No more typing reviews! Try our Samantha, our new voice AI agent.

CyberArk Endpoint Privilege Manager vs Symantec Directory comparison

 

Comparison Buyer's Guide

Executive Summary

Review summaries and opinions

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
 

Categories and Ranking

CyberArk Endpoint Privilege...
Average Rating
8.2
Reviews Sentiment
6.8
Number of Reviews
38
Ranking in other categories
Endpoint Compliance (5th), Privileged Access Management (PAM) (4th), Anti-Malware Tools (5th), Application Control (3rd), Ransomware Protection (3rd)
Symantec Directory
Average Rating
7.6
Number of Reviews
2
Ranking in other categories
Directory Servers (3rd)
 

Mindshare comparison

While both are Security Software solutions, they serve different purposes. CyberArk Endpoint Privilege Manager is designed for Privileged Access Management (PAM) and holds a mindshare of 2.4%, down 3.6% compared to last year.
Symantec Directory, on the other hand, focuses on Directory Servers, holds 26.7% mindshare, up 7.1% since last year.
Privileged Access Management (PAM) Mindshare Distribution
ProductMindshare (%)
CyberArk Endpoint Privilege Manager2.4%
CyberArk Privileged Access Manager10.4%
Delinea Secret Server4.5%
Other82.7%
Privileged Access Management (PAM)
Directory Servers Mindshare Distribution
ProductMindshare (%)
Symantec Directory26.7%
Ping Identity Platform35.0%
Oracle OUD18.3%
Other20.0%
Directory Servers
 

Featured Reviews

DR
Commercial and Technical Professional Manager at Evolution Technologies Group
Strengthening financial services infrastructure by safeguarding and integrating with ecosystems
We use CyberArk Endpoint Privilege Manager to complement a privilege access management solution in order to avoid golden ticket attacks and strengthen services against attacks. It serves as a complement to our asset management solution. The architecture of CyberArk Endpoint Privilege Manager is beneficial for integrating with all customer ecosystems; it's easy to deploy, and achieving that level of integration and control is more challenging with other solutions. The ability of CyberArk Endpoint Privilege Manager to safeguard our financial services infrastructure is very important, as we need to record actions on privileges in our information systems. Regarding the granularity of the managed controls in CyberArk Endpoint Privilege Manager, we have different levels of features to define compensations and capabilities, which help us verify configurations and access, ultimately keeping the safety of rights intact. Our initial challenge with CyberArk Endpoint Privilege Manager is to comply with Colombian regulations in the financial sector, particularly identifying users and managing password changes and rotations. We needed to certify the identities and provide necessary information for government investigations, if required. CyberArk Endpoint Privilege Manager is very important for helping our organization meet compliance and regulatory requirements. We have to comply with international regulations such as SOC, but also with local regulations unique to the financial sector, which is crucial for us due to the high risks involved. CyberArk Endpoint Privilege Manager helped us reduce the time for regulatory processes to approximately two to four months, completing the solution and training. CyberArk Endpoint Privilege Manager has helped us reduce the mean time to detect within our organization. That's our main goal. Regarding MTTD, the solution provides enough information to enhance our overall detection process. We have an 85% improvement in MTTD. CyberArk Endpoint Privilege Manager helps ensure data privacy through strategies that manage information in real-time. CyberArk Endpoint Privilege Manager helps save costs by avoiding risks and future expenses associated with security incidents. It's essential to communicate the value of CyberArk Endpoint Privilege Manager to users, as its controls help improve system security. My role at the company involves service and sales activities.
it_user558261 - PeerSpot reviewer
Annalyst Programmer at a energy/utilities company with 5,001-10,000 employees
We use it for internal-facing and external-facing website security.
The most valuable feature of this product is the enterprise-based security and the reliability that it comes with. Most of the people in this industry are using this product, so you are a victim of it since you need to use what everybody else is using and adopt it to your basic criteria.

Quotes from Members

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
 

Pros

"The most valuable feature of CyberArk Endpoint Privilege Manager is its ability to reset passwords every time that it is needed or periodically."
"Their customer support was excellent."
"Our setup process is moving to the cloud, which is very good. It reduces complexity."
"I like that we have the power to blacklist, whitelist, and greylist applications."
"It offers great performance."
"I have always found that CyberArk is a very tight, foolproof product compared to most other products available."
"What sets CyberArk apart is its continuous innovation, staying ahead of the competition."
"In terms of removing local admin credentials on the endpoint and the effect on the size of the attack surface in our organization, it has drastically reduced the attack surface for local administrative rights and the chance of escalation of privilege."
"The most valuable feature of this product is the enterprise-based security and the reliability that it comes with."
"Technical support has been excellent."
 

Cons

"Despite newer versions and functionalities, CyberArk Endpoint Privilege Manager lacks sufficient knowledgeable support staff, resulting in longer wait times for assistance."
"CyberArk should consider whitelisting important applications like PowerShell and DLL that are currently not allowed due to some malicious content."
"Another enhancement needed is the scheduling of deployment, which I expect in future releases."
"The management of Privilege Access is not satisfactory."
"The main issues I experience are related to deployment, which requires dependency on other solutions like AD or SCCM."
"CyberArk Endpoint Privilege Manager is a perfect solution, but CyberArk Endpoint Privilege Manager for Linux has many issues. Another area for improvement in CyberArk Endpoint Privilege Manager, specifically for Windows, is that there's no way for you to check credential theft from a text file, such as a notepad file."
"Can be improved by allowing computers to be excluded from policies."
"Compared to other tools like Linux, this solution isn't as user-friendly."
"The configuration management could be better. It’s not very straightforward and is awkward to work with."
"Something that is contributing to global development like social media. I know there is something today but if they could make it easier; instead of trying to figure things out."
 

Pricing and Cost Advice

"It's not at the lower end of the market. I think the price is reasonable considering the quality it delivers. It is a top-notch solution at a fair price point."
"The tool is a bit pricey compared to its competitors. My company does work with competitors, but I don't have hands-on experience with other software. I've just done some comparisons."
"The product's license is easy to procure."
"I rate the solution's pricing an eight out of ten since the price can be too high for smaller businesses."
"The professional services for one eight-hour day would be $1,800."
"The price of CyberArk Endpoint Privilege Manager is expensive."
"We pay about $17 per user."
"The solution's pricing is reasonable compared to other vendors' products."
Information not available
report
Use our free recommendation engine to learn which Privileged Access Management (PAM) solutions are best for your needs.
893,244 professionals have used our research since 2012.
 

Top Industries

By visitors reading reviews
Financial Services Firm
14%
Manufacturing Company
11%
Computer Software Company
7%
Government
7%
No data available
 

Company Size

By reviewers
Large Enterprise
Midsize Enterprise
Small Business
By reviewers
Company SizeCount
Small Business17
Midsize Enterprise9
Large Enterprise18
No data available
 

Questions from the Community

Looking for recommendations and a pros/cons template for software to detect insider threats
This is an inside-out --- outside-in --- inside-in question, as an insider can be an outsider as well. There is no short answer other than a blend of a PAM tool with Behavioral Analytics and Endpo...
What do you like most about CyberArk Endpoint Privilege Manager?
The most valuable feature of the solution is its performance.
What is your experience regarding pricing and costs for CyberArk Endpoint Privilege Manager?
I believe it's quite a reasonably priced solution. It's not very common to use CyberArk because it's a niche solution, but customers who are willing to control administrative accounts are willing t...
Ask a question
Earn 20 points
 

Also Known As

Viewfinity
CA Directory
 

Overview

 

Sample Customers

Information Not Available
DBS
Find out what your peers are saying about CyberArk, One Identity, Okta and others in Privileged Access Management (PAM). Updated: April 2026.
893,244 professionals have used our research since 2012.