2019-03-03T11:30:00Z

What is your primary use case for CyberArk Endpoint Privilege Manager?

Miriam Tover - PeerSpot reviewer
  • 0
  • 80
PeerSpot user
15

15 Answers

Fabio Facchinetti - PeerSpot reviewer
Reseller
Top 10
2024-02-05T12:06:00Z
Feb 5, 2024

I work with CyberArk Endpoint Privilege Manager for my partners. It is mainly for compliance, managing credentials securely, and monitoring what's going on with those credentials. Also, there's this thing about limiting privileges for certain users in production environments. But it seems like it's not just for big setups, it's also used across all kinds of workplaces.

Search for a product comparison
S Azeem - PeerSpot reviewer
Real User
Top 5Leaderboard
2023-10-03T06:48:40Z
Oct 3, 2023

We use the solution for cyber security to block unwanted things and ensure endpoint security. We also use the solution to collect user analytics.

David Morimanno - PeerSpot reviewer
User
Top 20
2023-08-25T18:09:00Z
Aug 25, 2023

The solution is used for: Rotating local administrator passwords: EPM can be used to rotate the passwords of local administrator accounts on endpoints, which helps to prevent attackers from gaining unauthorized access to these accounts. Revoking access to privileged accounts: EPM can be used to revoke access to privileged accounts when users no longer need it, which helps to reduce the risk of unauthorized access. Monitoring privileged activity: EPM can be used to monitor all privileged activity on endpoints, which helps to identify and investigate suspicious activity. Auditing privileged access: EPM can be used to audit all privileged access to sensitive systems and data, which helps to comply with security regulations.

YT
Reseller
Top 20
2023-04-27T14:09:00Z
Apr 27, 2023

We use the solution as a Privilege Access Manager to manage user's passwords.

Mohammed Talukdar - PeerSpot reviewer
Real User
Top 10
2023-03-17T13:38:03Z
Mar 17, 2023

I'm using it in my company. It helps us manage our endpoints and keep things secure.

AP
Real User
Top 20
2023-01-13T12:36:20Z
Jan 13, 2023

Previously, the enterprise EPM was on-premises. Now, it has gone to the SaaS model. So, we have used CyberArk professional services, wherein CyberArk deployed all the agents into our different Unix machines. This deployment is currently underway. The policy changes and the reconfigurations part are pending. In the coming quarter, or by the end of it, the overall EPM deployment will be completed with this customer.

Learn what your peers think about CyberArk Endpoint Privilege Manager. Get advice and tips from experienced pros sharing their opinions. Updated: March 2024.
765,234 professionals have used our research since 2012.
Oluwajuwon Olorunlona - PeerSpot reviewer
Real User
Top 5
2022-12-08T09:59:25Z
Dec 8, 2022

My primary use case for CyberArk Endpoint Privilege Manager is malware prevention. The solution enables malware detonation, which helps you solve ransomware problems. For example, suppose an unknown application comes into your environment, and you have installed a CyberArk Endpoint Privilege Manager agent. In that case, the solution will filter the unknown traffic from an unknown publisher and stop it from infiltrating. The solution dashboard also lets you know that specific software is suspicious. Still, it depends on the category, but malware prevention is one use case of CyberArk Endpoint Privilege Manager. Classifying a trusted or whitelisted application is also a use case of the solution. Another use case of CyberArk Endpoint Privilege Manager is stopping credential theft. For example, you have credential stores all around, whether you know it or not. You have credential stores in web browsers like Chrome and Microsoft Edge. The solution protects you against an attacker that has already gained access to your environment, an internal person that leverages your system and wants to go to your web browser, or probably there's a browser path attack where the person has access to your browser. He can check your credential store, but if CyberArk Endpoint Privilege Manager is in place, that situation will be prevented. Just-In-Time Access is another use case of the solution. For example, there's no administrator privilege on the system, but let's say a database administrator or application administrator wants to use the credential. You can provide that person with Just-In-Time Access so he can use the credential for thirty minutes, then that credential expires once the time is up. CyberArk Endpoint Privilege Manager also separates the privileges. For example, a team of application managers receives access to specific software that the network team can't access.

SF
Consultant
Top 20
2022-11-11T16:18:13Z
Nov 11, 2022

CyberArk Endpoint Privilege Manager can be deployed across all platforms, such as AWS, GCP, and Ali Baba. The solution is used for management, multi-site failover, satellite vaulting, distributed architecture, custom CPM, PSM deployment, custom CCP, and CCP deployment.

AI
Reseller
Top 5
2022-10-06T22:05:41Z
Oct 6, 2022

We primarily use the solution on our endpoints.

TB
Real User
Top 10
2022-07-31T13:35:52Z
Jul 31, 2022

CyberArk Endpoint Privilege Manager is used for compliance with password policies.

PM
Real User
2021-06-30T14:37:14Z
Jun 30, 2021

We use CyberArk Endpoint Privilege Manager mainly for privilege management.

Ebenezer D - PeerSpot reviewer
Real User
Top 5
2021-03-29T18:38:06Z
Mar 29, 2021

We are implementing this product to control the Privilege account. For example, from a Cyber Privilege account, we just want to know what the user is doing and how to control it. We use it for security and monitoring.

PS
Real User
2020-10-22T13:37:00Z
Oct 22, 2020

Because we are dealing with personal health information, we have had to setup up a security broker for admin access in and out of the accounts. They wanted to have a break-glass solution in case there was a problem with the multi-factor authentication or any other issues. We chose to use CyberArk for their failover abilities. If the Multi-factor authentication fails then you can still log in and it has a second factor that authenticates. It gives them the break glass option that they needed.

KA
Real User
2019-11-18T07:22:00Z
Nov 18, 2019

I'm a senior specialist in cybersecurity technology. We are partners and resellers of CyberArk and a system integrator company. We're not the end-users. Our customers are generally interested in the Privilege Access Management solution and EPM which is an extension of that.

UU
Real User
2019-03-03T11:30:00Z
Mar 3, 2019

Our primary use case for this solution is to manage enterprise passwords and monitor session connections.

CyberArk Endpoint Privilege Manager, a critical and foundational endpoint control addresses the underlying weaknesses of endpoint defenses against a privileged attacker and helps enterprises defend against these attacks through removing local admin rights, enforcing least privilege, and implementing foundational endpoint security controls across all Windows, macOS and Linux endpoints from hybrid to cloud environments. Click here for a free 30 day trial: CyberArk Endpoint Privilege...
Download CyberArk Endpoint Privilege Manager ReportRead more