We are implementing this product to control the Privilege account. For example, from a Cyber Privilege account, we just want to know what the user is doing and how to control it. We use it for security and monitoring.
Network Security & Data Management Admin at Digitaltrack
The department management is the most valuable feature
Pros and Cons
- "The department management aspect of the solution is the most valuable aspect."
- "Technical support is slow to respond when we run into issues."
What is our primary use case?
What is most valuable?
The department management aspect of the solution is the most valuable aspect.
The screen the color options are very good.
The solution does a good job of assisting with the monitoring of users.
Basic integrations of users are very straightforward. It's easy to assign them the rules, et cetera.
What needs improvement?
Technical support is slow to respond when we run into issues.
We haven't really faced too many issues so far. There are some small issues here and there, however, it hasn't been anything major.
We've faced some delays in tax reporting.
When you're trying to integrate the other products, there are some workarounds which we have to do. We'd like the integration of security to be easier.
We expected it to be very easy for the people who are deploying and managing the product, however, that isn't necessarily the case.
For how long have I used the solution?
We've only been dealing with the solution for about a year or so. It's a somewhat recent addition to the company.
Buyer's Guide
CyberArk Endpoint Privilege Manager
September 2025

Learn what your peers think about CyberArk Endpoint Privilege Manager. Get advice and tips from experienced pros sharing their opinions. Updated: September 2025.
868,787 professionals have used our research since 2012.
What do I think about the stability of the solution?
The product has a very stable history. I've not heard of any issues. There doesn't seem to be problems with bugs or glitches. It doesn't crash or freeze. Any issue we've had has been extremely minor. It's reliable.
What do I think about the scalability of the solution?
The solution is scalable, even though we have had some difficulties here and there. We had a client who purchased an extra 50 licenses and we faced some complications around that, however, it did end up working out just fine in the end.
How are customer service and support?
Technical support does not cause us issues. They are supporting us just fine. Presently, they are very good.
That said, reaching them is a bit of a problem. It's complicated. It can take a lot of time. I don't know where the delay is happening, or why, yet, often, when we reach out, we have trouble.
Otherwise, they are very good and very capable. We are mostly satisfied with their level of support.
How was the initial setup?
I did not handle the installation myself. I have done one recently, however, I did it with the assistance of our distributor. As I've only ever done one implementation personally, it's hard to comment on the process. I'm still quite new to it.
What about the implementation team?
We can implement the solution for our clients. I myself have recently handled my first implementation, and I did that with the help of our distributor.
What's my experience with pricing, setup cost, and licensing?
I'm more on the technical side. I don't typically deal with the pricing of products. I can't speak to the licensing, how it works, or how much it costs. That's handled by a different team.
Which other solutions did I evaluate?
We have tried other products. We have tried, for example, BeyondTrust, and the MicroFocus Time Solution. However, neither was what we expected and therefore we need up coming back to CyberArk.
What other advice do I have?
We are resellers and an implementor of the solution.
I'd rate the solution at a nine out of ten.
Product-wise we don't face that many issues, and basic integration of users and assigning them the rules and other stuff like that is, compared to other options, very straightforward.
Which deployment model are you using for this solution?
On-premises
Disclosure: My company has a business relationship with this vendor other than being a customer. reseller
Enterprise Cyber Security Advisor at a energy/utilities company with 5,001-10,000 employees
Enables us to see how users use their access and lock down things that aren't appropriate
Pros and Cons
- "It has drastically reduced the attack surface for local administrative rights and the chance of escalation of privilege. We've removed, at this point, close to 98 percent of the local administrative accounts on workstations. If there were an incident, it would stop at that point and we'd be able to know."
- "We have had some major issues with the tool, but we have worked with the R&D teams and we have worked with support. There is room for improvement, especially on response times. But they're working on it and they're doing the best they can."
How has it helped my organization?
Day-to-day, normally when administrative access is required for a user, they have a UAC prompt that comes up and they have to click yes or no. When we whitelist an application, it automatically elevates, so it's one less click for the user. It's improving efficiency and it's making it easier for them, at the end of the day.
The tool has great functionality in reducing risk in the environment, especially if an endpoint is compromised. It reduces pass-the-hash and same-account harvesting. And if something were to happen, we would be able to report on that right away and let the SOC know.
In terms of removing local admin credentials on the endpoint and the effect on the size of the attack surface in our organization, it has drastically reduced the attack surface for local administrative rights and the chance of escalation of privilege. We've removed, at this point, close to 98 percent of the local administrative accounts on workstations. If there were an incident, it would stop at that point and we'd be able to know.
We have also been able to reduce the number of local admins. We originally scoped out to only have a certain number of licenses for the software and we have reduced it significantly from what we thought we would need, purely based on a policy perspective and who actually really needs some administrative access.
What is most valuable?
With conventional local administrative access, you have no insight into how users are using that access. With Endpoint Privilege Manager, we have the ability to see how they're using that and then lock down things that aren't appropriate or are not allowed in our company.
At scale, in an enterprise environment, it's very easy to start installing agents on multiple workstations. So if we need to deploy to several thousand more workstations, we will have the ability to do that.
So far, there are a lot of integrations we are using. We are sending logs to a SIEM. We are working with AD to make sure that we are provisioning roles properly at that point. That's where we've left it.
What needs improvement?
If we look at the Privilege Management Inbox, we get a lot of information on what's happening right then and now. But if we would able to filter it down based on a role group or an AD group to say, "Give me all the actions run by this specific AD group," it would be very easy to scope out access for different roles.
What do I think about the stability of the solution?
Overall, the ability on the endpoint is very good for the user. It can be used online and offline. As for the administrative console, there's room for improvement and that is something we've already escalated. We've worked with the R&D teams to address those issues.
What do I think about the scalability of the solution?
Scaling is easy. If you want to put it out on more endpoints, if you need thousands of more workstations, it's very easy to do. CyberArk has easy guidelines on how you should be sizing your infrastructure.
How are customer service and technical support?
Overall, I would rate technical support at seven out of 10. We have had some major issues with the tool, but we have worked with the R&D teams and we have worked with support. There is room for improvement, especially on response times. But they're working on it and they're doing the best they can.
Which solution did I use previously and why did I switch?
We did not have a previous solution. However, we knew that there is a large attack surface in the event that we were to be compromised or fished. We knew that there was a vulnerability and we said, "Okay, we want to get it in front of this so we're not Equifax or CapitalOne or something like that."
How was the initial setup?
It was a pretty straightforward setup. CyberArk does support the documentation for it. We did customize it a little bit more for high-availability. If a server were to go down, we can automatically switch. So overall, it's quite easy to set up, but you can always customize a little bit more.
What was our ROI?
I don't think I could quantify ROI, to be honest. Reducing risk is always something that is going to cost you. But when it comes to share price, stock price, etc., if a breach were to occur that would have huge implications.
What other advice do I have?
If you're going to implement Endpoint Privilege Manager, don't just give everybody EPM and think you're done with it. Spend the time, engineer it, think about it from a project perspective, and deploy it with the concept of least privilege. Really spend the time to make sure it's deployed correctly and all the processes are established so it's smooth sailing from there on in.
Overall, I would rate this product at 8.5 out of 10. The product does exactly what we need it to do. However, we do need a little bit more action and response time with regards to support.
In terms of the effect working with CyberArk has had on my career, it has really put my name on the map with regards to the whole CSO world and IT security, as well as from our company-wide, holistic perspective. People come to me; they know me as the person who will solve problems. Usually, things are very difficult, but at the end of the day, we'll find a solution and implement it. From that perspective, it's giving me a lot more opportunities.
Disclosure: PeerSpot contacted the reviewer to collect the review and to validate authenticity. The reviewer was referred by the vendor, but the review is not subject to editing or approval by the vendor.
Buyer's Guide
CyberArk Endpoint Privilege Manager
September 2025

Learn what your peers think about CyberArk Endpoint Privilege Manager. Get advice and tips from experienced pros sharing their opinions. Updated: September 2025.
868,787 professionals have used our research since 2012.
Tech Support at a tech services company with 11-50 employees
DNS Scanning allows for the reporting of account location information
Pros and Cons
- "This is the number one product for privilege account security."
- "For an experienced system implementer it will take approximately one day. However, for somebody who is inexperienced it may take up to five days."
What is our primary use case?
Our primary use case for this solution is to manage enterprise passwords and monitor session connections.
How has it helped my organization?
Prior to using this solution, we did not know where our accounts were being created. The DNS scanning is a very good tool that allows us to manage existing accounts.
What is most valuable?
While I find all of the features valuable, one of them that stands out is the DNS scanning. This provides information with respect to the locations of accounts that are created. We then get an overview of the location information.
What needs improvement?
What I would really like to see improved is the AIM (Application Identity Manager). I think that it could be simpler to use, and much more straight forward.
In terms of additional features, I cannot think of any that I would like to see implemented at the moment.
For how long have I used the solution?
Three to five years.
What do I think about the stability of the solution?
I find the product to be very stable.
What do I think about the scalability of the solution?
This product is very, very scalable. Currently we have about one hundred users, and we have plans to increase the usage.
How are customer service and technical support?
I found the technical support to be good. They are always available and ready to answer questions and provide support.
Which solution did I use previously and why did I switch?
No, beyond evaluating other solutions we did not use a different one.
How was the initial setup?
I found the initial setup to be quite complex. You really have to pay attention to detail during the process, because any mistake will render the installation and setup useless.
For an experienced system implementer it will take approximately one day. However, for somebody who is inexperienced it may take up to five days.
Once the deployment is complete, no staff is required for maintaining the solution. Everything is pretty much straight forward.
What about the implementation team?
We take care of the implementation for our customers.
What was our ROI?
We have indeed seen a return on investment with this solution. I cannot put a monetary value on it, but it is valuable information that we are protecting. If it were to be leaked then it would result in damage to reputation, as well as a loss in confidence.
What's my experience with pricing, setup cost, and licensing?
As I am the technical contact for this product, I do not have direct knowledge of the pricing. However, I can say that the licensing for this solution is based on the number of APV (privileged users), and the number of sessions that you want to record.
Which other solutions did I evaluate?
Yes, we evaluated three other products before choosing this one. They were Security from CA, BeyondTrust, and ObserveIT.
What other advice do I have?
This is the number one product for privilege account security.
I suggest getting the best help available when it comes time to implement and deploy this solution. Once this is complete, everything else will fall into place.
I would rate this product eight out of ten. It is very good, but there is always room for improvement.
Disclosure: My company does not have a business relationship with this vendor other than being a customer.
Information Security Senior Engineer at a tech vendor with 10,001+ employees
It identifies the original source, and all instances of malicious applications in the environment.
Valuable Features
It has removed the need for the local admin.
Improvements to My Organization
It identifies the original source, and all instances of malicious applications in the environment.
Room for Improvement
Some technical admins create crazy rules, which allow the staff to run anything they want. Currently I'm reviewing our Viewfinity rules and I have noticed different kinds of rules, such as permitting any installation from "download folder." I would suggest that Viewfinity add a new feature which refuses these rules.
Use of Solution
I've used it for four years.
Deployment Issues
There have been no issues with the deployment.
Stability Issues
There have been no issues with its stability.
Scalability Issues
There have been no issues with the scalability.
Customer Service and Technical Support
Customer Service:
9/10
Technical Support:8/10
Initial Setup
It was complex to introduction the product to the end-users and the technical team.
ROI
We have better product management, review, and the training of our admins.
Other Solutions Considered
We're comparing Viewfinity to Bit9.
Other Advice
Keep the product managed by specialists and create global rules.
Disclosure: My company does not have a business relationship with this vendor other than being a customer.
Regional Product Manager at a tech services company with 501-1,000 employees
Has an easy initial setup process, but it could be more affordable
Pros and Cons
- "The solution's technical support is good."
- "The solution's pricing could be better."
What needs improvement?
The solution's pricing could be better.
For how long have I used the solution?
I have been working with the solution for about six years.
How are customer service and support?
The solution's technical support is good. We have a team of qualified and certified support engineers.
How was the initial setup?
The solution's initial setup process is straightforward.
What's my experience with pricing, setup cost, and licensing?
It is an expensive solution.
What other advice do I have?
I rate the solution a seven out of ten.
Disclosure: My company has a business relationship with this vendor other than being a customer. Distributor
Channel Sales Manager at Cyber Knight Technologies FZ LLC
A solid enterprise product with good PAM vault
Pros and Cons
- "I am impressed with the product's seamless integration. The PAM wallet and enterprise password wallet are good also good."
- "The tool should be more user-friendly."
What is our primary use case?
We use the solution as a Privilege Access Manager to manage user's passwords.
What is most valuable?
I am impressed with the product's seamless integration. The PAM wallet and enterprise password wallet are good also good.
What needs improvement?
The tool should be more user-friendly.
For how long have I used the solution?
I have been using the product for one year.
What do I think about the stability of the solution?
The solution is stable.I would rate it an eight out of ten.
What do I think about the scalability of the solution?
The product is scalable. I would rate it an eight out of ten. There are about 35 users for the solution in my company. The users are mostly sales managers.
How are customer service and support?
The product's technical support is only average. They need to improve their response time.
How would you rate customer service and support?
Neutral
Which solution did I use previously and why did I switch?
I have used ARCON before. It is not as user-friendly compared to CyberArk. CyberArk has got more visibility compared to ARCON.
How was the initial setup?
The product's setup was complex. I would rate its setup a seven out of ten. The tool's architecture is difficult. The product's deployment takes one to two months to complete.
What's my experience with pricing, setup cost, and licensing?
The tool is priced high. I would rate its pricing an eight out of ten.
What other advice do I have?
I would rate the product an eight out of ten. The tool's performance is good. It is an enterprise product.
Disclosure: My company has a business relationship with this vendor other than being a customer.
Product Consultant at M.Tech
High performance levels, reliable, and secure
Pros and Cons
- "The most valuable feature of CyberArk Endpoint Privilege Manager is its high performance, it's the best identity security platform. The security is good. It's easy to showcase the feature and capabilities and compare it with other competitors. It competes well with other solutions. Additionally, it is a complete solution."
- "The solution can be complex to use at times."
What is our primary use case?
There are a lot of companies that have servers that want to monitor their members if they do something that violates their policy.
What is most valuable?
The most valuable feature of CyberArk Endpoint Privilege Manager is its high performance, it's the best identity security platform. The security is good. It's easy to showcase the feature and capabilities and compare it with other competitors. It competes well with other solutions. Additionally, it is a complete solution.
What needs improvement?
The solution can be complex to use at times.
CyberArk Endpoint Privilege Manager has a lot of integrated APIs. Some of them are outdated and could be improved.
For how long have I used the solution?
I have been using CyberArk Endpoint Privilege Manager for approximately one year.
What do I think about the stability of the solution?
I rate the stability of CyberArk Endpoint Privilege Manager a seven out of ten.
What do I think about the scalability of the solution?
I rate the scalability of CyberArk Endpoint Privilege Manager a seven out of ten.
How are customer service and support?
The support from CyberArk Endpoint Privilege Manager is good.
How was the initial setup?
The initial setup of CyberArk Endpoint Privilege Manager can be complex. It took approximately six hours to complete the installation.
I rate the initial setup of CyberArk Endpoint Privilege Manager a seven out of ten.
What's my experience with pricing, setup cost, and licensing?
The solution requires an annual license to use it. There can be some extra costs in some cases.
What other advice do I have?
I would recommend this solution to others.
I rate CyberArk Endpoint Privilege Manager a nine out of ten.
Disclosure: My company has a business relationship with this vendor other than being a customer. Reseller

Buyer's Guide
Download our free CyberArk Endpoint Privilege Manager Report and get advice and tips from experienced pros
sharing their opinions.
Updated: September 2025
Product Categories
Privileged Access Management (PAM) Endpoint Compliance Anti-Malware Tools Application Control Ransomware ProtectionPopular Comparisons
Microsoft Defender for Endpoint
SentinelOne Singularity Complete
CyberArk Privileged Access Manager
Cortex XDR by Palo Alto Networks
Fortinet FortiClient
Check Point Harmony Endpoint
Kaspersky Endpoint Security for Business
Trend Vision One Endpoint Security
VMware Carbon Black Endpoint
Delinea Secret Server
ThreatLocker Zero Trust Endpoint Protection Platform
BeyondTrust Endpoint Privilege Management
WALLIX Bastion
Ivanti Endpoint Security for Endpoint Manager
ManageEngine PAM360
Buyer's Guide
Download our free CyberArk Endpoint Privilege Manager Report and get advice and tips from experienced pros
sharing their opinions.
Quick Links
Learn More: Questions:
- When evaluating Privileged Identity Management, what aspect do you think is the most important to look for?
- How was the 2020 Twitter Hack carried out? Could it have been prevented?
- Which is the best Privileged Account Management solution?
- What are the top 5 PAM solutions that can be implemented which cover both hybrid and cloud?
- What are the top 5 PAM solutions?
- How will AI and ML help or work with PIM/PAM?
- Is BeyondTrust Endpoint Privilege Management really expensive compared to other tools or software?
- What is the difference between PAM and PAS?
- What is the difference between IDAM , PIM and PAM?
- Which PAM tool do you prefer: CyberArk Privileged Access Manager, One Identity Safeguard, Delinea Secret Server, or BeyondTrust Privileged Remote A
Thank you for the review!