Show rating breakdown
Save to My Lists
Claimed
Claimed

Top Rated Cyberark Endpoint Privilege Manager Alternatives

Cyberark Endpoint Privilege Manager Reviews & Product Details

Nicholas B.
NB
Systems Administrator
Construction
Mid-Market(51-1000 emp.)
More Options
Validated Reviewer
Verified Current User
Review source: G2 invite
Incentivized Review
What do you like best about Cyberark Endpoint Privilege Manager?

Easy to deploy and a great tool to give the limited access to admin privileges that users need sometimes. Keeps a company compliant with also keeping the business functioning. Reliable software that is easy to maintain as an admin. Review collected by and hosted on G2.com.

What do you dislike about Cyberark Endpoint Privilege Manager?

While the UI has been slightly updated over the past few years it still could be modernized. Also, the product has an ok learning curve and could use a better knowledge base when compared to other software. Review collected by and hosted on G2.com.

What problems is Cyberark Endpoint Privilege Manager solving and how is that benefiting you?

We have certain tasks and processes that require admin access to be done. We as IT can't spend every day giving admin access when people are just trying to do their job. The product lets us give users limited admin access to do what they need but keeps us as a company safe and compliant. Review collected by and hosted on G2.com.

Cyberark Endpoint Privilege Manager Overview

What is Cyberark Endpoint Privilege Manager?

CyberArk Endpoint Privilege Manager enables organizations to enforce least privilege policies for business and administrative users, as well as control applications to reduce the attack surface without halting productivity. The solution helps organizations revoke everyday local administrator privileges from business users while elevating privileges when required by trusted applications. CyberArk Endpoint Privilege Manager also enables security teams to enforce granular least privilege policies for IT administrators, helping organizations effectively segregate duties on Windows servers. Complementing these privilege controls, the solution also delivers application controls, which are designed to manage and control which applications are permitted to run on endpoints and servers and prevent malicious applications from penetrating the environment.

Cyberark Endpoint Privilege Manager Details
Show LessShow More
Product Description

CyberArk Endpoint Privilege Manager enables organizations to enforce least privilege policies for business and administrative users, as well as control applications to reduce the attack surface without halting productivity. The solution helps organizations revoke everyday local administrator privileges from business users while elevating privileges when required by trusted applications. CyberArk Endpoint Privilege Manager also enables security teams to enforce granular least privilege policies for IT administrators, helping organizations effectively segregate duties on Windows servers. Complementing these privilege controls, the solution also delivers application controls, which are designed to manage and control which applications are permitted to run on endpoints and servers and prevent malicious applications from penetrating the environment.


Seller Details
Seller
CyberArk
Year Founded
1999
HQ Location
Newton, MA
Twitter
@CyberArk
17,248 Twitter followers
LinkedIn® Page
www.linkedin.com
3,824 employees on LinkedIn®
Ownership
NASDAQ:CYBR
Phone
1-888-808-9005
Total Revenue (USD mm)
$464

JL
Overview Provided by:

Recent Cyberark Endpoint Privilege Manager Reviews

Nicholas B.
NB
Nicholas B.Mid-Market (51-1000 emp.)
4.0 out of 5
"Cyberark EPM solid product"
Easy to deploy and a great tool to give the limited access to admin privileges that users need sometimes. Keeps a company compliant with also keepi...
Bobby V.
BV
Bobby V.Mid-Market (51-1000 emp.)
4.5 out of 5
"CyberArk is a great tool for privilege escalation management"
We use CyberArk for privilege escalation mainly among the other things the product is capable of. We needed a way to manage user accounts and allow...
Security Badge
This seller hasn't added their security information yet. Let them know that you'd like them to add it.
0 people requested security information

Cyberark Endpoint Privilege Manager Media

Answer a few questions to help the Cyberark Endpoint Privilege Manager community
Have you used Cyberark Endpoint Privilege Manager before?
Yes
G2 reviews are authentic and verified.

There are not enough reviews of Cyberark Endpoint Privilege Manager for G2 to provide buying insight. Below are some alternatives with more reviews:

1
NinjaOne Logo
NinjaOne
4.7
(1,859)
NinjaOne, the automated endpoint management platform, delivers real-time visibility, security, and control over all endpoints to increase productivity for more than 20,000 customers.
2
ManageEngine Endpoint Central Logo
ManageEngine Endpoint Central
4.4
(907)
Endpoint Central is an integrated desktop and mobile device management software that helps in managing servers, laptops, desktops, smartphones, and tablets from a central location.
3
Acronis Cyber Protect Logo
Acronis Cyber Protect
4.3
(700)
4
ThreatDown Logo
ThreatDown
4.6
(1,016)
Actively protect against all forms of Malware, Improve your protection without changing your AV, Renowned protection and cleanup technologies, Tool most recommended by techs and super users.
5
Atera Logo
Atera
4.6
(793)
Atera offers an all-in-one IT management platform that combines Remote Monitoring and Management (RMM), Helpdesk, Ticketing, and automation tools, providing efficient infrastructure management, enhanced service quality, and comprehensive features like patch management and AI-driven analytics, all under a transparent per-technician pricing model.
6
Datto RMM Logo
Datto RMM
4.5
(646)
A proactive remote monitoring & management (RMM) that maximizes productivity.
7
Microsoft System Center Logo
Microsoft System Center
4.1
(585)
Microsoft System Center helps customers realize the benefits of the Microsoft Cloud Platform by delivering unified management. Experience fast time-to-value with out-of-the-box monitoring, provisioning, configuration, automation, protection and self-service.
8
Symantec End-user Endpoint Security Logo
Symantec End-user Endpoint Security
4.4
(552)
Proactively detect and block today's most advanced threats with an endpoint protection solution that goes beyond antivirus.
9
Webroot Business Endpoint Protection Logo
Webroot Business Endpoint Protection
4.6
(525)
Webroot SecureAnywhere Business Endpoint Protection offers a revolutionary approach to malware protection.
10
N-able N-central Logo
N-able N-central
4.4
(475)
As networks grow in complexity and scale to thousands or tens of thousands of devices, IT service providers need powerful tools to help them keep up. N-able N-central gives you that power.
Show More