
9%
VISITORS READING REVIEWS
Financial Services Firm
29%
Insurance Company
9%
Comms Service Provider
7%
Energy/Utilities Company
7%
No Data Available
Company Size
Company Size
REVIEWERS
Small Business
21%
Midsize Enterprise
10%
Large Enterprise
69%
VISITORS READING REVIEWS
Small Business
17%
Midsize Enterprise
23%
Large Enterprise
60%
No Data Available

Have A Question About User Activity Monitoring?

Our experts can help. 287,901 professionals have used our research on 6,458 solutions.
We monitor all User Activity Monitoring reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.

Sign Up with Email