CyberArk Privileged Access Management vs. Netwrix Auditor

Overview
ProductRatingMost Used ByProduct SummaryStarting Price
CyberArk Privileged Access Management
Score 8.2 out of 10
N/A
CyberArk is a privileged account and access security suite issued by the company of the same name in Massachusetts . The Core Privileged Access Security Solution unifies Enterprise Password Vault, Privileged Session Manager and Privileged Threat Analytics to protect an organization’s most critical assets.N/A
Netwrix Auditor
Score 8.6 out of 10
N/A
Netwrix Auditor is designed to enable auditing of the broadest variety of IT systems, including Active Directory, Exchange, file servers, SharePoint, SQL Server, VMware and Windows Server. It also supports monitoring of privileged user activity in all other systems. According to the vendor, Netwrix Auditor eliminates these blind spots by delivering complete visibility into all changes to system configurations, content and permissions across the IT infrastructure. Moreover, Netwrix…N/A
Pricing
CyberArk Privileged Access ManagementNetwrix Auditor
Editions & Modules
No answers on this topic
No answers on this topic
Offerings
Pricing Offerings
CyberArk Privileged Access ManagementNetwrix Auditor
Free Trial
YesYes
Free/Freemium Version
NoNo
Premium Consulting/Integration Services
NoNo
Entry-level Setup FeeNo setup feeNo setup fee
Additional DetailsCyberArk offers a variety of Identity Security packages for different user types within an organization.
More Pricing Information
Community Pulse
CyberArk Privileged Access ManagementNetwrix Auditor
Considered Both Products
CyberArk Privileged Access Management
Chose CyberArk Privileged Access Management
I have not use any other product. CyberArk is the only one we've used in the past 4 yrs.
Netwrix Auditor

No answer on this topic

Top Pros

No answers on this topic

Top Cons

No answers on this topic

Best Alternatives
CyberArk Privileged Access ManagementNetwrix Auditor
Small Businesses

No answers on this topic

Oracle Audit Vault and Database Firewall
Oracle Audit Vault and Database Firewall
Score 7.0 out of 10
Medium-sized Companies
Delinea Secret Server
Delinea Secret Server
Score 8.7 out of 10
Oracle Audit Vault and Database Firewall
Oracle Audit Vault and Database Firewall
Score 7.0 out of 10
Enterprises
BeyondTrust Endpoint Privilege Management
BeyondTrust Endpoint Privilege Management
Score 8.7 out of 10
Oracle Audit Vault and Database Firewall
Oracle Audit Vault and Database Firewall
Score 7.0 out of 10
All AlternativesView all alternativesView all alternatives
User Ratings
CyberArk Privileged Access ManagementNetwrix Auditor
Likelihood to Recommend
8.0
(9 ratings)
8.2
(19 ratings)
Likelihood to Renew
-
(0 ratings)
8.0
(1 ratings)
Usability
-
(0 ratings)
8.0
(1 ratings)
Support Rating
7.2
(4 ratings)
8.6
(3 ratings)
Implementation Rating
-
(0 ratings)
7.0
(1 ratings)
User Testimonials
CyberArk Privileged Access ManagementNetwrix Auditor
Likelihood to Recommend
Cyberark
The system is great for enterprise or larger IT departments or teams where temporary or full access may be given using privileged IDs. Requirements for needing local admin access is also eliminated which can help with specific Windows workstation related tasks. It can be very useful when working with remote teams or contractors who may need temporary access to a system when required.
Read full review
Netwrix
Netwrix [Auditor] is a great tool for any SysAdmin no matter the company size. Licensing is determined by users, not employee count, and that makes it a great product from a small business to an enterprise application. The time savings coupled with the increased productivity is a key factor is determining this tool over other products.
Read full review
Pros
Cyberark
  • Automatically discover new servers on the network and take control of the local admin password by vaulting it and ensuring nobody knows the password. A different password on every server.
  • Automatically roll the password in a configurable manner - after each use, after a certain period of time, etc.
  • Track and govern sensitive account usage by ensuring only properly authorized users can access the vault and obtain the credentials and then monitor usage.
Read full review
Netwrix
  • Netwrix Auditor performs the audit collection process in a method that does not burden the systems it is auditing. It usually just pulls the log and event logs data from the machine it is auditing and then performs the extraction of the information in these files on the Netwrix Auditor server. This reducing the audit processes to only pulling log data from the server but does not keep the server busy processing the data.
  • Once the log data has been pulled from a server being audited, Netwrix will store the log data in a compressed form in its Long Term Archive. This allows the database to be kept smaller than the all the data being kept in the Log Term Archive and therefore makes creating reports much faster since the database is not as big as it could be.
  • Since Netwrix Auditor uses standard Microsoft SQL Server and SQL Server Reporting Services (SSRS) to perform reporting, working with the results of the audit is much easier. Anyone who knows SQL Server and SSRS can work with the data and create their own reports.
  • The predefined reports that come with Netwrix Auditor cover most of the items required to properly report on the status of a system. They have many predefined reports for FedRamp, PCI, HIPPA, and other compliance regulations.
Read full review
Cons
Cyberark
  • GUI - right now everything is on one page/dashboard. Some level of folder/Safe type view would be great
  • More options when storing passwords - especially for network based passwords
  • Better integrations with vendors like Cisco so that admins dont need to really get the password from the vault (think Last Pass type add on)
Read full review
Netwrix
  • There is a bit of a learning curve. The interface is fairly intuitive, but I think there is room for improvement.
  • There is a LOT of functionality which can be quite overwhelming at first, but in and of itself, not a bad thing.
  • I think this software would benefit from a "Simple" mode and "Advanced" mode. This would ease the learning curve a bit.
Read full review
Likelihood to Renew
Cyberark
No answers on this topic
Netwrix
We have renewed already the licensing of the product minus SQL Server and Oracle Database because the organisation believes the modules are very expensive and have identified a different product for auditing Databases Other modules are very important like the User Activity monitor, AD queries that we can not get from the native AD itself or you have to run complicated powershell scripts! Easy to use interface Pre-defined Reports Easy way to subscribe to important alerts e.g Privilege account group membership changes
Read full review
Usability
Cyberark
No answers on this topic
Netwrix
The product has user friend pre-defined queries which takes off the stress and horrors of having to query Active Directory with complex Powershell scripts! You can subscribe to certain functions when they are done and you get an alert e.g privileged accounts actions and you don't need to have programming skills The product has a desktop version of the software and donot have to login to the server all the time you need to use it. You can see very fast the posture of your environment of the overview screen and deduce what exactly is wrong and what has to be done
Read full review
Support Rating
Cyberark
Customer support and technical support have always been great when we require assistance. Especially when we come across issues that we're not familiar with.
Read full review
Netwrix
Customer support has always been fast and helpful when we run into any issues. The smaller issues are usually resolved within a day or two. It is great support and I feel like I am in good hands anytime an issue comes up. However, we don't run into many issues
Read full review
Implementation Rating
Cyberark
No answers on this topic
Netwrix
Make sure you trial the software and understand the fundamentals of each module that you are interested in Make sure you get the buy in from both Management and most importantly your team members (the product users) for a successful implementation Watch the webinars of the product from the product website
Read full review
Alternatives Considered
Cyberark
It is known as one of the safest products in the market. It has good support and is also available as on-premise. You can run it virtually on VMWare (and probably on other hypervisors as well). You can have a second instance on bare metal and that makes it a very safe system.
Read full review
Netwrix
I can only compare it to SolarWinds. Their similar products have larger foot prints and seem a little clumsy in comparison. The Netwrix product turns on a lot of the auditing options that were required for the product to work properly where it seemed I had to do a lot of manual tweeking with the SolarWinds product.
Read full review
Return on Investment
Cyberark
  • Decreased the probability of an external cyber attack to privileged accounts..
  • Management can control privileged account life cycle management more effectively
  • Recording privileged sessions allows our organization to play back exactly the point of a breach or malicious behavior
  • Automated system to manage and verify passwords, as privileged accounts are constantly created and deleted
  • Automatic PWD change functionality will substantially decrease probability of PWD theft or misuse.
Read full review
Netwrix
  • 2 men 4 four rule is eliminated.
  • System administrators are on their toes now and very attentive before performing and change.
  • Change management is followed properly.
  • Compliance is implemented as it should be.
  • Housekeeping of servers is done.
  • AD users maintained well.
Read full review
ScreenShots

CyberArk Privileged Access Management Screenshots

Screenshot of ISPSSScreenshot of Privilege CloudScreenshot of Identity Security IntelligenceScreenshot of Identity Security Intelligence

Netwrix Auditor Screenshots

Screenshot of Full visibility into changes to critical IT systemsScreenshot of Out-of-the-box Compliance ReportsScreenshot of Customized Reports On-Demand and Easy Data Search