

CyberArk Endpoint Privilege Manager and One Identity Safeguard are leading solutions in the endpoint security sector. CyberArk appears to have the upper hand in user satisfaction, particularly in pricing and support, whereas One Identity Safeguard is valued for its rich features that justify its higher cost.
Features: Users identify CyberArk Endpoint Privilege Manager for its integration capabilities, effective privilege management, and streamlined user controls. One Identity Safeguard stands out with its comprehensive session management, scalability, and robust security features.
Room for Improvement: CyberArk users suggest enhancements in reporting capabilities, simplified update processes, and more user-friendly interfaces. For One Identity Safeguard, improvements in response time, configuration simplicity, and user documentation are highlighted.
Ease of Deployment and Customer Service: CyberArk Endpoint Privilege Manager offers straightforward deployment and responsive customer service, making it a good fit for fast implementation. One Identity Safeguard, despite requiring more complex setup, provides a comprehensive support framework appreciated by users.
Pricing and ROI: CyberArk Endpoint Privilege Manager is seen as cost-effective with its competitive setup costs and quick ROI. One Identity Safeguard, although higher in upfront costs, provides long-term value due to its extensive features, offering a justified investment for many organizations.
Deploying CyberArk Endpoint Privilege Manager has secured the infrastructure, which saves money, time, and resources.
I consider CyberArk Endpoint Privilege Manager's return on investment to be good since it effectively accomplishes the goals expected from privilege access management solutions.
It has also reduced the time spent on password management, saving our team time in managing privileged accounts, and is helping with automation that reduces manual efforts.
Instead of manually reconstructing activity, everything is already logged and searchable, which has improved response time during internal reviews.
It has reduced inside and external threats, which is essential for preventing privileged user damage, and decreased privileged account incidents by 40%.
They respond immediately to our inquiries, resolve issues promptly, and provide valuable guidance, especially in critical situations.
We engage them when needed and receive prompt responses that typically resolve our issues.
Earlier, we received support for normal tickets within a day, but now it takes one or two days to resolve issues.
Documentation and knowledge base resources are also useful for resolving common issues and understanding product features, making customer support reliable and meeting enterprise expectations.
The customer team is knowledgeable and technically strong, especially when dealing with configuration issues, session monitoring, or password-related queries.
I sometimes need escalations to reach expertise.
We can set permissions per team or department, allowing some teams to elevate specific applications while others have different permissions.
CyberArk Endpoint Privilege Manager is quite scalable.
The available reports and other security tools assist in scaling it according to my organization's needs.
The scalability of One Identity Safeguard is perfect, scoring ten out of ten.
The system can distribute tasks across nodes, improving performance as demand grows.
The platform is designed to support horizontal scaling, so adding capacity is relatively straightforward without redesigning the entire architecture.
It is a robust solution that has effectively supported our environment without major issues.
Since implementing it, we have not experienced any outages or stability issues.
CyberArk Endpoint Privilege Manager offers multiple options for creating and stopping policies.
With proper sizing and high availability configuration, the system handles multiple concurrent sessions efficiently, making it a dependable and stable platform suitable for enterprise environments.
It appears designed as a dependable enterprise-grade solution, reflecting well in its production performance.
I would rate it a nine out of ten for stability.
CyberArk Endpoint Privilege Manager could be improved by simplifying the administration process, specifically when setting up policies and applications.
Currently, no user-based policy option is available inside the EPM console.
Some features provided in the self-hosted version of EPM are not supported in the software as a service version, like connection to some analysis applied by Palo Alto.
While it integrates well with standard environments like Active Directory, expanding smoother integration across a wider range of tools would make it even more versatile.
For some configurations on the SPS side, if I need to make changes, such as for DNS servers, I must redeploy the machine.
There are many steps. We are still in the onboarding phase, and it seems very manual.
CyberArk Endpoint Privilege Manager is slightly expensive, but costs can be negotiated to become more competitive.
CyberArk Endpoint Privilege Manager is costly compared to other solutions.
I've received feedback that the pricing is high, however, for me, the value it brings is worth the cost.
It is one of those where the more you buy, the cheaper it is.
It is cheaper than CyberArk.
Regarding pricing, it may appear slightly on the higher side initially compared to some alternatives, but when we evaluate it against the security benefits, compliance support, and risk reduction, it proves to be cost-effective in the long run.
CyberArk Endpoint Privilege Manager effectively reduces malicious content in applications by allowing us to identify and block dangerous applications.
It allows them to granularly manage controls to prevent some malicious activities on the endpoint machine.
CyberArk Endpoint Privilege Manager enhances computer security by providing minimal access, effectively preventing ransomware attacks.
The auditing and approval mechanisms are features we did not have before and are greatly appreciated.
Automatic credential rotation helps our team by removing the need for manual changes to privileged passwords, reducing the risk of stale or shared credentials and ensuring that every access is controlled and compliant.
The password vault has been a game changer because it provides a secure and controlled way to store, manage, and rotate sensitive credentials without exposing them to users.
| Product | Mindshare (%) |
|---|---|
| One Identity Safeguard | 4.4% |
| CyberArk Endpoint Privilege Manager | 2.4% |
| Other | 93.2% |

| Company Size | Count |
|---|---|
| Small Business | 17 |
| Midsize Enterprise | 9 |
| Large Enterprise | 18 |
| Company Size | Count |
|---|---|
| Small Business | 55 |
| Midsize Enterprise | 27 |
| Large Enterprise | 28 |
CyberArk Endpoint Privilege Manager enhances security by controlling access, removing admin rights, and managing privileges. It supports diverse environments with simple integration, focusing on credential detection, threat protection, and compliance.
CyberArk Endpoint Privilege Manager secures enterprise passwords, monitors session connections, and enhances cybersecurity by controlling privileged access. It blocks unauthorized applications, monitors user activities, and secures credentials across platforms. Key areas include Just-In-Time Access, privilege separation, and local administrator password rotation. While robust, challenges exist with performance, complexity, and setup. Integration with Linux and Unix needs improvement, requiring advanced reporting tools and easier policy management. Pricing concerns and maintenance issues with Windows servers persist, as well as database issues in the on-prem version.
What are the key features of CyberArk Endpoint Privilege Manager?Organizations deploying CyberArk Endpoint Privilege Manager in industries such as finance, healthcare, and technology benefit from secure credential management across Unix, AWS, and GCP. By implementing privilege separation and monitoring user activities, they achieve effective risk mitigation and compliance across multiple platforms.
One Identity Safeguard manages and monitors privileged access, enhancing security with features like automatic session recording, real-time monitoring, and credential rotation. It integrates seamlessly, supports compliance with audit trails, and improves operational efficiency across organizations. This robust platform significantly bolsters security protocols while controlling sensitive operations.
We monitor all Privileged Access Management (PAM) reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.