CyberArk Endpoint Privilege Manager Overview

CyberArk Endpoint Privilege Manager is the #27 ranked solution in our list of endpoint security software. It is most often compared to BeyondTrust Endpoint Privilege Management: CyberArk Endpoint Privilege Manager vs BeyondTrust Endpoint Privilege Management

What is CyberArk Endpoint Privilege Manager?

CyberArk Endpoint Privilege Manager enables organizations to enforce least privilege policies for business and administrative users, as well as control applications to reduce the attack surface without halting productivity. The solution helps organizations revoke everyday local administrator privileges from business users while seamlessly elevating privileges when required by trusted applications. CyberArk Endpoint Privilege Manager also enables security teams to enforce granular least privilege policies for IT administrators, helping organizations effectively segregate duties on Windows servers. Complementing these privilege controls, the solution also delivers application controls, which are designed to manage and control which applications are permitted to run on endpoints and servers and prevent malicious applications from penetrating the environment.

CyberArk Endpoint Privilege Manager is also known as Viewfinity.

CyberArk Endpoint Privilege Manager Buyer's Guide

Download the CyberArk Endpoint Privilege Manager Buyer's Guide including reviews and more. Updated: January 2021

CyberArk Endpoint Privilege Manager Customers

Clearstream, McKesson, Boston Childrens Hospital

CyberArk Endpoint Privilege Manager Video

Pricing Advice

What users are saying about CyberArk Endpoint Privilege Manager pricing:
  • "I think that it was in the range of $200,000 that had to get approved."
  • "licensing for this solution is based on the number of APV (privileged users), and the number of sessions that you want to record."

CyberArk Endpoint Privilege Manager Reviews

Filter by:
Filter Reviews
Industry
Loading...
Filter Unavailable
Company Size
Loading...
Filter Unavailable
Job Level
Loading...
Filter Unavailable
Rating
Loading...
Filter Unavailable
Considered
Loading...
Filter Unavailable
Order by:
Loading...
  • Date
  • Highest Rating
  • Lowest Rating
  • Review Length
Search:
Showingreviews based on the current filters. Reset all filters
WarranGrin
Enterprise Cyber Security Advisor at a energy/utilities company with 5,001-10,000 employees
Real User
Top 20
May 19, 2020
Enables us to see how users use their access and lock down things that aren't appropriate

Pros and Cons

  • "It has drastically reduced the attack surface for local administrative rights and the chance of escalation of privilege. We've removed, at this point, close to 98 percent of the local administrative accounts on workstations. If there were an incident, it would stop at that point and we'd be able to know."
  • "We have had some major issues with the tool, but we have worked with the R&D teams and we have worked with support. There is room for improvement, especially on response times. But they're working on it and they're doing the best they can."

What other advice do I have?

If you're going to implement Endpoint Privilege Manager, don't just give everybody EPM and think you're done with it. Spend the time, engineer it, think about it from a project perspective, and deploy it with the concept of least privilege. Really spend the time to make sure it's deployed correctly and all the processes are established so it's smooth sailing from there on in. Overall, I would rate this product at 8.5 out of 10. The product does exactly what we need it to do. However, we do need a little bit more action and response time with regards to support. In terms of the effect working…
Paul Stapleton
Enterprise Architect at a tech services company with 11-50 employees
Real User
Oct 25, 2020
Supports dynamically-generated keys, it's stable, and has automatic lifecylce management

What is our primary use case?

Because we are dealing with personal health information, we have had to setup up a security broker for admin access in and out of the accounts. They wanted to have a break-glass solution in case there was a problem with the multi-factor authentication or any other issues. We chose to use CyberArk for their failover abilities. If the Multi-factor authentication fails then you can still log in and it has a second factor that authenticates. It gives them the break glass option that they needed.

Pros and Cons

  • "The most valuable feature is that it does lifecycle management and that it will change to whatever the end target is."
  • "It's an old product and has many areas that can be improved."

What other advice do I have?

I basically am trying to drive their digital transformation and do the overall build a mass data network for their data strategy. Building out different APIs and different things. Building out a blockchain security framework to allow HIPAA compliance where you can go in at the portability of their data to pull in and out without creating an issue with the payers. I would recommend this solution depending on what the business needs are. I'm a big proponent for keeping things simple and trying to avoid unneeded complexity. The company demanded certain things and only wanted to do it one way, and…
Learn what your peers think about CyberArk Endpoint Privilege Manager. Get advice and tips from experienced pros sharing their opinions. Updated: January 2021.
455,301 professionals have used our research since 2012.
Uchechukwu Ukazu
Tech Support at a tech services company with 11-50 employees
Real User
Top 5
Apr 15, 2019
DNS Scanning allows for the reporting of account location information

What is our primary use case?

Our primary use case for this solution is to manage enterprise passwords and monitor session connections.

Pros and Cons

  • "This is the number one product for privilege account security."
  • "For an experienced system implementer it will take approximately one day. However, for somebody who is inexperienced it may take up to five days."

What other advice do I have?

This is the number one product for privilege account security. I suggest getting the best help available when it comes time to implement and deploy this solution. Once this is complete, everything else will fall into place. I would rate this product eight out of ten. It is very good, but there is always room for improvement.
reviewer925509
Senior Specialist, Cyber Security Technology at a tech services company with 51-200 employees
Real User
Nov 20, 2019
Good monitoring and recording features and has a good interface

What is our primary use case?

I'm a senior specialist in cybersecurity technology. We are partners and resellers of CyberArk and a system integrator company. We're not the end-users. Our customers are generally interested in the Privilege Access Management solution and EPM which is an extension of that.

Pros and Cons

  • "Monitoring and recording are valuable features, particularly the recording."
  • "I'd like to see the product include out of the box connectors."

What other advice do I have?

I would rate this product an eight out of 10.
Buyer's Guide
Download our free CyberArk Endpoint Privilege Manager Report and get advice and tips from experienced pros sharing their opinions.