Try our new research platform with insights from 80,000+ expert users

CyberArk Endpoint Privilege Manager vs Tanium comparison

 

Comparison Buyer's Guide

Executive Summary

Review summaries and opinions

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
 

Categories and Ranking

CyberArk Endpoint Privilege...
Average Rating
8.2
Reviews Sentiment
6.8
Number of Reviews
38
Ranking in other categories
Endpoint Compliance (5th), Privileged Access Management (PAM) (4th), Anti-Malware Tools (5th), Application Control (3rd), Ransomware Protection (5th)
Tanium
Average Rating
7.8
Reviews Sentiment
6.2
Number of Reviews
22
Ranking in other categories
Server Monitoring (3rd), Vulnerability Management (23rd), Endpoint Protection Platform (EPP) (19th), Endpoint Detection and Response (EDR) (21st), Unified Endpoint Management (UEM) (6th)
 

Mindshare comparison

While both are Security Software solutions, they serve different purposes. CyberArk Endpoint Privilege Manager is designed for Privileged Access Management (PAM) and holds a mindshare of 2.4%, down 3.5% compared to last year.
Tanium, on the other hand, focuses on Endpoint Protection Platform (EPP), holds 2.3% mindshare, down 2.6% since last year.
Privileged Access Management (PAM) Mindshare Distribution
ProductMindshare (%)
CyberArk Endpoint Privilege Manager2.4%
CyberArk Privileged Access Manager11.4%
Delinea Secret Server4.9%
Other81.3%
Privileged Access Management (PAM)
Endpoint Protection Platform (EPP) Mindshare Distribution
ProductMindshare (%)
Tanium2.3%
Microsoft Defender for Endpoint7.8%
CrowdStrike Falcon6.6%
Other83.3%
Endpoint Protection Platform (EPP)
 

Featured Reviews

PH
Manager at a computer software company with 1,001-5,000 employees
MFA boosts protection and has blocking capabilities but dependency on other solutions complicates deployment
The main issues I experience are related to deployment, which requires dependency on other solutions like AD or SCCM. These tools need to be defined and synced with the client or agent and master, sometimes needing manual checks. The agent may have problems syncing, which complicates deployment, especially when users leave the organization, however, agents remain licensed since the server still maintains licenses. Additionally, compared to other endpoint managers like Thycotic, CyberArk Endpoint Privilege Manager lacks recording capabilities, which limits its functionality for critical applications. A feature that records activity, even when bypassing CyberArk Endpoint Privilege Manager, would be beneficial.
MA
Division Manager, Information Technology at a legal firm with 51-200 employees
Centralized policies have improved remote endpoint control and have simplified data visibility
The integration is not simple and easy. It requires experienced users or people who have done the implementation. When certain policies are applied, they do not immediately push the policies. For example, we manage endpoint device USB access. We set a policy to block it, but it does not come into effect immediately. Sometimes it takes three or four days for it to reflect. That is a pain point. I have raised this issue with support as well, but they said that I need to limit the number of devices in the policy. In terms of application deployment, for us, it was seamless.

Quotes from Members

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
 

Pros

"The most valuable features of CyberArk Endpoint Privilege Manager are password management, session management, onboarding rules, platform customization, and safety management."
"We were able to reduce the number of privileged accounts by 50%, which helped to simplify our privileged access management environment."
"The most valuable feature is that their database is completely encrypted and protected with multiple layers."
"You can use it to strip users of their local admin rights and, at the same time, elevate applications for them."
"It has drastically reduced the attack surface for local administrative rights and the chance of escalation of privilege. We've removed, at this point, close to 98 percent of the local administrative accounts on workstations. If there were an incident, it would stop at that point and we'd be able to know."
"The tool is an endpoint management system. It monitors everything a standard user does and helps elevate privileges when necessary for advanced users. It keeps an auditable trail of all activities. Practically, it stops and blocks potentially hazardous user behavior, whether intentional or unintentional. Certain companies must use endpoint management software because of national or international rules or ISO norms."
"Their customer support was excellent."
"The solution's technical support is good."
"Tanium is stable and it is also lightweight."
"When I push a quick update, it's done right away, and I can rescan immediately to confirm completion within minutes."
"The interrogation piece was the most valuable feature because it was very detailed."
"Tanium is a very good product and I would rate it eight or nine out of ten."
"Tanium has made the process of detecting threats more proactive with its detection. So, the process is easier and more efficient."
"Tanium’s best features include support for any Windows, Linux, or Mac endpoint, regardless of where it is, and the ability to do IT operations and security operations."
"I would say Tanium is the best tool for vulnerability management."
"Tanium's most valuable feature is its instant discovery aspect."
 

Cons

"The installation process is pretty difficult."
"CyberArk meets clients' need very spot-on. It covers everything customers ask for. As for improvements, honestly, the feedback's been really positive. I haven't heard any specific areas that need work."
"Compared to other tools like Linux, this solution isn't as user-friendly."
"CyberArk should consider whitelisting important applications like PowerShell and DLL that are currently not allowed due to some malicious content."
"The solution is very expensive."
"CyberArk is a pretty heavy solution."
"A customization option is required for certain policies. For instance, if we need to stop PowerShell scripting, we have to create a different policy for that. Being able to create a sub-level policy within a top-level policy would be good."
"CyberArk should consider whitelisting important applications like PowerShell and DLL that are currently not allowed due to some malicious content."
"The most painful thing is the interface. It's a bit unclear sometimes."
"The performance could improve in future releases. We have had performance issues in specialized web environments, but overall I think the problems are less than 2% of the computer systems being used."
"We set a policy to block USB access. The moment a device is being set up on the network, I apply the policy, but it does not come into effect immediately."
"When working with Tanium, there are some older devices that haven't been patched for a long time, and certain patches are not included in Tanium. I have to search outside to download patches, create bundles, and then perform the task."
"Any movement into a SaaS solution has challenges since the processes and data flows are not well defined. Hence, you need to build it at the same time."
"When working with Tanium, there are some older devices that haven't been patched for a long time, and certain patches are not included in Tanium."
"Most of the time, agent-relative issues have to be more equipped with self-healing features."
"They could improve the UI."
 

Pricing and Cost Advice

"The price of CyberArk Endpoint Privilege Manager is expensive."
"The solution requires an annual license to use it. There can be some extra costs in some cases."
"I rate the solution's pricing an eight out of ten since the price can be too high for smaller businesses."
"The product's license is easy to procure."
"The tool is priced high. I would rate its pricing an eight out of ten."
"The cost for CyberArk is very high."
"licensing for this solution is based on the number of APV (privileged users), and the number of sessions that you want to record."
"The professional services for one eight-hour day would be $1,800."
"The solution offers value for money."
"Tanium is a more expensive solution in Latin America than some of the competitors, such as BigFix."
"The solution is expensive but it's a good investment."
"It's an expensive solution. It would be nice if the cost were lower."
"The product's pricing differs from region to region depending on negotiations and the number of endpoints."
"There is an annual license required to use this solution."
"It is higher than some competitors in the market."
report
Use our free recommendation engine to learn which Privileged Access Management (PAM) solutions are best for your needs.
884,933 professionals have used our research since 2012.
 

Top Industries

By visitors reading reviews
Financial Services Firm
13%
Manufacturing Company
11%
Computer Software Company
9%
Government
7%
Financial Services Firm
15%
Government
11%
Manufacturing Company
9%
Healthcare Company
7%
 

Company Size

By reviewers
Large Enterprise
Midsize Enterprise
Small Business
By reviewers
Company SizeCount
Small Business17
Midsize Enterprise9
Large Enterprise18
By reviewers
Company SizeCount
Small Business8
Midsize Enterprise3
Large Enterprise12
 

Questions from the Community

Looking for recommendations and a pros/cons template for software to detect insider threats
This is an inside-out --- outside-in --- inside-in question, as an insider can be an outsider as well. There is no short answer other than a blend of a PAM tool with Behavioral Analytics and Endpo...
What do you like most about CyberArk Endpoint Privilege Manager?
The most valuable feature of the solution is its performance.
What is your experience regarding pricing and costs for CyberArk Endpoint Privilege Manager?
I believe it's quite a reasonably priced solution. It's not very common to use CyberArk because it's a niche solution, but customers who are willing to control administrative accounts are willing t...
What needs improvement with Tanium?
While there is always room for improvement, I am pleased with Tanium.
What is your primary use case for Tanium?
The primary use case for Tanium ( /products/tanium-reviews ) is compliance, patching, and inventory as part of the core functions.
What advice do you have for others considering Tanium?
For smaller companies, Tanium is quite a big investment, and one needs to have a considerable setup to make it economically viable. I would recommend it to others with a similar use case. The solut...
 

Also Known As

Viewfinity
Tanium Inc Cloud, Tanium XEM
 

Overview

 

Sample Customers

Information Not Available
JPMorgan Chase, eBay, Amazon, US Bank, MetLife, pwc, Cerner, Delphi, MGM Grand, New York Life
Find out what your peers are saying about CyberArk Endpoint Privilege Manager vs. Tanium and other solutions. Updated: May 2022.
884,933 professionals have used our research since 2012.