Try our new research platform with insights from 80,000+ expert users

CyberArk Endpoint Privilege Manager vs Varonis Platform comparison

 

Comparison Buyer's Guide

Executive SummaryUpdated on Apr 20, 2025

Review summaries and opinions

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
 

Categories and Ranking

CyberArk Endpoint Privilege...
Ranking in Ransomware Protection
7th
Average Rating
8.2
Reviews Sentiment
6.8
Number of Reviews
36
Ranking in other categories
Endpoint Compliance (4th), Privileged Access Management (PAM) (3rd), Anti-Malware Tools (5th), Application Control (5th)
Varonis Platform
Ranking in Ransomware Protection
8th
Average Rating
8.2
Reviews Sentiment
6.4
Number of Reviews
14
Ranking in other categories
Data Loss Prevention (DLP) (9th), Data Governance (6th), SaaS Security Posture Management (SSPM) (5th), Data Security Posture Management (DSPM) (8th), Compliance Management (8th), Identity Threat Detection and Response (ITDR) (5th)
 

Mindshare comparison

As of May 2025, in the Ransomware Protection category, the mindshare of CyberArk Endpoint Privilege Manager is 5.8%, down from 7.5% compared to the previous year. The mindshare of Varonis Platform is 2.1%, up from 1.3% compared to the previous year. It is calculated based on PeerSpot user engagement data.
Ransomware Protection
 

Featured Reviews

Sumit Chavan - PeerSpot reviewer
Helps secure the infrastructure and control users with admin rights
There are many features that are currently missing. A customization option is required for certain policies. For instance, if we need to stop PowerShell scripting, we have to create a different policy for that. Being able to create a sub-level policy within a top-level policy would be good. Currently, no user-based policy option is available inside the EPM console. We can only create computer-based policies. The database is available, but there is a drawback in not being able to create local groups on the EPM console. We only have to depend on Active Directory. This limits infrastructure security as we depend on the Active Directory team to manage user groups. If they remove any users, we lose control. If we could create groups locally and block them or set specific policies, we would have more control. Local endpoint management is missing from the EPM site. Moreover, there is an issue with policies not running as expected when we make enhancements. We have to find multiple ways to whitelist applications or enhance policies.
Frederic  Delos - PeerSpot reviewer
Offers the ability to identify sensitive areas, allowing you to drill down into the sensitive data
The most effective feature for me is its ability to identify sensitive areas, allowing you to drill down into the sensitive data, provided you have access, to determine whether it's a false positive or a true positive. That's the best thing for me, out of all of it. It's got everything, like other ones, but I like to be able to look at something if I'm doing forensics on the alert and say, "Okay, do I really need to do something with this?" For example, we don't want sensitive data in our OneDrive. So it identifies the sensitive data that's possibly in the OneDrive. And what I can do is look at it and identify whether it's actually sensitive data in Datalert or whether it looks like sensitive data, but I know it's a false positive. If it is a false positive, I can basically say ignore this pattern based on X, Y, and Z, you know, whether it's Redjax or keyword proximity. So I like that. With other tools, I gotta go through a whole process because it's a little bit more complex. Here, I can tag it and bag it in one shot. And the next good time I scan, it slips over it. So it helps in that.

Quotes from Members

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
 

Pros

"I like that you can remove the admin rights from the user's computer and have control over the environment. That means you can delete the local admins and grant them proper privileges with the console. So, they will get proper permissions for applications they need, but we don't have to do it. In the domain where we don't have control, the user can only do specified actions, but not all of them."
"It allows whitelisting."
"The most valuable feature of CyberArk Endpoint Privilege Manager is its ability to reset passwords every time that it is needed or periodically."
"In terms of ROI, deploying CyberArk Endpoint Privilege Manager has secured the infrastructure, which saves money, time, and resources."
"We can do both server and endpoint protection."
"It offers great performance."
"The solution allows me to give access and privileges to each user individually"
"The password rotation and the session recording are the most valuable features."
"I also appreciate the reporting feature, which allows for the extraction of various reports based on specific needs. These reports can be used for audit purposes, such as tracking changes in file locations or deletions."
"That alerting and reporting service is great."
"The solution's classification engine is highly configurable and efficient."
"The analytics would have to be our most valuable feature."
"It can easily identify unusual behavior or access patterns that may pose a potential threat, while operating as a unified reporting system."
"The most important feature is remediation. In remediation support, there is no group permission. We'll go ahead and remediate the access from the Dell folder to the parent folder."
"The telemetry to capture everything and the reports are very easy to configure without having a developer degree."
"Technical support from Varonis is rated as nine out of ten."
 

Cons

"There are many features that are currently missing. A customization option is required for certain policies."
"CyberArk Endpoint Privilege Manager is not suitable for the current situation because when you compare it to OTP, OTP is the strongest password solution. You can use it as a one-time password, but you have to log into the password manager itself and if you don't change your password, it will be the weakest link in the security. In OTP, you don't have that weakest link."
"The main issues I experience are related to deployment, which requires dependency on other solutions like AD or SCCM. These tools need to be defined and synced with the client or agent and master, sometimes needing manual checks."
"My recommendation for improvement is to add functionality for when users request access to an application. There's a pop-up UI, but it's not very customizable. I suggest creating a UI where we can write scripts or use SDKs to enhance it. This could automatically create tickets in a system like ServiceNow when users request an application. If a manager approves, we could automatically push policies to those users."
"CyberArk Endpoint Privilege Manager is a perfect solution, but CyberArk Endpoint Privilege Manager for Linux has many issues. Another area for improvement in CyberArk Endpoint Privilege Manager, specifically for Windows, is that there's no way for you to check credential theft from a text file, such as a notepad file."
"CyberArk meets clients' need very spot-on. It covers everything customers ask for. As for improvements, honestly, the feedback's been really positive. I haven't heard any specific areas that need work."
"The solution's pricing could be better."
"CyberArk Endpoint Privilege Manager could be improved by simplifying the administration process, specifically when setting up policies and applications."
"Varonis requires more access permissions for its core functions compared to competitors, which can be a concern for companies about data safety."
"For unstructured data monitoring, it's one of the top ones, if not the top one, due to its usability."
"The GUI should be more functional. There should be a process for connecting through Chrome, Internet Explorer, etc."
"One area for improvement is the calculation engine. When applying rules in Varonis, especially for large datasets (terabytes of data), the calculations can be slow and require time to process. Speeding up this process would be beneficial."
"I'd like to see automatic updates for this solution. Currently, it's a manual process to update all the keywords"
"The solution's areas of improvement are the interface and the dependency on on-premises deployment for some components."
"There is one thing that if I add something manually, I get so many alerts. That's the biggest bad thing."
"I would like it to have cloud integration."
 

Pricing and Cost Advice

"The tool is priced high. I would rate its pricing an eight out of ten."
"The solution requires an annual license to use it. There can be some extra costs in some cases."
"The professional services for one eight-hour day would be $1,800."
"We pay about $17 per user."
"The product's license is easy to procure."
"The cost for CyberArk is very high."
"The tool's pricing is reasonable for customers."
"The solution's pricing is reasonable compared to other vendors' products."
"The platform is expensive. I rate the pricing a nine out of ten."
"The pricing is good. It neither expensive nor cheap. It is average."
"You could do a subscription, where you pay yearly, or you could purchase it outright. The licensing cost is based on the number of users on the system that you are monitoring."
"Varonis Platform wasn't certainly the cheapest solution."
"It's expensive, kind of, really expensive."
"I would rate the pricing an eight out of ten, with ten being the most expensive."
"Licensing is on an annual basis. Maintenance and renewal fees are separate. Varonis Datalert is quite expensive."
report
Use our free recommendation engine to learn which Ransomware Protection solutions are best for your needs.
849,963 professionals have used our research since 2012.
 

Top Industries

By visitors reading reviews
Financial Services Firm
16%
Computer Software Company
14%
Manufacturing Company
11%
Government
8%
Financial Services Firm
16%
Computer Software Company
11%
Manufacturing Company
10%
Healthcare Company
7%
 

Company Size

By reviewers
Large Enterprise
Midsize Enterprise
Small Business
 

Questions from the Community

Looking for recommendations and a pros/cons template for software to detect insider threats
This is an inside-out --- outside-in --- inside-in question, as an insider can be an outsider as well. There is no short answer other than a blend of a PAM tool with Behavioral Analytics and Endpo...
What do you like most about CyberArk Endpoint Privilege Manager?
The most valuable feature of the solution is its performance.
What is your experience regarding pricing and costs for CyberArk Endpoint Privilege Manager?
I've received feedback that the pricing is high, however, for me, the value it brings is worth the cost. It's really one of the best solutions.
What do you like most about Varonis Platform?
The solution has significantly improved data security and compliance posture by allowing us to track and monitor activities. We can see who accesses data and when files are created and understand w...
What needs improvement with Varonis Platform?
Varonis started as an on-premises solution and is transitioning to cloud. It hasn't fully moved yet, which is an area for improvement. Varonis requires more access permissions for its core function...
What is your primary use case for Varonis Platform?
The primary use case for Varonis Platform is data discovery, specifically for discovering sensitive data in our organization to protect it. We are looking for a solution that can scan our repositor...
 

Also Known As

Viewfinity
No data available
 

Overview

 

Sample Customers

Information Not Available
Nottingham Building Society
Find out what your peers are saying about CyberArk Endpoint Privilege Manager vs. Varonis Platform and other solutions. Updated: April 2025.
849,963 professionals have used our research since 2012.