We performed a comparison between CyberArk Privileged Access Manager and Proofpoint Email Protection based on real PeerSpot user reviews.
Find out what your peers are saying about CyberArk, Delinea, BeyondTrust and others in Privileged Access Management (PAM)."We are utilizing CyberArk to secure applications, credentials, and endpoints."
"It is a central repository. Therefore, if someone needs to access a server, then they go through CyberArk PAM. It provides a secure way to do this and CyberArk PAM records everything. For example, if you are connecting to a Linux server, then once you get into the Linux server and if it is integrated with CyberArk, it will automatically start recording everything that is being done. In most banks, seeing the recordings is very useful. If there are any gaps or something has happened which shouldn't have happened, then we can check the logs and videos. So, it gives security, in a robust manner, to the organization."
"I'm no longer the product owner for PAM, but I can say that the most useful feature is the vault functionality, which keeps all your passwords secure in a digital vault."
"The threat analytics is an important feature."
"I love the ability to customize the passwords: the forbidden characters, the length of the password, the number of capital, lowercase, and special characters. You can customize the password so that it tailor fits, for example, mainframes that can't have more than eight characters. You can say, "I want a random password that doesn't have these special characters, but it is exactly eight characters," so that it doesn't throw errors."
"We are able to rotate privileged user passwords to eliminate fraudulent use."
"Technical support is very helpful whenever we have any questions."
"On the customer accounts side, our account managers are responsive. If you ask them, they will get you whomever you need."
"The stability is very good."
"There is no downtime."
"The most valuable features of Proofpoint Email Protection are ease of use, data loss prevention, antivirus, and spam protection."
"URL scanning and online relay service are the most valuable features of Proofpoint Email Protection."
"The most valuable feature of Proofpoint Email Protection is the dashboards and their visibility, easy configuration, and artificial intelligence. Additionally, the reports are very important and helpful."
"The most valuable feature of Proofpoint Email Protection is the central location dashboard for viewing all the related information for risk."
"Proofpoint Email Protection's initial installation is straightforward. It took us less than a day to complete the implementation."
"The most valuable feature is the option to edit the inbound security."
"One thing that could be improved is to create of a better alternative for fixing group policy fees. We currently use Microsoft, but they have introduced new policies that may not be compatible."
"I would love them to improve their UI customizing features."
"The initial setup has room for improvement to be more straightforward."
"It can be made user-friendly, in the sense of the console is pretty outdated."
"New functionalities and discovered bugs take longer to patch. We would greatly appreciate quicker development of security patches and bug corrections."
"Currently, in Secure Connect, an end user is required to enter account information manually, and cannot save any of this information for future use."
"If you are an administrator or architect, then the solution is kind of complicated, as it is mostly focused on the end user. So, they need to also focus on the people who are implementing it."
"We would like to expand the usage of the auto discovery accounts feed, then on our end, tie in the REST API for automation."
"The solution should add post-sales training."
"Integration and filtering out who you want and don't want to have integrated ID could be improved."
"Proofpoint Email Protection's interface is confusing and could be improved."
"The solution could be improved with the addition of PLP and email encryption features."
"It has too many screens. It is kind of a conglomeration of products. In other words, they built product A, product B, and product C, and they are yet to integrate them into a single administrative console. I would certainly like to see a more seamless administrative interface. I would also like to see them include more bang for the buck, by including features like email fraud protection, rather than making their product so piecemeal, where you are buying little pieces. I agree with the idea of having multiple tiers or layers, but maybe as small, medium, and large, as opposed to an a la carte menu."
"Sometimes it detects false positives."
"Unfortunately, the whole product is going downhill right now, ever since they were sold to Thoma Bravo. We're constantly having problems with stability and the product in general."
"Proofpoint Email Protection could improve the Mail Trace feature and make navigation easier."
More CyberArk Privileged Access Manager Pricing and Cost Advice →
CyberArk Privileged Access Manager is ranked 1st in Privileged Access Management (PAM) with 142 reviews while Proofpoint Email Protection is ranked 1st in Secure Email Gateway (SEG) with 44 reviews. CyberArk Privileged Access Manager is rated 8.8, while Proofpoint Email Protection is rated 8.4. The top reviewer of CyberArk Privileged Access Manager writes "Lets you ensure relevant, compliant access in good time and with an audit trail, yet lacks clarity on MITRE ATT&CK". On the other hand, the top reviewer of Proofpoint Email Protection writes "A reasonably priced product that offers protection to emails, along with spam filters". CyberArk Privileged Access Manager is most compared with Cisco ISE (Identity Services Engine), Microsoft Entra ID, Delinea Secret Server, WALLIX Bastion and One Identity Safeguard, whereas Proofpoint Email Protection is most compared with Microsoft Defender for Office 365, Microsoft Exchange Online Protection (EOP), Palo Alto Networks WildFire, Cisco Secure Email and Fortinet FortiMail.
We monitor all Privileged Access Management (PAM) reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.