The solution helps our developers access internal systems. It also helps us in Privilege Access Management.
Procurement Manager at a hospitality company with 501-1,000 employees
A robust solution that provides good security support
Pros and Cons
- "The solution helps our developers access internal systems. It also helps us in Privilege Access Management."
- "The tool’s pricing and scalability can be better."
What is our primary use case?
What needs improvement?
The tool’s pricing and scalability can be better.
For how long have I used the solution?
I have been using the solution for five years.
What do I think about the stability of the solution?
I would rate the tool’s stability a ten out of ten. It is stable.
Buyer's Guide
CyberArk Privileged Access Manager
January 2026
Learn what your peers think about CyberArk Privileged Access Manager. Get advice and tips from experienced pros sharing their opinions. Updated: January 2026.
880,901 professionals have used our research since 2012.
What do I think about the scalability of the solution?
I would rate the tool’s scalability an eight out of ten. The tool is scalable.
How was the initial setup?
I would rate the tool’s setup a nine out of ten. The solution’s setup is easy. We have a good internal implementation team who completed the deployment in a few days. About five to six engineers worked on the tool’s deployment.
What about the implementation team?
We have an internal integrator for the tool.
What was our ROI?
We have seen ROI with the tool’s use.
What's my experience with pricing, setup cost, and licensing?
I would rate the tool’s pricing a six out of ten.
What other advice do I have?
The tool is robust and our IT team is happy with it. It provides you with strong security.
Which deployment model are you using for this solution?
On-premises
Disclosure: My company has a business relationship with this vendor other than being a customer. Reseller
Technical Manager at a tech services company with 11-50 employees
Lots of features with a great performance and the ability to expand
Pros and Cons
- "Performance-wise, it is excellent."
- "Sometimes the infrastructure team is hesitant to provide more resources."
What is our primary use case?
The concern on our end was separating the components, including the password storage component, and having everything completely separated.
What is most valuable?
The scalability is very easy.
The most valuable aspect was being to be able to manage it through multiple mediums. We can manage it through its command line interface, web view, and directly logging into the digital environment with permission. You have multiple mediums. You don't have to give direct access to the world every time you want to limit what admins should do and what they should not do.
CyberArk has the biggest number of features available when you compare it to other PAN solutions like BeyondTrust, Thycotic, and Delinea. They tend to have a lot of separate components.
Performance-wise, it is excellent.
What needs improvement?
The components of their web view, policy manager, and session manager, most of them are separated. We need something which can unify those components into a single appliance. Sometimes the infrastructure team is hesitant to provide more resources.
They have a lot of out-of-the-box integrations with a lot of other products. However, I would want them to bring on some kind of similar platform. If they can bring up the SSO on-prem, that would be ideal, as they don't have those things on-premises. They only provide that for the cloud. If they can do that, it would actually help a lot of us and keep us from trying to acquire multiple technologies for solutions.
For how long have I used the solution?
I've used the solution for six or seven years at this point.
What do I think about the stability of the solution?
We are very stringent on the performance metrics and would rate the solution very high. It's stable.
What do I think about the scalability of the solution?
We found that scalability was much easier in CyberArk. In BeyondTrust, scalability required purchasing extra virtual machines every time we wanted to scale it up. However, in CyberArk, we don't need to purchase extra components. It comes along with the line.
Currently, we have around 78 to 80 admins, and there are around 200 underlying accounts.
Which solution did I use previously and why did I switch?
We previously used BeyondTrust.
Which other solutions did I evaluate?
I haven't compared it to Thycotic yet, however, from what I have read, it looks like CyberArk is better. I've also looked into Delinea.
What other advice do I have?
We are reselling the solution to customers.
I'd rate the solution nine out of ten. It's quite a good product.
Which deployment model are you using for this solution?
On-premises
Disclosure: My company has a business relationship with this vendor other than being a customer.
Buyer's Guide
CyberArk Privileged Access Manager
January 2026
Learn what your peers think about CyberArk Privileged Access Manager. Get advice and tips from experienced pros sharing their opinions. Updated: January 2026.
880,901 professionals have used our research since 2012.
Procurement Manager at a hospitality company with 501-1,000 employees
Easy to set up and fairly priced with helpful support
Pros and Cons
- "We found the initial setup to be easy."
- "We would, of course, always prefer it if the pricing was cheaper."
What is most valuable?
The product is fairly priced.
It's stable.
The solution is scalable.
People are quite satisfied with the way it's working and the support we receive.
The security is good.
The interface is fine, although I'm not directly using it too much.
We found the initial setup to be easy.
What needs improvement?
We would, of course, always prefer it if the pricing was cheaper.
For how long have I used the solution?
I've been using the solution for four or five years.
What do I think about the stability of the solution?
It's stable. There are no bugs or glitches. It's reliable. It does not crash or freeze.
What do I think about the scalability of the solution?
We have more than 100 people on the solution right now. 20 to 30 are likely admins.
The solution is scalable. We can increase licenses as needed.
How are customer service and support?
Technical support has been helpful and responsive. We are happy with their support.
Which solution did I use previously and why did I switch?
I can't speak to what solutions, if any, we used previously.
How was the initial setup?
The solution is very simple and straightforward. It's not complex at all.
What's my experience with pricing, setup cost, and licensing?
I know that CyberArk is now changing the pricing model to subscription-based. My understanding is renewals will be done on the subscription-based models. The pricing is reasonable. We pay annually.
The costs depend on if you were talking about the access of internal or external users. There is also an extra external fee for supporting the licensing.
What other advice do I have?
We are end-users and customers.
This is a stable, reasonably priced product. It has good security features as well. Since we received the renewal request, it's been working very well.
I'd rate the product eight out of ten.
Which deployment model are you using for this solution?
On-premises
Disclosure: My company does not have a business relationship with this vendor other than being a customer.
Assistant Vice President for Cyber Security Project at a financial services firm with 1,001-5,000 employees
Plenty of features, scalable, and responsive support
Pros and Cons
- "All of the features of CyberArk Privileged Access Manager are valuable."
- "The initial setup of CyberArk Privileged Access Manager difficulty depends on the environment that you are implementing it into. However, it typically is simple."
What is our primary use case?
We are using CyberArk Privileged Access Manager for securing access to the host or the server. The solution has the capability to record activity on the server, rotate the passwords, kick out an active user, and complete an action if suspicious activity is triggered on the server. We typically only use the solution for accessing the target server and for password rotations.
How has it helped my organization?
One of the benefits of using CyberArk Privileged Access Manager is we have an audit trail that fits the requirements of our organization and we are more secure using the features of the solution, such as investigating and tracking.
What is most valuable?
All of the features of CyberArk Privileged Access Manager are valuable.
For how long have I used the solution?
I have been using CyberArk Privileged Access Manager for approximately six months.
What do I think about the stability of the solution?
CyberArk Privileged Access Manager is stable.
What do I think about the scalability of the solution?
The scalability of CyberArk Privileged Access Manager is very good.
We have approximately 300 users using the solution.
How are customer service and support?
The partner support we have in Indonesia is fast and responsive to our needs. They are available if we are facing a problem. However, there is still room for improvement.
I rate the support from CyberArk Privileged Access Manager an eight out of ten.
How would you rate customer service and support?
Positive
Which solution did I use previously and why did I switch?
I was previously using MEGA HOPEX.
How was the initial setup?
The initial setup of CyberArk Privileged Access Manager difficulty depends on the environment that you are implementing it into. However, it typically is simple.
I rate the initial setup of CyberArk Privileged Access Manager a five out of ten.
What about the implementation team?
We use a third party to do the implementation of the solution. We purchased preventive and corrective maintenance from our partner.
What's my experience with pricing, setup cost, and licensing?
There are additional features added to our CyberArk Privileged Access Manager license. For example, features that allow us to integrate into various kinds of platforms.
What other advice do I have?
I would recommend this solution to others. It has great value and it ensures your environment is secure and it is most important in production. If your company is a financial institution it is a lot of times mandatory to have a solution similar to this in operation because of cyber security concerns. We need to have preventive or professional action and one of those elements is to have a secure platform.
I rate CyberArk Privileged Access Manager an eight out of ten.
Which deployment model are you using for this solution?
On-premises
Disclosure: My company does not have a business relationship with this vendor other than being a customer.
Consultant at a recruiting/HR firm with 10,001+ employees
Reliable and great for securing environments but could be more user-friendly
Pros and Cons
- "The solution is scalable."
- "It can be made user-friendly, in the sense of the console is pretty outdated."
What is our primary use case?
CyberArk is for Privileged Access Management, so we secure our privileged accounts using CyberArk.
What is most valuable?
The main, most valuable aspect is its capability to secure our environment. That's the main reason why we are using it.
What needs improvement?
It can be made user-friendly, in the sense of the console is pretty outdated. They could add more enhancements, et cetera.
They could add more built-in connection components to support various other application platforms. The built-in connection components available are mostly not fit for our purpose. We need to do additional customization to make it work.
For how long have I used the solution?
I’ve used the solution for almost two years.
What do I think about the stability of the solution?
Stability is fine so far, other than a couple of phishes every once in a while.
What do I think about the scalability of the solution?
25 people are using the solution.
The solution is scalable. It’s on the cloud, which makes it simple.
How are customer service and support?
We have enterprise support from the vendors.
The response time could be a bit better. Some people don’t have the access to be able to jump in right away. Sometimes we need someone from the development team who has access to help.
How would you rate customer service and support?
Neutral
Which solution did I use previously and why did I switch?
I’ve never had experience with any other vendors.
How was the initial setup?
The initial setup was not that straightforward. However, we had vendor support, and we were able to fix all the issues.
It took us almost a month to deploy the solution.
I’d rate the solution a three out of five in terms of ease of setup.
In terms of maintenance, some of the components are not in the cloud, so we handle these aspects ourselves. We have a dedicated team for it.
What about the implementation team?
We initiated the setup with the help of the vendor.
What's my experience with pricing, setup cost, and licensing?
I don’t deal with the licensing. That said, my understanding is that it is on the higher side.
When we need enhancements, we do have to pay more.
What other advice do I have?
We are CyberArk partners. I’m a consultant.
We’re always using the most up-to-date solution version, as we are utilizing the cloud.
We use it mostly to secure our privileged accounts. We don't actively use any other products of CyberArk.
I’d recommend the solution. It’s ideal for smaller organizations.
I would rate it seven out of ten.
Which deployment model are you using for this solution?
Public Cloud
Disclosure: My company has a business relationship with this vendor other than being a customer. Partner
Identity and Access Management Engineer at a tech services company with 1-10 employees
Is user-friendly and easy to deploy, and integrates well with other products
Pros and Cons
- "Creating policies and the password rotation feature have been valuable. We don't have to memorize our password for the ADM account."
- "Report creation could be improved. The policies could be more customized."
What is our primary use case?
We use this solution for the user ADM account onboarding process within our company. If they need server access, we create ADM accounts, and we onboard to CyberArk.
We use it also for the password protection process with other products. We can use this as a password wallet, and we create the password rotation in CyberArk.
We can grant access, check the system's health, and create policies for users.
What is most valuable?
Creating policies and the password rotation feature have been valuable. We don't have to memorize our password for the ADM account.
Security wise, it's really safe. The password expires within six to eight hours, so no one can get that password from us. Other users can't log in without our credentials, and also, the ADM account password will automatically rotate.
It's really user-friendly as well.
What needs improvement?
Report creation could be improved.
The policies could be more customized.
For how long have I used the solution?
I've been working with this solution for almost nine months. It's deployed on the cloud.
What do I think about the stability of the solution?
The stability is really good.
What do I think about the scalability of the solution?
We have more than 2000 users, and it's really easy to scale.
Which solution did I use previously and why did I switch?
I have worked with Thycotic before. It is not user-friendly, although it has changed a lot.
Implementation was really hard, and the reporting was not as good as the users expected. In comparison to CyberArk, Thycotic was not better.
How was the initial setup?
The deployment process is really easy, and I would give it a four out of five.
What about the implementation team?
We got support from the CyberArk team but deployed it ourselves. It was easy to follow the documentation and user guide.
What's my experience with pricing, setup cost, and licensing?
CyberArk is an expensive product.
What other advice do I have?
If you can afford CyberArk Privileged Access Manager or you are looking 5 to 10 years in the future, it's a good investment. You will gain experience handling all these pieces using the one product. You can easily integrate with other products also.
You would have maintenance with other PAM products, and you won't with CyberArk. You can save that money by investing in a high quality product from the beginning itself.
Overall, I would rate CyberArk Privileged Access Manager at eight on a scale from one to ten.
Disclosure: My company does not have a business relationship with this vendor other than being a customer.
Manager Engineering at a comms service provider with 1,001-5,000 employees
Once you complete the setup, you have everything at the click of a button.
Pros and Cons
- "The logs and reporting features are impressive."
- "CyberArk's license is too expensive. I rate it seven out of 10 for affordability."
What is our primary use case?
We Enterprise Password Vault to manage privileged credentials as well as some server and activity logging.
How has it helped my organization?
Before we implemented CyberArk, we had no password vault, so it was challenging to keep a record of who made changes and had access. With CyberArk, everything is a click away for us. We don't need to worry about reporting and other things. We can on our server to check who had access and the changes they made.
What is most valuable?
The logs and reporting features are impressive.
For how long have I used the solution?
We've been using CyberArk for about five years now.
What do I think about the stability of the solution?
CyberArk is stable, and the performance is awesome.
What do I think about the scalability of the solution?
CyberArk is highly scalable. You don't need to worry about being dependent on only one server because you can deploy to multiple ones and manage it with all of them. If one fails, you can still use your access, so I think it's scalable.
We aren't using the solution extensively, but we plan to expand, and we'll definitely we'll continue with the same solution.
How are customer service and support?
I rate CyberArk support 10 out of 10. We have contacted tech support a few times for help with some of the cases, and the support was perfect.
How would you rate customer service and support?
Positive
Which solution did I use previously and why did I switch?
We didn't have a password vault solution before CyberArk.
How was the initial setup?
The initial setup was straightforward for us, but it depends on how you want to use it. It will become a little complex, and you need to gain some knowledge to customize it how you want. That applies to any product. I'll rate CyberArk 10 out of 10 for ease of setup.
It took us around five or six months to deploy because we were also testing out some other products at the same time. And after testing for a few months, we decided to go with CyberArk for the final production rollout. Once you complete the setup, you don't need much maintenance, but we have around 40 system administrators managing the CyberArk server.
What about the implementation team?
We did the deployment with our in-house team.
What's my experience with pricing, setup cost, and licensing?
CyberArk's license is too expensive. I rate it seven out of 10 for affordability.
Which other solutions did I evaluate?
We tried a couple of solutions before selecting CyberArk. Some of them are highly secure, but the reporting functions were tricky. A few were highly scalable, but they required a lot of resources to manage. We preferred CybeArk because it's easy to use and set up. Once you complete the setup, you have everything at the click of a button.
What other advice do I have?
I rate CyberArk Enterprise Password Vault nine out of 10. If you're worried about privileged ID management, security, and scalability, you should go with CyberArk.
Which deployment model are you using for this solution?
Private Cloud
Disclosure: My company does not have a business relationship with this vendor other than being a customer.
Senior Manager Cybersecurity at a tech vendor with 10,001+ employees
Beneficial secure server assess, useful user log access, and good support
Pros and Cons
- "CyberArk Privileged Access Manager's main benefit is it provides secure access to our servers. There are features to capture the user activity, it provides video recording processing. If the users are logged in to the server, we can see what activities they are performing. It's a very nice tool for Privileged Access Management. They have plenty of useful services and the solution has fulfilled our needs."
- "The solution could improve by adding more connectors."
What is our primary use case?
I am using CyberArk Privileged Access Manager to protect our servers. It can be either a Windows or Linux Server. Additionally, we have some network devices, and databases, such as Oracle and MySQL Server being protected.
How has it helped my organization?
It's improved our organization a lot. It has fulfilled some guidelines from the Indian government. There is some Indian government guideline for anonymity and access management. Similarly, there are guidelines for GDPR, and where we have vendor's control. CyberArk Privileged Access Manager has helped us to meet all the requirements.
What is most valuable?
CyberArk Privileged Access Manager's main benefit is it provides secure access to our servers. There are features to capture the user activity, it provides video recording processing. If the users are logged in to the server, we can see what activities they are performing. It's a very nice tool for Privileged Access Management. They have plenty of useful services and the solution has fulfilled our needs.
What needs improvement?
The solution could improve by adding more connectors.
For how long have I used the solution?
I have been using CyberArk Privileged Access Manager for two and a half years.
What do I think about the stability of the solution?
CyberArk Privileged Access Manager is a stable and reliable solution.
What do I think about the scalability of the solution?
We have approximately 200 people using this solution.
How are customer service and support?
The support team from CyberArk Privileged Access Manager is very good.
Which solution did I use previously and why did I switch?
I have not used other solutions.
How was the initial setup?
CyberArk Privileged Access Manager's initial setup is straightforward. However, it can depend on many factors, such as architecture.
What about the implementation team?
I used a partner for the implementation of the CyberArk Privileged Access Manager.
The number of people required for the implementation of CyberArk Privileged Access Manager depends on the number of applications. However, for my team, we have two to four people who were involved in the development of our architecture.
What was our ROI?
From a technology perspective, CyberArk Privileged Access Manager has helped us to improve our services. It helped us to meet our requirements or guidelines. Whether it's audit perspective, internal, or external, whatever the guideline is, it meets our needs. If there are any independent agencies that need to be involved we meet those requirements.
What's my experience with pricing, setup cost, and licensing?
The price of CyberArk Privileged Access Manager is expensive. There are no other fees other than the standard licensing fees.
Which other solutions did I evaluate?
As part of our company's policies, we have to evaluate other solutions.
What other advice do I have?
I would advise others that requirements should be discussed properly with all the stakeholders to understand their expectations. Additionally, it is important to explore our tool limitations. We should more focus on solution designing.
I rate CyberArk Privileged Access Manager a nine out of ten.
Which deployment model are you using for this solution?
On-premises
Disclosure: My company does not have a business relationship with this vendor other than being a customer.
Buyer's Guide
Download our free CyberArk Privileged Access Manager Report and get advice and tips from experienced pros
sharing their opinions.
Updated: January 2026
Product Categories
Privileged Access Management (PAM) User Activity Monitoring Enterprise Password Managers Mainframe Security Operational Technology (OT) SecurityPopular Comparisons
Azure Key Vault
Okta Platform
AWS Secrets Manager
HashiCorp Vault
Delinea Secret Server
CyberArk Endpoint Privilege Manager
CyberArk Identity
One Identity Safeguard
BeyondTrust Endpoint Privilege Management
Keeper Enterprise Password Manager
WALLIX Bastion
BeyondTrust Privileged Remote Access
Buyer's Guide
Download our free CyberArk Privileged Access Manager Report and get advice and tips from experienced pros
sharing their opinions.
Quick Links
Learn More: Questions:
- CyberArk vs. ManageEngine Password Manager Pro
- Which PAM tool do you prefer: CyberArk Privileged Access Manager, One Identity Safeguard, Delinea Secret Server, or BeyondTrust Privileged Remote A
- How does Sailpoint IdentityIQ compare with CyberArk PAM?
- What is the difference between Privileged Users and Privileged Accounts
- When evaluating Privileged Identity Management, what aspect do you think is the most important to look for?
- How was the 2020 Twitter Hack carried out? Could it have been prevented?
- Which is the best Privileged Account Management solution?
- What are the top 5 PAM solutions that can be implemented which cover both hybrid and cloud?
- What are the top 5 PAM solutions?
- How will AI and ML help or work with PIM/PAM?

















