


CyberArk Endpoint Privilege Manager and Kaspersky Endpoint Security Cloud compete in the endpoint security market. CyberArk is noted for its focus on privilege management, offering robust control over application usage, while Kaspersky provides a comprehensive security suite that may appeal to organizations seeking a wider range of protection technologies.
Features: CyberArk Endpoint Privilege Manager manages administrator rights effectively and reduces risk without altering user behavior using application control and risk-based credential elevation. It improves password management through continuous innovation in privilege access. Meanwhile, Kaspersky Endpoint Security Cloud integrates anti-malware capabilities, web protection, device management, and application control in one package.
Room for Improvement: CyberArk could enhance user interface intuitiveness and reduce initial setup complexity for quicker adoption. It may also benefit from improving documentation for easier administrator navigation. On the other hand, Kaspersky might need to address occasional false positives in its vulnerability assessments and improve the cloud management console interface following updates. Reducing the complexity of integrating with third-party applications could further enhance its offering.
Ease of Deployment and Customer Service: CyberArk Endpoint Privilege Manager provides seamless deployment through a cloud-based management service, minimizing disruptions. Kaspersky Endpoint Security Cloud offers easy implementation and is known for its intuitive support, facilitating smooth integration and user experience. Both companies deliver customer service, but Kaspersky's broad support channels stand out for comprehensive assistance.
Pricing and ROI: CyberArk Endpoint Privilege Manager involves higher initial setup costs but offers ROI by enhancing security efficiency through focused privilege management investment. Kaspersky Endpoint Security Cloud, although having potentially lower upfront costs, justifies its investment by delivering extensive security features, resulting in a broader security deployment.
They appreciate the rich telemetry data from the solution, as it provides in-depth threat identification.
Cortex XDR by Palo Alto Networks helps to reduce my total cost of ownership significantly.
In Cortex XDR by Palo Alto Networks, most of the remediation is automated and the accuracy is quite good.
Deploying CyberArk Endpoint Privilege Manager has secured the infrastructure, which saves money, time, and resources.
I consider CyberArk Endpoint Privilege Manager's return on investment to be good since it effectively accomplishes the goals expected from privilege access management solutions.
The technical support from Palo Alto deserves a mark of ten because they reach out within an hour whenever assistance is needed.
There is no back and forth, and they know what we are asking for and come up with the best resolution for a solution.
If any of these services are missed, it becomes a problem in terms of support tickets, follow-up, or special configuration that needs to be done in the system.
They respond immediately to our inquiries, resolve issues promptly, and provide valuable guidance, especially in critical situations.
We engage them when needed and receive prompt responses that typically resolve our issues.
Earlier, we received support for normal tickets within a day, but now it takes one or two days to resolve issues.
They should start offering sessions if there's some critical error occurring, even if someone has to pay for the support.
We contacted support, and they answered all questions.
You can onboard 10,000 endpoints in just hours, which demonstrates the excellent scalability of this product.
Activating the newly purchased licenses is instantaneous, allowing installations without adjustments since it's cloud-based.
Cortex XDR by Palo Alto Networks can be expanded anytime by purchasing another license without any issues related to scalability.
We can set permissions per team or department, allowing some teams to elevate specific applications while others have different permissions.
CyberArk Endpoint Privilege Manager is quite scalable.
The available reports and other security tools assist in scaling it according to my organization's needs.
If you assign a device to a user in Kaspersky Endpoint Security Cloud, you cannot reassign it to another user.
Cortex remains fast and responsive, even with increasing data and alerts.
The thresholds we've seen on our firewall boxes at some instances reached 80% to 85%, but even at that level of utilization, we don't observe any latency or any issues reported with respect to accessing the application.
Cortex XDR is stable, offering high quality and reliable performance.
It is a robust solution that has effectively supported our environment without major issues.
Since implementing it, we have not experienced any outages or stability issues.
CyberArk Endpoint Privilege Manager offers multiple options for creating and stopping policies.
Improving reporting and dashboard customization, along with the addition of real-time and exportable reports, would help SOC teams greatly.
The inclusion of this feature would allow the application of DLP policies alongside antivirus policies via a single agent and console, making it more competitive as other OEMs often offer DLP solutions as part of their antivirus products.
If the per GB data could be provided at a certain level free of cost or at the same cost which the customer is taking for the entire bundle, that would be better.
CyberArk Endpoint Privilege Manager could be improved by simplifying the administration process, specifically when setting up policies and applications.
Currently, no user-based policy option is available inside the EPM console.
Some features provided in the self-hosted version of EPM are not supported in the software as a service version, like connection to some analysis applied by Palo Alto.
Recently, there was a company which was attacked by phishing emails, and out of 10, it was only blocking three emails.
Changes occur without notification or updates from the Kaspersky team, making it difficult to prepare for modifications.
The pricing on SentinelOne is far more reasonable and cheaper than Cortex XDR by Palo Alto Networks.
I would say it is definitely not a cheap product, considering how mature it is and how scalable all Palo Alto products are together.
Cortex XDR is perceived as expensive by some customers, yet offers dynamic pricing.
CyberArk Endpoint Privilege Manager is slightly expensive, but costs can be negotiated to become more competitive.
CyberArk Endpoint Privilege Manager is costly compared to other solutions.
I've received feedback that the pricing is high, however, for me, the value it brings is worth the cost.
It incorporates AI for normal behavior detection, distinguishing unusual operations.
The product provides automation responses in case of a threat attack, severity assessments, centralized manageability, and comprehensive compliance features, resulting in reduced costs.
It includes machine learning to easily analyze data and detect complex threats across endpoints, networks, or clouds.
CyberArk Endpoint Privilege Manager effectively reduces malicious content in applications by allowing us to identify and block dangerous applications.
It allows them to granularly manage controls to prevent some malicious activities on the endpoint machine.
CyberArk Endpoint Privilege Manager enhances computer security by providing minimal access, effectively preventing ransomware attacks.
Endpoint Detection and Response functionality includes root cause analysis and device isolation.
Kaspersky Endpoint Security Cloud is one of the best, very effective software because of its vulnerability assessment and threat assessments.
We contacted support, and they answered all questions.
| Product | Mindshare (%) |
|---|---|
| Cortex XDR by Palo Alto Networks | 11.3% |
| CyberArk Endpoint Privilege Manager | 6.5% |
| Kaspersky Endpoint Security Cloud | 3.4% |
| Other | 78.8% |


| Company Size | Count |
|---|---|
| Small Business | 45 |
| Midsize Enterprise | 20 |
| Large Enterprise | 48 |
| Company Size | Count |
|---|---|
| Small Business | 17 |
| Midsize Enterprise | 9 |
| Large Enterprise | 18 |
| Company Size | Count |
|---|---|
| Small Business | 8 |
| Midsize Enterprise | 4 |
| Large Enterprise | 3 |
Cortex XDR by Palo Alto Networks provides advanced threat detection with AI-driven endpoint protection and seamless integration, ensuring multi-layered security and automatic threat response.
Cortex XDR is designed to safeguard endpoints against malware and suspicious activities. It offers advanced threat detection and response capabilities using behavioral analysis, AI, and machine learning. It seamlessly integrates with security infrastructures, providing endpoint security, firewall integration, and enhanced visibility in both cloud-based and on-premises environments.
What are the key features of Cortex XDR?Organizations in diverse sectors deploy Cortex XDR to protect against malware, leveraging its advanced threat detection capabilities. Its integration with existing security infrastructures appeals to those seeking comprehensive protection in both cloud and on-premises environments, providing enhanced visibility and threat intelligence.
CyberArk Endpoint Privilege Manager enhances security by controlling access, removing admin rights, and managing privileges. It supports diverse environments with simple integration, focusing on credential detection, threat protection, and compliance.
CyberArk Endpoint Privilege Manager secures enterprise passwords, monitors session connections, and enhances cybersecurity by controlling privileged access. It blocks unauthorized applications, monitors user activities, and secures credentials across platforms. Key areas include Just-In-Time Access, privilege separation, and local administrator password rotation. While robust, challenges exist with performance, complexity, and setup. Integration with Linux and Unix needs improvement, requiring advanced reporting tools and easier policy management. Pricing concerns and maintenance issues with Windows servers persist, as well as database issues in the on-prem version.
What are the key features of CyberArk Endpoint Privilege Manager?Organizations deploying CyberArk Endpoint Privilege Manager in industries such as finance, healthcare, and technology benefit from secure credential management across Unix, AWS, and GCP. By implementing privilege separation and monitoring user activities, they achieve effective risk mitigation and compliance across multiple platforms.
Kaspersky Endpoint Security Cloud offers robust cybersecurity with features like malware detection and cloud-based endpoint management, suitable for businesses requiring advanced protection.
This solution provides comprehensive endpoint security, including a self-protection mechanism, EDR service, and integration with Microsoft Office 365. It supports multiple operating systems with components like Web Control, Device Control, and BitLocker encryption. Anti-phishing and anti-malware features, alongside detailed vulnerability assessments, enhance its security capabilities. Despite its strengths, users note areas for improvement in deployment, update management, and resource usage. Challenges include high CPU usage, installation delays, and stability issues. Companies benefit from features like ransomware protection and cloud platform integration, ensuring protection against threats.
What are the most important features of Kaspersky Endpoint Security Cloud?Companies in sectors such as automation and insurance implement Kaspersky Endpoint Security Cloud for its advanced cybersecurity features. They rely on its capabilities for application blocking, web and email threat defense, and compliance with data protection standards. By leveraging endpoint management and behavior analysis, organizations integrate this tool with cloud platforms to secure servers, workstations, and mobile devices.
We monitor all Ransomware Protection reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.