CyberArk Endpoint Privilege Manager Primary Use Case

Anish R - PeerSpot reviewer
Digital Architect - IAM at a manufacturing company with 10,001+ employees

We primarily use the solution on our endpoints. 

We are using pretty much everything there. Basically, what we are trying to do, is when the end user connects to machines, the actual Window servers, Linux servers, et cetera, everything is run through CyberArk. We haven't got into the Application Identity Management part yet, using CyberArk APIs. 

That said, we are using CyberArk whenever somebody wants to access a remote server or any server, for that matter. Our infrastructure is basically set up so that access is given through CyberArk.

View full review »
David Morimanno - PeerSpot reviewer
Principal / President at ERS Consulting LLC

The solution is used for:

Rotating local administrator passwords: EPM can be used to rotate the passwords of local administrator accounts on endpoints, which helps to prevent attackers from gaining unauthorized access to these accounts.

Revoking access to privileged accounts: EPM can be used to revoke access to privileged accounts when users no longer need it, which helps to reduce the risk of unauthorized access.

Monitoring privileged activity: EPM can be used to monitor all privileged activity on endpoints, which helps to identify and investigate suspicious activity.

Auditing privileged access: EPM can be used to audit all privileged access to sensitive systems and data, which helps to comply with security regulations.

View full review »
Mohammed Talukdar - PeerSpot reviewer
Enterprise Architect - Information Security at EasyJet

I'm using it in my company. It helps us manage our endpoints and keep things secure.

View full review »
Buyer's Guide
CyberArk Endpoint Privilege Manager
May 2024
Learn what your peers think about CyberArk Endpoint Privilege Manager. Get advice and tips from experienced pros sharing their opinions. Updated: May 2024.
770,394 professionals have used our research since 2012.
Asim-Bhatti - PeerSpot reviewer
Cybersecurity Consultant at Infosec Technologies Ltd

We use the solution to secure direct access to servers. Users could open their browsers and access resources. This applies to different teams, such as DevOps, IT services, and development teams. They can no longer use RDP connections directly to the server for their day-to-day tasks. Instead, they must log in to CyberArk with their account and then use a shared account to access the server. Another advantage is using (Privilege Access Management) PAM accounts, which have high permissions but are limited in their access.

View full review »
Ike-Ekweruo - PeerSpot reviewer
CyberArk Consultant at a tech services company with 11-50 employees

The primary use case for CyberArk Endpoint Privilege Manager (EPM) is to control applications on work sessions, particularly in environments where users are not supposed to have open rights. It can be utilized to remove local admin rights from work sessions and protect the local admin group from unauthorized modifications. By deploying policies on these work sessions, organizations can restrict users' privileges and prevent them from adding users to the local admin group, reducing administrative privilege risks on endpoints.

Furthermore, it enables the deployment of policies that allow users to elevate application permissions without granting additional user rights. These application policies benefit specific applications without affecting users' overall rights. For instance, developers may require elevated permissions for certain software applications without needing broader administrative rights. However, EPM does not directly improve an organization's response to endpoint threats. Instead, it depends on other policies, such as those designed to prevent ransomware attacks. These policies focus on different aspects of endpoint security, while application policies specifically address the elevation of application permissions for user tasks, such as development activities.

View full review »
Fabio Facchinetti - PeerSpot reviewer
Solution Achitect at Var Group SpA

I work with CyberArk Endpoint Privilege Manager for my partners. It is mainly for compliance, managing credentials securely, and monitoring what's going on with those credentials. Also, there's this thing about limiting privileges for certain users in production environments. But it seems like it's not just for big setups, it's also used across all kinds of workplaces.

View full review »
AP
Technical Manager at Tech Mahindra Limited

Previously, the enterprise EPM was on-premises. Now, it has gone to the SaaS model. So, we have used CyberArk professional services, wherein CyberArk deployed all the agents into our different Unix machines. This deployment is currently underway. The policy changes and the reconfigurations part are pending. In the coming quarter, or by the end of it,  the overall EPM deployment will be completed with this customer.

View full review »
Oluwajuwon Olorunlona - PeerSpot reviewer
Cyber Security Engineer at eprocessconsulting

My primary use case for CyberArk Endpoint Privilege Manager is malware prevention. The solution enables malware detonation, which helps you solve ransomware problems. For example, suppose an unknown application comes into your environment, and you have installed a CyberArk Endpoint Privilege Manager agent. In that case, the solution will filter the unknown traffic from an unknown publisher and stop it from infiltrating. The solution dashboard also lets you know that specific software is suspicious. Still, it depends on the category, but malware prevention is one use case of CyberArk Endpoint Privilege Manager.

Classifying a trusted or whitelisted application is also a use case of the solution.

Another use case of CyberArk Endpoint Privilege Manager is stopping credential theft. For example, you have credential stores all around, whether you know it or not. You have credential stores in web browsers like Chrome and Microsoft Edge. The solution protects you against an attacker that has already gained access to your environment, an internal person that leverages your system and wants to go to your web browser, or probably there's a browser path attack where the person has access to your browser. He can check your credential store, but if CyberArk Endpoint Privilege Manager is in place, that situation will be prevented.

Just-In-Time Access is another use case of the solution. For example, there's no administrator privilege on the system, but let's say a database administrator or application administrator wants to use the credential. You can provide that person with Just-In-Time Access so he can use the credential for thirty minutes, then that credential expires once the time is up.

CyberArk Endpoint Privilege Manager also separates the privileges. For example, a team of application managers receives access to specific software that the network team can't access.

View full review »
Omar_Jaimes - PeerSpot reviewer
Cybersecurity Architecture Manager at Data Warden

Inside we have a lot of applications, including three or four critical applications. With this application, remote users cannot run another application if you do not grant access to these applications. For example, if you want users to use Word or PowerPoint, you can allow usage of those and block usage of other things. If you want to run one application and you need to get permission, you send a ticket to ask for authorization to use it. That way, the company can control the access of every user.

View full review »
SF
Senior Consultant at a tech services company with 11-50 employees

CyberArk Endpoint Privilege Manager can be deployed across all platforms, such as AWS, GCP, and Ali Baba. 

The solution is used for management, multi-site failover, satellite vaulting, distributed architecture, custom CPM, PSM deployment, custom CCP, and CCP deployment.

View full review »
S Azeem - PeerSpot reviewer
Technology Manager at a computer software company with 201-500 employees

We use the solution for cyber security to block unwanted things and ensure endpoint security. We also use the solution to collect user analytics.

View full review »
PS
Enterprise Architect at a tech services company with 11-50 employees

Because we are dealing with personal health information, we have had to setup up a security broker for admin access in and out of the accounts.

They wanted to have a break-glass solution in case there was a problem with the multi-factor authentication or any other issues.

We chose to use CyberArk for their failover abilities. If the Multi-factor authentication fails then you can still log in and it has a second factor that authenticates.  

It gives them the break glass option that they needed.

View full review »
Aparna Solanki - PeerSpot reviewer
Security Consultant at SNSIN

I use the solution in my company since its PAM features are used for privileged accounts.

View full review »
AI
Technical Manager at Gulf IT

We primarily use the solution on our endpoints. 

View full review »
PM
IT Security Service Specialist at a manufacturing company with 10,001+ employees

We use CyberArk Endpoint Privilege Manager mainly for privilege management.

View full review »
TB
Professional Services Manager at PT Korelasi Persada Indonesia

CyberArk Endpoint Privilege Manager is used for compliance with password policies.

View full review »
Anson Mani - PeerSpot reviewer
Cyber Security Consultant at a financial services firm with 1,001-5,000 employees

I use the solution in my company since some users need a certain level of activity in EXE files. The tool is used to block certain issues that we don't want in our environment.

View full review »
YT
Channel Sales Manager at Cyber Knight Technologies FZ LLC

We use the solution as a Privilege Access Manager to manage user's passwords. 

View full review »
Ebenezer D - PeerSpot reviewer
Network Security & Data Management Admin at Digitaltrack

We are implementing this product to control the Privilege account. For example, from a Cyber Privilege account, we just want to know what the user is doing and how to control it. We use it for security and monitoring.

View full review »
CK
Product Consultant at M.Tech

There are a lot of companies that have servers that want to monitor their members if they do something that violates their policy.

View full review »
UU
Tech Support at a tech services company with 11-50 employees

Our primary use case for this solution is to manage enterprise passwords and monitor session connections.

View full review »
Buyer's Guide
CyberArk Endpoint Privilege Manager
May 2024
Learn what your peers think about CyberArk Endpoint Privilege Manager. Get advice and tips from experienced pros sharing their opinions. Updated: May 2024.
770,394 professionals have used our research since 2012.