We performed a comparison between CyberArk Privileged Access Manager and Proofpoint Email Protection based on real PeerSpot user reviews.
Find out what your peers are saying about CyberArk, Delinea, BeyondTrust and others in Privileged Access Management (PAM)."Right off the bat, the most valuable feature is the DNA scan. It gives us the ability to scan our environment and find the accounts that we're going to need to take under control."
"There are no issues with scalability. Our clients are very happy to use the product."
"We are able to rotate privileged user passwords to eliminate fraudulent use."
"The voice technology is very good."
"It has a centralized page where you can manage everything. This makes work easier. You don't have to remember different module URLs or browser applications. It is very easy to get all the secure identities of other environments into a single page, which is very important for us as it helps a lot in terms of operations, e.g., reduces management time. This is a single page where you can manage all accounts and onboard them to the CyberArk. You can then secure and see passwords from everywhere. So, there is a single pane of glass where you can manage all the identities across environments as well as across different types of identities."
"It is useful for protecting passwords. If you need to do access security management, you can first use the CyberArk console, and after that, you can connect the firewall interface or firewall command line. Similarly, if you need to do an RDP session, you need to first log in to CyberArk before connecting to the Windows RDP session. This way, the admin doesn't know the password, and that password is changed immediately. To change the password, you first discover the old password in the network, and after that, you can change the password."
"The most valuable feature is that it always provides flexibility, password quality and one-time user check-in and check-out."
"We like it for the ability to automatically change passwords. At least for my group, that's the best thing."
"The most valuable feature is the ability to remove bad messages that were delivered, prior to being classified as unwanted."
"Proofpoint Email Protection is the best solution from the perspective of email security."
"URL scanning and online relay service are the most valuable features of Proofpoint Email Protection."
"The most valuable feature of Proofpoint Email Protection is the TAP Dashboard. It provides more detailed information that can be used for forensic analysis. This is an advantage that other email security providers, such as Cisco, IronPort, or Microsoft do not offer in their dashboards."
"The most valuable feature is the option to edit the inbound security."
"There is no downtime."
"The stability is very good."
"The solution scales well."
"Some of the additional features that we are looking at are in the Conjur product. I am specifically discussing key management, API Keys, and things for connecting applications in the CI/CD pipelines."
"Some aspects of the administration need improvement, though they have recently made improvements to the API. However, the management with the interface and configuration are not so user-friendly. It has not changed much during all the years that CyberArk has been on the market. The management part, like platform management as well as PSM connectors definition and management, could be improved, even if it has already been done with the API."
"CyberArk PAM is a very broad product as everyone's requirements for implementation are different. In our particular case, the initial implementation was planned and developed by people who didn't know our specific network requirements, so the initial implementation needed to be tweaked over time. While this is normal, at the time all these "major" changes required CyberArk professional services to come in-plant and "assist" with the changes."
"The solution needs better features for end users to manage their own whitelisting for API retrieval."
"Make it easier to deploy."
"The usual workload is sometimes delayed by the solution."
"I would love them to improve their UI customizing features."
"I'd like to see a more expansive SSH tunneling situation through PSMP. Right now you have an account that exists in the vault and you say, "I want to create a tunnel using this account." I'd like to see something that is not account-based where I could say, "I want to create a tunnel to this machine over here," and then authenticate through the PSMP and then your tunnel is set up. You wouldn't need to then authenticate to a machine."
"The solution should add post-sales training."
"The product's deployment is complex and requires technical knowledge."
"Sometimes it detects false positives."
"The reporting section could be enhanced. I like some reports but if they could allow us to create custom reports with more flexibility it would enhance the reports more."
"We'd like to have the ability to create more customized reports."
"Unfortunately, the whole product is going downhill right now, ever since they were sold to Thoma Bravo. We're constantly having problems with stability and the product in general."
"You only receive one model in Proofpoint Email Protection and the other ones you have to purchase at a high price. There should be more available with the solution and additional models should be less expensive."
"Proofpoint Email Protection could improve by reducing the price."
More CyberArk Privileged Access Manager Pricing and Cost Advice →
CyberArk Privileged Access Manager is ranked 1st in Privileged Access Management (PAM) with 142 reviews while Proofpoint Email Protection is ranked 1st in Secure Email Gateway (SEG) with 44 reviews. CyberArk Privileged Access Manager is rated 8.8, while Proofpoint Email Protection is rated 8.4. The top reviewer of CyberArk Privileged Access Manager writes "Lets you ensure relevant, compliant access in good time and with an audit trail, yet lacks clarity on MITRE ATT&CK". On the other hand, the top reviewer of Proofpoint Email Protection writes "A reasonably priced product that offers protection to emails, along with spam filters". CyberArk Privileged Access Manager is most compared with Cisco ISE (Identity Services Engine), Microsoft Entra ID, Delinea Secret Server, WALLIX Bastion and One Identity Safeguard, whereas Proofpoint Email Protection is most compared with Microsoft Defender for Office 365, Microsoft Exchange Online Protection (EOP), Palo Alto Networks WildFire, Cisco Secure Email and Fortinet FortiMail.
We monitor all Privileged Access Management (PAM) reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.