Try our new research platform with insights from 80,000+ expert users

CyberArk Endpoint Privilege Manager vs Varonis Platform comparison

 

Comparison Buyer's Guide

Executive SummaryUpdated on Sep 7, 2025

Review summaries and opinions

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
 

Categories and Ranking

CyberArk Endpoint Privilege...
Ranking in Ransomware Protection
5th
Average Rating
8.2
Reviews Sentiment
6.8
Number of Reviews
38
Ranking in other categories
Endpoint Compliance (5th), Privileged Access Management (PAM) (3rd), Anti-Malware Tools (5th), Application Control (5th)
Varonis Platform
Ranking in Ransomware Protection
10th
Average Rating
8.2
Reviews Sentiment
6.4
Number of Reviews
14
Ranking in other categories
Email Security (20th), Data Loss Prevention (DLP) (9th), User Entity Behavior Analytics (UEBA) (7th), Data Governance (4th), SaaS Security Posture Management (SSPM) (5th), Data Security Posture Management (DSPM) (3rd), Compliance Management (7th), Identity Threat Detection and Response (ITDR) (7th), Insider Risk Management (1st)
 

Mindshare comparison

As of October 2025, in the Ransomware Protection category, the mindshare of CyberArk Endpoint Privilege Manager is 4.9%, down from 7.5% compared to the previous year. The mindshare of Varonis Platform is 2.9%, up from 1.8% compared to the previous year. It is calculated based on PeerSpot user engagement data.
Ransomware Protection Market Share Distribution
ProductMarket Share (%)
CyberArk Endpoint Privilege Manager4.9%
Varonis Platform2.9%
Other92.2%
Ransomware Protection
 

Featured Reviews

Sumit Chavan - PeerSpot reviewer
Helps secure the infrastructure and control users with admin rights
There are many features that are currently missing. A customization option is required for certain policies. For instance, if we need to stop PowerShell scripting, we have to create a different policy for that. Being able to create a sub-level policy within a top-level policy would be good. Currently, no user-based policy option is available inside the EPM console. We can only create computer-based policies. The database is available, but there is a drawback in not being able to create local groups on the EPM console. We only have to depend on Active Directory. This limits infrastructure security as we depend on the Active Directory team to manage user groups. If they remove any users, we lose control. If we could create groups locally and block them or set specific policies, we would have more control. Local endpoint management is missing from the EPM site. Moreover, there is an issue with policies not running as expected when we make enhancements. We have to find multiple ways to whitelist applications or enhance policies.
Frederic  Delos - PeerSpot reviewer
Offers the ability to identify sensitive areas, allowing you to drill down into the sensitive data
The most effective feature for me is its ability to identify sensitive areas, allowing you to drill down into the sensitive data, provided you have access, to determine whether it's a false positive or a true positive. That's the best thing for me, out of all of it. It's got everything, like other ones, but I like to be able to look at something if I'm doing forensics on the alert and say, "Okay, do I really need to do something with this?" For example, we don't want sensitive data in our OneDrive. So it identifies the sensitive data that's possibly in the OneDrive. And what I can do is look at it and identify whether it's actually sensitive data in Datalert or whether it looks like sensitive data, but I know it's a false positive. If it is a false positive, I can basically say ignore this pattern based on X, Y, and Z, you know, whether it's Redjax or keyword proximity. So I like that. With other tools, I gotta go through a whole process because it's a little bit more complex. Here, I can tag it and bag it in one shot. And the next good time I scan, it slips over it. So it helps in that.

Quotes from Members

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
 

Pros

"We have not had issues with CyberArk. It works very smoothly. We can do many things with CyberArk. It helps us to see exactly what is happening."
"I have always found that CyberArk is a very tight, foolproof product compared to most other products available."
"We can do both server and endpoint protection."
"The most valuable feature of CyberArk Endpoint Privilege Manager is its ability to reset passwords every time that it is needed or periodically."
"The most valuable features of CyberArk Endpoint Privilege Manager are password management, session management, onboarding rules, platform customization, and safety management."
"There are many valuable aspects of the product, but the most common feature is working with the privileges. The controls of CyberArk Endpoint Privilege Manager influence the visibility into endpoints for my customers. It allows them to granularly manage controls to prevent some malicious activities on the endpoint machine."
"It allows whitelisting."
"We did immediately begin to see results when using CyberArk."
"The solution ensures that users have not accidentally shared sensitive information with the wrong people or too many people."
"The solution has significantly improved data security and compliance posture by allowing us to track and monitor activities. We can see who accesses data and when files are created and understand what's happening in our environment."
"There's also a 90-day policy where if a user is not using the warehouse, it will automatically delete that username."
"Technical support from Varonis is rated as nine out of ten."
"The solution's classification engine is highly configurable and efficient."
"I also appreciate the reporting feature, which allows for the extraction of various reports based on specific needs. These reports can be used for audit purposes, such as tracking changes in file locations or deletions."
"On the Varonis side, technical support is phenomenal. Their ability to explain is very good, and they seem to be very knowledgeable. When I get an alert that doesn't quite make sense, they dive in there and kind of take me through it. That's very useful and very good. There are some false alerts, but it is better to have a false alert than no alert at all."
"That alerting and reporting service is great."
 

Cons

"The solution can be complex to use at times."
"The solution's pricing could be better."
"Another enhancement needed is the scheduling of deployment, which I expect in future releases."
"CyberArk Endpoint Privilege Manager can be better by making its UI more consistent."
"While CyberArk Endpoint Privilege Manager is a great tool, I believe the functionality could be wider. If it could work not only with permissions but also involve pure EDR tasks or User and Entity Behavior Analytics, it would be great."
"CyberArk Endpoint Privilege Manager can improve its Identity Governance, which is already working effectively yet could continue to enhance its capabilities."
"The product's threat protection and defense capabilities need enhancement."
"It is hard to deal with technical support if you are not certified."
"I'd like to see automatic updates for this solution. Currently, it's a manual process to update all the keywords"
"I would like it to have cloud integration."
"The product is very complicated."
"There is one thing that if I add something manually, I get so many alerts. That's the biggest bad thing."
"One area for improvement is the calculation engine. When applying rules in Varonis, especially for large datasets (terabytes of data), the calculations can be slow and require time to process. Speeding up this process would be beneficial."
"The solution's areas of improvement are the interface and the dependency on on-premises deployment for some components."
"For unstructured data monitoring, it's one of the top ones, if not the top one, due to its usability."
"We have Microsoft Office 365. I just saw an article today which says that they're actually getting integrated with Microsoft Office 365, which would be a useful feature. For user-based reports, log on activity, and stuff like that, it doesn't seem to really be present like Log360. That could just be my inexperience with it. I've been dealing with it for only about two and a half months."
 

Pricing and Cost Advice

"I believe it's quite a reasonably priced solution. It's not very common to use CyberArk because it's a niche solution, but customers who are willing to control administrative accounts are willing to pay this money."
"I think that it was in the range of $200,000 that had to get approved."
"CyberArk Endpoint Privilege Manager is slightly expensive, but costs can be negotiated to become more competitive."
"The tool is a bit pricey compared to its competitors. My company does work with competitors, but I don't have hands-on experience with other software. I've just done some comparisons."
"CyberArk Endpoint Privilege Manager has a very high price, so it's a one out of ten for me in terms of pricing."
"Pricing depends on how many devices you use. Right now, on-premise, it costs us a little, but it's worth it. It seems like the cloud solution is much more expensive. We got this solution one year ago, and it's like we bought the solution, and now they are not going to support it on-premise anymore. We are in the implementation phase, and we missed this, and we already paid for the licenses. This is wasted time from my perspective, and CyberArk should be more customer-friendly."
"I feel that the price of the product is nominal. It must be around 10 to 15 USD per installation. I rate the product price an eight to nine out of ten, where one is high price, and ten is low price."
"The price of CyberArk Endpoint Privilege Manager is expensive."
"I would rate the pricing an eight out of ten, with ten being the most expensive."
"Licensing is on an annual basis. Maintenance and renewal fees are separate. Varonis Datalert is quite expensive."
"The platform is expensive. I rate the pricing a nine out of ten."
"It's expensive, kind of, really expensive."
"Varonis Platform wasn't certainly the cheapest solution."
"The pricing is good. It neither expensive nor cheap. It is average."
"You could do a subscription, where you pay yearly, or you could purchase it outright. The licensing cost is based on the number of users on the system that you are monitoring."
report
Use our free recommendation engine to learn which Ransomware Protection solutions are best for your needs.
869,202 professionals have used our research since 2012.
 

Top Industries

By visitors reading reviews
Computer Software Company
14%
Financial Services Firm
14%
Manufacturing Company
11%
Government
8%
Financial Services Firm
15%
Manufacturing Company
9%
Computer Software Company
9%
Insurance Company
8%
 

Company Size

By reviewers
Large Enterprise
Midsize Enterprise
Small Business
By reviewers
Company SizeCount
Small Business17
Midsize Enterprise9
Large Enterprise18
By reviewers
Company SizeCount
Small Business2
Midsize Enterprise1
Large Enterprise11
 

Questions from the Community

Looking for recommendations and a pros/cons template for software to detect insider threats
This is an inside-out --- outside-in --- inside-in question, as an insider can be an outsider as well. There is no short answer other than a blend of a PAM tool with Behavioral Analytics and Endpo...
What do you like most about CyberArk Endpoint Privilege Manager?
The most valuable feature of the solution is its performance.
What is your experience regarding pricing and costs for CyberArk Endpoint Privilege Manager?
I believe it's quite a reasonably priced solution. It's not very common to use CyberArk because it's a niche solution, but customers who are willing to control administrative accounts are willing t...
What do you like most about Varonis Platform?
The solution has significantly improved data security and compliance posture by allowing us to track and monitor activities. We can see who accesses data and when files are created and understand w...
What needs improvement with Varonis Platform?
Varonis started as an on-premises solution and is transitioning to cloud. It hasn't fully moved yet, which is an area for improvement. Varonis requires more access permissions for its core function...
What is your primary use case for Varonis Platform?
The primary use case for Varonis Platform is data discovery, specifically for discovering sensitive data in our organization to protect it. We are looking for a solution that can scan our repositor...
 

Also Known As

Viewfinity
SlashNext Complete
 

Overview

 

Sample Customers

Information Not Available
Nottingham Building Society
Find out what your peers are saying about CyberArk Endpoint Privilege Manager vs. Varonis Platform and other solutions. Updated: September 2025.
869,202 professionals have used our research since 2012.