Try our new research platform with insights from 80,000+ expert users
CyberArk Endpoint Privilege Manager Logo

CyberArk Endpoint Privilege Manager pros and cons

Vendor: CyberArk
4.1 out of 5

Pros & Cons summary

Buyer's Guide

Get pricing advice, tips, use cases and valuable features from real users of this product.
Get the report

Prominent pros & cons

PROS

CyberArk Endpoint Privilege Manager offers excellent performance and high scalability, making it an industry-leading choice for privilege account security.
It effectively reduces the attack surface by limiting local administrative accounts and preventing privilege escalation, achieving reduced privileged account numbers by up to 98%.
CyberArk Endpoint Privilege Manager enhances security by encrypting databases, managing user application privileges, and controlling access to specific files and applications, protecting against ransomware attacks and unauthorized activities.
The implementation of CyberArk Endpoint Privilege Manager has led to significant improvements in security posture, with a positive impact on preventing virus incidents and stopping users from downloading unwanted applications.
Its ability to offer granular control over user privileges, allowing tailored access management, bridges the gap between security and operations teams without affecting operational efficiency.

CONS

Installation can be complex, especially for those without experience, possibly taking up to five days.
Technical support is slow, resulting in significant delays when resolving issues.
CyberArk Endpoint Privilege Manager only supports cloud deployment, which can limit usage for some organizations.
The performance of CyberArk Endpoint Privilege Manager is lacking, with noted issues in various environments.
The pricing of CyberArk Endpoint Privilege Manager is considered expensive and could be improved.
 

CyberArk Endpoint Privilege Manager Pros review quotes

UU
Tech Support at a tech services company with 11-50 employees
Mar 3, 2019
This is the number one product for privilege account security.
WG
Enterprise Cyber Security Advisor at a energy/utilities company with 5,001-10,000 employees
May 19, 2020
It has drastically reduced the attack surface for local administrative rights and the chance of escalation of privilege. We've removed, at this point, close to 98 percent of the local administrative accounts on workstations. If there were an incident, it would stop at that point and we'd be able to know.
PS
Enterprise Architect at a tech services company with 11-50 employees
Oct 22, 2020
The most valuable feature is that it does lifecycle management and that it will change to whatever the end target is.
Learn what your peers think about CyberArk Endpoint Privilege Manager. Get advice and tips from experienced pros sharing their opinions. Updated: January 2026.
881,082 professionals have used our research since 2012.
Ebenezer D - PeerSpot reviewer
Network Security & Data Management Admin at Digitaltrack
Mar 29, 2021
The department management aspect of the solution is the most valuable aspect.
reviewer1614768 - PeerSpot reviewer
IT Security Service Specialist at a manufacturing company with 10,001+ employees
Jun 30, 2021
I like that you can remove the admin rights from the user's computer and have control over the environment. That means you can delete the local admins and grant them proper privileges with the console. So, they will get proper permissions for applications they need, but we don't have to do it. In the domain where we don't have control, the user can only do specified actions, but not all of them.
PH
Manager at a computer software company with 1,001-5,000 employees
May 5, 2022
The most valuable feature is that their database is completely encrypted and protected with multiple layers.
TB
Professional Services Manager at PT Korelasi Persada Indonesia
Jul 31, 2022
The most valuable feature of CyberArk Endpoint Privilege Manager is its ability to reset passwords every time that it is needed or periodically.
AI
Technical Manager at Gulf IT
Oct 6, 2022
It offers great performance.
IkeEkweruo - PeerSpot reviewer
Sr. PAM Consultant at a tech vendor with 11-50 employees
Oct 21, 2022
You can use it to strip users of their local admin rights and, at the same time, elevate applications for them.
reviewer1268721 - PeerSpot reviewer
Senior Consultant at a consultancy with 51-200 employees
Nov 11, 2022
The most valuable features of CyberArk Endpoint Privilege Manager are password management, session management, onboarding rules, platform customization, and safety management.
 

CyberArk Endpoint Privilege Manager Cons review quotes

UU
Tech Support at a tech services company with 11-50 employees
Mar 3, 2019
For an experienced system implementer it will take approximately one day. However, for somebody who is inexperienced it may take up to five days.
WG
Enterprise Cyber Security Advisor at a energy/utilities company with 5,001-10,000 employees
May 19, 2020
We have had some major issues with the tool, but we have worked with the R&D teams and we have worked with support. There is room for improvement, especially on response times. But they're working on it and they're doing the best they can.
PS
Enterprise Architect at a tech services company with 11-50 employees
Oct 22, 2020
It's an old product and has many areas that can be improved.
Learn what your peers think about CyberArk Endpoint Privilege Manager. Get advice and tips from experienced pros sharing their opinions. Updated: January 2026.
881,082 professionals have used our research since 2012.
Ebenezer D - PeerSpot reviewer
Network Security & Data Management Admin at Digitaltrack
Mar 29, 2021
Technical support is slow to respond when we run into issues.
reviewer1614768 - PeerSpot reviewer
IT Security Service Specialist at a manufacturing company with 10,001+ employees
Jun 30, 2021
Performance could be better. We have a couple of problems with CyberArk right now. One of the problems is performance in our environment. Support also takes a long time to respond. If the user already has local admin rights, then I can't collect any events in the console from this device. There are also some options in CyberArk that are not working properly, and are not helpful in this case. I can't collect any information to create a proper policy for the device. I have to investigate everything manually, or even disable the local admin from the device. I can collect the events only after this, and it's very time consuming. In my case, it's a waste of resources.
PH
Manager at a computer software company with 1,001-5,000 employees
May 5, 2022
Compared to other tools like Linux, this solution isn't as user-friendly.
TB
Professional Services Manager at PT Korelasi Persada Indonesia
Jul 31, 2022
CyberArk Endpoint Privilege Manager is not suitable for the current situation because when you compare it to OTP, OTP is the strongest password solution. You can use it as a one-time password, but you have to log into the password manager itself and if you don't change your password, it will be the weakest link in the security. In OTP, you don't have that weakest link.
AI
Technical Manager at Gulf IT
Oct 6, 2022
It cannot be on-prem. It is only cloud-based. Sometimes, that's a restriction in terms of usage.
IkeEkweruo - PeerSpot reviewer
Sr. PAM Consultant at a tech vendor with 11-50 employees
Oct 21, 2022
Can be improved by allowing computers to be excluded from policies.
reviewer1268721 - PeerSpot reviewer
Senior Consultant at a consultancy with 51-200 employees
Nov 11, 2022
The price of the solution should improve.