

Find out what your peers are saying about CyberArk, One Identity, Okta and others in Privileged Access Management (PAM).
Deploying CyberArk Endpoint Privilege Manager has secured the infrastructure, which saves money, time, and resources.
I consider CyberArk Endpoint Privilege Manager's return on investment to be good since it effectively accomplishes the goals expected from privilege access management solutions.
On a B2B level, it opened up the market for TomTom to sell its services in a more efficient way to car companies.
We can use a Linux image from ForgeRock with different systems, applications, websites, and mobile apps to create various types of access for users.
I can definitely see that fewer employees are needed compared to using different SaaS applications.
They respond immediately to our inquiries, resolve issues promptly, and provide valuable guidance, especially in critical situations.
We engage them when needed and receive prompt responses that typically resolve our issues.
Earlier, we received support for normal tickets within a day, but now it takes one or two days to resolve issues.
The support portals offer comprehensive documentation, troubleshooting guides, and community forums that have been helpful for resolving common issues independently.
For standard support tickets, response times were very decent, and the support team was helpful in identifying configuration issues, especially with authentication trees, token settings, and directory replications.
The customer support is very flexible and supportive, particularly in the area of automation and customer deployments.
We can set permissions per team or department, allowing some teams to elevate specific applications while others have different permissions.
CyberArk Endpoint Privilege Manager is quite scalable.
The available reports and other security tools assist in scaling it according to my organization's needs.
The access management layer is stateless, so I can scale horizontally by adding more nodes behind a load balancer as traffic increases.
The platform provides flexible authentication trees, enabling us to design custom MFA flows tailored for different user groups and risk profiles.
We scaled up with ForgeRock. My team received an award for implementing it for a 60 million customer base, which was the largest implementation at that time.
It is a robust solution that has effectively supported our environment without major issues.
Since implementing it, we have not experienced any outages or stability issues.
CyberArk Endpoint Privilege Manager offers multiple options for creating and stopping policies.
ForgeRock supports integration with legacy systems in our organization by offering a wide range of connectors and APIs.
ForgeRock is very stable because it manages access, authentication, and authorization effectively.
CyberArk Endpoint Privilege Manager could be improved by simplifying the administration process, specifically when setting up policies and applications.
Currently, no user-based policy option is available inside the EPM console.
Some features provided in the self-hosted version of EPM are not supported in the software as a service version, like connection to some analysis applied by Palo Alto.
ForgeRock needs to focus on low-code, no-code solutions that allow for drag-and-drop functionality with good orchestration.
It would be better if they were available for support whenever the customer needs it, especially during migration or go-live time periods.
The main area is complexity. ForgeRock is extremely flexible, but the learning curve can be steep.
CyberArk Endpoint Privilege Manager is slightly expensive, but costs can be negotiated to become more competitive.
CyberArk Endpoint Privilege Manager is costly compared to other solutions.
I've received feedback that the pricing is high, however, for me, the value it brings is worth the cost.
The pricing, setup cost, and licensing are very straightforward, which is a good success.
One has to spend considerable time trying to understand the different modules and different needs for those modules on the licensing front.
CyberArk Endpoint Privilege Manager effectively reduces malicious content in applications by allowing us to identify and block dangerous applications.
It allows them to granularly manage controls to prevent some malicious activities on the endpoint machine.
CyberArk Endpoint Privilege Manager enhances computer security by providing minimal access, effectively preventing ransomware attacks.
Centralized management makes the biggest difference because it allows us to define, update, and enforce security and compliance rules from a single location.
ForgeRock positively impacts our organization as we manage a large number of users with ease, providing a standard IAM solution that simplifies our processes.
ForgeRock has positively impacted my organization by allowing us to migrate from the older system to the newer ForgeRock component, enabling us to go live with many products across geographies, enhancing security as it is all cloud-based, and with the company taking care of availability, it has reduced costs for the company.
| Product | Mindshare (%) |
|---|---|
| CyberArk Endpoint Privilege Manager | 2.4% |
| CyberArk Privileged Access Manager | 10.4% |
| Delinea Secret Server | 4.5% |
| Other | 82.7% |
| Product | Mindshare (%) |
|---|---|
| ForgeRock | 4.5% |
| Microsoft Entra ID | 12.9% |
| Okta Platform | 11.4% |
| Other | 71.2% |
| Company Size | Count |
|---|---|
| Small Business | 18 |
| Midsize Enterprise | 9 |
| Large Enterprise | 18 |
| Company Size | Count |
|---|---|
| Small Business | 15 |
| Midsize Enterprise | 5 |
| Large Enterprise | 18 |
CyberArk Endpoint Privilege Manager enhances security by controlling access, removing admin rights, and managing privileges. It supports diverse environments with simple integration, focusing on credential detection, threat protection, and compliance.
CyberArk Endpoint Privilege Manager secures enterprise passwords, monitors session connections, and enhances cybersecurity by controlling privileged access. It blocks unauthorized applications, monitors user activities, and secures credentials across platforms. Key areas include Just-In-Time Access, privilege separation, and local administrator password rotation. While robust, challenges exist with performance, complexity, and setup. Integration with Linux and Unix needs improvement, requiring advanced reporting tools and easier policy management. Pricing concerns and maintenance issues with Windows servers persist, as well as database issues in the on-prem version.
What are the key features of CyberArk Endpoint Privilege Manager?Organizations deploying CyberArk Endpoint Privilege Manager in industries such as finance, healthcare, and technology benefit from secure credential management across Unix, AWS, and GCP. By implementing privilege separation and monitoring user activities, they achieve effective risk mitigation and compliance across multiple platforms.
ForgeRock offers robust integration, customization, and identity management with support for SAML, OAuth 2.0, and DevOps readiness, ensuring enhanced security and scalability.
ForgeRock stands out in identity and access management featuring flexible authentication flows, risk-based authentication, centralized policy management, and comprehensive data protection. Its open-source foundation and cloud capabilities allow versatility and ease of use. While it provides excellent user path orchestration through the Journey feature, challenges exist in integration support and user-friendly customization. Improved documentation and streamlined interfaces are necessary to overcome deployment complexities. Additionally, the cost and support model may be burdensome for smaller organizations.
What are the key features?ForgeRock is widely utilized in industries like telecommunications, insurance, and open banking for secure user authentication and access management. It supports microservice authentications, customer identity management, single sign-on, and multi-factor authentication, integrating effectively with existing infrastructures to enhance security and user experience.
We monitor all Privileged Access Management (PAM) reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.