CyberArk Privileged Account Security vs Palo Alto Networks VM-Series

CyberArk Privileged Account Security is ranked 2nd in Advanced Threat Protection with 33 reviews vs Palo Alto Networks VM-Series which is ranked 9th in Advanced Threat Protection with 4 reviews. The top reviewer of CyberArk Privileged Account Security writes "It is modular, and each module can extend its operational area with plug-ins". The top reviewer of Palo Alto Networks VM-Series writes "A reliable tool with excellent support". CyberArk Privileged Account Security is most compared with BeyondTrust PowerBroker, Cisco Identity Services Engine and Oracle Identity Manager (Oracle IAM). Palo Alto Networks VM-Series is most compared with Fortinet FortiGate, Meraki MX Firewalls and Zscaler Web Security. See our CyberArk Privileged Account Security vs Palo Alto Networks VM-Series report.
Cancel
You must select at least 2 products to compare!
+Add products to compare
Most Helpful Review
Cyberark privileged account security vs. palo alto networks vm series report from it central station 2018 05 04 thumbnail
Find out what your peers are saying about CyberArk Privileged Account Security vs Palo Alto Networks VM-Series and others in Advanced Threat Protection.
270,604 professionals have used our research since 2012.

Quotes From Members Comparing CyberArk Privileged Account Security vs Palo Alto Networks VM-Series

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
Pros
Automatic password management, which will automatically change passwords based on compliance requirements.DVR like video recording and text-based recording for easier audits.The Password Upload Utility tool makes it easier when setting up a Safe that contains multiple accounts and has cut down the amount of time that it takes to complete the task.CyberArk has helped us to identify, store, protect, and monitor the usage of privileged accounts.The Vault offers great capabilities for structuring and accessing data.Central Password Manager is useful for agentless automated password management through AD integration as well as endpoints for different devices.Allows secure, logged access to highly sensitive servers and services.The regulation of accounts is by far the most needed and valuable part of the application.

Read more »

It is reliable and the support is very good.In the newer version, there are 3850s, all of them are scalable. They fit better into the medium or small businesses.They now know the details about their network traffic that they did not know before: Applications that they are using and some application they did not know they were using.A solid operating system with all the necessary data center security features.We have reduced the number of configuration lines by 90%. We need fewer number of admins right now because of it.It scales linearly with load and no issues.We now know a lot more detail about what our users are doing on the network.It is very stable. It is fairly easy to use.

Read more »

Cons
This product needs professional consulting services to onboard accounts effectively based user profiles.Currently, in Secure Connect, an end user is required to enter account information manually, and cannot save any of this information for future use.Online help needs to be looked into with live agent support.The product documentation has to be more precise in certain aspects with explanations for functionality limitations along with reference material or screenshots.New functionalities and discovered bugs take longer to patch. We would greatly appreciate quicker development of security patches and bug corrections.​It's hard to find competent resellers/support.Initial setup is complex. Lots of architecture, lots of planning, and lots of education and training are needed.it manages creds based on Organizational Units. That is, a "safe" is limited to specific OUs. That makes for very elaborate OU structure, or you risk exposing too many devices by putting most of them in fewer OUs.

Read more »

From time to time, they have released some content updates that have some issues, maybe twice a year.There are various reports that come with the box or with the VMware, but you can only run them daily.All areas need improvement: manufacturing, education, financial, etc.The user-friendliness of the UI could be improved.The interface is all Java-based. I would prefer an HTML5 interface.Just sometimes it can be a bit sluggish navigating through pages. That is just purely because of Java.​

Read more »

Pricing and Cost Advice
The cost is high compared to other products.CyberArk provides all the features bundled. This is compared to other vendors who provide them as a different license for each functionality.Cost efficiency is the number one thing that can be improved in my mind. This would change lots of companies minds on purchasing the product.It can be an expensive product.It is not a cheap solution. It is expensive as compared with other solutions. However, it is one of the best solutions in their domain.Pricing and licensing depend on the environment.

Read more »

I know Palo Alto is not cheap. They have been telling me, the members of the finance team, it is not a cheap solution. It is a solution whose target is that no matter how big your organization is, small, medium, or large, it is about the maturity of your security team or infrastructure team whom you want to work with.It is a little bit of crazy if you compare it to Vanguard, Sophos, or even Cisco. The newest version of Cisco, the Next-Generation Firewall of Cisco, is less expensive than Palo Alto. It is more comparable to Check Point.For licensing, It depends how they want to use the firewall. The firewall can be used only for IPS purposes. If you only want that firewall IPSs, you will only need a license that is called threat prevention. That license, threat prevention, includes vulnerabilities, antivirus signatures and one additional measure (that I can't remember), but it includes three measures and security updates.The box, if you do not want to buy the threat prevention license in the box, you can buy it only with the support license. It is for the support of the hardware. It works like a simple firewall. It integrates what it calls user IDs and application IDs. If you do not buy any other license, only the firewall, Palo Alto will also help you improve a lot of your security.​The licensing is pretty much like everyone else.When you have a client compare box against box, a lot of times Palo Alto is a bit more expensive, but its network firewalls have a very rich ratio.Do not buy larges box if you do not need them. Rightsizing is a great task to do before​hand.For what you get, it does do what it says. It is a good value for an enterprise firewall.​

Read more »

Cyberark privileged account security vs. palo alto networks vm series report from it central station 2018 05 04 thumbnail
Find out what your peers are saying about CyberArk Privileged Account Security vs Palo Alto Networks VM-Series and others in Advanced Threat Protection.
270,604 professionals have used our research since 2012.
Ranking
RANKING
Views
28,843
Comparisons
16,662
Reviews
31
Followers
1,799
Avg. Rating
8.5
Views
477
Comparisons
263
Reviews
3
Followers
64
Avg. Rating
9.0
Top Comparisons
Top ComparisonsSee more CyberArk Privileged Account Security competitors »See more Palo Alto Networks VM-Series competitors »
Also Known As
Also Known AsSSH Key Manager, Privileged Session Manager, Privileged Threat Analytics, Application Identity Manager, On-Demand Privileges Manager, Endpoint Privilege Manager
Website/Video
Website/VideoCyberArk
  • Vendor 7132 screenshot 1526145151
Palo Alto Networks
  • Vendor 7769 screenshot 1526145749
OverviewQuestionmark icon
Overview

CyberArk is the trusted expert in privileged account security. Designed from the ground up with a focus on security, CyberArk has developed a powerful, modular technology platform that provides the industry's most comprehensive Privileged Account Security Solution.

The VM-Series is a virtualized form factor of our next-generation firewall that can be deployed in a range of private and public cloud computing environments based on technologies from VMware, Amazon Web Services, Microsoft, Citrix and KVM.

The VM-Series natively analyzes all traffic in a single pass to determine the application identity, the content within, and the user identity. These core elements of your business can then be used as integral components of your security policy, enabling you to improve your security efficacy through a positive control model and reduce your incident response time though complete visibility into applications across all ports.

In both private and public cloud environments, the VM-Series can be deployed as a perimeter gateway, an IPsec VPN termination point, and a segmentation gateway, protecting your workloads with application enablement and threat prevention policies.

OFFER
Learn more about CyberArk Privileged Account Security
Learn more about Palo Alto Networks VM-Series
Sample Customers
Sample CustomersRockwell AutomationWarren Rogers Associates
Top IndustriesQuestionmark icon
Top Industries
REVIEWERS
Financial Services Firm
33%
Insurance Company
17%
Hospitality Company
8%
Energy/Utilities Company
8%
VISITORS READING REVIEWS
Financial Services Firm
30%
Insurance Company
8%
Comms Service Provider
7%
Marketing Services Firm
6%
No Data Available
Company SizeQuestionmark icon
Company Size
REVIEWERS
Small Business
32%
Midsize Enterprise
13%
Large Enterprise
55%
VISITORS READING REVIEWS
Small Business
18%
Midsize Enterprise
23%
Large Enterprise
59%
No Data Available
Cyberark privileged account security vs. palo alto networks vm series report from it central station 2018 05 04 thumbnail
Find out what your peers are saying about CyberArk Privileged Account Security vs Palo Alto Networks VM-Series and others in Advanced Threat Protection.
Download now
270,604 professionals have used our research since 2012.
We monitor all Advanced Threat Protection reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.

Sign Up with Email