CyberArk Endpoint Privilege Manager Valuable Features

WarranGrin
Enterprise Cyber Security Advisor at a energy/utilities company with 5,001-10,000 employees
With conventional local administrative access, you have no insight into how users are using that access. With Endpoint Privilege Manager, we have the ability to see how they're using that and then lock down things that aren't appropriate or are not allowed in our company. At scale, in an enterprise environment, it's very easy to start installing agents on multiple workstations. So if we need to deploy to several thousand more workstations, we will have the ability to do that. So far, there are a lot of integrations we are using. We are sending logs to a SIEM. We are working with AD to make sure that we are provisioning roles properly at that point. That's where we've left it. View full review »
Paul Stapleton
Enterprise Architect at a tech services company with 11-50 employees
The most valuable feature is that it does lifecycle management and that it will change to whatever the end target is. For example, you can go into Azure AD, a backup directory, or a set of Google cloud platforms. It will do lifecycle management on the keys. It makes it so that you won't have to ever have a standard key. It's generating dynamically keys and you can enforce policy easier. As you start adjusting your key lengths and everything further, you can adjust them all in a single day. View full review »
Uchechukwu Ukazu
Tech Support at a tech services company with 11-50 employees
While I find all of the features valuable, one of them that stands out is the DNS scanning. This provides information with respect to the locations of accounts that are created. We then get an overview of the location information. View full review »
Learn what your peers think about CyberArk Endpoint Privilege Manager. Get advice and tips from experienced pros sharing their opinions. Updated: November 2020.
447,654 professionals have used our research since 2012.
reviewer925509
Senior Specialist, Cyber Security Technology at a tech services company with 51-200 employees
In terms of valuable features, this really depends on the customer. Many people try to secure access for third party contractors and try to protect access to their systems. The session recording is usually a required feature. Monitoring and recording are valuable features, particularly the recording. I personally like the privilege analytics part of the solution. The Privileged Access Management solution is a valuable feature of the product. The interface and dashboards are good too. View full review »
Learn what your peers think about CyberArk Endpoint Privilege Manager. Get advice and tips from experienced pros sharing their opinions. Updated: November 2020.
447,654 professionals have used our research since 2012.