


Find out what your peers are saying about CyberArk, One Identity, Delinea and others in Privileged Access Management (PAM).
The return on investment lies in improved security infrastructure, addressing over-privileged access, and reducing the risk of credential compromise, which is a major source of data breaches.
The end users have the authority to reconcile the password or verify it before using session isolation, which is one of the unique features that can be enabled through Privileged Session Manager, preventing any attacks from happening within the organization when connected with sessions through CyberArk Privileged Access Manager.
CyberArk Privileged Access Manager has helped customers save on costs primarily by reducing the number of engineering and information security personnel.
The service generates a low rate of false positives, reducing the overhead of managing false positive events.
That is a reason to buy a firewall, and it is challenging to put a monetary value on security.
CyberArk has been exceptional in coming back to us with immediate responses.
It could be forever until you talk to someone who knows what they are doing.
Based on the issue resolution and support quality, I rate the support 10 out of 10.
There is a lack of SLA adherence, and third-party partners do not provide prompt responses.
We have had some open tickets for months, maybe half a year, and there is no real answer.
The service response times are aligned with standards, responding within a few hours based on the problem's criticality.
Customer service is excellent.
For support, I would rate SonicWall TZ five out of 10.
The CPM can reportedly handle up to 50,000 accounts independently without issue.
I would rate it a ten out of ten for scalability.
They had 40,000 passwords in this one safe, and it was saving the last ten iterations of each password object. That means they had 400,000 password objects in this safe. They exceeded the limit.
Wildfire is highly scalable.
Palo Alto Networks WildFire is scalable, and I give it a nine for scalability.
The on-premises version is expensive to scale as it might need an additional device to be installed in the setup.
Proper fine-tuning and expertise ensure the product performs well.
Overall, the stability of the solution is high.
It has a large customer base and positive feedback within my network.
It performs filtering, malware blocking, and scanning.
The solution is scalable and stable.
In terms of stability, SonicWall doesn't have performance issues.
SonicWall TZ rates 10 out of 10 for stability.
SonicWall TZ is definitely stable and offers a good value for money.
They want everything to be on the cloud, but even in the SaaS version of CyberArk Privileged Access Manager, they need to deploy some servers on-premises.
We cannot generate a plug-in for web-based applications.
If they want clients to move to the cloud, they need to support them in real-time.
It should be easier to establish the Palo Alto Networks WildFire cluster between the devices.
The dashboard should provide better visibility, especially in showing how many files are sent to Wildfire and their findings.
It is a very good product.
Integration with other vendors, especially with VPNs, can be challenging and requires more effort when configuring.
SonicWall TZ could benefit from newer technology.
The VPN license should be improved by providing more free SSL VPN licenses.
CyberArk is expensive compared to other products I know.
CyberArk is comparatively expensive compared to other PAM solutions, such as Delinea, especially during renewal.
CyberArk's SaaS solution is particularly expensive.
I would rate it an eight out of ten in terms of affordability.
More licenses are required to purchase the perpetual license for SSL VPN and Global VPN.
When comparing similar products across vendors, there may be a small difference in cost.
I would also position its pricing as a three, where one is the lowest price and ten is the highest.
CyberArk Privileged Access Manager helps ensure data privacy because we now know who is using which credentials and at what time.
It keeps a record of activities, allowing me to easily fetch screen recordings to detect any misuse and see who did what and what happened.
It can integrate with Splunk, SNMP, and other solutions and technologies.
Integrating Palo Alto Networks WildFire with various security protocols similar to a firewall has significantly improved the overall threat detection capabilities in our organization.
The most valuable feature of Wildfire is its sandboxing capability for examining suspicious files or locations.
The integration and working with third-party solutions was very seamless and smooth.
For SMB segments, SonicWall performs well.
It was beneficial during COVID for remote work through its VPN functionality.
The advanced gateway security features such as web filter, application control filter, IPS, ideas, gateway antivirus, anti-spyware, and botnet filter are valuable.
| Product | Market Share (%) |
|---|---|
| CyberArk Privileged Access Manager | 11.2% |
| Delinea Secret Server | 5.0% |
| WALLIX Bastion | 4.5% |
| Other | 79.3% |
| Product | Market Share (%) |
|---|---|
| Palo Alto Networks WildFire | 7.5% |
| Microsoft Defender for Office 365 | 8.3% |
| Proofpoint Email Protection | 5.9% |
| Other | 78.3% |
| Product | Market Share (%) |
|---|---|
| SonicWall TZ | 2.2% |
| Fortinet FortiGate | 18.7% |
| OPNsense | 10.5% |
| Other | 68.6% |


| Company Size | Count |
|---|---|
| Small Business | 59 |
| Midsize Enterprise | 40 |
| Large Enterprise | 173 |
| Company Size | Count |
|---|---|
| Small Business | 37 |
| Midsize Enterprise | 16 |
| Large Enterprise | 29 |
| Company Size | Count |
|---|---|
| Small Business | 62 |
| Midsize Enterprise | 16 |
| Large Enterprise | 13 |
CyberArk Privileged Access Manager is a next-generation solution that allows users to secure both their applications and their confidential corporate information. It is extremely flexible and can be implemented across a variety of environments. This program runs with equal efficiency in a fully cloud-based, hybrid, or on-premises environment. Users can now protect their critical infrastructure and access it in any way that best meets their needs.
CyberArk Privileged Access Manager possesses a simplified and unified user interface. Users are able to manage the solution from one place. The UI allows users to view and manage all of the information and controls that administrators need to be able to easily access. Very often, management UIs do not have all of the controls and information streamlined in a single location. This platform provides a level of visibility that ensures users will be able to view all of their system’s most critical information at any time that they wish.
Benefits of CyberArk Privileged Access Manager
Some of CyberArk Privileged Access Manager’s benefits include:
Reviews from Real Users
CyberArk Privileged Access Manager’s software stands out among its competitors for one very fundamental reason. CyberArk Privileged Access Manager is an all-in-one solution. Users are given the ability to accomplish with a single platform what might usually only be accomplished with multiple solutions.
PeerSpot users note the truly all-in-one nature of this solution. Mateusz K., IT Manager at a financial services firm, wrote, "It improves security in our company. We have more than 10,000 accounts that we manage in CyberArk. We use these accounts for SQLs, Windows Server, and Unix. Therefore, keeping these passwords up-to-date in another solution or software would be impossible. Now, we have some sort of a platform to manage passwords, distribute the inflow, and manage IT teams as well as making regular changes to it according to the internal security policies in our bank."
Hichem T.-B., CDO & Co-Founder at ELYTIK, noted that “This is a complete solution that can detect cyber attacks well. I have found the proxy features most valuable for fast password web access.”
Palo Alto Networks WildFire is a highly effective cloud-based advanced threat protection (ATP) solution that organizations in a wide variety of fields trust to help them keep safe from digital threats. It is designed to enable businesses to confront even the most evasive threats and resolve them. It combines many techniques to maximize the level of threat protection available to users.
Palo Alto Networks WildFire Benefits
Some of the ways that organizations can benefit by choosing to deploy WildFire include:
Proactive real-time threat prevention. Organizations that utilize WildFire can take a proactive approach to their network security. Wildfire’s security scanning software is supported by powerful automation that enables it to run 180 times faster than other similar solutions. It also leverages machine learning to spot and address two times more malware monthly than its competitors. Users can solve issues as they arise, which prevents them from suffering severe harm.
A holistic approach to security. WildFire leverages many of the security features and characteristics that can be found in some of the most effective security solutions in a way that provides users with a powerful protective blanket. It combines such things as machine learning, dynamic and static analysis, and a custom-built analysis environment, and enables users to cover many different potential avenues of attack. In this way, organizations can easily detect and prevent even the most sophisticated threats from harming them.
Reduce overhead costs. Using WildFire cuts the expenses that a business incurs. Its architecture is based in the cloud and, as a result, users do not have to purchase hardware to run it. Additionally, those users do not have to pay anything more than a product subscription fee. They can scale it up as they wish and incur no additional costs.
Palo Alto Networks WildFire Features
Some of the many features WildFire offers include:
Third-party integrations. WildFire gives users access to integrations that can enable them to combine Wildfire’s security suite with outside tools. If an organization thinks that they are missing something, they can easily use Wildfire’s third-party integrations to bolster their capabilities. These integrations can connect to many different types of tools, like security information or event management systems.
URL filtering. Organizations can use a URL filtering feature to safeguard themselves against known threats. When this feature is active, it will scan for traffic coming from specific URLs that are known to be malicious. This keeps them one step ahead of those threats that they know about.
Deep analytics. Wildfire comes with the ability to provide users with a detailed analysis of any threat that it finds across all of their network environments. It gives users insight into everything from their natures to the actions that they have performed.
Reviews from Real Users
WildFire is a solution that stands out when compared to its primary competitors. Two major advantages that it offers are the high speeds at which it can analyze network traffic for threats and the accuracy with which it can pick out genuine threats from false positives.
Ahmad Z., the principal consultant at Securelytics, writes, “The analysis is very fast. The intermittent is a millisecond and has a speedy response time.”
Christopher B., the senior systems administrator at a government agency, says, “It gives a more accurate assessment of a virus in terms of whether it's truly a virus, malware, or a false positive. We have some legacy software that could pop up as being something that is malware. WildFire goes through and inspects it, and then it comes back and lets us know if it's a false positive. Usually, when it finds out that it's not a virus, it lets us know that it's benign, and it can exclude it from that scan, which means I don't even have to worry about that one popping up anymore.”