Try our new research platform with insights from 80,000+ expert users

CyberArk Endpoint Privilege Manager vs StrongDM comparison

 

Comparison Buyer's Guide

Executive SummaryUpdated on Sep 21, 2025

Review summaries and opinions

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
 

Categories and Ranking

CyberArk Endpoint Privilege...
Ranking in Privileged Access Management (PAM)
3rd
Average Rating
8.2
Reviews Sentiment
6.8
Number of Reviews
38
Ranking in other categories
Endpoint Compliance (5th), Anti-Malware Tools (5th), Application Control (5th), Ransomware Protection (5th)
StrongDM
Ranking in Privileged Access Management (PAM)
17th
Average Rating
9.0
Reviews Sentiment
7.3
Number of Reviews
2
Ranking in other categories
Access Management (16th)
 

Mindshare comparison

As of October 2025, in the Privileged Access Management (PAM) category, the mindshare of CyberArk Endpoint Privilege Manager is 3.2%, down from 3.6% compared to the previous year. The mindshare of StrongDM is 1.6%, up from 0.7% compared to the previous year. It is calculated based on PeerSpot user engagement data.
Privileged Access Management (PAM) Market Share Distribution
ProductMarket Share (%)
CyberArk Endpoint Privilege Manager3.2%
StrongDM1.6%
Other95.2%
Privileged Access Management (PAM)
 

Featured Reviews

Sumit Chavan - PeerSpot reviewer
Helps secure the infrastructure and control users with admin rights
There are many features that are currently missing. A customization option is required for certain policies. For instance, if we need to stop PowerShell scripting, we have to create a different policy for that. Being able to create a sub-level policy within a top-level policy would be good. Currently, no user-based policy option is available inside the EPM console. We can only create computer-based policies. The database is available, but there is a drawback in not being able to create local groups on the EPM console. We only have to depend on Active Directory. This limits infrastructure security as we depend on the Active Directory team to manage user groups. If they remove any users, we lose control. If we could create groups locally and block them or set specific policies, we would have more control. Local endpoint management is missing from the EPM site. Moreover, there is an issue with policies not running as expected when we make enhancements. We have to find multiple ways to whitelist applications or enhance policies.
reviewer2589615 - PeerSpot reviewer
Seamlessly manage cloud access with enhanced security features
I was part of the team managing the infrastructure for a small startup company. We used StrongDM to provide access to cloud private networks, control user access to databases, hosts through SSH, and Kubernetes resources StrongDM was able to replace the combination of different products we…

Quotes from Members

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
 

Pros

"The tool is an endpoint management system. It monitors everything a standard user does and helps elevate privileges when necessary for advanced users. It keeps an auditable trail of all activities. Practically, it stops and blocks potentially hazardous user behavior, whether intentional or unintentional. Certain companies must use endpoint management software because of national or international rules or ISO norms."
"It doesn't affect operational efficiency. If you set everything correctly, the user doesn't notice that it is in the background."
"CyberArk Endpoint Privilege Manager is very easy to manage, which I like. The solution also has a dashboard where you can see which software is suspicious, which I find valuable."
"We did immediately begin to see results when using CyberArk."
"It has drastically reduced the attack surface for local administrative rights and the chance of escalation of privilege. We've removed, at this point, close to 98 percent of the local administrative accounts on workstations. If there were an incident, it would stop at that point and we'd be able to know."
"The most valuable features of CyberArk Endpoint Privilege Manager are password management, session management, onboarding rules, platform customization, and safety management."
"I have always found that CyberArk is a very tight, foolproof product compared to most other products available."
"You can use it to strip users of their local admin rights and, at the same time, elevate applications for them."
"We primarily used StrongDM for access to resources on private networks like EC2 machines, Kubernetes clusters, and various databases."
"All of the logging is handled for us, including for auditing purposes. Looking through the audit logs is not a painful experience."
"StrongDM replaced the puzzle of different solutions with one single product, which made managing resources more efficient."
 

Cons

"While CyberArk Endpoint Privilege Manager is a great tool, I believe the functionality could be wider. If it could work not only with permissions but also involve pure EDR tasks or User and Entity Behavior Analytics, it would be great."
"The main issues I experience are related to deployment, which requires dependency on other solutions like AD or SCCM."
"CyberArk Endpoint Privilege Manager can improve its Identity Governance, which is already working effectively yet could continue to enhance its capabilities."
"Technical support is slow to respond when we run into issues."
"CyberArk is a pretty heavy solution."
"One area that has room for improvement is in managing the credentials for network devices."
"The CyberArk team is working on a feature to identify devices without the Endpoint Privilege Manager running, which is currently missing."
"The tool should be more user-friendly."
"It would be beneficial to have better control and alignment between frequent updates and improved communication regarding possible negative effects on existing customer bases."
"It would be beneficial to have better control and alignment between frequent updates and improved communication regarding possible negative effects on existing customer bases."
"We've had a few issues with the stability of this product in the past."
 

Pricing and Cost Advice

"CyberArk Endpoint Privilege Manager has a very high price, so it's a one out of ten for me in terms of pricing."
"We pay about $17 per user."
"The cost for CyberArk is very high."
"CyberArk Endpoint Privilege Manager is slightly expensive, but costs can be negotiated to become more competitive."
"The product's license is easy to procure."
"It is an expensive solution."
"I believe it's quite a reasonably priced solution. It's not very common to use CyberArk because it's a niche solution, but customers who are willing to control administrative accounts are willing to pay this money."
"I rate the solution's pricing an eight out of ten since the price can be too high for smaller businesses."
"The licensing is per user per month."
report
Use our free recommendation engine to learn which Privileged Access Management (PAM) solutions are best for your needs.
869,202 professionals have used our research since 2012.
 

Top Industries

By visitors reading reviews
Computer Software Company
14%
Financial Services Firm
14%
Manufacturing Company
11%
Government
8%
Computer Software Company
24%
Manufacturing Company
12%
Financial Services Firm
12%
Leisure / Travel Company
7%
 

Company Size

By reviewers
Large Enterprise
Midsize Enterprise
Small Business
By reviewers
Company SizeCount
Small Business17
Midsize Enterprise9
Large Enterprise18
No data available
 

Questions from the Community

Looking for recommendations and a pros/cons template for software to detect insider threats
This is an inside-out --- outside-in --- inside-in question, as an insider can be an outsider as well. There is no short answer other than a blend of a PAM tool with Behavioral Analytics and Endpo...
What do you like most about CyberArk Endpoint Privilege Manager?
The most valuable feature of the solution is its performance.
What is your experience regarding pricing and costs for CyberArk Endpoint Privilege Manager?
I believe it's quite a reasonably priced solution. It's not very common to use CyberArk because it's a niche solution, but customers who are willing to control administrative accounts are willing t...
What is your experience regarding pricing and costs for StrongDM?
The leadership chose StrongDM after comparative research, which suggests economic benefits. It was mentioned that while the product is rapidly gaining features, it might become cost-prohibitive for...
What needs improvement with StrongDM?
It would be beneficial to have better control and alignment between frequent updates and improved communication regarding possible negative effects on existing customer bases. Also, documentation s...
What is your primary use case for StrongDM?
I was part of the team managing the infrastructure for a small startup company. We used StrongDM to provide access to cloud private networks, control user access to databases, hosts through SSH, an...
 

Also Known As

Viewfinity
No data available
 

Overview

Find out what your peers are saying about CyberArk Endpoint Privilege Manager vs. StrongDM and other solutions. Updated: September 2025.
869,202 professionals have used our research since 2012.