CyberArk Endpoint Privilege Manager and Zscaler Zero Trust Exchange Platform compete in the cybersecurity domain, focusing on user permissions and network security. CyberArk has an advantage in managing user access and application control, while Zscaler stands out for its robust network security and minimal user interaction.
Features: CyberArk Endpoint Privilege Manager offers granular user permission management, application control, and strong password and session management. Zscaler Zero Trust Exchange Platform provides seamless VPN connectivity, comprehensive cloud-based cybersecurity features, and scalable user-based licensing.
Room for Improvement: CyberArk could enhance integration capabilities and address performance issues while simplifying its user interface. Zscaler needs to focus on improving latency management, clarifying backend architecture, and refining its pricing structure. Both platforms would benefit from faster technical support responses.
Ease of Deployment and Customer Service: CyberArk provides versatile deployment options for on-premises and hybrid cloud environments, though its technical support sometimes faces criticism. Zscaler focuses on public cloud deployment with strong hybrid support. Users appreciate its available support but note delays with complex issues.
Pricing and ROI: CyberArk Endpoint Privilege Manager is known for its high cost but delivers ROI through enhanced security features. Zscaler offers competitive pricing with scalable user-based licensing, appealing to large organizations. Both are recognized for positive ROI through security improvements.
Deploying CyberArk Endpoint Privilege Manager has secured the infrastructure, which saves money, time, and resources.
I consider CyberArk Endpoint Privilege Manager's return on investment to be good since it effectively accomplishes the goals expected from privilege access management solutions.
We don't have to purchase many components such as load balancers and proxy servers that were necessary in traditional setups.
They respond immediately to our inquiries, resolve issues promptly, and provide valuable guidance, especially in critical situations.
We engage them when needed and receive prompt responses that typically resolve our issues.
Earlier, we received support for normal tickets within a day, but now it takes one or two days to resolve issues.
Sometimes, support takes time since the solution has some bugs that need fixing.
We can set permissions per team or department, allowing some teams to elevate specific applications while others have different permissions.
CyberArk Endpoint Privilege Manager is quite scalable.
The available reports and other security tools assist in scaling it according to my organization's needs.
It is a robust solution that has effectively supported our environment without major issues.
Since implementing it, we have not experienced any outages or stability issues.
CyberArk Endpoint Privilege Manager offers multiple options for creating and stopping policies.
CyberArk Endpoint Privilege Manager could be improved by simplifying the administration process, specifically when setting up policies and applications.
Currently, no user-based policy option is available inside the EPM console.
Some features provided in the self-hosted version of EPM are not supported in the software as a service version, like connection to some analysis applied by Palo Alto.
They might be able to identify if something is missing with Zscaler.
CyberArk Endpoint Privilege Manager is slightly expensive, but costs can be negotiated to become more competitive.
CyberArk Endpoint Privilege Manager is costly compared to other solutions.
I've received feedback that the pricing is high, however, for me, the value it brings is worth the cost.
CyberArk Endpoint Privilege Manager effectively reduces malicious content in applications by allowing us to identify and block dangerous applications.
It allows them to granularly manage controls to prevent some malicious activities on the endpoint machine.
CyberArk Endpoint Privilege Manager enhances computer security by providing minimal access, effectively preventing ransomware attacks.
The solution is cloud-based with the latest inspection engines, which I find to be amazing.
CyberArk Endpoint Privilege Manager, a critical and foundational endpoint control addresses the underlying weaknesses of endpoint defenses against a privileged attacker and helps enterprises defend against these attacks through removing local admin rights, enforcing least privilege, and implementing foundational endpoint security controls across all Windows, macOS and Linux endpoints from hybrid to cloud environments.
Click here for a free 30 day trial: CyberArk Endpoint Privilege Manager free trial
Zscaler Zero Trust Exchange Platform acts as a VPN alternative for secure remote access, cloud protection, and zero-trust strategies. It enables secure data transmission, supports remote work, and enhances compliance through a cloud-based architecture, offering improved performance and simplified management.
Designed for organizations seeking secure application access and robust data protection, Zscaler Zero Trust Exchange Platform delivers a comprehensive solution through seamless VPN connectivity, data loss prevention, and SSL inspection. Its cloud integration ensures scalability and reliability, while its interface provides intuitive management. Companies benefit from automatic secure access, minimizing constant authentication needs, and safeguarding sensitive data. The platform allows easy deployment and integration with diverse identity providers, granting granular control for access and application segmentation. Despite powerful capabilities, enhancements are needed in speed, bandwidth, and legacy support, with users noting interface and configuration challenges.
What are the key features of Zscaler Zero Trust Exchange Platform?In specific industries, Zscaler Zero Trust Exchange has been implemented to enhance security protocols in fields like finance and healthcare. By prioritizing data protection and compliance, it assists companies in safely managing sensitive information and meeting regulatory requirements. Organizations leverage its features to ensure secure operations across remote and cloud environments, adapting to industry-specific needs with customizable access and security controls.
We monitor all Application Control reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.