CyberArk Endpoint Privilege Manager vs One Identity Safeguard comparison

 

Comparison Buyer's Guide

Executive Summary
 

Categories and Ranking

CyberArk Endpoint Privilege...
Ranking in Privileged Access Management (PAM)
6th
Average Rating
8.2
Number of Reviews
28
Ranking in other categories
No ranking in other categories
One Identity Safeguard
Ranking in Privileged Access Management (PAM)
4th
Average Rating
8.2
Number of Reviews
39
Ranking in other categories
User Entity Behavior Analytics (UEBA) (6th)
 

Mindshare comparison

As of July 2024, in the Privileged Access Management (PAM) category, the mindshare of CyberArk Endpoint Privilege Manager is 4.8%, up from 4.0% compared to the previous year. The mindshare of One Identity Safeguard is 4.8%, down from 5.9% compared to the previous year. It is calculated based on PeerSpot user engagement data.
Privileged Access Management (PAM)
Unique Categories:
No other categories found
User Entity Behavior Analytics (UEBA)
2.2%
 

Featured Reviews

Oluwajuwon Olorunlona - PeerSpot reviewer
Dec 8, 2022
Easy to manage, has an application whitelisting feature and a dashboard that shows you which software is suspicious, but there's no way to check credential theft from a text file
CyberArk Endpoint Privilege Manager is a perfect solution, but CyberArk Endpoint Privilege Manager for Linux has many issues. One issue I observed while using it is that it needs to synchronize from an agent to a cloud because the agent does not update configurations or settings from the cloud. When I change some settings on the cloud, the changes don't synchronize into the system, and the policies won't come back unless I reinstall all the services. This is an area for improvement in CyberArk Endpoint Privilege Manager. Another area for improvement in CyberArk Endpoint Privilege Manager, specifically for Windows, is that there's no way for you to check credential theft from a text file, such as a notepad file. Suppose I have a text file that contains passwords, for instance. In that case, I'm doing an application configuration that needs a password. CyberArk Endpoint Privilege Manager won't be able to help you locate that file, which means there's still an opportunity for an attacker to look into that text file and steal the passwords. You can leverage the CyberArk Application Access Manager with CyberArk Endpoint Privilege Manager, but that aspect also needs improvement. An additional feature I want to see in CyberArk Endpoint Privilege Manager is XDR, where you can trace how an attack can happen on an endpoint, how traffic was initiated, or if a person tried to access your computer and whether he was denied or allowed. CyberArk Endpoint Privilege Manager should be able to track such activities. The solution should allow you to see a specific event ID and use it to correlate whatever activity the malicious person was trying to do.
SA
Sep 26, 2023
Fast to implement and has good pricing but lacks documentation
We use the on-demand version. We use the solution for monitoring and connection to the customer's server for Windows and Linux It's easier to connect to the server and it makes it more secure. We've seen about a 40% improvement in that regard. The monitoring system is very good. It has a very…

Quotes from Members

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
 

Pros

"I like that you can remove the admin rights from the user's computer and have control over the environment. That means you can delete the local admins and grant them proper privileges with the console. So, they will get proper permissions for applications they need, but we don't have to do it. In the domain where we don't have control, the user can only do specified actions, but not all of them."
"You can use it to strip users of their local admin rights and, at the same time, elevate applications for them."
"It has drastically reduced the attack surface for local administrative rights and the chance of escalation of privilege. We've removed, at this point, close to 98 percent of the local administrative accounts on workstations. If there were an incident, it would stop at that point and we'd be able to know."
"What sets CyberArk apart is its continuous innovation, staying ahead of the competition."
"The feature called PTA, which stands for Privileged Threat Analytics keeps track of what admins are doing and works with Centimeters. If something fishy is going on with a user's credentials, it alerts the security team so they can act fast. Plus, it automates stuff like resetting credentials or blocking users. So, if there's a potential hack, CyberArk can change passwords and lock out users in a snap. It also gives you a heads-up if anything unusual is going on with server activities, like someone creating new users with uncontrolled credentials."
"The most valuable feature of CyberArk Endpoint Privilege Manager is its high performance, it's the best identity security platform. The security is good. It's easy to showcase the feature and capabilities and compare it with other competitors. It competes well with other solutions. Additionally, it is a complete solution."
"The most valuable features of CyberArk Endpoint Privilege Manager are password management, session management, onboarding rules, platform customization, and safety management."
"The password rotation and the session recording are the most valuable features."
"There are a lot of features, so it's going to sound funny, but one of the most simplistic features, the Favorites feature, is the one we like the best. You do a full run-through of configuration to check out a server and then you can save that whole configuration as a favorite. So the next time you go in, you click on the favorite that you configured and it automatically takes you to the end so you can check the server out that much faster. It saves a lot of time..."
"The Transparent Mode is the number one advantage of the product."
"I have found One Identity Safeguard to be stable."
"All sessions are audited and they are indexed/searchable through the GUI."
"It's one of the best products we've seen. When you start looking at the functionality and use cases and usability of the product, it's straightforward. They designed this product with the end-user in mind, and they also had the sysadmin who is supporting the product in mind. They really did a nice job. Overall, it's a nice product to work with."
"One of the most important things is that it is very easy to use and install. It is also agentless, so all of the operations happen more smoothly than any other product."
"One Identity Safeguard is stable and provides great performance."
"We deployed it into our company for controlling a client's behavior in our data center. It is very useful to control their connections, such as RDP."
 

Cons

"The price of the product is an area of concern where improvements are required. The product's price should be made more flexible."
"Can be improved by allowing computers to be excluded from policies."
"The tool should be more user-friendly."
"For an experienced system implementer it will take approximately one day. However, for somebody who is inexperienced it may take up to five days."
"We have had some major issues with the tool, but we have worked with the R&D teams and we have worked with support. There is room for improvement, especially on response times. But they're working on it and they're doing the best they can."
"It is hard to deal with technical support if you are not certified."
"They need much better integration with Azure AD."
"Technical support is slow to respond when we run into issues."
"The deployment affects our privileged users because it takes a long time for them to request privileges, which impacts the SLA."
"The interface is better now, but it still could be improved a lot. It needs more organization, menus, automatic refresh of information, and Web 2.0."
"When we compare One Identity Safeguard with Cyberark, we know CyberArk has other tools or other features that are more complex and more useful for the customers. For example, I have one customer that wants to elevate the permission that is available in CyberArk."
"The SPS could be a lot easier to administrate and the parts should be unified, from a design perspective, so that I can recognize the systems as being part of the same package. They feel like they have been forced together."
"Support for One Identity Safeguard could be improved because sometimes the support team doesn't have an answer or solution for some bugs. A feature I found in a competitor would make One Identity Safeguard better, and that is the ability to load balance the traffic in the target."
"Monitoring of the platform should be easier and more functional so that you can have a clear picture of the running service."
"We can't review or audit HTTP and HTTPS. This functionality should be added so that we can review and audit HTTP and HTTPS."
"The Transparent Mode could be somewhat easier to use."
 

Pricing and Cost Advice

"It is an expensive solution."
"licensing for this solution is based on the number of APV (privileged users), and the number of sessions that you want to record."
"CyberArk Endpoint Privilege Manager has a very high price, so it's a one out of ten for me in terms of pricing."
"The price of CyberArk Endpoint Privilege Manager is expensive. The solution is priced based on the number of accounts onboarded and the number of concurrent sessions. Everyone else is included in the price, such as support."
"We pay about $17 per user."
"I think that it was in the range of $200,000 that had to get approved."
"It's not at the lower end of the market. I think the price is reasonable considering the quality it delivers. It is a top-notch solution at a fair price point."
"I rate the solution's pricing an eight out of ten since the price can be too high for smaller businesses."
"The pricing depends on our perspective, our budget, and, of course, the competitors we are taking into account."
"Safeguard is cheaper than CyberArk."
"As compared to other products, it is reasonable, but the training sessions are too expensive."
"The license is very expensive for us, partly due to inflation and partly because of the exchange rate between the Dollar and the Iranian Rial. We purchased a perpetual license that we've been using up until now, but I believe that we are not going to update it in the future. Instead, we plan to find another third-party to support us with the license, in the sense that we would have access to their license as a shared agreement."
"Its subscription cost is too much, and sometimes, it is very difficult to pitch the solution to the management for cost approval. If the cost is reduced a little bit, it would be easier. If its cost was less, many other organizations that currently cannot afford it would be able to use this technology. I'm sure many organizations around the globe are having issues with identity management, and it is a very difficult task for IT to manage privileged accounts."
"They have comparable pricing. All identity products are essentially priced in a similar way. It's a per-user base."
"It was definitely cheaper than the other two products that we evaluated."
"Our licensing costs are on a yearly basis."
report
Use our free recommendation engine to learn which Privileged Access Management (PAM) solutions are best for your needs.
793,295 professionals have used our research since 2012.
 

Top Industries

By visitors reading reviews
Financial Services Firm
15%
Computer Software Company
15%
Manufacturing Company
10%
Government
9%
Computer Software Company
22%
Financial Services Firm
13%
Manufacturing Company
7%
Government
7%
 

Company Size

By reviewers
Large Enterprise
Midsize Enterprise
Small Business
 

Questions from the Community

Looking for recommendations and a pros/cons template for software to detect insider threats
This is an inside-out --- outside-in --- inside-in question, as an insider can be an outsider as well. There is no short answer other than a blend of a PAM tool with Behavioral Analytics and Endpo...
What do you like most about CyberArk Endpoint Privilege Manager?
The most valuable feature of the solution is its performance.
What do you like most about One Identity Safeguard?
The identity discovery is good, and the performance is pretty good value.
What is your experience regarding pricing and costs for One Identity Safeguard?
They have comparable pricing. All identity products are essentially priced in a similar way. It's a per-user base. Usually, they start at one price, and when you start pricing the competition, you ...
What needs improvement with One Identity Safeguard?
We sometimes face issues with configuration and things like that, but we manage to solve them. In general, it is a pretty good solution for the PSM features. There can be an improvement in terms of...
 

Also Known As

Viewfinity
No data available
 

Overview

 

Sample Customers

Cavium
Find out what your peers are saying about CyberArk Endpoint Privilege Manager vs. One Identity Safeguard and other solutions. Updated: July 2024.
793,295 professionals have used our research since 2012.