Try our new research platform with insights from 80,000+ expert users

CyberArk Privileged Access Manager vs Symantec Advanced Threat Protection comparison

 

Comparison Buyer's Guide

Executive Summary

Review summaries and opinions

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
 

Categories and Ranking

CyberArk Privileged Access ...
Average Rating
8.6
Reviews Sentiment
6.8
Number of Reviews
229
Ranking in other categories
User Activity Monitoring (1st), Enterprise Password Managers (3rd), Privileged Access Management (PAM) (1st), Mainframe Security (2nd), Operational Technology (OT) Security (3rd)
Symantec Advanced Threat Pr...
Average Rating
7.8
Reviews Sentiment
7.1
Number of Reviews
16
Ranking in other categories
Advanced Threat Protection (ATP) (21st)
 

Mindshare comparison

While both are Network Security Systems solutions, they serve different purposes. CyberArk Privileged Access Manager is designed for Privileged Access Management (PAM) and holds a mindshare of 11.6%, down 20.0% compared to last year.
Symantec Advanced Threat Protection, on the other hand, focuses on Advanced Threat Protection (ATP), holds 1.9% mindshare, up 1.6% since last year.
Privileged Access Management (PAM) Market Share Distribution
ProductMarket Share (%)
CyberArk Privileged Access Manager11.6%
WALLIX Bastion5.1%
Delinea Secret Server5.0%
Other78.3%
Privileged Access Management (PAM)
Advanced Threat Protection (ATP) Market Share Distribution
ProductMarket Share (%)
Symantec Advanced Threat Protection1.9%
Microsoft Defender for Office 3659.7%
Palo Alto Networks WildFire7.6%
Other80.8%
Advanced Threat Protection (ATP)
 

Featured Reviews

SI
Senior PAM Consultant at iC Consult GmbH
Makes privileged access management easy with automation and granular control
Many people underestimate the value of these tools because they treat them as simple automated password management. Once you realize the volume of passwords in your organization and factor in nonhuman passwords, you realize its value. Last year, CyberArk Impact cited 45 nonhuman passwords for every human password. If you have 10,000 employees, you can imagine the number of passwords. There are also many other operations. For example, you have a Qualys scanner that needs to reach out and touch all your endpoints and scan them for vulnerabilities. They use an API call to CyberArk to pull out a Privileged credential that allows them to log in to that target. This is an automated machine call. It is tapping into CyberArk to get that credential. There can be hundreds of thousands of those operations a day. You do not want to manage those passwords by hand. Some people marginalize the significance of such a solution by saying that it is just a fancy password changer. It goes well beyond that, especially with API calls and automation. Its importance extends beyond merely changing passwords; it involves automation, API calls, and process integration, crucial in agile environments for standing up new Amazon servers or other processes needing privileged credentials. CyberArk can automate these tasks into their build processes. Another critical feature is the proxy service via Privileged Session Manager (PSM), providing not only a proxy between your user and the target servers, protecting against malware but also offering session recording. Many companies I have worked with implemented a PAM product as a knee-jerk reaction to SOX audit requirements. They discovered they needed session recording and retention for regulatory compliance. This has become a major factor for clients instituting CyberArk, so PSM is a big deal in addition to regular password rotation.
TapabrataSamanta - PeerSpot reviewer
Lead Architect at Zones
Reliable platform with effective integration capabilities
Our primary use case for the product is to provide advanced threat protection to our clients, primarily in the banking and financial sectors Symantec ATP has been beneficial in ensuring robust security for our clients. Its effectiveness in detecting and mitigating threats has improved customer…

Quotes from Members

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
 

Pros

"The whole concept of Zero Trust and implementing it with CyberArk, which somewhat adheres to the 'never trust, always verify' principle, is very valuable. I really appreciate this aspect. Moreover, the just-in-time access is impressive, allowing access for a specific time."
"The accounts are maintained automatically. Hence, resource and administration costs are less."
"The most valuable feature is that it always provides flexibility, password quality and one-time user check-in and check-out."
"It has the ability to scale out. We have scaled out quite a bit with our product and use of it to get to multiple locations and businesses, so it has the breadth to do that."
"CyberArk Privileged Access Manager assists in meeting compliance and regulatory requirements such as HIPAA and SOX, ensuring I adhere to necessary standards in my operations."
"CyberArk Privileged Access Manager has made our operations more streamlined."
"The feature that I like the most is the Privileged Session Manager. It offers session recordings, logging, and tracking of user workstreams."
"The solution helps our developers access internal systems. It also helps us in Privilege Access Management."
"They manage to solve detection quite nicely. There is some rather elaborate detection compared to other providers."
"Real-time threat analysis is quick and takes action on threats immediately."
"The most valuable feature is Click-time URL protection."
"The Application Control code and the easy integration are valuable features."
"You don't have to buy a separate email security platform. You can enable that using their endpoint, and I like that. You don't have to have two agents running on the same box."
"Currently we have 800-plus nodes connected with this solution, without any issues. The solution is scalable."
"Technical support is very responsive. You just have to open a ticket. They respond in a timely manner. Their response is good. I'm satisfied."
"The great advantage in using this product is it creates multiple services."
 

Cons

"We have had some performance and stability issues. We have had instances where things weren't as they should be, however, we worked closely with the development support teams once the issues were escalated and managed to find either a resolution or a workaround to stabilize the solution."
"They are sometimes not flexible with things. For instance, from one day to another, there might be something that had been done years ago by CyberArk, then they say, "We do not support that." You then have to initiate a complaint and start working with them. Things might become complicated and months pass while you are working with them. Usually, they are good and fast, but sometimes they seem to be blocked with problems, e.g., you will suddenly be working with another team instead of the team that you were working with the day before."
"CyberArk has brought a feature called Vendor Team Manager, but it does not provide full access. It requires the vendor team leader to be onboarded as a local account instead of using their email address. Improvements could be made to onboard the vendor team leaders using their email, allowing them to manage their own team. That would greatly reduce the overhead in managing vendor team members."
"One area for improvement is the user interface. It needs significant enhancements."
"Report creation could be improved. The policies could be more customized."
"The solution could improve by adding more connectors."
"This is probably a common thing, but they do ask for a lot of log files, a lot of information. They ask you to provide a lot of information to them before they're willing to give you anything at all upfront. It would be better if they were a little more give-and-take upfront: "Why don't you try these couple of things while we take your log files and stuff and go research them?" A little bit of that might be more helpful."
"The tool’s pricing and scalability can be better."
"It's a strange situation where the infrastructure of the consumer or customer is behind some kind of firewall and they have always used some kind of customized proxy. In this situation, the ATP has a very tough time to pass the information to the cloud and back. To fix, it requires a more elaborate and complex configuration for that particular case."
"The support has dropped down to a five out of ten."
"The product's support services need improvement."
"The cloud platform needs to have improvement in terms of the user interface and the different capabilities it has available. It needs to match the other leading next-gen EDR products that are available in the market. That's the reason why we are stepping away from Symantec. Their cloud environment is just generally lacking in comparison to others."
"Symantec appliances need improvement. The whole appliance environment is a robust system and it needs a massive amount of storage space. If you have to increase or speed up the background storage it's a pretty complicated process. The scalability and sizing is critical, and if you do it wrong you run into issues pretty quickly."
"The administration interface needs a lot of improvement. It should be UI based, and simple. They need to improve it. It's pretty much not that friendly compared to what we were using as Bitdefender before. It's okay but is improving, actually."
"Not ideal for advanced threat protection."
"Entire threat protection is not available for the advanced features."
 

Pricing and Cost Advice

"With reducing the privileged account access, there has been a huge improvement. They are now bringing more accounts on a little at a time."
"CyberArk Privileged Access Manager is on the expensive side. It is very expensive."
"If you are looking at implementing this solution, buy the training and go to it."
"It's not a cheap application. It's very expensive."
"The pricing is slightly higher compared to other solutions, but it is reasonable because there are better security features."
"Licensing fees are paid on a yearly basis."
"The license CyberArk Privileged Access Manager is on an annual basis."
"The price of the solution is reasonable."
"The price is quite expensive."
"Symantec Endpoint Protection has an average price."
"Pricing is good. It is nice to have a great product at a fair price."
"Symantec Advanced Threat Protection's pricing is comparable."
"The pricing of this solution is inexpensive and affordable."
report
Use our free recommendation engine to learn which Privileged Access Management (PAM) solutions are best for your needs.
881,114 professionals have used our research since 2012.
 

Top Industries

By visitors reading reviews
Financial Services Firm
15%
Manufacturing Company
10%
Computer Software Company
9%
Government
6%
University
9%
Manufacturing Company
9%
Financial Services Firm
9%
Insurance Company
6%
 

Company Size

By reviewers
Large Enterprise
Midsize Enterprise
Small Business
By reviewers
Company SizeCount
Small Business59
Midsize Enterprise40
Large Enterprise173
By reviewers
Company SizeCount
Small Business9
Midsize Enterprise3
Large Enterprise13
 

Questions from the Community

How does Sailpoint IdentityIQ compare with CyberArk PAM?
We evaluated Sailpoint IdentityIQ before ultimately choosing CyberArk. Sailpoint Identity Platform is a solution to manage risks in cloud enterprise environments. It automates and streamlines the m...
What do you like most about CyberArk Privileged Access Manager?
The most valuable features of the solution are control and analytics.
What is your experience regarding pricing and costs for CyberArk Privileged Access Manager?
My thoughts on the pricing of CyberArk Privileged Access Manager depend entirely on the vendors' requirements. If they want their things to be secure, they have to spend accordingly. We have four t...
What is your experience regarding pricing and costs for Symantec Advanced Threat Protection?
The price is quite expensive because a different entity has taken over the company.
What needs improvement with Symantec Advanced Threat Protection?
One area for improvement could be the pricing model. Future releases could further enhance integration capabilities with other platforms and simplify the licensing model to compete more with Micros...
What is your primary use case for Symantec Advanced Threat Protection?
Our primary use case for the product is to provide advanced threat protection to our clients, primarily in the banking and financial sectors.
 

Also Known As

CyberArk Privileged Access Security, CyberArk Enterprise Password Vault
No data available
 

Overview

 

Sample Customers

Rockwell Automation
ECI
Find out what your peers are saying about CyberArk Privileged Access Manager vs. Symantec Advanced Threat Protection and other solutions. Updated: September 2019.
881,114 professionals have used our research since 2012.