CyberArk Endpoint Privilege Manager and Quest KACE Systems Management Appliance compete in IT management software. CyberArk has the upper hand in privilege and lifecycle management, while Quest KACE excels in asset and device management.
Features: CyberArk Endpoint Privilege Manager focuses on privilege management, lifecycle management, and application control, offering password and session management, threat protection, and granular privilege control. Quest KACE Systems Management Appliance is optimal for asset management, service desk, and device management, providing value in software distribution, patch management, and help desk integration.
Room for Improvement: CyberArk could simplify administration processes, improve user experience, and enhance support responsiveness, expanding in integration, automation, and compatibility. Quest KACE SMA may improve scalability, ease of updates, patch management accuracy, and interface intuitiveness, with noted reporting feature challenges and asset management enhancement requests.
Ease of Deployment and Customer Service: CyberArk Endpoint Privilege Manager supports hybrid cloud and on-premises deployment, with technical support that can be complex and slow. Quest KACE SMA supports on-premises and private cloud deployments; its technical support is generally competent, though it can experience delays. Both require robust planning, with Quest KACE SMA noted for straightforward licensing and deployment.
Pricing and ROI: CyberArk Endpoint Privilege Manager is pricing-expensive, which may deter smaller organizations, though users report significant security returns. Quest KACE SMA has a straightforward licensing model, charging by device, seen as reasonably priced and offering good value, showing ROI through operational efficiency and risk mitigation.
Deploying CyberArk Endpoint Privilege Manager has secured the infrastructure, which saves money, time, and resources.
The return on investment is seen in the quick access to information, good inventory management, and efficient systems management.
They respond immediately to our inquiries, resolve issues promptly, and provide valuable guidance, especially in critical situations.
We engage them when needed and receive prompt responses that typically resolve our issues.
Earlier, we received support for normal tickets within a day, but now it takes one or two days to resolve issues.
The customer service is very good, providing quick customer support in Spanish.
We can set permissions per team or department, allowing some teams to elevate specific applications while others have different permissions.
CyberArk Endpoint Privilege Manager is quite scalable.
The available reports and other security tools assist in scaling it according to my organization's needs.
The product is very scalable as it supports 10,000 thousand endpoints with just one appliance.
It is a robust solution that has effectively supported our environment without major issues.
Since implementing it, we have not experienced any outages or stability issues.
CyberArk Endpoint Privilege Manager offers multiple options for creating and stopping policies.
CyberArk Endpoint Privilege Manager could be improved by simplifying the administration process, specifically when setting up policies and applications.
Currently, no user-based policy option is available inside the EPM console.
Some features provided in the self-hosted version of EPM are not supported in the software as a service version, like connection to some analysis applied by Palo Alto.
The user interface needs improvement as customers have mentioned they do not like the interface since it is not an SMA-based interface.
CyberArk Endpoint Privilege Manager is slightly expensive, but costs can be negotiated to become more competitive.
CyberArk Endpoint Privilege Manager is costly compared to other solutions.
I've received feedback that the pricing is high, however, for me, the value it brings is worth the cost.
The pricing is in the middle range of the market, not too expensive but not the cheapest either.
CyberArk Endpoint Privilege Manager effectively reduces malicious content in applications by allowing us to identify and block dangerous applications.
CyberArk Endpoint Privilege Manager enhances computer security by providing minimal access, effectively preventing ransomware attacks.
The most valuable feature is the ability to control users with admin rights.
The most valuable features include simplicity, which makes systems management easier and faster, especially for device management.
CyberArk Endpoint Privilege Manager, a critical and foundational endpoint control addresses the underlying weaknesses of endpoint defenses against a privileged attacker and helps enterprises defend against these attacks through removing local admin rights, enforcing least privilege, and implementing foundational endpoint security controls across all Windows, macOS and Linux endpoints from hybrid to cloud environments.
Click here for a free 30 day trial: CyberArk Endpoint Privilege Manager free trial
Quest KACE Systems Management Appliance is a comprehensive tool for managing IT endpoints. It facilitates asset management, software distribution, and endpoint tracking while offering remote access capabilities and a centralized help desk.
Quest KACE Systems Management Appliance is designed for organizations that need efficient endpoint management. It offers a range of features like inventory tracking, automated patch management, and ticketing. By integrating with remote access tools such as Bomgar, Quest KACE helps reduce manual tasks involved in managing software updates and system deployments. Although it faces challenges in scalability and requires improvements in integration and reporting, it remains a versatile choice for asset tracking and endpoint administration.
What are Quest KACE SMA's key features?Quest KACE Systems Management Appliance is implemented across industries for managing IT assets and endpoints, particularly where remote management and compliance are critical. It's employed in healthcare, education, and government sectors for efficient patch management, inventory control, and software deployment, aiding organizations in managing security accreditations and centralizing help desk operations.
We monitor all Endpoint Compliance reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.