CyberArk Endpoint Privilege Manager and Check Point Harmony SASE compete in the cybersecurity sector. CyberArk seems to have the upper hand in privilege management, while Check Point excels in network access flexibility.
Features: CyberArk Endpoint Privilege Manager includes DNS scanning, lifecycle management, and policies for elevated app access. It also offers password management, session recording, and application control. Check Point Harmony SASE provides zero-trust network access, unified policy management, and advanced threat prevention with user-friendly access control.
Room for Improvement: CyberArk needs better integration with PAM tools, enhanced reporting, and improved technical support. There's also a call for better onboarding and diverse OS integration. Check Point Harmony SASE could improve with more granular control options, better integration with existing security solutions, and enhanced user notifications.
Ease of Deployment and Customer Service: CyberArk is suitable for on-premises or cloud environments but poses support challenges, especially for non-certified users. Check Point Harmony SASE performs well in hybrid cloud environments with reliable support but can be hard to reach for smaller issues.
Pricing and ROI: CyberArk Endpoint Privilege Manager is expensive, with high costs for user accounts and sessions, suited for large organizations. Check Point Harmony SASE offers flexible pricing, suitable for larger companies looking for comprehensive security.
We are saving 40% of our time, which is good.
Deploying CyberArk Endpoint Privilege Manager has secured the infrastructure, which saves money, time, and resources.
They respond immediately to our inquiries, resolve issues promptly, and provide valuable guidance, especially in critical situations.
We engage them when needed and receive prompt responses that typically resolve our issues.
Earlier, we received support for normal tickets within a day, but now it takes one or two days to resolve issues.
I would rate it nine out of ten for scalability.
We can set permissions per team or department, allowing some teams to elevate specific applications while others have different permissions.
CyberArk Endpoint Privilege Manager is quite scalable.
The available reports and other security tools assist in scaling it according to my organization's needs.
There are some lags and glitches with connectivity, so I would rate the stability as between seven or eight out of ten.
After the last improvement, I can say it is much more stable now.
It is a robust solution that has effectively supported our environment without major issues.
Since implementing it, we have not experienced any outages or stability issues.
CyberArk Endpoint Privilege Manager offers multiple options for creating and stopping policies.
A local data center in Turkey would enhance the product, as currently, our Internet traffic goes to another country, which is problematic for us.
The connectivity issue can be improved as at times it lags when connecting to their server.
CyberArk Endpoint Privilege Manager could be improved by simplifying the administration process, specifically when setting up policies and applications.
Currently, no user-based policy option is available inside the EPM console.
Some features provided in the self-hosted version of EPM are not supported in the software as a service version, like connection to some analysis applied by Palo Alto.
Cost efficiency is a consideration, as SASE products are not the cheapest security products.
It is a bit expensive.
CyberArk Endpoint Privilege Manager is slightly expensive, but costs can be negotiated to become more competitive.
CyberArk Endpoint Privilege Manager is costly compared to other solutions.
I've received feedback that the pricing is high, however, for me, the value it brings is worth the cost.
The firewall management is the most valuable feature for me.
The best key features of Harmony are stabilization, private access, and Internet access.
CyberArk Endpoint Privilege Manager effectively reduces malicious content in applications by allowing us to identify and block dangerous applications.
CyberArk Endpoint Privilege Manager enhances computer security by providing minimal access, effectively preventing ransomware attacks.
The most valuable feature is the ability to control users with admin rights.
Perimeter 81 is a cloud-based network security and software-defined perimeter (SDP) solution designed to provide secure access to resources in the cloud, data centers, and on-premises environments. It offers a unified platform for organizations to manage and secure their network infrastructure, regardless of the location or type of resources.
Perimeter 81 Benefits:
Perimeter 81 Features:
Reviews from Real Users
PeerSpot user, Frontend Developer at Limelight Networks, states that "We use some VPN solutions, and Perimeter 81 has the best user experience for desktop or mobile".
Daniel Goldfeld, Vice President of Customer Success at Mine - The All-in-One Privacy Suite, says that Perimeter 81 has "Great SAML and SCIM support with the ability to deploy site-2-site tunnels with specific IP restrictions".
Another PeerSpot user, Accounts Payable Specialist at Simera, writes that "The feature that I have found to be most valuable is the reputation that the company has regarding privacy. Nowadays, this is critical, especially when you do all of your work online."
CyberArk Endpoint Privilege Manager, a critical and foundational endpoint control addresses the underlying weaknesses of endpoint defenses against a privileged attacker and helps enterprises defend against these attacks through removing local admin rights, enforcing least privilege, and implementing foundational endpoint security controls across all Windows, macOS and Linux endpoints from hybrid to cloud environments.
Click here for a free 30 day trial: CyberArk Endpoint Privilege Manager free trial
We monitor all Anti-Malware Tools reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.