No more typing reviews! Try our Samantha, our new voice AI agent.

CyberArk Endpoint Privilege Manager vs Tanium comparison

 

Comparison Buyer's Guide

Executive Summary

Review summaries and opinions

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
 

Categories and Ranking

CyberArk Endpoint Privilege...
Average Rating
8.2
Reviews Sentiment
6.8
Number of Reviews
38
Ranking in other categories
Endpoint Compliance (5th), Privileged Access Management (PAM) (4th), Anti-Malware Tools (5th), Application Control (3rd), Ransomware Protection (3rd)
Tanium
Average Rating
7.8
Reviews Sentiment
6.2
Number of Reviews
22
Ranking in other categories
Server Monitoring (4th), Vulnerability Management (25th), Endpoint Protection Platform (EPP) (16th), Endpoint Detection and Response (EDR) (22nd), Unified Endpoint Management (UEM) (7th)
 

Mindshare comparison

While both are Security Software solutions, they serve different purposes. CyberArk Endpoint Privilege Manager is designed for Privileged Access Management (PAM) and holds a mindshare of 2.4%, down 3.6% compared to last year.
Tanium, on the other hand, focuses on Endpoint Protection Platform (EPP), holds 2.3% mindshare, down 2.5% since last year.
Privileged Access Management (PAM) Mindshare Distribution
ProductMindshare (%)
CyberArk Endpoint Privilege Manager2.4%
CyberArk Privileged Access Manager10.4%
Delinea Secret Server4.5%
Other82.7%
Privileged Access Management (PAM)
Endpoint Protection Platform (EPP) Mindshare Distribution
ProductMindshare (%)
Tanium2.3%
Microsoft Defender for Endpoint7.0%
CrowdStrike Falcon6.2%
Other84.5%
Endpoint Protection Platform (EPP)
 

Featured Reviews

DR
Commercial and Technical Professional Manager at Evolution Technologies Group
Strengthening financial services infrastructure by safeguarding and integrating with ecosystems
We use CyberArk Endpoint Privilege Manager to complement a privilege access management solution in order to avoid golden ticket attacks and strengthen services against attacks. It serves as a complement to our asset management solution. The architecture of CyberArk Endpoint Privilege Manager is beneficial for integrating with all customer ecosystems; it's easy to deploy, and achieving that level of integration and control is more challenging with other solutions. The ability of CyberArk Endpoint Privilege Manager to safeguard our financial services infrastructure is very important, as we need to record actions on privileges in our information systems. Regarding the granularity of the managed controls in CyberArk Endpoint Privilege Manager, we have different levels of features to define compensations and capabilities, which help us verify configurations and access, ultimately keeping the safety of rights intact. Our initial challenge with CyberArk Endpoint Privilege Manager is to comply with Colombian regulations in the financial sector, particularly identifying users and managing password changes and rotations. We needed to certify the identities and provide necessary information for government investigations, if required. CyberArk Endpoint Privilege Manager is very important for helping our organization meet compliance and regulatory requirements. We have to comply with international regulations such as SOC, but also with local regulations unique to the financial sector, which is crucial for us due to the high risks involved. CyberArk Endpoint Privilege Manager helped us reduce the time for regulatory processes to approximately two to four months, completing the solution and training. CyberArk Endpoint Privilege Manager has helped us reduce the mean time to detect within our organization. That's our main goal. Regarding MTTD, the solution provides enough information to enhance our overall detection process. We have an 85% improvement in MTTD. CyberArk Endpoint Privilege Manager helps ensure data privacy through strategies that manage information in real-time. CyberArk Endpoint Privilege Manager helps save costs by avoiding risks and future expenses associated with security incidents. It's essential to communicate the value of CyberArk Endpoint Privilege Manager to users, as its controls help improve system security. My role at the company involves service and sales activities.
MA
Division Manager, Information Technology at a legal firm with 51-200 employees
Centralized policies have improved remote endpoint control and have simplified data visibility
The integration is not simple and easy. It requires experienced users or people who have done the implementation. When certain policies are applied, they do not immediately push the policies. For example, we manage endpoint device USB access. We set a policy to block it, but it does not come into effect immediately. Sometimes it takes three or four days for it to reflect. That is a pain point. I have raised this issue with support as well, but they said that I need to limit the number of devices in the policy. In terms of application deployment, for us, it was seamless.

Quotes from Members

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
 

Pros

"CyberArk Endpoint Privilege Manager (EPM) 's most valuable feature is its ability to manage user application privileges and protect against ransomware attacks by controlling access to specific files and applications."
"It identifies the original source, and all instances of malicious applications in the environment."
"Our setup process is moving to the cloud, which is very good. It reduces complexity."
"The most valuable feature is that their database is completely encrypted and protected with multiple layers."
"The most valuable feature is that their database is completely encrypted and protected with multiple layers."
"The most valuable feature is that it does lifecycle management and that it will change to whatever the end target is."
"It allows whitelisting."
"Their customer support was excellent."
"I like the tool's incident response and security patching."
"Tanium’s best features include support for any Windows, Linux, or Mac endpoint, regardless of where it is, and the ability to do IT operations and security operations."
"For incident response tasks, all these tasks can get done in minutes with minimal disruption to the end-user."
"Threat hunting is a very good feature on Tanium. We have just started using it and have not used it extensively."
"The most valuable features of this solution are the consolidation of all historical data on device endpoints, security drivers, firmware, and Software version gaps."
"The product is granular and can build complex roles compared to other EDR vendors."
"The solution's technical support is very responsive."
"Tanium is stable and it is also lightweight."
 

Cons

"If you do not have certification, you cannot send a ticket; this makes dealing with technical support difficult."
"We have had some major issues with the tool, but we have worked with the R&D teams and we have worked with support. There is room for improvement, especially on response times. But they're working on it and they're doing the best they can."
"The price of CyberArk Endpoint Privilege Manager is expensive."
"Can be improved by allowing computers to be excluded from policies."
"The price of the product is an area of concern where improvements are required. The product's price should be made more flexible."
"Despite newer versions and functionalities, CyberArk Endpoint Privilege Manager lacks sufficient knowledgeable support staff, resulting in longer wait times for assistance."
"Another enhancement needed is the scheduling of deployment, which I expect in future releases."
"My recommendation for improvement is to add functionality for when users request access to an application. There's a pop-up UI, but it's not very customizable. I suggest creating a UI where we can write scripts or use SDKs to enhance it. This could automatically create tickets in a system like ServiceNow when users request an application. If a manager approves, we could automatically push policies to those users."
"The problem or challenge is a pre-sales and go-to strategy for the SMB market delivered through a channel or model. It's very convoluted and vague, which leads to some confusion about the various types of modules, and the device-to-seat cost is extremely difficult to calculate."
"The main issues are the network connection because different customers have issues with their networks. It's difficult implementing this type of solution because the network is the main feature in the architecture for these types of solutions. Tanium could improve by creating some network optimization."
"When working with Tanium, there are some older devices that haven't been patched for a long time, and certain patches are not included in Tanium."
"I would like to have more integrations and custom plugins to input. Integration is always a big deal in a lot of different environments."
"We had some issues with the solution's OS upgrade."
"I would like to have more integrations and custom plugins to input."
"It is not really additional functions, or the features that are needed, rather the complexity would be reduced based on the number of modules required to put together a comprehensive operational security and risk compliance model."
"Our biggest issue with the solution is its lack of mobility."
 

Pricing and Cost Advice

"CyberArk Endpoint Privilege Manager has a very high price, so it's a one out of ten for me in terms of pricing."
"The tool is priced high. I would rate its pricing an eight out of ten."
"The professional services for one eight-hour day would be $1,800."
"We pay about $17 per user."
"I feel that the price of the product is nominal. It must be around 10 to 15 USD per installation. I rate the product price an eight to nine out of ten, where one is high price, and ten is low price."
"I believe it's quite a reasonably priced solution. It's not very common to use CyberArk because it's a niche solution, but customers who are willing to control administrative accounts are willing to pay this money."
"The solution's pricing is reasonable compared to other vendors' products."
"The solution requires an annual license to use it. There can be some extra costs in some cases."
"It is higher than some competitors in the market."
"The solution offers value for money."
"The product's pricing differs from region to region depending on negotiations and the number of endpoints."
"Tanium is a more expensive solution in Latin America than some of the competitors, such as BigFix."
"The solution is expensive but it's a good investment."
"It's an expensive solution. It would be nice if the cost were lower."
"There is an annual license required to use this solution."
report
Use our free recommendation engine to learn which Privileged Access Management (PAM) solutions are best for your needs.
893,438 professionals have used our research since 2012.
 

Top Industries

By visitors reading reviews
Financial Services Firm
14%
Manufacturing Company
11%
Computer Software Company
7%
Government
7%
Financial Services Firm
15%
Government
11%
Manufacturing Company
9%
Healthcare Company
7%
 

Company Size

By reviewers
Large Enterprise
Midsize Enterprise
Small Business
By reviewers
Company SizeCount
Small Business18
Midsize Enterprise9
Large Enterprise19
By reviewers
Company SizeCount
Small Business8
Midsize Enterprise3
Large Enterprise12
 

Questions from the Community

Looking for recommendations and a pros/cons template for software to detect insider threats
This is an inside-out --- outside-in --- inside-in question, as an insider can be an outsider as well. There is no short answer other than a blend of a PAM tool with Behavioral Analytics and Endpo...
What do you like most about CyberArk Endpoint Privilege Manager?
The most valuable feature of the solution is its performance.
What is your experience regarding pricing and costs for CyberArk Endpoint Privilege Manager?
I believe it's quite a reasonably priced solution. It's not very common to use CyberArk because it's a niche solution, but customers who are willing to control administrative accounts are willing t...
What needs improvement with Tanium?
While there is always room for improvement, I am pleased with Tanium.
What is your primary use case for Tanium?
The primary use case for Tanium ( /products/tanium-reviews ) is compliance, patching, and inventory as part of the core functions.
What advice do you have for others considering Tanium?
For smaller companies, Tanium is quite a big investment, and one needs to have a considerable setup to make it economically viable. I would recommend it to others with a similar use case. The solut...
 

Also Known As

Viewfinity
Tanium Inc Cloud, Tanium XEM
 

Overview

 

Sample Customers

Information Not Available
JPMorgan Chase, eBay, Amazon, US Bank, MetLife, pwc, Cerner, Delphi, MGM Grand, New York Life
Find out what your peers are saying about CyberArk Endpoint Privilege Manager vs. Tanium and other solutions. Updated: May 2022.
893,438 professionals have used our research since 2012.