Try our new research platform with insights from 80,000+ expert users

CyberArk Endpoint Privilege Manager vs Fudo PAM comparison

 

Comparison Buyer's Guide

Executive SummaryUpdated on Oct 6, 2024

Review summaries and opinions

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
 

Categories and Ranking

CyberArk Endpoint Privilege...
Ranking in Privileged Access Management (PAM)
4th
Average Rating
8.2
Reviews Sentiment
6.8
Number of Reviews
38
Ranking in other categories
Endpoint Compliance (5th), Anti-Malware Tools (5th), Application Control (3rd), Ransomware Protection (5th)
Fudo PAM
Ranking in Privileged Access Management (PAM)
25th
Average Rating
8.0
Reviews Sentiment
7.0
Number of Reviews
5
Ranking in other categories
No ranking in other categories
 

Mindshare comparison

As of March 2026, in the Privileged Access Management (PAM) category, the mindshare of CyberArk Endpoint Privilege Manager is 2.4%, down from 3.5% compared to the previous year. The mindshare of Fudo PAM is 2.5%, down from 2.6% compared to the previous year. It is calculated based on PeerSpot user engagement data.
Privileged Access Management (PAM) Mindshare Distribution
ProductMindshare (%)
CyberArk Endpoint Privilege Manager2.4%
Fudo PAM2.5%
Other95.1%
Privileged Access Management (PAM)
 

Featured Reviews

PH
Manager at a computer software company with 1,001-5,000 employees
MFA boosts protection and has blocking capabilities but dependency on other solutions complicates deployment
The main issues I experience are related to deployment, which requires dependency on other solutions like AD or SCCM. These tools need to be defined and synced with the client or agent and master, sometimes needing manual checks. The agent may have problems syncing, which complicates deployment, especially when users leave the organization, however, agents remain licensed since the server still maintains licenses. Additionally, compared to other endpoint managers like Thycotic, CyberArk Endpoint Privilege Manager lacks recording capabilities, which limits its functionality for critical applications. A feature that records activity, even when bypassing CyberArk Endpoint Privilege Manager, would be beneficial.
TD
BDM at Oberig-it
Works with SCTP, STTPS, SQL, and MySQL protocols
There are some areas for improvement in the Fudo PAM cake that we want to improve in terms of scaling. Scaling is an optional feature because we closed some big projects with enterprise customers from different countries, including Ukraine, Kaloxetine, Uzbekistan, and others. We closed projects in different areas with customers of different sizes. When we talk about enterprise customers, we should consider that they have different use cases and desires for Fudo PAM. We compared our options for customers to choose their vendors, and we discovered Fudo PAM has few scaling options. In Fudo PAM, there should be additional features for scaling and organizing remote sessions for remote systems in remote networks.

Quotes from Members

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
 

Pros

"The most valuable feature is the ability to control users with admin rights. Even if developers and senior folks maintain their admin rights, we can still manage their activities."
"In terms of removing local admin credentials on the endpoint and the effect on the size of the attack surface in our organization, it has drastically reduced the attack surface for local administrative rights and the chance of escalation of privilege."
"This is the number one product for privilege account security."
"The biggest benefit of CyberArk EPM for our customers is control over privileged access for endpoints. Endpoints are often the starting point for attackers to enter and move within a network. CyberArk EPM bridges the gap between security and operations teams. Operations teams are happy because work isn't stopped due to admin rights issues, while security teams are satisfied that full admin rights aren't given to all users."
"We can do both server and endpoint protection."
"The most valuable feature of CyberArk Endpoint Privilege Manager is its high performance, it's the best identity security platform. The security is good. It's easy to showcase the feature and capabilities and compare it with other competitors. It competes well with other solutions. Additionally, it is a complete solution."
"The most valuable features of CyberArk Endpoint Privilege Manager are password management, session management, onboarding rules, platform customization, and safety management."
"We did immediately begin to see results when using CyberArk."
"it's perfect to control and administer computers in our company."
"Right now we are encouraging our customers to use Fudo PAM because it is the only product in PAM technology that we have to offer them."
"This is a solution that I recommend because it is a simple privileged access management system that is done very well."
"Session recording and password management are the two main aspects."
"We are convinced that Fudo PAM is better than competing products like WALLIX."
"The main benefit of the solution is that it's very easy to set up. It only takes a couple of hours to install everything."
"I think that Fudo Privileged Access Management is a very good program."
"Fudo PAM was the most flexible and intuitive interface out of all of the products in the PAM sector."
 

Cons

"The main issues I experience are related to deployment, which requires dependency on other solutions like AD or SCCM."
"The solution can be complex to use at times."
"CyberArk should consider whitelisting important applications like PowerShell and DLL that are currently not allowed due to some malicious content."
"There are many features that are currently missing. A customization option is required for certain policies."
"CyberArk Endpoint Privilege Manager could be improved by simplifying the administration process, specifically when setting up policies and applications."
"Compared to other tools like Linux, this solution isn't as user-friendly."
"CyberArk Endpoint Privilege Manager can be better by making its UI more consistent."
"The price of the product is an area of concern where improvements are required. The product's price should be made more flexible."
"Fudo PAM’s scalability is not very strong."
"I would like to see better server management. You have to know exactly what you're looking for to get the right server."
"Professional training and certification would be great."
"To tell you the truth, I find that Fudo is not very stable and we had some issues during the implementation."
"Professional training and certification would be great."
"The configuration is difficult."
"The configuration is difficult."
"The stability is not very good."
 

Pricing and Cost Advice

"The product's license is easy to procure."
"The tool's pricing is reasonable for customers."
"The price of CyberArk Endpoint Privilege Manager is expensive."
"We pay about $17 per user."
"The professional services for one eight-hour day would be $1,800."
"The tool is a bit pricey compared to its competitors. My company does work with competitors, but I don't have hands-on experience with other software. I've just done some comparisons."
"The price of CyberArk Endpoint Privilege Manager is expensive. The solution is priced based on the number of accounts onboarded and the number of concurrent sessions. Everyone else is included in the price, such as support."
"It's not at the lower end of the market. I think the price is reasonable considering the quality it delivers. It is a top-notch solution at a fair price point."
"The pricing is great. We've been given discounts that make it cheaper than using any other solution."
report
Use our free recommendation engine to learn which Privileged Access Management (PAM) solutions are best for your needs.
884,933 professionals have used our research since 2012.
 

Top Industries

By visitors reading reviews
Financial Services Firm
13%
Manufacturing Company
11%
Computer Software Company
9%
Government
7%
Government
13%
Comms Service Provider
12%
Financial Services Firm
12%
Computer Software Company
9%
 

Company Size

By reviewers
Large Enterprise
Midsize Enterprise
Small Business
By reviewers
Company SizeCount
Small Business17
Midsize Enterprise9
Large Enterprise18
No data available
 

Questions from the Community

Looking for recommendations and a pros/cons template for software to detect insider threats
This is an inside-out --- outside-in --- inside-in question, as an insider can be an outsider as well. There is no short answer other than a blend of a PAM tool with Behavioral Analytics and Endpo...
What do you like most about CyberArk Endpoint Privilege Manager?
The most valuable feature of the solution is its performance.
What is your experience regarding pricing and costs for CyberArk Endpoint Privilege Manager?
I believe it's quite a reasonably priced solution. It's not very common to use CyberArk because it's a niche solution, but customers who are willing to control administrative accounts are willing t...
Ask a question
Earn 20 points
 

Also Known As

Viewfinity
Fudo Privileged Access Management
 

Overview

 

Sample Customers

Information Not Available
KFC, BP, Santander, Burger King, ING, Starbucks, Yahoo, DHL
Find out what your peers are saying about CyberArk Endpoint Privilege Manager vs. Fudo PAM and other solutions. Updated: March 2026.
884,933 professionals have used our research since 2012.