CyberArk Endpoint Privilege Manager OverviewUNIXBusinessApplication

CyberArk Endpoint Privilege Manager is the #29 ranked solution in our list of endpoint security software. It is most often compared to BeyondTrust Endpoint Privilege Management: CyberArk Endpoint Privilege Manager vs BeyondTrust Endpoint Privilege Management

What is CyberArk Endpoint Privilege Manager?

CyberArk Endpoint Privilege Manager enables organizations to enforce least privilege policies for business and administrative users, as well as control applications to reduce the attack surface without halting productivity. The solution helps organizations revoke everyday local administrator privileges from business users while seamlessly elevating privileges when required by trusted applications. CyberArk Endpoint Privilege Manager also enables security teams to enforce granular least privilege policies for IT administrators, helping organizations effectively segregate duties on Windows servers. Complementing these privilege controls, the solution also delivers application controls, which are designed to manage and control which applications are permitted to run on endpoints and servers and prevent malicious applications from penetrating the environment.

CyberArk Endpoint Privilege Manager is also known as Viewfinity.

CyberArk Endpoint Privilege Manager Buyer's Guide

Download the CyberArk Endpoint Privilege Manager Buyer's Guide including reviews and more. Updated: September 2021

CyberArk Endpoint Privilege Manager Customers

Clearstream, McKesson, Boston Childrens Hospital

CyberArk Endpoint Privilege Manager Video

Pricing Advice

What users are saying about CyberArk Endpoint Privilege Manager pricing:
  • "Pricing depends on how many devices you use. Right now, on-premise, it costs us a little, but it's worth it. It seems like the cloud solution is much more expensive. We got this solution one year ago, and it's like we bought the solution, and now they are not going to support it on-premise anymore. We are in the implementation phase, and we missed this, and we already paid for the licenses. This is wasted time from my perspective, and CyberArk should be more customer-friendly."
  • "I think that it was in the range of $200,000 that had to get approved."

Filter Reviews

Filter by:
Filter Reviews
Industry
Loading...
Filter Unavailable
Company Size
Loading...
Filter Unavailable
Job Level
Loading...
Filter Unavailable
Rating
Loading...
Filter Unavailable
Considered
Loading...
Filter Unavailable
Order by:
Loading...
  • Date
  • Highest Rating
  • Lowest Rating
  • Review Length
Search:
Showingreviews based on the current filters. Reset all filters
WarranGrin
Enterprise Cyber Security Advisor at a energy/utilities company with 5,001-10,000 employees
Real User
Top 20
Enables us to see how users use their access and lock down things that aren't appropriate

Pros and Cons

  • "It has drastically reduced the attack surface for local administrative rights and the chance of escalation of privilege. We've removed, at this point, close to 98 percent of the local administrative accounts on workstations. If there were an incident, it would stop at that point and we'd be able to know."
  • "We have had some major issues with the tool, but we have worked with the R&D teams and we have worked with support. There is room for improvement, especially on response times. But they're working on it and they're doing the best they can."

What other advice do I have?

If you're going to implement Endpoint Privilege Manager, don't just give everybody EPM and think you're done with it. Spend the time, engineer it, think about it from a project perspective, and deploy it with the concept of least privilege. Really spend the time to make sure it's deployed correctly and all the processes are established so it's smooth sailing from there on in. Overall, I would rate this product at 8.5 out of 10. The product does exactly what we need it to do. However, we do need a little bit more action and response time with regards to support. In terms of the effect working…
PM
IT Security Service Specialist at a manufacturing company with 10,001+ employees
Real User
Top 20
An endpoint security solution with a useful admin rights management feature, but performance could be better

What is our primary use case?

We use CyberArk Endpoint Privilege Manager mainly for privilege management.

Pros and Cons

  • "I like that you can remove the admin rights from the user's computer and have control over the environment. That means you can delete the local admins and grant them proper privileges with the console. So, they will get proper permissions for applications they need, but we don't have to do it. In the domain where we don't have control, the user can only do specified actions, but not all of them."
  • "Performance could be better. We have a couple of problems with CyberArk right now. One of the problems is performance in our environment. Support also takes a long time to respond. If the user already has local admin rights, then I can't collect any events in the console from this device. There are also some options in CyberArk that are not working properly, and are not helpful in this case. I can't collect any information to create a proper policy for the device. I have to investigate everything manually, or even disable the local admin from the device. I can collect the events only after this, and it's very time consuming. In my case, it's a waste of resources."

What other advice do I have?

I would advise poential users to instantly look for a solution in the cloud if they want to go with CyberArk. Don't get the on-premise version. I'm not satisfied with the EPM, and I'm just looking to see if there's any other solution that we can get. This is also because CyberArk is ending support for on-premise solutions in 2023. So, in our case, we will have to move to the cloud, and the cloud is much more expensive than just using the solution we have right now. On a scale from one to ten, I would give CyberArk Endpoint Privilege Manager a six.
Learn what your peers think about CyberArk Endpoint Privilege Manager. Get advice and tips from experienced pros sharing their opinions. Updated: September 2021.
534,768 professionals have used our research since 2012.
PS
Enterprise Architect at a tech services company with 11-50 employees
Real User
Top 5
Supports dynamically-generated keys, it's stable, and has automatic lifecylce management

What is our primary use case?

Because we are dealing with personal health information, we have had to setup up a security broker for admin access in and out of the accounts. They wanted to have a break-glass solution in case there was a problem with the multi-factor authentication or any other issues. We chose to use CyberArk for their failover abilities. If the Multi-factor authentication fails then you can still log in and it has a second factor that authenticates. It gives them the break glass option that they needed.

Pros and Cons

  • "The most valuable feature is that it does lifecycle management and that it will change to whatever the end target is."
  • "It's an old product and has many areas that can be improved."

What other advice do I have?

I basically am trying to drive their digital transformation and do the overall build a mass data network for their data strategy. Building out different APIs and different things. Building out a blockchain security framework to allow HIPAA compliance where you can go in at the portability of their data to pull in and out without creating an issue with the payers. I would recommend this solution depending on what the business needs are. I'm a big proponent for keeping things simple and trying to avoid unneeded complexity. The company demanded certain things and only wanted to do it one way, and…
ED
Network Security & Data Management Admin at Digitaltrack
Reseller
Top 5
Review about CyberArk Endpoint Privilege Manager

What is our primary use case?

We are implementing this product to control the Privilege account. For example, from a Cyber Privilege account, we just want to know what the user is doing and how to control it. We use it for security and monitoring.

Pros and Cons

  • "The department management aspect of the solution is the most valuable aspect."
  • "Technical support is slow to respond when we run into issues."

What other advice do I have?

We are resellers and an implementor of the solution. I'd rate the solution at a nine out of ten. Product-wise we don't face that many issues, and basic integration of users and assigning them the rules and other stuff like that is, compared to other options, very straightforward.
Buyer's Guide
Download our free CyberArk Endpoint Privilege Manager Report and get advice and tips from experienced pros sharing their opinions.