We performed a comparison between CyberArk Endpoint Privilege Manager and Elastic Security based on real PeerSpot user reviews.
Find out in this report how the two Privileged Access Management (PAM) solutions compare in terms of features, pricing, service and support, easy of deployment, and ROI."The solution's technical support is good."
"The department management aspect of the solution is the most valuable aspect."
"CyberArk Endpoint Privilege Manager is very easy to manage, which I like. The solution also has a dashboard where you can see which software is suspicious, which I find valuable."
"Users can scale the solution."
"The solution allows me to give access and privileges to each user individually"
"The most valuable feature of CyberArk Endpoint Privilege Manager is its high performance, it's the best identity security platform. The security is good. It's easy to showcase the feature and capabilities and compare it with other competitors. It competes well with other solutions. Additionally, it is a complete solution."
"The most valuable feature is that it does lifecycle management and that it will change to whatever the end target is."
"It offers great performance."
"Stability-wise, I rate the solution a ten out of ten."
"It's very stable and reliable."
"The most valuable feature is the ability to collect authentication information from service providers."
"The scalability is good. It can be scaled easily in the production environment."
"The visualization is very good."
"I like the indexing of the logs."
"It's very customizable, which is quite helpful."
"It's open-source and free to use."
"The price of the product is an area of concern where improvements are required. The product's price should be made more flexible."
"We have had some major issues with the tool, but we have worked with the R&D teams and we have worked with support. There is room for improvement, especially on response times. But they're working on it and they're doing the best they can."
"Technical support is slow to respond when we run into issues."
"The product needs a streamlined user interface; improvements to the user interface can enhance user experience and make the solution more intuitive to navigate."
"The solution is very expensive."
"CyberArk is a pretty heavy solution."
"The solution's pricing could be better."
"CyberArk Endpoint Privilege Manager can be better by making its UI more consistent."
"Better integration with third-party APMs would be really good."
"Authentication is not a default in Kibana. We need to have another tool to have authentication and authorization. These two should be part of Kibana."
"The tool should improve its scalability."
"Their visuals and graphs need to be better."
"There should be a simulation environment to check whether my Elastic implementation is functioning perfectly fine. Other solutions have their own Android and iOS applications that I can install on my mobile so that I am continuously connected to the SIEM."
"The price of this product could be improved, especially the additional costs. I would also like to see better-quality graphics."
"The interface could be more user friendly because it is sometimes hard to deal with."
"There are connectors to gather logs for Windows PCs and Linux PCs, but if we have to get the logs from Syslog then we have to do it manually, and this should be automated."
More CyberArk Endpoint Privilege Manager Pricing and Cost Advice →
CyberArk Endpoint Privilege Manager is ranked 6th in Privileged Access Management (PAM) with 27 reviews while Elastic Security is ranked 5th in Log Management with 58 reviews. CyberArk Endpoint Privilege Manager is rated 8.0, while Elastic Security is rated 7.6. The top reviewer of CyberArk Endpoint Privilege Manager writes "Offers integrated solutions and expands its capabilities through strategic acquisitions". On the other hand, the top reviewer of Elastic Security writes "A stable and scalable tool that provides visibility along with the consolidation of logs to its users". CyberArk Endpoint Privilege Manager is most compared with Microsoft Defender for Endpoint, BeyondTrust Endpoint Privilege Management, CrowdStrike Falcon, CyberArk Privileged Access Manager and Tanium, whereas Elastic Security is most compared with Wazuh, Splunk Enterprise Security, Microsoft Sentinel, IBM Security QRadar and Microsoft Defender for Endpoint. See our CyberArk Endpoint Privilege Manager vs. Elastic Security report.
We monitor all Privileged Access Management (PAM) reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.