We performed a comparison between CyberArk Privileged Access Manager and Symantec Advanced Threat Protection based on real PeerSpot user reviews.
Find out in this report how the two Privileged Access Management (PAM) solutions compare in terms of features, pricing, service and support, easy of deployment, and ROI."The most valuable feature is that it always provides flexibility, password quality and one-time user check-in and check-out."
"It is scalable."
"The solution is stable."
"Enterprise Password Vault, Privilege Session Manager, and Application Identity Management have been very useful for our client environment."
"I'm no longer the product owner for PAM, but I can say that the most useful feature is the vault functionality, which keeps all your passwords secure in a digital vault."
"I found it valuable that CyberArk Privileged Access Manager can be integrated with PTA (privileged threat analytics), and this means that it will tell you if there's a risk to the logins and signs of risk and if risky behavior is observed. It's a good feature. Another good feature is the CPM (central password manager) because it helps you rotate the passwords automatically without involving the admins. It can go and update the scheduled tasks and the services. At the same time, if there's an application where it cannot do all of these, CPM will trigger an automatic email to the application owners, telling them that they should go ahead and change the password. This allows you to manage the account password that CyberArk cannot manage, which helps mitigate the risk of old passwords, where the password gets compromised, and also allows you to manage the security of the domain."
"It allows users to self-provision access to the accounts that they need."
"AIM has been a great help in automating password retrieval which removes the need for hard-coded credentials."
"Endpoint to network protects the line."
"Technical support is very responsive. You just have to open a ticket. They respond in a timely manner. Their response is good. I'm satisfied."
"Technical support has been helpful and responsive."
"The Application Control code and the easy integration are valuable features."
"Currently we have 800-plus nodes connected with this solution, without any issues. The solution is scalable."
"The most valuable feature is NetFlow threat protection."
"Real-time threat analysis is quick and takes action on threats immediately."
"The great advantage in using this product is it creates multiple services."
"CyberArk has a lot on the privileged access side but they have to concentrate more on the application side as well."
"One thing that could be improved is to create of a better alternative for fixing group policy fees. We currently use Microsoft, but they have introduced new policies that may not be compatible."
"The current user interface is a little dated. However, I hear there are changes coming in the next version."
"There is room for improvement in the pricing model."
"The product is very vaulting-focused. I'd love to see it expanding its capabilities a bit further into areas like just-in-time elevation, and access with non-vaulted credentials."
"The initial setup of CyberArk Privileged Access Manager difficulty depends on the environment that you are implementing it into. However, it typically is simple."
"We had an issue with the Copy feature... Apparently, in version 10, that Copy feature does not work. You actually have to click Show and then copy the password from within Show and then paste it. We've had a million tickets and we had to figure out a workaround to it."
"For users to access a system via CyberArk Privileged Session Manager, a universal connector needs to be coded in a language called AutoIT and its support for web browsers is so-so. Other products like Centrify have browser plugins that can help automate the process when using their products."
"An improvement could be made on the reporting because then it would be easier to collect information and submit it for compliance."
"The security features need to be improved."
"It's a strange situation where the infrastructure of the consumer or customer is behind some kind of firewall and they have always used some kind of customized proxy. In this situation, the ATP has a very tough time to pass the information to the cloud and back. To fix, it requires a more elaborate and complex configuration for that particular case."
"There are some features that would add value to this product. One of them would be a graphical presentation of threats that the system has encountered."
"Scalability could be better."
"It should be able to collect information if the agent is disabled."
"The cloud platform needs to have improvement in terms of the user interface and the different capabilities it has available. It needs to match the other leading next-gen EDR products that are available in the market. That's the reason why we are stepping away from Symantec. Their cloud environment is just generally lacking in comparison to others."
"The product's support services need improvement."
More CyberArk Privileged Access Manager Pricing and Cost Advice →
More Symantec Advanced Threat Protection Pricing and Cost Advice →
CyberArk Privileged Access Manager is ranked 1st in Privileged Access Management (PAM) with 144 reviews while Symantec Advanced Threat Protection is ranked 21st in Advanced Threat Protection (ATP) with 14 reviews. CyberArk Privileged Access Manager is rated 8.8, while Symantec Advanced Threat Protection is rated 7.8. The top reviewer of CyberArk Privileged Access Manager writes "Lets you ensure relevant, compliant access in good time and with an audit trail, yet lacks clarity on MITRE ATT&CK". On the other hand, the top reviewer of Symantec Advanced Threat Protection writes "Provides end-to-end antivirus protection and has good stability ". CyberArk Privileged Access Manager is most compared with Cisco ISE (Identity Services Engine), Microsoft Entra ID, Delinea Secret Server, WALLIX Bastion and One Identity Safeguard, whereas Symantec Advanced Threat Protection is most compared with Palo Alto Networks WildFire, Check Point SandBlast Network, Microsoft Defender for Office 365, Trellix Network Detection and Response and Fortinet FortiSandbox. See our CyberArk Privileged Access Manager vs. Symantec Advanced Threat Protection report.
We monitor all Privileged Access Management (PAM) reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.