We performed a comparison between CyberArk Endpoint Privilege Manager and One Identity Privileged Access Suite for Unix based on real PeerSpot user reviews.
Find out in this report how the two Privileged Access Management (PAM) solutions compare in terms of features, pricing, service and support, easy of deployment, and ROI."The most valuable feature of CyberArk Endpoint Privilege Manager is its ability to reset passwords every time that it is needed or periodically."
"The password rotation and the session recording are the most valuable features."
"The product is very flexible"
"The solution's technical support is good."
"We can do both server and endpoint protection."
"The department management aspect of the solution is the most valuable aspect."
"The feature called PTA, which stands for Privileged Threat Analytics keeps track of what admins are doing and works with Centimeters. If something fishy is going on with a user's credentials, it alerts the security team so they can act fast. Plus, it automates stuff like resetting credentials or blocking users. So, if there's a potential hack, CyberArk can change passwords and lock out users in a snap. It also gives you a heads-up if anything unusual is going on with server activities, like someone creating new users with uncontrolled credentials."
"The most valuable feature is that it does lifecycle management and that it will change to whatever the end target is."
"Privileged Access Suite's best feature is it's straightforward to use."
"The most valuable feature of this solution is that it is easy to use."
"The most valuable features are session and password management."
"The product's threat protection and defense capabilities need enhancement."
"CyberArk Endpoint Privilege Manager is a perfect solution, but CyberArk Endpoint Privilege Manager for Linux has many issues. Another area for improvement in CyberArk Endpoint Privilege Manager, specifically for Windows, is that there's no way for you to check credential theft from a text file, such as a notepad file."
"One area that has room for improvement is in managing the credentials for network devices."
"We have had some major issues with the tool, but we have worked with the R&D teams and we have worked with support. There is room for improvement, especially on response times. But they're working on it and they're doing the best they can."
"It's an old product and has many areas that can be improved."
"The price of the product is an area of concern where improvements are required. The product's price should be made more flexible."
"For an experienced system implementer it will take approximately one day. However, for somebody who is inexperienced it may take up to five days."
"They need much better integration with Azure AD."
"Product management should be improved."
"There is a new trend of not having any privileged users or accounts."
"Privileged Access Suite's interface could be better."
More CyberArk Endpoint Privilege Manager Pricing and Cost Advice →
CyberArk Endpoint Privilege Manager is ranked 6th in Privileged Access Management (PAM) with 28 reviews while One Identity Privileged Access Suite for Unix is ranked 20th in Privileged Access Management (PAM) with 3 reviews. CyberArk Endpoint Privilege Manager is rated 8.2, while One Identity Privileged Access Suite for Unix is rated 7.6. The top reviewer of CyberArk Endpoint Privilege Manager writes "Offers integrated solutions and expands its capabilities through strategic acquisitions". On the other hand, the top reviewer of One Identity Privileged Access Suite for Unix writes "A reliable solution with great password and session management". CyberArk Endpoint Privilege Manager is most compared with BeyondTrust Endpoint Privilege Management, Microsoft Defender for Endpoint, CrowdStrike Falcon, CyberArk Privileged Access Manager and Tanium, whereas One Identity Privileged Access Suite for Unix is most compared with ManageEngine PAM360 and WALLIX Bastion. See our CyberArk Endpoint Privilege Manager vs. One Identity Privileged Access Suite for Unix report.
See our list of best Privileged Access Management (PAM) vendors.
We monitor all Privileged Access Management (PAM) reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.