Cynet and CyberArk Identity compete in the cybersecurity solutions category, offering distinct advantages in pricing and advanced features, respectively. Cynet stands out due to its effective pricing and support, while CyberArk Identity is favored for its advanced multi-factor authentication and identity management capabilities.
Features: Cynet offers notable features such as autonomous threat blocking, user behavior analysis, and deception capabilities, with a user-friendly interface for easy deployment and 24/7 SOC monitoring. CyberArk Identity excels in identity management, providing strong multi-factor authentication and seamless integration with tools like UiPath Orchestrator, alongside robust access management tailored for complex environments.
Room for Improvement: Cynet could benefit from improved mobile support, better integration with third-party tools, and more flexible management of false positives. It also needs to enhance reporting features. CyberArk requires enhancements in integration capabilities, a more intuitive user interface, and improved scalability. Its governance platform also has room for advancement.
Ease of Deployment and Customer Service: Cynet is praised for its straightforward deployment process and responsive 24/7 support, accommodating multiple cloud environments efficiently. CyberArk Identity supports diverse deployment environments but has received feedback suggesting that its support services are less immediate compared to Cynet.
Pricing and ROI: Cynet is recognized for its competitive pricing and flexible licensing, ensuring value with included SOC services, offering strong ROI through comprehensive threat protection. CyberArk Identity, while more costly, is appreciated for its premium security features. Its higher cost may not be favorable for smaller businesses seeking cost-effective identity management solutions.
I have seen over 30% return on investment due to the improvement in operational efficiencies through automation, which enhances productivity.
The return on investment with Cynet is pretty good, as it doesn't require a dedicated resource to manage, being highly automated.
They always respond on time and offer 24/7 support.
They resolved the problem immediately after I reported it, on the same day, within one hour.
They respond immediately when requests are raised, and they are always available for priority one tickets.
Their SOC side support, when a threat is detected, is excellent.
My experience with the technical support of Cynet is excellent; they are just one click away.
Based on our needs, they schedule remote sessions and resolve the issues.
We can use it on different phones and computers, demonstrating its scalability.
For scalability and reliability, it rates a perfect 10 out of 10.
You can scale it out pretty easily, and you can implement it very small.
The solution is highly scalable.
We can deploy Cynet for 50,000 users, and we have deployed it at that scale, with the capability to scale higher to 100,000 users without any challenges.
Cynet is very scalable.
We no longer have our data infiltrated by unauthorized persons, and tracking actions within the system has become very easy.
When you have it in the cloud, you have CyberArk every time you need it.
With a stable network, due to the redundant data centers across the globe, it is a lot easier to use as a SaaS solution.
Within six years of usage, we have not had any issues such as outages or downtime.
Integration or deployment is extremely difficult for CyberArk Identity.
There's a need to enhance network performance.
For CyberArk Identity, you need knowledge of their scripting language to pull different sets of reports.
There should be more options than deploying solely through group policy, as the assumption that GPO is working isn’t always the case.
Having a DLP feature would also add value.
Integration with local Active Directory, not only Azure AD, is a must.
Regarding pricing, it can be quite a lot for small companies.
The pricing is acceptable.
If I am not going fully cloud, there are additional resources I will need to purchase, such as spinning more VMs or acquiring an HSM device to encrypt the vault.
I think the pricing of Cynet is fair and one of the better options in the market.
The price of Cynet is reasonable considering its features and support.
Cynet does not ask for additional costs for add-on features.
It impacts zero trust security strategies. It prevents lateral movements in the organization.
The two-factor authentication is very important, but the fact that every account is being regenerated every time we use it is the most important security feature for us.
It is the most powerful access management system.
The valuable aspects of Cynet are its EDR and XDR components, which are available at a reasonable price point.
The most effective features of Cynet are its ransomware protection and lateral movement deception.
The SOAR function, deception, and forensics are very useful.
Product | Market Share (%) |
---|---|
Cynet | 5.4% |
CyberArk Identity | 0.8% |
Other | 93.8% |
Company Size | Count |
---|---|
Small Business | 20 |
Midsize Enterprise | 4 |
Large Enterprise | 9 |
Company Size | Count |
---|---|
Small Business | 29 |
Midsize Enterprise | 7 |
Large Enterprise | 12 |
CyberArk Identity is a versatile identity management solution suitable for a wide range of enterprises. It is designed to enhance enterprise security and improve user experience. Its focus on security, compliance, and operational efficiency, combined with positive user feedback, makes it a strong contender in the identity management space.
CyberArk Identity offers a robust suite of features to manage user identities and access privileges. It focuses on securing access to resources across various environments, including cloud and on-premises applications. Its capabilities include single sign-on (SSO), multi-factor authentication (MFA), lifecycle management, and privileged access management. These features are engineered to streamline access control, enhance security, and ensure compliance with regulatory standards.
According to our user interviews, CyberArk Identity is praised for its reliability and user-friendly interface. IT professionals highlight the ease of integration with existing systems, while business executives appreciate the visibility it provides into access and identity management across the organization. Users also commend the responsive customer support, which is crucial for enterprise-level solutions.
IT Professionals found that CyberArk Identity's focus on multi-layered security significantly reduced the risk of data breaches and unauthorized access. With a centralized dashboard and automation features, you can streamline identity and access management tasks, saving time and reducing complexity. Finally, it helps meet various compliance requirements.
Cynet provides comprehensive endpoint protection and advanced threat detection, offering intuitive deployment and monitored support. It ensures real-time visibility and minimal management, enhancing security for diverse and remote teams.
Cynet integrates seamlessly with existing infrastructure, providing an efficient solution for endpoint protection, threat detection, and response. Its automation, scalability, and stability are key benefits. Users benefit from real-time network visibility, ransomware protection, and deception capabilities. Cynet serves as a robust alternative to CrowdStrike, offering a multifaceted approach to security operations, especially in environments needing continuous threat monitoring and zero-day threat management. Areas needing improvement include mobile device support, enhanced reporting, third-party integrations, and AI-based detection.
What are Cynet's most important features?In the financial sector, Cynet's ability to support efficient threat detection and endpoint protection is crucial. Healthcare industries leverage its data protection features for compliance and security. In manufacturing, real-time threat monitoring supports safeguarding intellectual property. Retail sectors benefit from its scalability and minimal management demands, helping secure diverse, distributed locations.
We monitor all User Entity Behavior Analytics (UEBA) reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.