CyberArk Endpoint Privilege Manager and Symantec Privileged Access Manager compete in the privileged access management space. CyberArk shows an advantage in customer support and pricing, while Symantec leads with its robust features.
Features: CyberArk Endpoint Privilege Manager features strong integration capabilities, efficient privileged access controls, and competitive pricing. Symantec Privileged Access Manager offers comprehensive security features, scalability for larger organizations, and reliable performance gains.
Room for Improvement: CyberArk could enhance its reporting tools, simplify policy configurations, and improve initial deployment process. Symantec may improve the initial deployment process, technical documentation, and its user interface.
Ease of Deployment and Customer Service: CyberArk users cite a straightforward deployment process and responsive support team. Symantec offers detailed assistance with its more complex deployment procedure although some report slower response times.
Pricing and ROI: CyberArk offers competitive pricing with faster ROI for small to medium businesses. Symantec's higher upfront costs are justified by its reliability and potential long-term returns for larger enterprises.
CyberArk Endpoint Privilege Manager, a critical and foundational endpoint control addresses the underlying weaknesses of endpoint defenses against a privileged attacker and helps enterprises defend against these attacks through removing local admin rights, enforcing least privilege, and implementing foundational endpoint security controls across all Windows, macOS and Linux endpoints from hybrid to cloud environments.
Click here for a free 30 day trial: CyberArk Endpoint Privilege Manager free trial
CA Privileged Access Manager is a simple-to-deploy, automated, proven solution for privileged access management in physical, virtual and cloud environments. It enhances security by protecting sensitive administrative credentials such as root and administrator passwords, controlling privileged user access, proactively enforcing policies and monitoring and recording privileged user activity across all IT resources. It includes CA PAM Server Control (previously CA Privileged Identity Manager) for fine-grained protection of critical servers
We monitor all Privileged Access Management (PAM) reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.