We performed a comparison between CyberArk Privileged Access Manager, NetWitness Platform, and RiskIQ Illuminate based on real PeerSpot user reviews.
Find out what your peers are saying about CyberArk, Delinea, BeyondTrust and others in Privileged Access Management (PAM)."Technical support is very helpful whenever we have any questions."
"It enables companies to automate password management on target systems gaining a more secure access management approach."
"Rather than multiple tools for maintaining regulatory compliance around passwords and privileged accounts, we have centralized as much as possible with CyberArk. This is now a one stop shop for end users to access their elevated credentials."
"Lessens the risk with privileged access."
"The password management feature is valuable."
"We utilize PTA, and we are now integrating that into our risk management program so we can identify the uses of the vault which are outside of the norm, e.g., people accessing after hours. It has reduced the amount of time that we are looking through logs and audit logs."
"It has helped from an auditing perspective identify who has access to privileged accounts."
"The Vault offers great capabilities for structuring and accessing data."
"NetWitness Platform is valuable for creating rules that the solution must detect."
"Alerting Module: It provides real-time event processing language on all the logs/packets stream for advanced alerting, i.e., using SQL LIKE statements."
"The most valuable feature is the security that it provides."
"What we are mainly using are the RSA concentrator, RSA Decoder, Archiver, Broker, and Log Decoder."
"It gives the capability for the incident response team to correlate logs to identify any kind of problem like malware and incidents in a general sense, both for logs and packets."
"The packet capture aspect of it is a valuable feature because it is quite different from a traditional SIEM solution that only carries out investigations based on captured logs."
"It gives the ability to investigate into network traffic in the Net and the organization what we couldn't do before."
"Possibility to investigate incidents based on logs and raw packets, such as extracting files sent over the network"
"The solution is stable with 12 years of established historical data."
"The current interface is not very intuitive."
"I'd like to see a more expansive SSH tunneling situation through PSMP. Right now you have an account that exists in the vault and you say, "I want to create a tunnel using this account." I'd like to see something that is not account-based where I could say, "I want to create a tunnel to this machine over here," and then authenticate through the PSMP and then your tunnel is set up. You wouldn't need to then authenticate to a machine."
"Stability is a huge concern right now. We are on a version which is very unstable. We have to upgrade to stabilize it. It is fine, but the problem is we have to hire CyberArk to do the upgrade. This costs money, and it is their bug."
"CyberArk Privileged Access Manager could improve the integration with other solutions and ease of use. Additionally, there should be a feature to have remote connections without a VPN."
"The product documentation has to be more precise in certain aspects with explanations for functionality limitations along with reference material or screenshots."
"They need to provide better training for the System Integrator."
"We would like to expand the usage of the auto discovery accounts feed, then on our end, tie in the REST API for automation."
"The product is very vaulting-focused. I'd love to see it expanding its capabilities a bit further into areas like just-in-time elevation, and access with non-vaulted credentials."
"The threat detection capability and centralizing and upgrading capability need to be improved. The threat alert capability needs to be improved as well because there is some lag time at present. They need to work on their database search too."
"The user interface is a little bit difficult for new users and it needs to be improved."
"If we have the ability to run a dynamic analysis through malware in the same suite, it would be great to have a sandbox solution to analyze malware through dynamic analysis."
"Lots of competing products have vulnerability protection built into their products, and this solution would be improved by including that support."
"The tool's integration capability isn't so great."
"The implementation needs assistance."
"The product's licensing models are complex to understand. This particular area needs improvement."
"The system looks like it is a mix of a bunch of different systems, and nothing looked like it was quite together."
"A low-cost service to evaluate the risk score of a supply chain would be very helpful."
More CyberArk Privileged Access Manager Pricing and Cost Advice →
Earn 20 points