Coming October 25: PeerSpot Awards will be announced! Learn more
2019-03-03T11:30:00Z
Miriam Tover - PeerSpot reviewer
Service Delivery Manager at PeerSpot (formerly IT Central Station)
  • 0
  • 2

What is your primary use case for CyberArk Endpoint Privilege Manager?

How do you or your organization use this solution?

Please share with us so that your peers can learn from your experiences.

Thank you!

4
PeerSpot user
4 Answers
ED
Network Security & Data Management Admin at Digitaltrack
Reseller
Top 10
2021-03-29T18:38:06Z
29 March 21

We are implementing this product to control the Privilege account. For example, from a Cyber Privilege account, we just want to know what the user is doing and how to control it. We use it for security and monitoring.

PS
Enterprise Architect at a tech services company with 11-50 employees
Real User
Top 10
2020-10-22T13:37:00Z
22 October 20

Because we are dealing with personal health information, we have had to setup up a security broker for admin access in and out of the accounts. They wanted to have a break-glass solution in case there was a problem with the multi-factor authentication or any other issues. We chose to use CyberArk for their failover abilities. If the Multi-factor authentication fails then you can still log in and it has a second factor that authenticates. It gives them the break glass option that they needed.

KA
Senior Specialist, Cyber Security Technology at a tech services company with 51-200 employees
Real User
2019-11-18T07:22:00Z
18 November 19

I'm a senior specialist in cybersecurity technology. We are partners and resellers of CyberArk and a system integrator company. We're not the end-users. Our customers are generally interested in the Privilege Access Management solution and EPM which is an extension of that.

Uchechukwu Ukazu - PeerSpot reviewer
Tech Support at a tech services company with 11-50 employees
Real User
2019-03-03T11:30:00Z
03 March 19

Our primary use case for this solution is to manage enterprise passwords and monitor session connections.

Learn what your peers think about CyberArk Endpoint Privilege Manager. Get advice and tips from experienced pros sharing their opinions. Updated: October 2022.
634,590 professionals have used our research since 2012.
Related Questions
Miriam Tover - PeerSpot reviewer
Service Delivery Manager at PeerSpot (formerly IT Central Station)
Jul 31, 2022
How do you or your organization use this solution? Please share with us so that your peers can learn from your experiences. Thank you!
2 out of 4 answers
PS
Enterprise Architect at a tech services company with 11-50 employees
22 October 20
Because we are dealing with personal health information, we have had to setup up a security broker for admin access in and out of the accounts. They wanted to have a break-glass solution in case there was a problem with the multi-factor authentication or any other issues. We chose to use CyberArk for their failover abilities. If the Multi-factor authentication fails then you can still log in and it has a second factor that authenticates. It gives them the break glass option that they needed.
ED
Network Security & Data Management Admin at Digitaltrack
29 March 21
We are implementing this product to control the Privilege account. For example, from a Cyber Privilege account, we just want to know what the user is doing and how to control it. We use it for security and monitoring.
Miriam Tover - PeerSpot reviewer
Service Delivery Manager at PeerSpot (formerly IT Central Station)
Jul 31, 2022
Hi, We all know it's really hard to get good pricing and cost information. Please share what you can so you can help your peers.
2 out of 5 answers
PS
Enterprise Architect at a tech services company with 11-50 employees
22 October 20
I think that it was in the range of $200,000 that had to get approved. That may have been for the whole three to five years for the project length.
ED
Network Security & Data Management Admin at Digitaltrack
29 March 21
I'm more on the technical side. I don't typically deal with the pricing of products. I can't speak to the licensing, how it works, or how much it costs. That's handled by a different team.
Related Articles
Netanya Carmi - PeerSpot reviewer
Content Manager at PeerSpot (formerly IT Central Station)
Apr 18, 2022
Top 5 Privileged Access Management (PAM) Tools PeerSpot’s crowdsourced user review platform helps technology decision-makers around the world to better connect with peers and other independent experts who provide advice without vendor bias. Our users have ranked these solutions according to their valuable features, and discuss which features they like most and why. You can read user reviews ...
Shibu Babuchandran - PeerSpot reviewer
Regional Manager/ Service Delivery Manager at ASPL INFO Services
Jan 17, 2022
Cyber Security has become one of the top priorities in today’s hyper-connected fast-growing technologies like cloud, mobile, and virtualization, making the lives of security professionals more challenging. Building multiple layers of security on the perimeter such as VPNs, access controls, firewalls, IDS, IPS, SIEMs and email gateways are no longer considered fully effective. It needs to be c...
See 2 comments
DM
Director at DNAX s.r.o.
12 January 22
As a cybersecurity professional, I would NEVER outsource a PAM solution anywhere outside of my company, no matter how beneficiary it could look at a first sight. In the end, it can cost you everything.
Shibu Babuchandran - PeerSpot reviewer
Regional Manager/ Service Delivery Manager at ASPL INFO Services
17 January 22
HI @DavidMateju​, Thanks for your response, can you let us know in more detail the reason for not outsourcing a PAM solution.
Shibu Babuchandran - PeerSpot reviewer
Regional Manager/ Service Delivery Manager at ASPL INFO Services
Dec 11, 2021
                                What is Privileged Account Management (PAM)? Privileged account management can be defined as managing and auditing account and data access by privileged users. A privileged user is someone who has administrative access to critical systems. For instance, anyone who can set up and delete user accounts and roles on your Oracle database is a privileged user. Lik...
Related Articles
Netanya Carmi - PeerSpot reviewer
Content Manager at PeerSpot (formerly IT Central Station)
Apr 18, 2022
Top 5 Privileged Access Management (PAM) Tools 2022
Top 5 Privileged Access Management (PAM) Tools PeerSpot’s crowdsourced user review platform help...
Shibu Babuchandran - PeerSpot reviewer
Regional Manager/ Service Delivery Manager at ASPL INFO Services
Jan 17, 2022
Privileged Access Management as a Service (PAMaaS): benefits and service offerings
Cyber Security has become one of the top priorities in today’s hyper-connected fast-growing tec...
Download Free Report
Download our free CyberArk Endpoint Privilege Manager Report and get advice and tips from experienced pros sharing their opinions. Updated: October 2022.
DOWNLOAD NOW
634,590 professionals have used our research since 2012.