

Forescout Platform and CyberArk Endpoint Privilege Manager both compete in the network security and endpoint management sector. While Forescout is preferred for its robust NAC capabilities that are ideal for large-scale projects, CyberArk boasts superior privilege management and ransomware protection, lending it an advantage in delivering tangible ROI.
Features: The standout features of Forescout Platform include its robust Network Access Control (NAC) with the flexibility to operate without 802.1x, extensive endpoint visibility, and seamless integration with third-party security products, making it suitable for large, multi-site deployments. On the other side, CyberArk Endpoint Privilege Manager provides granular control over user privileges, effective protection against ransomware, and integration capabilities with active directories and SIEM systems.
Room for Improvement: Forescout needs to enhance its reporting capabilities, improve third-party integrations, and offer a more user-friendly interface, also addressing issues with patch management and false positives. CyberArk's areas for improvement include simplifying administration processes, especially policy setup, enhancing application integration, and updating its APIs to reduce bulkiness.
Ease of Deployment and Customer Service: Forescout Platform is mostly deployed on-premises with hybrid options; it's praised for ease of deployment but requires expert handling. Their customer support could improve, specifically in technical response times. CyberArk provides deployment options that include on-premises, public, and hybrid clouds, adaptable to various business needs, and is known for fast, efficient customer service.
Pricing and ROI: Forescout is perceived as costly primarily due to its device-based licensing, yet recognized for its network security value. CyberArk, though also expensive, is considered effective in generating a measurable ROI due to its strong security features. Both products yield significant ROI through enhanced security and reduced vulnerabilities.
Deploying CyberArk Endpoint Privilege Manager has secured the infrastructure, which saves money, time, and resources.
I consider CyberArk Endpoint Privilege Manager's return on investment to be good since it effectively accomplishes the goals expected from privilege access management solutions.
They respond immediately to our inquiries, resolve issues promptly, and provide valuable guidance, especially in critical situations.
We engage them when needed and receive prompt responses that typically resolve our issues.
Earlier, we received support for normal tickets within a day, but now it takes one or two days to resolve issues.
We have had experience with their technical support and must pay additionally for maintenance, support, and regional service.
We can set permissions per team or department, allowing some teams to elevate specific applications while others have different permissions.
CyberArk Endpoint Privilege Manager is quite scalable.
The available reports and other security tools assist in scaling it according to my organization's needs.
Scalability can be costly since a physical box needs to be installed for every site.
It is a robust solution that has effectively supported our environment without major issues.
Since implementing it, we have not experienced any outages or stability issues.
CyberArk Endpoint Privilege Manager offers multiple options for creating and stopping policies.
I would rate its stability as 9.5 out of ten.
CyberArk Endpoint Privilege Manager could be improved by simplifying the administration process, specifically when setting up policies and applications.
Currently, no user-based policy option is available inside the EPM console.
Some features provided in the self-hosted version of EPM are not supported in the software as a service version, like connection to some analysis applied by Palo Alto.
It would help if during integration, an admin user could check the password or credential used, as they currently cannot see the password after it is entered and saved.
Forescout Platform could enhance its integration of AI to improve IoT and OT device security to better meet our needs.
The console is a fat client, and a web interface would be preferable.
CyberArk Endpoint Privilege Manager is slightly expensive, but costs can be negotiated to become more competitive.
CyberArk Endpoint Privilege Manager is costly compared to other solutions.
I've received feedback that the pricing is high, however, for me, the value it brings is worth the cost.
Installing a physical box on each site can be expensive.
The overall pricing of Forescout Platform is reasonable for the functionality it provides.
The price of Forescout Platform is reasonable and not overly costly.
CyberArk Endpoint Privilege Manager effectively reduces malicious content in applications by allowing us to identify and block dangerous applications.
It allows them to granularly manage controls to prevent some malicious activities on the endpoint machine.
CyberArk Endpoint Privilege Manager enhances computer security by providing minimal access, effectively preventing ransomware attacks.
One of the most valuable features of Forescout Platform is its automation, particularly the ability to automate remediation of rogue devices on the network.
The most effective feature has been network access management, which has been crucial for our primary use cases in the organization.
When it comes to the effectiveness of Forescout Platform's real-time visibility in reducing the overall attack surface, I give it a 9 out of 10.
| Product | Mindshare (%) |
|---|---|
| Forescout Platform | 10.8% |
| CyberArk Endpoint Privilege Manager | 10.8% |
| Other | 78.4% |

| Company Size | Count |
|---|---|
| Small Business | 17 |
| Midsize Enterprise | 9 |
| Large Enterprise | 18 |
| Company Size | Count |
|---|---|
| Small Business | 30 |
| Midsize Enterprise | 10 |
| Large Enterprise | 44 |
CyberArk Endpoint Privilege Manager enhances security by controlling access, removing admin rights, and managing privileges. It supports diverse environments with simple integration, focusing on credential detection, threat protection, and compliance.
CyberArk Endpoint Privilege Manager secures enterprise passwords, monitors session connections, and enhances cybersecurity by controlling privileged access. It blocks unauthorized applications, monitors user activities, and secures credentials across platforms. Key areas include Just-In-Time Access, privilege separation, and local administrator password rotation. While robust, challenges exist with performance, complexity, and setup. Integration with Linux and Unix needs improvement, requiring advanced reporting tools and easier policy management. Pricing concerns and maintenance issues with Windows servers persist, as well as database issues in the on-prem version.
What are the key features of CyberArk Endpoint Privilege Manager?Organizations deploying CyberArk Endpoint Privilege Manager in industries such as finance, healthcare, and technology benefit from secure credential management across Unix, AWS, and GCP. By implementing privilege separation and monitoring user activities, they achieve effective risk mitigation and compliance across multiple platforms.
Forescout Platform provides comprehensive device visibility and asset management without requiring agent installation. It strengthens network access control and endpoint compliance, integrating flexibly with zero-trust architecture.
Forescout Platform offers organizations a robust solution for maintaining network security by enabling detailed monitoring of connected devices and enforcing compliance policies across IT and OT networks. Effective in sectors like finance, healthcare, and manufacturing, it controls unauthorized access, authenticates, quarantines, and remediates noncompliant devices while supporting both on-premises and cloud environments. Notable for its third-party integration, easy configuration, and customizable threat responses, Forescout Platform aids in efficient security measure maintenance.
What are the key features?Forescout Platform finds widespread adoption across industries like finance, healthcare, and manufacturing. It is particularly valued for enforcing cybersecurity measures and maintaining compliance in diverse operational environments, handling network access and device management challenges efficiently.
We monitor all Endpoint Compliance reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.