No more typing reviews! Try our Samantha, our new voice AI agent.

CyberArk Endpoint Privilege Manager vs Fudo PAM comparison

 

Comparison Buyer's Guide

Executive SummaryUpdated on Oct 6, 2024

Review summaries and opinions

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
 

Categories and Ranking

CyberArk Endpoint Privilege...
Ranking in Privileged Access Management (PAM)
4th
Average Rating
8.2
Reviews Sentiment
6.8
Number of Reviews
38
Ranking in other categories
Endpoint Compliance (5th), Anti-Malware Tools (5th), Application Control (3rd), Ransomware Protection (3rd)
Fudo PAM
Ranking in Privileged Access Management (PAM)
24th
Average Rating
8.0
Reviews Sentiment
7.0
Number of Reviews
5
Ranking in other categories
No ranking in other categories
 

Mindshare comparison

As of May 2026, in the Privileged Access Management (PAM) category, the mindshare of CyberArk Endpoint Privilege Manager is 2.4%, down from 3.6% compared to the previous year. The mindshare of Fudo PAM is 2.4%, down from 2.7% compared to the previous year. It is calculated based on PeerSpot user engagement data.
Privileged Access Management (PAM) Mindshare Distribution
ProductMindshare (%)
CyberArk Endpoint Privilege Manager2.4%
Fudo PAM2.4%
Other95.2%
Privileged Access Management (PAM)
 

Featured Reviews

DR
Commercial and Technical Professional Manager at Evolution Technologies Group
Strengthening financial services infrastructure by safeguarding and integrating with ecosystems
We use CyberArk Endpoint Privilege Manager to complement a privilege access management solution in order to avoid golden ticket attacks and strengthen services against attacks. It serves as a complement to our asset management solution. The architecture of CyberArk Endpoint Privilege Manager is beneficial for integrating with all customer ecosystems; it's easy to deploy, and achieving that level of integration and control is more challenging with other solutions. The ability of CyberArk Endpoint Privilege Manager to safeguard our financial services infrastructure is very important, as we need to record actions on privileges in our information systems. Regarding the granularity of the managed controls in CyberArk Endpoint Privilege Manager, we have different levels of features to define compensations and capabilities, which help us verify configurations and access, ultimately keeping the safety of rights intact. Our initial challenge with CyberArk Endpoint Privilege Manager is to comply with Colombian regulations in the financial sector, particularly identifying users and managing password changes and rotations. We needed to certify the identities and provide necessary information for government investigations, if required. CyberArk Endpoint Privilege Manager is very important for helping our organization meet compliance and regulatory requirements. We have to comply with international regulations such as SOC, but also with local regulations unique to the financial sector, which is crucial for us due to the high risks involved. CyberArk Endpoint Privilege Manager helped us reduce the time for regulatory processes to approximately two to four months, completing the solution and training. CyberArk Endpoint Privilege Manager has helped us reduce the mean time to detect within our organization. That's our main goal. Regarding MTTD, the solution provides enough information to enhance our overall detection process. We have an 85% improvement in MTTD. CyberArk Endpoint Privilege Manager helps ensure data privacy through strategies that manage information in real-time. CyberArk Endpoint Privilege Manager helps save costs by avoiding risks and future expenses associated with security incidents. It's essential to communicate the value of CyberArk Endpoint Privilege Manager to users, as its controls help improve system security. My role at the company involves service and sales activities.
TD
BDM at Oberig-it
Works with SCTP, STTPS, SQL, and MySQL protocols
There are some areas for improvement in the Fudo PAM cake that we want to improve in terms of scaling. Scaling is an optional feature because we closed some big projects with enterprise customers from different countries, including Ukraine, Kaloxetine, Uzbekistan, and others. We closed projects in different areas with customers of different sizes. When we talk about enterprise customers, we should consider that they have different use cases and desires for Fudo PAM. We compared our options for customers to choose their vendors, and we discovered Fudo PAM has few scaling options. In Fudo PAM, there should be additional features for scaling and organizing remote sessions for remote systems in remote networks.

Quotes from Members

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
 

Pros

"The most valuable feature of CyberArk Endpoint Privilege Manager is its ability to reset passwords every time that it is needed or periodically."
"CyberArk Endpoint Privilege Manager helped us reduce the time for regulatory processes to approximately two to four months, completing the solution and training."
"We have not had issues with CyberArk. It works very smoothly. We can do many things with CyberArk. It helps us to see exactly what is happening."
"CyberArk Endpoint Privilege Manager is entirely cloud-based, so no further upkeep is required."
"I like that you can remove the admin rights from the user's computer and have control over the environment."
"What sets CyberArk apart is its continuous innovation, staying ahead of the competition."
"The most valuable feature is that their database is completely encrypted and protected with multiple layers."
"I like that you can remove the admin rights from the user's computer and have control over the environment. That means you can delete the local admins and grant them proper privileges with the console. So, they will get proper permissions for applications they need, but we don't have to do it. In the domain where we don't have control, the user can only do specified actions, but not all of them."
"The main benefit of the solution is that it's very easy to set up. It only takes a couple of hours to install everything."
"Session recording and password management are the two main aspects."
"Right now we are encouraging our customers to use Fudo PAM because it is the only product in PAM technology that we have to offer them."
"I think that Fudo Privileged Access Management is a very good program."
"This is a solution that I recommend because it is a simple privileged access management system that is done very well."
"Fudo PAM was the most flexible and intuitive interface out of all of the products in the PAM sector."
"We are convinced that Fudo PAM is better than competing products like WALLIX."
"it's perfect to control and administer computers in our company."
 

Cons

"The solution is good but can be improved by allowing computers to be excluded from policies."
"I'm not satisfied with the EPM, and I'm just looking to see if there's any other solution that we can get."
"Compared to other tools like Linux, this solution isn't as user-friendly."
"It is hard to deal with technical support if you are not certified."
"It cannot be on-prem. It is only cloud-based. Sometimes, that's a restriction in terms of usage."
"What I would really like to see improved is the AIM (Application Identity Manager). I think that it could be simpler to use, and much more straight forward."
"Technical support is slow to respond when we run into issues."
"CyberArk should consider whitelisting important applications like PowerShell and DLL that are currently not allowed due to some malicious content."
"The stability is not very good."
"Professional training and certification would be great."
"I would like to see better server management. You have to know exactly what you're looking for to get the right server."
"Professional training and certification would be great."
"The configuration is difficult."
"Fudo PAM’s scalability is not very strong."
"To tell you the truth, I find that Fudo is not very stable and we had some issues during the implementation."
"The configuration is difficult."
 

Pricing and Cost Advice

"licensing for this solution is based on the number of APV (privileged users), and the number of sessions that you want to record."
"I rate the solution's pricing an eight out of ten since the price can be too high for smaller businesses."
"CyberArk Endpoint Privilege Manager has a very high price, so it's a one out of ten for me in terms of pricing."
"Although I do not deal directly with the pricing, CyberArk Endpoint Privilege Manager is costly compared to other solutions. However, it offers beneficial features."
"I believe it's quite a reasonably priced solution. It's not very common to use CyberArk because it's a niche solution, but customers who are willing to control administrative accounts are willing to pay this money."
"The professional services for one eight-hour day would be $1,800."
"The price of CyberArk Endpoint Privilege Manager is expensive. The solution is priced based on the number of accounts onboarded and the number of concurrent sessions. Everyone else is included in the price, such as support."
"Pricing depends on how many devices you use. Right now, on-premise, it costs us a little, but it's worth it. It seems like the cloud solution is much more expensive. We got this solution one year ago, and it's like we bought the solution, and now they are not going to support it on-premise anymore. We are in the implementation phase, and we missed this, and we already paid for the licenses. This is wasted time from my perspective, and CyberArk should be more customer-friendly."
"The pricing is great. We've been given discounts that make it cheaper than using any other solution."
report
Use our free recommendation engine to learn which Privileged Access Management (PAM) solutions are best for your needs.
893,311 professionals have used our research since 2012.
 

Top Industries

By visitors reading reviews
Financial Services Firm
14%
Manufacturing Company
11%
Computer Software Company
7%
Government
7%
Comms Service Provider
13%
Government
13%
Financial Services Firm
10%
Computer Software Company
9%
 

Company Size

By reviewers
Large Enterprise
Midsize Enterprise
Small Business
By reviewers
Company SizeCount
Small Business18
Midsize Enterprise9
Large Enterprise18
No data available
 

Questions from the Community

Looking for recommendations and a pros/cons template for software to detect insider threats
This is an inside-out --- outside-in --- inside-in question, as an insider can be an outsider as well. There is no short answer other than a blend of a PAM tool with Behavioral Analytics and Endpo...
What do you like most about CyberArk Endpoint Privilege Manager?
The most valuable feature of the solution is its performance.
What is your experience regarding pricing and costs for CyberArk Endpoint Privilege Manager?
I believe it's quite a reasonably priced solution. It's not very common to use CyberArk because it's a niche solution, but customers who are willing to control administrative accounts are willing t...
Ask a question
Earn 20 points
 

Also Known As

Viewfinity
Fudo Privileged Access Management
 

Overview

 

Sample Customers

Information Not Available
KFC, BP, Santander, Burger King, ING, Starbucks, Yahoo, DHL
Find out what your peers are saying about CyberArk Endpoint Privilege Manager vs. Fudo PAM and other solutions. Updated: April 2026.
893,311 professionals have used our research since 2012.