We performed a comparison between CyberArk Endpoint Privilege Manager and Trend Micro Smart Protection based on real PeerSpot user reviews.
Find out in this report how the two Privileged Access Management (PAM) solutions compare in terms of features, pricing, service and support, easy of deployment, and ROI."Users can scale the solution."
"The feature called PTA, which stands for Privileged Threat Analytics keeps track of what admins are doing and works with Centimeters. If something fishy is going on with a user's credentials, it alerts the security team so they can act fast. Plus, it automates stuff like resetting credentials or blocking users. So, if there's a potential hack, CyberArk can change passwords and lock out users in a snap. It also gives you a heads-up if anything unusual is going on with server activities, like someone creating new users with uncontrolled credentials."
"The solution's technical support is good."
"The most valuable feature of CyberArk Endpoint Privilege Manager is its ability to reset passwords every time that it is needed or periodically."
"The most valuable feature is that their database is completely encrypted and protected with multiple layers."
"CyberArk Endpoint Privilege Manager (EPM) 's most valuable feature is its ability to manage user application privileges and protect against ransomware attacks by controlling access to specific files and applications."
"I have always found that CyberArk is a very tight, foolproof product compared to most other products available."
"It offers great performance."
"The most useful feature is endpoint security."
"Trend Micro Smart Protection has good features like malware analysis, C-to-C connection and detection, workbench, auto security play with features, and lots of DDI features."
"The most valuable feature of the solution is its simplicity."
"The most valuable aspect of the solution is that it also protects our smartphones. It's one of the reasons we use Trend Micro specifically."
"The solution has multiple modules within a single agent deployment."
"The sandboxing is more proactive and more reliable than any of the other endpoint protection solutions."
"It is their most comprehensive endpoint protection solution. It includes DLP and Office 365. It also includes device control and the rest of the little bells and whistles that the traditional AV vendors have."
"The stability is good and I like the level of performance I can get."
"For an experienced system implementer it will take approximately one day. However, for somebody who is inexperienced it may take up to five days."
"Can be improved by allowing computers to be excluded from policies."
"Compared to other tools like Linux, this solution isn't as user-friendly."
"The tool should be more user-friendly."
"They need much better integration with Azure AD."
"The solution's pricing could be better."
"CyberArk is a pretty heavy solution."
"The product needs a streamlined user interface; improvements to the user interface can enhance user experience and make the solution more intuitive to navigate."
"Trend Micro Smart Protection could improve the false positive with some integrations with other solutions and automated reporting. The reports should allow the user to set up some customer trigger alerts instead of the user having to look at the report manually. Additionally, the responses from sender detection and response feature could improve."
"The only notable concern is the level of support in the particular region of Sri Lanka. Following events in the past two years, the quality of technical support has regrettably declined."
"Documentation-wise, they are a disaster. If you want to know something about Trend Micro, you will not find anything useful from Trend Micro themselves. You have to basically dig some blog, or you need to seek some expert to help you understand what they are offering. I have never seen such a good product with such disastrous documentation. Feature-wise, almost all vendors are providing the same features, but it is all about the integration. For example, Trend Micro is promoting their endpoint protection suite, but they never mention about the integration that they are offering with their EDR solution. They are treating each product as a separate island, and you don't know much about their integration. It would be good if they can focus on integration."
"We found an issue on the server-side. Sometimes, it slows down the servers if you install it on the SQL."
"Smart Protection could be more compatible with older operating systems like Windows XP and Windows 2000. Some of our clients have requested that."
"This product is not very simple and in fact, kind of hard for some people to understand."
"It could be faster in responding to new threats like ransomware."
"The solution should improve its mobile management solution."
More CyberArk Endpoint Privilege Manager Pricing and Cost Advice →
CyberArk Endpoint Privilege Manager is ranked 6th in Privileged Access Management (PAM) with 26 reviews while Trend Micro Smart Protection is ranked 31st in Endpoint Protection Platform (EPP) with 38 reviews. CyberArk Endpoint Privilege Manager is rated 8.0, while Trend Micro Smart Protection is rated 8.0. The top reviewer of CyberArk Endpoint Privilege Manager writes "Offers integrated solutions and expands its capabilities through strategic acquisitions". On the other hand, the top reviewer of Trend Micro Smart Protection writes "Offers strong, all-around cybersecurity but is expensive". CyberArk Endpoint Privilege Manager is most compared with Microsoft Defender for Endpoint, BeyondTrust Endpoint Privilege Management, CrowdStrike Falcon, CyberArk Privileged Access Manager and Tanium, whereas Trend Micro Smart Protection is most compared with Trend Micro Apex One, Check Point Harmony Endpoint, Microsoft Defender for Endpoint, CrowdStrike Falcon and Symantec Endpoint Security. See our CyberArk Endpoint Privilege Manager vs. Trend Micro Smart Protection report.
We monitor all Privileged Access Management (PAM) reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.