No more typing reviews! Try our Samantha, our new voice AI agent.

CyberArk Endpoint Privilege Manager vs Symantec Privileged Access Manager comparison

 

Comparison Buyer's Guide

Executive SummaryUpdated on Oct 6, 2024

Review summaries and opinions

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
 

Categories and Ranking

CyberArk Endpoint Privilege...
Ranking in Privileged Access Management (PAM)
4th
Average Rating
8.2
Reviews Sentiment
6.8
Number of Reviews
38
Ranking in other categories
Endpoint Compliance (5th), Anti-Malware Tools (5th), Application Control (3rd), Ransomware Protection (3rd)
Symantec Privileged Access ...
Ranking in Privileged Access Management (PAM)
15th
Average Rating
7.8
Reviews Sentiment
7.0
Number of Reviews
53
Ranking in other categories
No ranking in other categories
 

Mindshare comparison

As of May 2026, in the Privileged Access Management (PAM) category, the mindshare of CyberArk Endpoint Privilege Manager is 2.4%, down from 3.6% compared to the previous year. The mindshare of Symantec Privileged Access Manager is 1.7%, up from 1.6% compared to the previous year. It is calculated based on PeerSpot user engagement data.
Privileged Access Management (PAM) Mindshare Distribution
ProductMindshare (%)
CyberArk Endpoint Privilege Manager2.4%
Symantec Privileged Access Manager1.7%
Other95.9%
Privileged Access Management (PAM)
 

Featured Reviews

DR
Commercial and Technical Professional Manager at Evolution Technologies Group
Strengthening financial services infrastructure by safeguarding and integrating with ecosystems
We use CyberArk Endpoint Privilege Manager to complement a privilege access management solution in order to avoid golden ticket attacks and strengthen services against attacks. It serves as a complement to our asset management solution. The architecture of CyberArk Endpoint Privilege Manager is beneficial for integrating with all customer ecosystems; it's easy to deploy, and achieving that level of integration and control is more challenging with other solutions. The ability of CyberArk Endpoint Privilege Manager to safeguard our financial services infrastructure is very important, as we need to record actions on privileges in our information systems. Regarding the granularity of the managed controls in CyberArk Endpoint Privilege Manager, we have different levels of features to define compensations and capabilities, which help us verify configurations and access, ultimately keeping the safety of rights intact. Our initial challenge with CyberArk Endpoint Privilege Manager is to comply with Colombian regulations in the financial sector, particularly identifying users and managing password changes and rotations. We needed to certify the identities and provide necessary information for government investigations, if required. CyberArk Endpoint Privilege Manager is very important for helping our organization meet compliance and regulatory requirements. We have to comply with international regulations such as SOC, but also with local regulations unique to the financial sector, which is crucial for us due to the high risks involved. CyberArk Endpoint Privilege Manager helped us reduce the time for regulatory processes to approximately two to four months, completing the solution and training. CyberArk Endpoint Privilege Manager has helped us reduce the mean time to detect within our organization. That's our main goal. Regarding MTTD, the solution provides enough information to enhance our overall detection process. We have an 85% improvement in MTTD. CyberArk Endpoint Privilege Manager helps ensure data privacy through strategies that manage information in real-time. CyberArk Endpoint Privilege Manager helps save costs by avoiding risks and future expenses associated with security incidents. It's essential to communicate the value of CyberArk Endpoint Privilege Manager to users, as its controls help improve system security. My role at the company involves service and sales activities.
Muzi Lubisi - PeerSpot reviewer
Senior technical Consultant at CA Africa
Secure management of sensitive servers and seamless applications with direct linking
The credential injection feature is highly valued, particularly for RDP sessions. A majority of customers use it for RDP, and a couple for Linux servers. The broader capabilities, including access to multiple systems, web-based applications, and clustering, have never posed an issue. The threat analytics aspect is also a robust feature that analyzes all pertinent information.

Quotes from Members

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
 

Pros

"The most valuable feature of CyberArk Endpoint Privilege Manager is its ability to reset passwords every time that it is needed or periodically."
"The solution is scalable."
"The solution's technical support is good."
"The solution is pretty mature and can accommodate our use cases quite well."
"The most valuable feature is that their database is completely encrypted and protected with multiple layers."
"The most valuable feature is that their database is completely encrypted and protected with multiple layers."
"We have not had issues with CyberArk. It works very smoothly. We can do many things with CyberArk. It helps us to see exactly what is happening."
"CyberArk Endpoint Privilege Manager is entirely cloud-based, so no further upkeep is required."
"This solution really makes a big difference."
"The tool helps us manage local, domain, and service accounts, and it helps us meet compliance standards."
"I like the fact that passwords are checked-in automatically."
"If I remember correctly, it was the two factor authentication, and the single most important capability was it supported PIV and CAC as one of the two factors."
"Comprehensive coverage of the required features for the PAM solution."
"So all the different roles (such as database admin, Unix admin, network administrator), are now centralized into one system."
"It is the best product for monitoring the recorded session of your IT admins and external consultants."
"For me, it is the robust API which is the most valuable feature."
 

Cons

"The solution is very expensive."
"It cannot be on-prem. It is only cloud-based. Sometimes, that's a restriction in terms of usage."
"CyberArk meets clients' need very spot-on. It covers everything customers ask for. As for improvements, honestly, the feedback's been really positive. I haven't heard any specific areas that need work."
"The main issues I experience are related to deployment, which requires dependency on other solutions like AD or SCCM. These tools need to be defined and synced with the client or agent and master, sometimes needing manual checks."
"One area that has room for improvement is in managing the credentials for network devices."
"There are many features that are currently missing. A customization option is required for certain policies."
"Despite newer versions and functionalities, CyberArk Endpoint Privilege Manager lacks sufficient knowledgeable support staff, resulting in longer wait times for assistance."
"Technical support is slow to respond when we run into issues."
"Yes, at first the cluster desynchronizes often."
"A better discovery interface of accounts. It does do discovery of accounts for Windows servers, and you could do UNIX servers as well, but it's kind of clunky how it does it."
"I wish it could create local accounts on desktops."
"I’m no fan of Java as an application front-end, as it tends to have issues depending on what browser one’s using."
"The cons are that you are rarely (if ever) able to talk to a technician when calling support."
"It'd be great if you just stuck in your PIV card and Windows popped up, asked you for your password. You typed it in, then it remembered your credentials."
"Recent releases need improvement in webpage management. For instance, navigating through a webpage that acts like a wizard, where I proceed to the next page and enter more information, is not handled well by the system."
"The live session recording is still not in the features."
 

Pricing and Cost Advice

"We pay about $17 per user."
"The price of CyberArk Endpoint Privilege Manager is expensive. The solution is priced based on the number of accounts onboarded and the number of concurrent sessions. Everyone else is included in the price, such as support."
"I feel that the price of the product is nominal. It must be around 10 to 15 USD per installation. I rate the product price an eight to nine out of ten, where one is high price, and ten is low price."
"CyberArk Endpoint Privilege Manager is slightly expensive, but costs can be negotiated to become more competitive."
"The tool is priced high. I would rate its pricing an eight out of ten."
"I think that it was in the range of $200,000 that had to get approved."
"The solution's pricing is reasonable compared to other vendors' products."
"The cost for CyberArk is very high."
"Appliances are relatively cheap, don’t skimp. Make sure you have redundancy, high availability, and enough appliances to manage the concurrent workload."
"Don’t go with an agent model. Don’t go with a model that has you buying a thousand different parts. Go with PAM that gives you everything, or you’ll just be paying costs of implementing another tool that PAM would have just given you up front."
"I would prefer better licensing options for the 20-100 users we have at a given time."
"The prices are not low, but one can ask for a discount. It’s not the cheapest PAM solution."
"They offer per-device, per-user, or monthly and yearly licensing models."
"It is reasonably priced."
"The licensing is simple and scalable."
"Pricing is fair compared to other top vendors."
report
Use our free recommendation engine to learn which Privileged Access Management (PAM) solutions are best for your needs.
894,738 professionals have used our research since 2012.
 

Top Industries

By visitors reading reviews
Financial Services Firm
14%
Manufacturing Company
11%
Computer Software Company
7%
Government
7%
Financial Services Firm
11%
Comms Service Provider
9%
Marketing Services Firm
8%
Construction Company
8%
 

Company Size

By reviewers
Large Enterprise
Midsize Enterprise
Small Business
By reviewers
Company SizeCount
Small Business18
Midsize Enterprise9
Large Enterprise19
By reviewers
Company SizeCount
Small Business14
Midsize Enterprise6
Large Enterprise30
 

Questions from the Community

Looking for recommendations and a pros/cons template for software to detect insider threats
This is an inside-out --- outside-in --- inside-in question, as an insider can be an outsider as well. There is no short answer other than a blend of a PAM tool with Behavioral Analytics and Endpo...
What do you like most about CyberArk Endpoint Privilege Manager?
The most valuable feature of the solution is its performance.
What is your experience regarding pricing and costs for CyberArk Endpoint Privilege Manager?
I believe it's quite a reasonably priced solution. It's not very common to use CyberArk because it's a niche solution, but customers who are willing to control administrative accounts are willing t...
What is your experience regarding pricing and costs for Symantec Privileged Access Manager?
Due to the nature of the solution, it is hard to gauge, but compared to competitors, the pricing is very good. I would rate it as an eight and a half out of ten.
What needs improvement with Symantec Privileged Access Manager?
Recent releases need improvement in webpage management. For instance, navigating through a webpage that acts like a wizard, where I proceed to the next page and enter more information, is not handl...
What is your primary use case for Symantec Privileged Access Manager?
With the customers that I have so far, I help them broker RDP sessions to sensitive servers, particularly those that manage aspects like physical access. I have also done it for backend databases, ...
 

Also Known As

Viewfinity
CA PAM, Xceedium Xsuite, CA Privileged Access Manager
 

Overview

 

Sample Customers

Information Not Available
NEOVERA, Telesis, eSoft
Find out what your peers are saying about CyberArk Endpoint Privilege Manager vs. Symantec Privileged Access Manager and other solutions. Updated: April 2026.
894,738 professionals have used our research since 2012.