If I have a core banking application platform with users or privileged users accessing that particular environment, I have to ensure that the right people are accessing what they're supposed to access. I need to have proper monitoring on them, ensuring that privileged accounts are not being shared and that generic accounts are not in use. For instance, if someone accesses the core banking application and performs changes or transactions, this solution enables me to track who did what in that session and even monitor or replay the session of that person's actions.
CyberArk provides identity governance. It gives you control of who, how, and what is accessing your environments. It provides simplicity for privileged users to access the environment.
When using IAM and PAM, CyberArk Identity is the best choice. If it is just one model, for IAM, I prefer others like One Identity. For PAM, CyberArk Identity is the best.
Furthermore, CyberArk Identity provides identity governance and gives me control over who and how access to environments occurs, offering significant confidentiality in what is accessed.
Initially, people find it challenging to adjust to these changes, however, over time, it becomes time-saving as there's no need to access each device individually. Instead, there is a single pane of glass or platform that administrators can log into to manage environments efficiently.
The partner portals are and support portals are very good.
CyberArk Identity's ability to safeguard financial services infrastructure is good. If you have your core banking application transformed, and have privileged users accessing the environment, you can control who and what is accessing where and generic accounts cannot be used. If some accesses core banking functionality, you will be able to track what a person is doing.
Its ability to help meet compliance requirements is good. It covers ISO standards. We easily integrate password policies. It helps us protect access within an organization.
It's helped us to comply with PCI DSS.
There are a lot of time savings. There's a single pane of glass to log into to access the environment. We don't have to go through individually.
We've reduced risk exposure. Instead of logging into different platforms, you just log in to one single platform. You have your resources being allocated to you. In this way, it also identifies you, with a single sign on privileges. It gives you protection in terms of not using generic accounts or administrative accounts that everybody uses. All credentials are saved in a particular system known as a vault, and only a particular port and a particular IP address can access the vault. Now, there is one way in or one way out. It doesn't create any vulnerabilities whereby people or unknown entities can enter easily.
It impacts zero trust security strategies. It prevents lateral movements in the organization. You cannot be gaining access to a privileged account.
The solution helps with operational efficiency as it provides a very secure mode of access.
Integration or deployment is extremely difficult for CyberArk Identity. For example, vault integration and deployments are very tedious and involve components like HSMs, requiring extensive skill sets and knowledge. This complexity is especially true when integrating into various environments, service applications, and session monitoring setups. It is very demanding.
I've deployed two solutions so far. I've worked with the solution for about three years, since 2021. I haven't worked with the projects this year. I've done some POCs.
With respect to stability, I find that stability is very good. It is very stable.
The solution is very scalable.
I'm also aware of One Identity.
The initial setup was complex. It was very complex when it was my first time handling an implementation.
We were the partner deploying for a customer.
CyberArk Identity is slightly expensive compared to others. That said, it offers value for money. It comes with additional resources that I need to spin up on-premises. So, if I am not going fully cloud, there are additional resources I will need to purchase, such as spinning more VMs or acquiring an HSM device to encrypt the vault.
I would probably give the solution a seven out of ten.
It offers the best PAM solution you can get compared to others, compared to One Identity.
Deployment is complex. If you are deploying CyberArk Identity, you should have the skill sets, knowledge, and resources to manage it. It is not easy to manage or deploy CyberArk Identity.