Try our new research platform with insights from 80,000+ expert users
CyberArk Privileged Access Manager Logo

CyberArk Privileged Access Manager Reviews

Vendor: CyberArk
4.3 out of 5
Badge Ranked 1
4,132 followers
Start review

What is CyberArk Privileged Access Manager?

Featured reviews

CyberArk Privileged Access Manager mindshare

As of February 2025, the mindshare of CyberArk Privileged Access Manager in the Privileged Access Management (PAM) category stands at 19.7%, down from 23.7% compared to the previous year, according to calculations based on PeerSpot user engagement data.
Privileged Access Management (PAM)

PeerAnalyst reports

TypeTitleDate
CategoryPrivileged Access Management (PAM)Feb 27, 2025Download
ProductReviews, tips, and advice from real usersFeb 27, 2025Download
ComparisonCyberArk Privileged Access Manager vs Delinea Secret ServerFeb 27, 2025Download
ComparisonCyberArk Privileged Access Manager vs CyberArk Endpoint Privilege ManagerFeb 27, 2025Download
ComparisonCyberArk Privileged Access Manager vs One Identity SafeguardFeb 27, 2025Download
Suggested products
TitleRatingMindshareRecommending
Okta Workforce Identity4.32.4%94%65 interviewsAdd to research
Saviynt3.73.9%78%23 interviewsAdd to research
 
 
Key learnings from peers

Valuable Features

Room for Improvement

ROI

Pricing

Popular Use Cases

Service and Support

Deployment

Scalability

Stability

Review data by company size

By reviewers
By visitors reading reviews

Top industries

By visitors reading reviews
Educational Organization
34%
Financial Services Firm
12%
Computer Software Company
11%
Manufacturing Company
6%
Government
4%
Insurance Company
4%
Healthcare Company
3%
Energy/Utilities Company
2%
Retailer
2%
University
2%
Comms Service Provider
2%
Construction Company
2%
Real Estate/Law Firm
2%
Non Profit
1%
Hospitality Company
1%
Media Company
1%
Legal Firm
1%
Outsourcing Company
1%
Wholesaler/Distributor
1%
Logistics Company
1%
Transportation Company
1%
Recreational Facilities/Services Company
1%
Pharma/Biotech Company
1%
Consumer Goods Company
1%
Performing Arts
1%

Compare CyberArk Privileged Access Manager with alternative products

Learn more about CyberArk Privileged Access Manager

CyberArk Privileged Access Manager customers

Related questions

 

CyberArk Privileged Access Manager reviews

Sort by:
SI
Senior PAM Consultant at iC Consult GmbH
Verified user of CyberArk Privileged Access Manager
Jan 30, 2025
Makes privileged access management easy with automation and granular control

Pros

"CyberArk Privileged Access Manager provides granularity. You can break things down into individual safes. You have specific access to safes by individual or group. The interface is with AD, with LDAP, or with local CyberArk passwords. You also have the ability to establish policies for your individual credentials. "

Cons

"CyberArk reporting is notoriously poor, offering about 5 reports out of the box. I am certified in Delinea, which includes 60 reports plus a custom report generator out of the box. Improved reporting would be beneficial."
PeerSpot user
IT Cyber Security Lead at a mining and metals company with 1,001-5,000 employees
Verified user of CyberArk Privileged Access Manager
Dec 29, 2024
Personalized assistance, session recording and monitoring capabilities make it the best option for us

Pros

"The session recording and monitoring capabilities are valuable. We have real-time session management ability to record, audit, and monitor any privileged user activities. That is a big deal."

Cons

"CyberArk has brought a feature called Vendor Team Manager, but it does not provide full access. It requires the vendor team leader to be onboarded as a local account instead of using their email address. Improvements could be made to onboard the vendor team leaders using their email, allowing them to manage their own team. That would greatly reduce the overhead in managing vendor team members."
Find out what your peers are saying about CyberArk Privileged Access Manager. Updated February 2025
839,080 professionals have used our research since 2012.
Lasantha Wijesinghe - PeerSpot user
Cybersecurity Specialist at a comms service provider with 5,001-10,000 employees
Verified user of CyberArk Privileged Access Manager
Dec 16, 2024
We have visibility and control through real-time user behavior analytics

Pros

"I appreciate CyberArk's real-time capabilities. I can secure critical sessions, such as SSH or database sessions. As a security professional, I have real-time visibility into ongoing sessions. If anything suspicious occurs, I can terminate or freeze the session, which is part of user behavior analytics. "

Cons

"Maintaining the product is challenging. Upgrades require a lot of resources, as it impacts the entire organization. For example, upgrading components like the Privileged Session Manager (PSM) and the vault is time-consuming and difficult. In the long term, I would like to see these processes simplified, especially for on-premise installations."
Abdul Durrani - PeerSpot user
Security Manager at Insight
Verified user of CyberArk Privileged Access Manager
Jan 28, 2025
Enables granular and secure access with just-in-time access and Zero Trust model

Pros

"The whole concept of Zero Trust and implementing it with CyberArk, which somewhat adheres to the 'never trust, always verify' principle, is very valuable. I really appreciate this aspect. Moreover, the just-in-time access is impressive, allowing access for a specific time."

Cons

"It would be good to have integrations with other tools and firewalls, such as Zscaler and CrowdStrike. Although I am not fully aware of recent updates, more cross-platform integration would be valuable. A SOC analyst would like to have centralized access in terms of information flowing in even for privileged access management. They would like to have control over everything instead of opening four to five tabs for different sorts of information."
Shubham Likhankar - PeerSpot user
Senior Software Engineer at Persistent Systems
Verified user of CyberArk Privileged Access Manager
Feb 3, 2025
Vaulting and seamless connection enhance security and streamline operations

Pros

"The best feature is vaulting. CyberArk has a separate vault, which is their proprietary vault, which provides multiple encryptions for every password object, as well as tamper-proof recording."

Cons

"I sometimes require learning resources when there is a new solution for CyberArk."
PeerSpot user
Senior IAM Engineer at a tech vendor with 10,001+ employees
Verified user of CyberArk Privileged Access Manager
Jan 23, 2025
Product version discussed: 12.6
Makes periodic password rotations and access management easy but needs better UI and simplicity

Pros

"The most valuable feature is platform management. It is quite easy to manage privileged access for certain target platforms with CyberArk Privileged Access Manager as compared to other products I have worked with."

Cons

"CyberArk definitely needs to improve user experience and reduce complexity."
NC
Privileged Access Management Engineer at a hospitality company with 10,001+ employees
Verified user of CyberArk Privileged Access Manager
Dec 22, 2024
The ability to ensure compliance with both our internal and industry standards is invaluable

Pros

"The best feature of CyberArk Privileged Access Manager is its core function: automatically managing and securing credentials."

Cons

"Transitioning from a traditional on-premises deployment to the privileged cloud has resulted in losing access to many logs and administrative tools typically available on the back end."
Yagya Mishra - PeerSpot user
Security Managing Consultant at IBM
Verified user of CyberArk Privileged Access Manager
Jan 24, 2025
Product version discussed: 12.2
Safeguards credentials, improves security posture, and reduces IT resources

Pros

"The main feature of CyberArk Privileged Access Manager is the ability to manage who has access to what and when, especially with shared accounts."

Cons

"The reporting should be improved. There should be more customization. The report should show how we are going to mitigate the risk because we cannot show the system environment to each and every auditor. "