CyberArk Endpoint Privilege Manager Valuable Features
What sets CyberArk apart is its continuous innovation, staying ahead of the competition. It not only offers integrated solutions but also expands its capabilities through strategic acquisitions.
View full review »The solution is good for controlling access.
I have always found that CyberArk is a very tight, foolproof product compared to most other products available.
It is quite stable.
View full review »The least privilege enforcement has helped us to reduce the number of privileged accounts by 50%, which has simplified our privileged access management environment and reduced the risk of unauthorized access.
The privileged session management has helped us to prevent unauthorized access to sensitive systems and data. For example, we were able to detect and block a number of unauthorized attempts to access our financial systems.
Auditing and reporting have helped us to comply with security regulations such as the Payment Card Industry Data Security Standard (PCI DSS).
Threat protection has helped us to detect and block malicious applications and scripts, which has helped to protect our endpoints from attacks.
Centralized management has simplified administration and reduced the risk of errors. For example, we were able to easily deploy CyberArk EPM to all of our endpoints without any major problems.
View full review »Buyer's Guide
CyberArk Endpoint Privilege Manager
April 2024
Learn what your peers think about CyberArk Endpoint Privilege Manager. Get advice and tips from experienced pros sharing their opinions. Updated: April 2024.
767,496 professionals have used our research since 2012.
The solution is doing what we expect it to do.
It integrates well with our CI/CD pipeline and Amazon Cloud, which is useful.
We can do both server and endpoint protection.
It's a stable product.
The interface has been fine.
It is scalable.
Technical support is helpful and responsive.
View full review »CyberArk Endpoint Privilege Manager (EPM) 's most valuable feature is its ability to manage user application privileges and protect against ransomware attacks by controlling access to specific files and applications. Additionally, EPM effectively oversees the local admin group, preventing unauthorized users from adding themselves to it and ensuring tighter security. Moreover, the capability to remove users from the local admin group and rotate passwords for built-in admin groups enhances security measures significantly.
View full review »The feature called PTA, which stands for Privileged Threat Analytics keeps track of what admins are doing and works with Centimeters. If something fishy is going on with a user's credentials, it alerts the security team so they can act fast. Plus, it automates stuff like resetting credentials or blocking users. So, if there's a potential hack, CyberArk can change passwords and lock out users in a snap. It also gives you a heads-up if anything unusual is going on with server activities, like someone creating new users with uncontrolled credentials.
View full review »AP
Ashish Pandey
Technical Manager at Tech Mahindra Limited
The kind of services they provide in the vaulting of both the password as well as the SSH keys in their Password Vault is great. The alert mechanism that they have is also provided by their different tools, called PTA, Privileged Threat Analytics. It's a key feature of CyberArk that they have provided.
Now they have also ventured into identity services, where they are also moving ahead from their legacy privileged access management to identity and access management. Therefore, apart from the core component, like the vault, you get privileged access management using the PSM and the password rotation through the CPMs.
There are other core features that they are working at. For example, they have introduced a new feature with a new core overall functionality using the DAP. DAP is a combination of AIM as well as Conjur. And then, you have got an HTML5 gateway with the flexibility to onboard some external partners for a limited period of time, depending upon their usage and availability. When they no longer need it, those aspects can be automatically removed, depending on the policies and approvals.
The solution is scalable.
It's stable and reliable.
View full review »CyberArk Endpoint Privilege Manager is very easy to manage, which I like.
I also found credential detection the most valuable feature of the solution. For example, if I put a credential on my desktop and name the file administrator credential, and a person has access to my system and clicks the file under the history section of the system to steal the credential, CyberArk Endpoint Privilege Manager will flag that activity.
The solution also has a dashboard where you can see which software is suspicious, which I find valuable.
Other valuable features of CyberArk Endpoint Privilege Manager include application whitelisting and Just-In-Time Access.
View full review »I like that we have the power to blacklist, whitelist, and greylist applications.
It is really easy to deploy.
The solution is mostly stable.
Users can scale the solution.
View full review »SF
reviewer1268721
Senior Consultant at a tech services company with 11-50 employees
The most valuable features of CyberArk Endpoint Privilege Manager are password management, session management, onboarding rules, platform customization, and safety management.
CyberArk Endpoint Privilege Manager was presently revised, which included a new interface, rebranding, improve documentation, and an excellent user panel that supports multiple integrations.
View full review »Based on a customer's requirements, the solution allows me to give access and privileges to each user individually. CyberArk also allows granular blocking permissions.
CyberArk has better features than other vendors' products, such as a password vault.
View full review »PS
Paul Stapleton
Enterprise Architect at a tech services company with 11-50 employees
The most valuable feature is that it does lifecycle management and that it will change to whatever the end target is. For example, you can go into Azure AD, a backup directory, or a set of Google cloud platforms.
It will do lifecycle management on the keys. It makes it so that you won't have to ever have a standard key.
It's generating dynamically keys and you can enforce policy easier.
As you start adjusting your key lengths and everything further, you can adjust them all in a single day.
View full review »EN
EzinneNwankwo
Security Engineer at DIL
The password rotation and the session recording are the most valuable features. Likewise, password management for service accounts is a very nice feature.
View full review »All of the features are valuable. They control applications for users, like preventing users from elevating applications. You can use it to strip users of their local admin rights and, at the same time, elevate applications for them and give them access to elevated applications. Hence, administrative rights are unavailable for domain accounts which are the juicy ones for attackers because they can use them to move laterally from one host to another. Therefore, attackers can no longer strip a user's near right, but at the same time, they can elevate the user from access to the application and do their jobs without having issues elevating applications.
View full review »AI
AslamImroze
Technical Manager at Gulf IT
We have found the solution quite impressive.
Performance-wise, it's on par with BeyondTrust.
We like that you can distribute the applications and decide how you want to run those applications based on their criticality. You can distribute them and decide which one needs any extra approval and which can run independently. That division was really, really helpful. It has actually reduced almost 30% of calls to the IT help desk.
View full review »WG
WarranGrin
Enterprise Cyber Security Advisor at a energy/utilities company with 5,001-10,000 employees
With conventional local administrative access, you have no insight into how users are using that access. With Endpoint Privilege Manager, we have the ability to see how they're using that and then lock down things that aren't appropriate or are not allowed in our company.
At scale, in an enterprise environment, it's very easy to start installing agents on multiple workstations. So if we need to deploy to several thousand more workstations, we will have the ability to do that.
So far, there are a lot of integrations we are using. We are sending logs to a SIEM. We are working with AD to make sure that we are provisioning roles properly at that point. That's where we've left it.
View full review »PH
Padmanabha Hegde
Manager at Happiest Minds Technologies
The most valuable feature is that their database is completely encrypted and protected with multiple layers.
View full review »PM
reviewer1614768
IT Security Service Specialist at a manufacturing company with 10,001+ employees
I like that you can remove the admin rights from the user's computer and have control over the environment. That means you can delete the local admins and grant them proper privileges with the console. So, they will get proper permissions for applications they need, but we don't have to do it. In the domain where we don't have control, the user can only do specified actions, but not all of them.
View full review »TB
TeguhBudyantara
Professional Services Manager at PT Korelasi Persada Indonesia
The most valuable feature of CyberArk Endpoint Privilege Manager is its ability to reset passwords every time that it is needed or periodically.
View full review »YT
YogananthamTheerthagiri
Channel Sales Manager at Cyber Knight Technologies FZ LLC
I am impressed with the product's seamless integration. The PAM wallet and enterprise password wallet are good also good.
View full review »The department management aspect of the solution is the most valuable aspect.
The screen the color options are very good.
The solution does a good job of assisting with the monitoring of users.
Basic integrations of users are very straightforward. It's easy to assign them the rules, et cetera.
View full review »CK
Chawapat Kongdumrongkiat
Product Consultant at M.Tech
The most valuable feature of CyberArk Endpoint Privilege Manager is its high performance, it's the best identity security platform. The security is good. It's easy to showcase the feature and capabilities and compare it with other competitors. It competes well with other solutions. Additionally, it is a complete solution.
UU
Uchechukwu Ukazu
Tech Support at a tech services company with 11-50 employees
While I find all of the features valuable, one of them that stands out is the DNS scanning. This provides information with respect to the locations of accounts that are created. We then get an overview of the location information.
View full review »It has removed the need for the local admin.
View full review »Buyer's Guide
CyberArk Endpoint Privilege Manager
April 2024
Learn what your peers think about CyberArk Endpoint Privilege Manager. Get advice and tips from experienced pros sharing their opinions. Updated: April 2024.
767,496 professionals have used our research since 2012.