CyberArk Endpoint Privilege Manager vs Fudo PAM comparison

Cancel
You must select at least 2 products to compare!
CyberArk Logo
1,604 views|1,084 comparisons
82% willing to recommend
Fudo Security Logo
1,090 views|644 comparisons
100% willing to recommend
Comparison Buyer's Guide
Executive Summary

We performed a comparison between CyberArk Endpoint Privilege Manager and Fudo PAM based on real PeerSpot user reviews.

Find out in this report how the two Privileged Access Management (PAM) solutions compare in terms of features, pricing, service and support, easy of deployment, and ROI.
To learn more, read our detailed CyberArk Endpoint Privilege Manager vs. Fudo PAM Report (Updated: March 2024).
771,157 professionals have used our research since 2012.
Featured Review
Quotes From Members
We asked business professionals to review the solutions they use.
Here are some excerpts of what they said:
Pros
"CyberArk Endpoint Privilege Manager (EPM) 's most valuable feature is its ability to manage user application privileges and protect against ransomware attacks by controlling access to specific files and applications.""The solution is scalable.""The solution allows me to give access and privileges to each user individually""This is the number one product for privilege account security.""It has drastically reduced the attack surface for local administrative rights and the chance of escalation of privilege. We've removed, at this point, close to 98 percent of the local administrative accounts on workstations. If there were an incident, it would stop at that point and we'd be able to know.""The solution's technical support is good.""The most valuable feature of CyberArk Endpoint Privilege Manager is its ability to reset passwords every time that it is needed or periodically.""The most valuable feature is that it does lifecycle management and that it will change to whatever the end target is."

More CyberArk Endpoint Privilege Manager Pros →

"it's perfect to control and administer computers in our company.""The main benefit of the solution is that it's very easy to set up. It only takes a couple of hours to install everything.""We are convinced that Fudo PAM is better than competing products like WALLIX.""Fudo PAM was the most flexible and intuitive interface out of all of the products in the PAM sector.""Session recording and password management are the two main aspects."

More Fudo PAM Pros →

Cons
"Technical support is slow to respond when we run into issues.""Performance could be better. We have a couple of problems with CyberArk right now. One of the problems is performance in our environment. Support also takes a long time to respond. If the user already has local admin rights, then I can't collect any events in the console from this device. There are also some options in CyberArk that are not working properly, and are not helpful in this case. I can't collect any information to create a proper policy for the device. I have to investigate everything manually, or even disable the local admin from the device. I can collect the events only after this, and it's very time consuming. In my case, it's a waste of resources.""It is hard to deal with technical support if you are not certified.""CyberArk meets clients' need very spot-on. It covers everything customers ask for. As for improvements, honestly, the feedback's been really positive. I haven't heard any specific areas that need work.""The turnaround time of the support team is an area of concern where improvements are required.""Compared to other tools like Linux, this solution isn't as user-friendly.""Can be improved by allowing computers to be excluded from policies.""The solution can be complex to use at times."

More CyberArk Endpoint Privilege Manager Cons →

"The stability is not very good.""The configuration is difficult.""Professional training and certification would be great.""I would like to see better server management. You have to know exactly what you're looking for to get the right server.""Fudo PAM’s scalability is not very strong."

More Fudo PAM Cons →

Pricing and Cost Advice
  • "licensing for this solution is based on the number of APV (privileged users), and the number of sessions that you want to record."
  • "I think that it was in the range of $200,000 that had to get approved."
  • "Pricing depends on how many devices you use. Right now, on-premise, it costs us a little, but it's worth it. It seems like the cloud solution is much more expensive. We got this solution one year ago, and it's like we bought the solution, and now they are not going to support it on-premise anymore. We are in the implementation phase, and we missed this, and we already paid for the licenses. This is wasted time from my perspective, and CyberArk should be more customer-friendly."
  • "The cost for CyberArk is very high."
  • "The price of CyberArk Endpoint Privilege Manager is expensive."
  • "The price of CyberArk Endpoint Privilege Manager is expensive. The solution is priced based on the number of accounts onboarded and the number of concurrent sessions. Everyone else is included in the price, such as support."
  • "We pay about $17 per user."
  • "CyberArk Endpoint Privilege Manager has a very high price, so it's a one out of ten for me in terms of pricing."
  • More CyberArk Endpoint Privilege Manager Pricing and Cost Advice →

  • "The pricing is great. We've been given discounts that make it cheaper than using any other solution."
  • More Fudo PAM Pricing and Cost Advice →

    report
    Use our free recommendation engine to learn which Privileged Access Management (PAM) solutions are best for your needs.
    771,157 professionals have used our research since 2012.
    Questions from the Community
    Top Answer:This is an inside-out --- outside-in --- inside-in question, as an insider can be an outsider as well. There is no short answer other than a blend of a PAM tool with Behavioral Analytics and Endpoint… more »
    Top Answer:The most valuable feature of the solution is its performance.
    Top Answer:Session recording and password management are the two main aspects.
    Top Answer:There are some areas for improvement in the Fudo PAM cake that we want to improve in terms of scaling. Scaling is an optional feature because we closed some big projects with enterprise customers from… more »
    Top Answer:The main use case is for protecting privileged user access, such as securing remote access services. Another important use case is when we work with third-party users and need to provide password… more »
    Ranking
    Views
    1,604
    Comparisons
    1,084
    Reviews
    15
    Average Words per Review
    601
    Rating
    8.0
    Views
    1,090
    Comparisons
    644
    Reviews
    0
    Average Words per Review
    0
    Rating
    N/A
    Comparisons
    Also Known As
    Viewfinity
    Fudo Privileged Access Management
    Learn More
    Overview

    CyberArk Endpoint Privilege Manager, a critical and foundational endpoint control addresses the underlying weaknesses of endpoint defenses against a privileged attacker and helps enterprises defend against these attacks through removing local admin rights, enforcing least privilege, and implementing foundational endpoint security controls across all Windows, macOS and Linux endpoints from hybrid to cloud environments.

    Click here for a free 30 day trial: CyberArk Endpoint Privilege Manager free trial

    We are the leading vendor of innovative IT security solutions. We focus on privileged access management and privileged session monitoring, combined under the Fudo Security brand. The Fudo product line merges innovation and an intuitive user experience with strong security features. These are the hallmarks of the future designs of the company.

    Sample Customers
    KFC, BP, Santander, Burger King, ING, Starbucks, Yahoo, DHL
    Top Industries
    REVIEWERS
    Computer Software Company38%
    Manufacturing Company15%
    Comms Service Provider15%
    Wholesaler/Distributor8%
    VISITORS READING REVIEWS
    Computer Software Company14%
    Financial Services Firm14%
    Manufacturing Company10%
    Government8%
    VISITORS READING REVIEWS
    Financial Services Firm22%
    Computer Software Company15%
    Media Company8%
    Energy/Utilities Company7%
    Company Size
    REVIEWERS
    Small Business41%
    Midsize Enterprise22%
    Large Enterprise38%
    VISITORS READING REVIEWS
    Small Business18%
    Midsize Enterprise13%
    Large Enterprise70%
    VISITORS READING REVIEWS
    Small Business29%
    Midsize Enterprise18%
    Large Enterprise53%
    Buyer's Guide
    CyberArk Endpoint Privilege Manager vs. Fudo PAM
    March 2024
    Find out what your peers are saying about CyberArk Endpoint Privilege Manager vs. Fudo PAM and other solutions. Updated: March 2024.
    771,157 professionals have used our research since 2012.

    CyberArk Endpoint Privilege Manager is ranked 6th in Privileged Access Management (PAM) with 28 reviews while Fudo PAM is ranked 21st in Privileged Access Management (PAM) with 5 reviews. CyberArk Endpoint Privilege Manager is rated 8.2, while Fudo PAM is rated 8.0. The top reviewer of CyberArk Endpoint Privilege Manager writes "Offers integrated solutions and expands its capabilities through strategic acquisitions". On the other hand, the top reviewer of Fudo PAM writes "Easy to install but needs to provide better server management and organization". CyberArk Endpoint Privilege Manager is most compared with BeyondTrust Endpoint Privilege Management, Microsoft Defender for Endpoint, CrowdStrike Falcon, CyberArk Privileged Access Manager and Tanium, whereas Fudo PAM is most compared with WALLIX Bastion, CyberArk Privileged Access Manager, Delinea Secret Server, One Identity Safeguard and Teleport. See our CyberArk Endpoint Privilege Manager vs. Fudo PAM report.

    See our list of best Privileged Access Management (PAM) vendors.

    We monitor all Privileged Access Management (PAM) reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.