What is your primary use case for CyberArk Endpoint Privilege Manager?


How do you or your organization use this solution?

Please share with us so that your peers can learn from your experiences.

Thank you!

ITCS user
44 Answers

author avatar
Top 5Reseller

We are implementing this product to control the Privilege account. For example, from a Cyber Privilege account, we just want to know what the user is doing and how to control it. We use it for security and monitoring.

author avatar
Top 10Real User

Because we are dealing with personal health information, we have had to setup up a security broker for admin access in and out of the accounts. They wanted to have a break-glass solution in case there was a problem with the multi-factor authentication or any other issues. We chose to use CyberArk for their failover abilities. If the Multi-factor authentication fails then you can still log in and it has a second factor that authenticates. It gives them the break glass option that they needed.

author avatar
Real User

I'm a senior specialist in cybersecurity technology. We are partners and resellers of CyberArk and a system integrator company. We're not the end-users. Our customers are generally interested in the Privilege Access Management solution and EPM which is an extension of that.

author avatar
Real User

Our primary use case for this solution is to manage enterprise passwords and monitor session connections.

Learn what your peers think about CyberArk Endpoint Privilege Manager. Get advice and tips from experienced pros sharing their opinions. Updated: June 2021.
511,773 professionals have used our research since 2012.