The integration capabilities, and ability to integrate CyberArk into the overall IBB strategy of our current clients.
Lead Cyber Security Architect at a tech services company with 10,001+ employees
Great overall coverage compared to competitors but the pricing is higher
Pros and Cons
- "The integration capabilities, ability to integrate CyberArk into the overall IBB strategy of our current clients."
- "In terms of general user feedback, the more security you put in front of a user, the more they complain. So usability and the user experience are always a challenge. So there's always room for improvement."
What is most valuable?
What needs improvement?
In terms of general user feedback, the more security you put in front of a user, the more they complain. So usability and the user experience are always a challenge. So there's always room for improvement.
For how long have I used the solution?
I have been using CyberArk Identity for ten years.
What do I think about the scalability of the solution?
I would I'd rate it probably seven and a half to eight.
Buyer's Guide
CyberArk Identity
November 2024
Learn what your peers think about CyberArk Identity. Get advice and tips from experienced pros sharing their opinions. Updated: November 2024.
816,406 professionals have used our research since 2012.
How are customer service and support?
The technical support is good.
How would you rate customer service and support?
Positive
What's my experience with pricing, setup cost, and licensing?
Their pricing is obviously a lot higher than many vendors in the marketplace but their service is also unmatched.
What other advice do I have?
I think maturity and overall coverage, CyberArk, obviously, has a lot more experience than many other vendors in this field. And, therefore, they have more wider range of tools and capabilities. But sometimes that's also a disadvantage that the newer vendors in the space often are more agile and more adaptable, especially to cloud environments and to, sort of, technologies that are more sort of, you know, cloud enabled. But overall, I would say CyberArk still has more maturity and more coverage in less than this.
I rate the overall solution a seven out of ten.
Disclosure: I am a real user, and this review is based on my own experience and opinions.
Last updated: Mar 13, 2024
Flag as inappropriateSenior Partner at a tech consulting company with 51-200 employees
Acts as an MFA for any kind of privileged access and helps with authentication
Pros and Cons
- "The tool helps with authentication. It acts as an MFA for any kind of privileged access that occurs in our organization."
- "The tool has issues with the third-party SMS gateway. The solution has its own SMS gateway. Integration support is a challenge when we don’t use their SMS gateway. The tool also needs to improve its scalability."
What is our primary use case?
The tool helps with authentication. It acts as an MFA for any kind of privileged access that occurs in our organization.
What needs improvement?
The tool has issues with the third-party SMS gateway. The solution has its own SMS gateway. Integration support is a challenge when we don’t use their SMS gateway. The tool also needs to improve its scalability.
For how long have I used the solution?
I have been working with the solution for two years. I use the tool’s latest version.
What do I think about the stability of the solution?
The solution is stable. You can expect one ticket every three months.
What do I think about the scalability of the solution?
I would rate the tool’s scalability a seven out of ten.
How are customer service and support?
The tool’s support is neither good nor bad. You need to wait a long time to get to the support.
How would you rate customer service and support?
Neutral
How was the initial setup?
I would rate the tool’s setup a seven out of ten. The solution’s setup is easy if you have the right person for it. A person who is inexperienced with the deployment process should go through a lot of documentation to install the solution.
The deployment will take around three to four weeks to complete if the servers are configured properly. Our deployment took about two weeks to complete. You need only one person to deploy the product.
What's my experience with pricing, setup cost, and licensing?
I would rate the tool’s pricing a seven out of ten. The product’s pricing is expensive and is on a yearly basis. You will need to pay around 10,000 GBP for 500 users.
What other advice do I have?
I would rate the solution a seven out of ten. We have enterprise-based customers for the solution. I think Okta is a good solution compared to CyberArk.
Which deployment model are you using for this solution?
On-premises
Disclosure: My company has a business relationship with this vendor other than being a customer: Partner
Buyer's Guide
CyberArk Identity
November 2024
Learn what your peers think about CyberArk Identity. Get advice and tips from experienced pros sharing their opinions. Updated: November 2024.
816,406 professionals have used our research since 2012.
Regional account manager at a tech services company with 51-200 employees
Helps to protect privilege accounts and offers service continuity
Pros and Cons
- "The tool is a very strong and valuable enterprise solution, particularly in ensuring the continuity of service."
- "The product is not cheap, especially if you opt for an on-premise deployment requiring a complex server infrastructure. On the other hand, choosing the software as a service version simplifies infrastructure requirements but necessitates being online all the time."
What is our primary use case?
CyberArk Identity's main use case is protecting privileged accounts. Although they've expanded into identity and access management, most of their business comes from privilege account management.
What is most valuable?
The tool is a very strong and valuable enterprise solution, particularly in ensuring the continuity of service.
What needs improvement?
The product is not cheap, especially if you opt for an on-premise deployment requiring a complex server infrastructure. On the other hand, choosing the software as a service version simplifies infrastructure requirements but necessitates being online all the time.
What do I think about the stability of the solution?
I rate the tool's stability a nine out of ten.
What do I think about the scalability of the solution?
I rate the product's scalability a nine out of ten.
How was the initial setup?
Setting up CyberArk Identity is not straightforward. Typically, for the on-premise version, you need to install at least three servers that work together, although installing four servers is more common. However, if you opt for the software as a service version in the cloud, it's simpler to set up.
What other advice do I have?
I rate the overall solution an eight out of ten. The recommendation is as follows: CyberArk Identity is the right product for you if you're an enterprise company. However, if you're a small or medium-sized company, you may face challenges with the on-premise solution from CyberArk Identity, and cheaper options may be available from other vendors.
Nevertheless, the tool is a strong and stable product. If you can afford it, opting for the software as a service (SaaS) solution would provide you with the best privilege account management tool.
Disclosure: My company has a business relationship with this vendor other than being a customer: Reseller
Last updated: May 22, 2024
Flag as inappropriateIdentity and Access Management Analyst at Security Finance Corporation
Stable, good technical support, and easy setup
Pros and Cons
- "I found the solution to be stable."
- "The solution could be easier to use and I found it to be very complex involving many steps."
What needs improvement?
The solution could be easier to use and I found it to be very complex involving many steps.
For how long have I used the solution?
I have used the solution for approximately three years.
What do I think about the stability of the solution?
I found the solution to be stable.
How are customer service and support?
The solution has good technical support.
How was the initial setup?
The solution's initial setup was straightforward.
What about the implementation team?
We used a vendor team to implement the solution.
What other advice do I have?
I rate CyberArk Identity an eight out of ten.
Which deployment model are you using for this solution?
On-premises
Disclosure: I am a real user, and this review is based on my own experience and opinions.
Sr. Analyst. at a tech services company with 10,001+ employees
Secure, has good vulnerability management, and is simple to set up
Pros and Cons
- "If anyone makes an error, or if an incident occurs by accident, the business will not be harmed as a result of this activity."
- "The user interface could be improved."
What is our primary use case?
We use CyberArk for security purposes.
What is most valuable?
If anyone makes an error, or if an incident occurs by accident, the business will not be harmed as a result of this activity.
What needs improvement?
The user interface could be improved.
For how long have I used the solution?
I am not familiar with the CyberArk tool, but we're working on vulnerability management, as well as some other functions, to ensure that the asset, software, and other applications are installed on the servers. We engage in this type of activity on a daily basis.
I have more than 15 years of experience in information technology. I've spent the last five years primarily working in a project team. I'm working on this type of activity and the tools for the customers or the business's needs.
What do I think about the stability of the solution?
CyberArk Identity is a stable solution.
Which solution did I use previously and why did I switch?
We are currently using Qualys for vulnerability management. And we are only using AD Connect for that privileged access.
How was the initial setup?
With CyberArk the initial setup is straightforward, we login into the servers to give the users access to that directory.
What was our ROI?
I have not seen a return on investment, but I am not familiar with this area.
What other advice do I have?
I'm a member of the project team, we primarily use this tool whenever we need to work on this. Otherwise, we don't use it on a daily basis.
In terms of the customer requirement, we use it whenever we are required to work on these tools.
I am an employee, and my company is a partner with CyberArk.
I would rate CyberArk Identity a nine out of ten.
Disclosure: My company has a business relationship with this vendor other than being a customer: Partner
Solutions Architect at Sonatype
The initial setup is straightforward
Pros and Cons
- "The initial setup is straightforward. It takes me up to an hour and a half."
- "More integrations would be better."
What is our primary use case?
I use CyberArk Identity for filling out demonstration environments for clients that have it installed on their premise or they're using the cloud version. I just create it for a proof of value demonstration.
What needs improvement?
More integrations would be better.
For how long have I used the solution?
I have been using CyberArk Identity on and off for about a year.
What do I think about the stability of the solution?
I don't really worry about stability. I just have to get it up and running. Then I move on after that.
What do I think about the scalability of the solution?
I'm sure it's scalable. I haven't had a chance to test it.
How are customer service and support?
I've not had to use it, had no experience with it.
How was the initial setup?
The initial setup is straightforward. It takes me up to an hour and a half.
What about the implementation team?
I do it all myself. I am in the sales side of the house. I do the initial consulting work for the client and then deploy.
What other advice do I have?
I would rate CyberArk Identity with a nine out of ten.
Disclosure: My company has a business relationship with this vendor other than being a customer: Partner
Pre-sales engineer at a computer software company with 201-500 employees
Good MFA and machine learning with single sign on capabilities and good general security
Pros and Cons
- "It has machine learning and can help clients to learn the environment and understand what is happening."
- "I'm not sure what needs improvement. It is a good platform."
What is our primary use case?
Customers primarily use the solution for multi-factor authentication and single sign on. It's good for source authentication. I do not use it personally.
How has it helped my organization?
We show the option to our clients. It helps them with security. It helps me with sales.
What is most valuable?
It helps with cyber identity and security.
The authentication is very good. It has good MFA. It has machine learning and can help clients to learn the environment and understand what is happening.
What needs improvement?
I'm not sure what needs improvement. It is a good platform.
For how long have I used the solution?
I've used the solution for a while with a client.
What other advice do I have?
I'm in sales.
I'm not sure which version of the solution is being used.
I'd rate the solution eight out of ten.
Disclosure: I am a real user, and this review is based on my own experience and opinions.
Information Security Engineer - Pre-sales at a tech services company with 11-50 employees
Adaptive interface, scales well, and high availability
Pros and Cons
- "The most valuable feature of CyberArk Identity is the adaptive interface."
- "The OpenID features could improve in CyberArk Identity."
What is our primary use case?
We are using CyberArk Identity to consolidate all the applications and demo tenants that we have in the same panel and to apply features, such as MFA and single sign-on.
How has it helped my organization?
CyberArk Identity has helped me a lot to optimize processes and provide access.
What is most valuable?
The most valuable feature of CyberArk Identity is the adaptive interface.
What needs improvement?
The OpenID features could improve in CyberArk Identity.
For how long have I used the solution?
I have been using CyberArk Identity for approximately two years.
What do I think about the stability of the solution?
CyberArk Identity is a stable solution.
I rate the stability of CyberArk Identity a nine out of ten.
What do I think about the scalability of the solution?
The scalability of CyberArk Identity is great. It is built with scalability in mind.
I plan to increase the usage of the solution.
I rate the scalability of CyberArk Identity a nine out of ten.
How are customer service and support?
I rate the support of CyberArk Identity a seven out of ten.
How would you rate customer service and support?
Neutral
How was the initial setup?
The initial setup of CyberArk Identity is straightforward. After 20 to 30 hours we finished the process.
What was our ROI?
I have received a good return on investment using CyberArk Identity.
What's my experience with pricing, setup cost, and licensing?
The pricing of CyberArk Identity is competitive.
I rate the price of CyberArk Identity a ten out of ten.
What other advice do I have?
I rate CyberArk Identity an eight out of ten.
Which deployment model are you using for this solution?
On-premises
Disclosure: I am a real user, and this review is based on my own experience and opinions.
Buyer's Guide
Download our free CyberArk Identity Report and get advice and tips from experienced pros
sharing their opinions.
Updated: November 2024
Product Categories
Customer Identity and Access Management (CIAM) Authentication Systems Identity Management (IM) Authorization Software Enterprise Password Managers User Entity Behavior Analytics (UEBA) Access Management Active Directory Management Cloud Resource Access ManagementPopular Comparisons
Omada Identity
Ping Identity Platform
ForgeRock
Salesforce Identity
Microsoft Entra External ID
ThreatLocker Elevation Control
Buyer's Guide
Download our free CyberArk Identity Report and get advice and tips from experienced pros
sharing their opinions.
Quick Links
Learn More: Questions:
- Looking for an Identity and Access Management product for an energy and utility organization
- What are some tips for effective identity and access management to prevent insider data breaches?
- Which is the best Privileged Account Management solution?
- What are your best practices for Identity and Access Management (IAM) in the Cloud?
- What access management tools would you recommend to help with GDPR compliance?
- How to convince a client that Identity and Access Management (IdAM) is essential for risk elimination?
- What advice do you have for an enterprise user on Password Day 2021?
- What are the best practices to prevent a Brute Force attack via remote access?
- How is Zero Trust different from the Least Privileged model?
- Microsoft accounts are going passwordless. What do you think?