The tool helps with authentication. It acts as an MFA for any kind of privileged access that occurs in our organization.
Senior Partner at a tech consulting company with 51-200 employees
Acts as an MFA for any kind of privileged access and helps with authentication
Pros and Cons
- "The tool helps with authentication. It acts as an MFA for any kind of privileged access that occurs in our organization."
- "The tool has issues with the third-party SMS gateway. The solution has its own SMS gateway. Integration support is a challenge when we don’t use their SMS gateway. The tool also needs to improve its scalability."
What is our primary use case?
What needs improvement?
The tool has issues with the third-party SMS gateway. The solution has its own SMS gateway. Integration support is a challenge when we don’t use their SMS gateway. The tool also needs to improve its scalability.
For how long have I used the solution?
I have been working with the solution for two years. I use the tool’s latest version.
What do I think about the stability of the solution?
The solution is stable. You can expect one ticket every three months.
Buyer's Guide
CyberArk Identity
December 2024
Learn what your peers think about CyberArk Identity. Get advice and tips from experienced pros sharing their opinions. Updated: December 2024.
824,053 professionals have used our research since 2012.
What do I think about the scalability of the solution?
I would rate the tool’s scalability a seven out of ten.
How are customer service and support?
The tool’s support is neither good nor bad. You need to wait a long time to get to the support.
How would you rate customer service and support?
Neutral
How was the initial setup?
I would rate the tool’s setup a seven out of ten. The solution’s setup is easy if you have the right person for it. A person who is inexperienced with the deployment process should go through a lot of documentation to install the solution.
The deployment will take around three to four weeks to complete if the servers are configured properly. Our deployment took about two weeks to complete. You need only one person to deploy the product.
What's my experience with pricing, setup cost, and licensing?
I would rate the tool’s pricing a seven out of ten. The product’s pricing is expensive and is on a yearly basis. You will need to pay around 10,000 GBP for 500 users.
What other advice do I have?
I would rate the solution a seven out of ten. We have enterprise-based customers for the solution. I think Okta is a good solution compared to CyberArk.
Which deployment model are you using for this solution?
On-premises
Disclosure: My company has a business relationship with this vendor other than being a customer: Partner
Obrela Group of Companies IT Manager & Security Integration Manager at Obrela
A mature product to handle the identity of an Active Directory, but its difficulty in gaining skill sets should be improved
Pros and Cons
- "CyberArk Identity is a mature product."
- "The solution's difficulty in gaining skill sets should be improved because it's a vertical product."
What is our primary use case?
We use CyberArk Identity to handle the identity of an Active Directory, to handle Linux and other systems, and for API configurations that can handle even database accesses and third-party IDB accesses.
What is most valuable?
CyberArk Identity is a mature product.
What needs improvement?
The solution's difficulty in gaining skill sets should be improved because it's a vertical product. We would expect a better and easier operational service from CyberArk Identity.
What do I think about the stability of the solution?
CyberArk Identity is a stable solution.
What do I think about the scalability of the solution?
Approximately, 55 customers are using CyberArk Identity.
How are customer service and support?
Usually, the solution's technical support team responds, but the skill set of the first engineer is not ideal. You need to keep pressing in order to have the appropriate person to help you with the support.
How was the initial setup?
The solution's initial setup is quite complex because it has its individual way of doing things.
What's my experience with pricing, setup cost, and licensing?
CyberArk Identity is an expensive solution.
What other advice do I have?
We recommend CyberArk Identity to our customers.
Overall, I rate CyberArk Identity a six or six and a half out of ten.
Disclosure: My company has a business relationship with this vendor other than being a customer: Partner
Buyer's Guide
CyberArk Identity
December 2024
Learn what your peers think about CyberArk Identity. Get advice and tips from experienced pros sharing their opinions. Updated: December 2024.
824,053 professionals have used our research since 2012.
Regional account manager at a tech services company with 51-200 employees
Helps to protect privilege accounts and offers service continuity
Pros and Cons
- "The tool is a very strong and valuable enterprise solution, particularly in ensuring the continuity of service."
- "The product is not cheap, especially if you opt for an on-premise deployment requiring a complex server infrastructure. On the other hand, choosing the software as a service version simplifies infrastructure requirements but necessitates being online all the time."
What is our primary use case?
CyberArk Identity's main use case is protecting privileged accounts. Although they've expanded into identity and access management, most of their business comes from privilege account management.
What is most valuable?
The tool is a very strong and valuable enterprise solution, particularly in ensuring the continuity of service.
What needs improvement?
The product is not cheap, especially if you opt for an on-premise deployment requiring a complex server infrastructure. On the other hand, choosing the software as a service version simplifies infrastructure requirements but necessitates being online all the time.
What do I think about the stability of the solution?
I rate the tool's stability a nine out of ten.
What do I think about the scalability of the solution?
I rate the product's scalability a nine out of ten.
How was the initial setup?
Setting up CyberArk Identity is not straightforward. Typically, for the on-premise version, you need to install at least three servers that work together, although installing four servers is more common. However, if you opt for the software as a service version in the cloud, it's simpler to set up.
What other advice do I have?
I rate the overall solution an eight out of ten. The recommendation is as follows: CyberArk Identity is the right product for you if you're an enterprise company. However, if you're a small or medium-sized company, you may face challenges with the on-premise solution from CyberArk Identity, and cheaper options may be available from other vendors.
Nevertheless, the tool is a strong and stable product. If you can afford it, opting for the software as a service (SaaS) solution would provide you with the best privilege account management tool.
Disclosure: My company has a business relationship with this vendor other than being a customer: Reseller
Last updated: May 22, 2024
Flag as inappropriateSr. Analyst. at a tech services company with 10,001+ employees
Secure, has good vulnerability management, and is simple to set up
Pros and Cons
- "If anyone makes an error, or if an incident occurs by accident, the business will not be harmed as a result of this activity."
- "The user interface could be improved."
What is our primary use case?
We use CyberArk for security purposes.
What is most valuable?
If anyone makes an error, or if an incident occurs by accident, the business will not be harmed as a result of this activity.
What needs improvement?
The user interface could be improved.
For how long have I used the solution?
I am not familiar with the CyberArk tool, but we're working on vulnerability management, as well as some other functions, to ensure that the asset, software, and other applications are installed on the servers. We engage in this type of activity on a daily basis.
I have more than 15 years of experience in information technology. I've spent the last five years primarily working in a project team. I'm working on this type of activity and the tools for the customers or the business's needs.
What do I think about the stability of the solution?
CyberArk Identity is a stable solution.
Which solution did I use previously and why did I switch?
We are currently using Qualys for vulnerability management. And we are only using AD Connect for that privileged access.
How was the initial setup?
With CyberArk the initial setup is straightforward, we login into the servers to give the users access to that directory.
What was our ROI?
I have not seen a return on investment, but I am not familiar with this area.
What other advice do I have?
I'm a member of the project team, we primarily use this tool whenever we need to work on this. Otherwise, we don't use it on a daily basis.
In terms of the customer requirement, we use it whenever we are required to work on these tools.
I am an employee, and my company is a partner with CyberArk.
I would rate CyberArk Identity a nine out of ten.
Disclosure: My company has a business relationship with this vendor other than being a customer: Partner
Identity and Access Management Analyst at Security Finance Corporation
Stable, good technical support, and easy setup
Pros and Cons
- "I found the solution to be stable."
- "The solution could be easier to use and I found it to be very complex involving many steps."
What needs improvement?
The solution could be easier to use and I found it to be very complex involving many steps.
For how long have I used the solution?
I have used the solution for approximately three years.
What do I think about the stability of the solution?
I found the solution to be stable.
How are customer service and support?
The solution has good technical support.
How was the initial setup?
The solution's initial setup was straightforward.
What about the implementation team?
We used a vendor team to implement the solution.
What other advice do I have?
I rate CyberArk Identity an eight out of ten.
Which deployment model are you using for this solution?
On-premises
Disclosure: I am a real user, and this review is based on my own experience and opinions.
Solutions Architect at Sonatype
The initial setup is straightforward
Pros and Cons
- "The initial setup is straightforward. It takes me up to an hour and a half."
- "More integrations would be better."
What is our primary use case?
I use CyberArk Identity for filling out demonstration environments for clients that have it installed on their premise or they're using the cloud version. I just create it for a proof of value demonstration.
What needs improvement?
More integrations would be better.
For how long have I used the solution?
I have been using CyberArk Identity on and off for about a year.
What do I think about the stability of the solution?
I don't really worry about stability. I just have to get it up and running. Then I move on after that.
What do I think about the scalability of the solution?
I'm sure it's scalable. I haven't had a chance to test it.
How are customer service and support?
I've not had to use it, had no experience with it.
How was the initial setup?
The initial setup is straightforward. It takes me up to an hour and a half.
What about the implementation team?
I do it all myself. I am in the sales side of the house. I do the initial consulting work for the client and then deploy.
What other advice do I have?
I would rate CyberArk Identity with a nine out of ten.
Disclosure: My company has a business relationship with this vendor other than being a customer: Partner
Pre-sales engineer at a computer software company with 201-500 employees
Good MFA and machine learning with single sign on capabilities and good general security
Pros and Cons
- "It has machine learning and can help clients to learn the environment and understand what is happening."
- "I'm not sure what needs improvement. It is a good platform."
What is our primary use case?
Customers primarily use the solution for multi-factor authentication and single sign on. It's good for source authentication. I do not use it personally.
How has it helped my organization?
We show the option to our clients. It helps them with security. It helps me with sales.
What is most valuable?
It helps with cyber identity and security.
The authentication is very good. It has good MFA. It has machine learning and can help clients to learn the environment and understand what is happening.
What needs improvement?
I'm not sure what needs improvement. It is a good platform.
For how long have I used the solution?
I've used the solution for a while with a client.
What other advice do I have?
I'm in sales.
I'm not sure which version of the solution is being used.
I'd rate the solution eight out of ten.
Disclosure: I am a real user, and this review is based on my own experience and opinions.
Information Security Engineer - Pre-sales at a tech services company with 11-50 employees
Adaptive interface, scales well, and high availability
Pros and Cons
- "The most valuable feature of CyberArk Identity is the adaptive interface."
- "The OpenID features could improve in CyberArk Identity."
What is our primary use case?
We are using CyberArk Identity to consolidate all the applications and demo tenants that we have in the same panel and to apply features, such as MFA and single sign-on.
How has it helped my organization?
CyberArk Identity has helped me a lot to optimize processes and provide access.
What is most valuable?
The most valuable feature of CyberArk Identity is the adaptive interface.
What needs improvement?
The OpenID features could improve in CyberArk Identity.
For how long have I used the solution?
I have been using CyberArk Identity for approximately two years.
What do I think about the stability of the solution?
CyberArk Identity is a stable solution.
I rate the stability of CyberArk Identity a nine out of ten.
What do I think about the scalability of the solution?
The scalability of CyberArk Identity is great. It is built with scalability in mind.
I plan to increase the usage of the solution.
I rate the scalability of CyberArk Identity a nine out of ten.
How are customer service and support?
I rate the support of CyberArk Identity a seven out of ten.
How would you rate customer service and support?
Neutral
How was the initial setup?
The initial setup of CyberArk Identity is straightforward. After 20 to 30 hours we finished the process.
What was our ROI?
I have received a good return on investment using CyberArk Identity.
What's my experience with pricing, setup cost, and licensing?
The pricing of CyberArk Identity is competitive.
I rate the price of CyberArk Identity a ten out of ten.
What other advice do I have?
I rate CyberArk Identity an eight out of ten.
Which deployment model are you using for this solution?
On-premises
Disclosure: I am a real user, and this review is based on my own experience and opinions.
Buyer's Guide
Download our free CyberArk Identity Report and get advice and tips from experienced pros
sharing their opinions.
Updated: December 2024
Product Categories
Customer Identity and Access Management (CIAM) Authentication Systems Identity Management (IM) Authorization Software Enterprise Password Managers User Entity Behavior Analytics (UEBA) Access Management Active Directory Management Cloud Resource Access ManagementPopular Comparisons
Omada Identity
Ping Identity Platform
ForgeRock
Salesforce Identity
Microsoft Entra External ID
Buyer's Guide
Download our free CyberArk Identity Report and get advice and tips from experienced pros
sharing their opinions.
Quick Links
Learn More: Questions:
- Looking for an Identity and Access Management product for an energy and utility organization
- What are some tips for effective identity and access management to prevent insider data breaches?
- Which is the best Privileged Account Management solution?
- What are your best practices for Identity and Access Management (IAM) in the Cloud?
- What access management tools would you recommend to help with GDPR compliance?
- How to convince a client that Identity and Access Management (IdAM) is essential for risk elimination?
- What advice do you have for an enterprise user on Password Day 2021?
- What are the best practices to prevent a Brute Force attack via remote access?
- How is Zero Trust different from the Least Privileged model?
- Microsoft accounts are going passwordless. What do you think?