Try our new research platform with insights from 80,000+ expert users
CyberArk Privileged Access Manager Logo

CyberArk Privileged Access Manager Reviews

Vendor: CyberArk
4.3 out of 5
Badge Ranked 1
4,119 followers
Post review

What is CyberArk Privileged Access Manager?

Featured reviews

CyberArk Privileged Access Manager mindshare

As of January 2025, the mindshare of CyberArk Privileged Access Manager in the Privileged Access Management (PAM) category stands at 20.5%, down from 23.6% compared to the previous year, according to calculations based on PeerSpot user engagement data.
Privileged Access Management (PAM)

PeerAnalyst reports

TypeTitleDate
CategoryPrivileged Access Management (PAM)Jan 10, 2025Download
ProductReviews, tips, and advice from real usersJan 10, 2025Download
ComparisonCyberArk Privileged Access Manager vs Delinea Secret ServerJan 10, 2025Download
ComparisonCyberArk Privileged Access Manager vs One Identity SafeguardJan 10, 2025Download
ComparisonCyberArk Privileged Access Manager vs ARCON Privileged Access ManagementJan 10, 2025Download
Suggested products
TitleRatingMindshareRecommending
Okta Workforce Identity4.2N/A94%64 interviewsAdd to research
Delinea Secret Server4.011.2%91%51 interviewsAdd to research
 
 
Key learnings from peers

Valuable Features

Room for Improvement

ROI

Pricing

Popular Use Cases

Service and Support

Deployment

Scalability

Stability

Review data by company size

By reviewers
By visitors reading reviews

Top industries

By visitors reading reviews
Educational Organization
33%
Financial Services Firm
12%
Computer Software Company
11%
Manufacturing Company
6%
Government
4%
Insurance Company
4%
Healthcare Company
4%
Energy/Utilities Company
3%
Retailer
2%
University
2%
Real Estate/Law Firm
2%
Construction Company
2%
Comms Service Provider
2%
Non Profit
1%
Media Company
1%
Hospitality Company
1%
Legal Firm
1%
Outsourcing Company
1%
Logistics Company
1%
Wholesaler/Distributor
1%
Transportation Company
1%
Pharma/Biotech Company
1%
Recreational Facilities/Services Company
1%
Consumer Goods Company
1%
Performing Arts
1%

Compare CyberArk Privileged Access Manager with alternative products

Learn more about CyberArk Privileged Access Manager

Product Video

CyberArk Privileged Access Manager video

CyberArk Privileged Access Manager customers

Related questions

 

CyberArk Privileged Access Manager reviews

Sort by:
SatishIyer - PeerSpot user
Assistant Vice President at a financial services firm with 10,001+ employees
Verified user of CyberArk Privileged Access Manager
Jul 6, 2022
Lets you ensure relevant, compliant access in good time and with an audit trail, yet lacks clarity on MITRE ATT&CK

Pros

"I'm no longer the product owner for PAM, but I can say that the most useful feature is the vault functionality, which keeps all your passwords secure in a digital vault."

Cons

"When I was a component owner for PAM's Privileged Threat Analytics (PTA) component, what I wanted was a clear mapping to the MITRE ATT&CK framework, a framework which has a comprehensive list of use cases. We reached out to the vendor and asked them how much coverage they have of the uses cases found on MITRE, which would have given us a better view of things while I was the product owner. Unfortunately they did not have the capability of mapping onto MITRE's framework at that time. "
Lasantha Wijesinghe - PeerSpot user
Cybersecurity Specialist at a comms service provider with 5,001-10,000 employees
Verified user of CyberArk Privileged Access Manager
Dec 16, 2024
We have visibility and control through real-time user behavior analytics

Pros

"I appreciate CyberArk's real-time capabilities. I can secure critical sessions, such as SSH or database sessions. As a security professional, I have real-time visibility into ongoing sessions. If anything suspicious occurs, I can terminate or freeze the session, which is part of user behavior analytics. "

Cons

"Maintaining the product is challenging. Upgrades require a lot of resources, as it impacts the entire organization. For example, upgrading components like the Privileged Session Manager (PSM) and the vault is time-consuming and difficult. In the long term, I would like to see these processes simplified, especially for on-premise installations."
Find out what your peers are saying about CyberArk Privileged Access Manager. Updated January 2025
830,526 professionals have used our research since 2012.
Jonathan Hawes - PeerSpot user
CyberArk PAS Administrator at L3Harris Technologies
Verified user of CyberArk Privileged Access Manager
Aug 27, 2023
Product discussed: v12.6
Easy to secure, control, and monitor privileged access on highly critical networks

Pros

"The established sessions on the target systems are fully isolated and the privileged account credentials are never exposed to the end-users or their client applications and devices."

Cons

"CyberArk PAM is a very broad product as everyone's requirements for implementation are different. In our particular case, the initial implementation was planned and developed by people who didn't know our specific network requirements, so the initial implementation needed to be tweaked over time. While this is normal, at the time all these "major" changes required CyberArk professional services to come in-plant and "assist" with the changes. "
Jonathan Hawes - PeerSpot user
CyberArk PAS Administrator at L3Harris Technologies
Verified user of CyberArk Privileged Access Manager
Aug 22, 2023
Good automation, reduces human error, and offers helpful support

Pros

"The implementation of the PSM proxy has reduced the specific risk of "insider attacks" on our domain controllers and SLDAP servers by eliminating direct user login by an open secure connection on the user's behalf without ever revealing the privileged credentials."

Cons

"We'd like to see the creation of some kind of memo field for each device account, which could be used, in our network at least, to leave a note about the device for either the security or network engineering team members."
Amandeep Singh - PeerSpot user
Associate Manager at Wipro
Verified user of CyberArk Privileged Access Manager
Apr 13, 2022
Good support, stable, and helpful in securing access to our lab

Pros

"It is one of the best solutions in the market. Ever since I started using this solution, there has not been any compromise when it comes to our lab."

Cons

"There is a lot of room for improvement in the report section. I also work on other tools, such as Thycotic, which allows you to create customized reports for your organization's needs. In CyberArk, there are limited reports, whereas in Thycotic or some of the other PAM tools, because the database is different, you can customize the report based on your needs through SQL queries."
UmeshKumar4 - PeerSpot user
Security Consultant at Ernst & Young
Verified user of CyberArk Privileged Access Manager
May 16, 2024
Product discussed: 12.6
Offers password rotation and makes session recordings compulsory for data protection

Pros

"Password rotation is the most valuable feature"

Cons

"The solution should be able to mitigate internal threats"
reviewer0714174 - PeerSpot user
CyberArk Product and Vendor Contract Manager at UBS Financial
Verified user of CyberArk Privileged Access Manager
Oct 1, 2023
Product discussed: v13,2
Great session management, password management, and temporary access capabilities

Pros

"The credentials management capability is key to ensuring that the credentials are kept secure and that access to them is done on a temporary and event-driven basis."

Cons

"The product is very vaulting-focused. I'd love to see it expanding its capabilities a bit further into areas like just-in-time elevation, and access with non-vaulted credentials."
NC
Privileged Access Management Engineer at a hospitality company with 10,001+ employees
Verified user of CyberArk Privileged Access Manager
Dec 22, 2024
The ability to ensure compliance with both our internal and industry standards is invaluable

Pros

"The best feature of CyberArk Privileged Access Manager is its core function: automatically managing and securing credentials."

Cons

"Transitioning from a traditional on-premises deployment to the privileged cloud has resulted in losing access to many logs and administrative tools typically available on the back end."