- This product provides accountability and audit trails for privileged account access.
- Automatic password rotation every 24 hours to adhere to our internal compliance guidelines.
Technologist - Specialty in Identity and Access Management at Sears Technology Services Incorporated
The DNA scan is very helpful and provides a security baseline for your environment
What is our primary use case?
How has it helped my organization?
- It helped us in SOX, PCI, PII and HIPAA compliance.
- Accountability, as far as knowing who has access to what.
What is most valuable?
- Reporting and PSM I feel are the two biggest points for us. We provide our audit team with failed password reporting, safe membership, and privileged account inventory reporting.
- The DNA scan is very helpful and provides a security baseline for your environment. I highly recommend running a DNA scan on your environment.
What needs improvement?
- Implementation documentation could use some improvement in a few areas. LDAP integration would be one area.
- Providing a way to group accounts by application would be nice.
Buyer's Guide
CyberArk Privileged Access Manager
November 2024
Learn what your peers think about CyberArk Privileged Access Manager. Get advice and tips from experienced pros sharing their opinions. Updated: November 2024.
816,660 professionals have used our research since 2012.
For how long have I used the solution?
Three to five years.
Disclosure: I am a real user, and this review is based on my own experience and opinions.
Senior Consultant (CyberArk) at a financial services firm with 10,001+ employees
The Enterprise Password Vault protects privileged IDs within a secure digital vault.
What is most valuable?
EPV (Enterprise Password Vault) is the most valuable feature of the product to me. It is the core of the product, where it stores the passwords it needs to protect. It protects privileged IDs within a secure digital vault.
What needs improvement?
User friendliness and reporting: While the PVWA (Password Vault Web Access) provides a web console for the end user and administrator to access the solution, there is room for improvement. (E.g.: show tips when the mouse hovers over.) Reportingprovides very detailed information; however, it requires customization before it is presentable.
For how long have I used the solution?
I first got introduced to CyberArk around 2012.
What do I think about the stability of the solution?
No issue with stability. The solution provides an HA option.
What do I think about the scalability of the solution?
I would say there are scalability issues. After the solution is deployed, resizing it is difficult. Therefore, proper sizing at the planning stage is important.
How are customer service and technical support?
Technical support is excellent; one of the most knowledgeable and well-trained support staff.
Which solution did I use previously and why did I switch?
I did not previously use a different solution.
How was the initial setup?
Initial setup was complex. A typical deployment will require at least two months of full-time planning. In a large deployment, it can be over six months.
Which other solutions did I evaluate?
Before choosing this product, I did not evaluate other options.
What other advice do I have?
A well-trained and experienced deployment team is critical. Sizing, safe design, and access management need to be discussed beforehand.
reason for not being a 10 is, there is always rooms for improvements.
Disclosure: I am a real user, and this review is based on my own experience and opinions.
Buyer's Guide
CyberArk Privileged Access Manager
November 2024
Learn what your peers think about CyberArk Privileged Access Manager. Get advice and tips from experienced pros sharing their opinions. Updated: November 2024.
816,660 professionals have used our research since 2012.
Network Engineer at Pronet
Works well and is easy to set up but support needs a faster response time
Pros and Cons
- "The solution is stable."
- "The support services could act faster when people reach out to resolve issues."
What is our primary use case?
It is a PAM solution, in which we provide privileged access to CyberArk and the users who are using to try to access their devices. They onboard on the CyberArk and then, whenever they need to access the devices, they get access to CyberArk which means they have to log in on CyberArk.
What is most valuable?
The models as a whole are great. I'm not sure if I can pull out specific features. I like that if we execute the user can't access their devices. If you remove the session manager, the user can't access their devices. It helps ensure we can protect our organization and data. The session manager is the most critical part of CyberArk's PAM solution.
It works perfectly well.
The solution is pretty easy to set up.
The solution is stable.
It's scalable.
What needs improvement?
The support services could act faster when people reach out to resolve issues.
For how long have I used the solution?
I've been using the solution for the last two years.
What do I think about the stability of the solution?
It's a stable product.
We have deployed CyberArk for two years, and so far, we haven't received any issues regarding any bugs or anything like that. We haven't faced any issues. There are some challenges regarding user access. We have to explain to users who are not familiar with the PAM solution what to do, however, regarding stability, or regarding bugs we haven't faced any issues.
What do I think about the scalability of the solution?
It's a scalable product. For example, in my scenario, the deployment that I have done, if I want to scale it up or if I want to extend it, I can easily add the next module in that. There are no challenges regarding scalability.
I have only one deployment in Pakistan. It is at one of the largest banks in Pakistan here which has thousands of users on CyberArk.
How are customer service and support?
Technical support is good. I haven't faced any issues. If you're looking at the response time, I will say that it's quite a long wait.
How was the initial setup?
The setup process of CyberArk is quite typical. Once you understand the process, it is very easy for you. That said, for a newbie, it may be a bit difficult. For example, for the PSM module, we have to make changes in the registry of the devices. You have to collaborate with your system team to make a configuration. I can get complex. That said, once you know, it's very easy.
What about the implementation team?
I have been through the process of implementing the solution for clients.
What's my experience with pricing, setup cost, and licensing?
The licensing can be yearly or over a couple of years. Support needs to be renewed every year.
What other advice do I have?
We have four models which we are using.
The first one has a wall that which we have deployed on the particular server. The next one is the CPM which is the Central Policy Manager through which we enforce the password policy and password rotation policies.
I'd recommend the solution to others.
We have conducted a POC in Pakistan on multiple sites with different customers. CyberArk is a quite typical product and can be a bit expensive, so it's a good idea to try it out first and make sure it is what you need.
I'd rate the solution seven out of ten.
Which deployment model are you using for this solution?
On-premises
Disclosure: My company has a business relationship with this vendor other than being a customer: Partner
Architect at a tech services company with 10,001+ employees
Extremely secure, great configuration capabilities and offers lots of plugins
Pros and Cons
- "It supports lots of requirements in the privileged access management area."
- "Its pricing is a big challenge here. When it started, the product came in at a very low cost. Now, they are the leaders in the market, so the cost has grown and is quite huge."
What is our primary use case?
The solution is primarily for security and access control.
It's used to ensure and protect the complete IT infrastructure administrative account and the administrators and limit them to do any particular activities on the server and record all the activities on the server. it's for auditing purposes and for forensic usage.
We use it o identify if somebody internally hits the organization or tries to intrude and try to do a data breach or try to steal the information or do some kind of internal hacking. That risk can be eliminated using the tool.
What is most valuable?
CyberArk is one of the greatest platforms. It supports lots of requirements in the privileged access management area.
From a configuration point of view, it is not very straightforward as per the deployment. The configuration is typical. However, when it comes to the integration piece, it has flawless integrations with lots of applications, whether it is out-of-the-box or customized. It supports any number of platforms.
The company is very keen on looking at new applications to build out-of-the-box plugins. The support for the privileged single sign-on configurations with the application is excellent.
Security-wise, the security is unbeatable compared to any other tool in the industry. They have a vault concept. They consider it similar to a bank vault. This is where they keep all the privileged admins' passwords. That particular vault has seven layers of security, which are unbreakable. It basically cannot be hacked. It cannot be hijacked.
If something goes wrong, for example, if the vault is destroyed, your data is still protected. You can easily revive your data from that particular vault. It's a great capability. The security is excellent. It is very, very tight here. They support one signal protocol kind of communication with the internal products.
Where your password will be residing that is protected by a seven-layer of security. It has a web interface hosted on an IAS server on Windows. It has a CPM called central password management, which will do the password rotation. That is sitting on one other server. It has a session manager, which provides the single sign-on mechanism, privileged single sign-on mechanism, or automatic single sign-on to log into any infrastructure servers and applications. These are the four core products, and they integrate with each other and they integrate on one single port.
If you try to intrude on the system or any hackers try to intrude the system, they will not be able to do that as the communication through this port is entirely encrypted. They will not be able to revive the data in real-time. It's a great security feature.
It supports hybrid deployments as well. It supports single standalone deployments for high availability with different kinds of deployment structures or topologies. This is a growing trend in the market.
What needs improvement?
They can work on the pricing part. Its pricing is a big challenge here. When it started, the product came in at a very low cost. Now, they are the leaders in the market, so the cost has grown and is quite huge.
For how long have I used the solution?
I've used the solution for four years now.
What do I think about the stability of the solution?
The solution is very stable. It's reliable and the performance is good.
What do I think about the scalability of the solution?
Every organization is different. Some are small, some are large, and some are medium-sized. This product fits all organizations. It is designed to be scalable.
How are customer service and support?
Technical support has been excellent overall. We are pleased with their level of service.
How was the initial setup?
The setup process is typical. It's not easy to set up. It depends upon the environment, the requirement, what the customer is looking for, et cetera. If, let's say, there's 1,500 accounts, which need to be protected and 10,000 servers, which need to be protected, the deployment can be done with the two-node setup. The two-node setup is okay. However, when it comes to the larger organization where we have lots of privileged accounts and lots of servers or when the account increases to 100,000 servers and 100,000 or 200,000 privileged accounts, in those cases, the product is complex.
You need to be well trained in order to be able to execute an implementation.
What's my experience with pricing, setup cost, and licensing?
The pricing used to be very competitive. I can't speak to the exact pricing. However, it is my understanding that it has gotten more expensive.
What other advice do I have?
I'm certified in CyberArk. Earlier, we worked with CyberArk as a partner. At this point, our contract is in a renewal state.
I'd rate the solution nine out of ten.
It is a great product when it comes to security. From the security point of view, I would advise a new user to use this tool and deploy it in your environment since the security is unbeatable.
Which deployment model are you using for this solution?
Public Cloud
Disclosure: I am a real user, and this review is based on my own experience and opinions.
Manager Engineering at a comms service provider with 1,001-5,000 employees
Once you complete the setup, you have everything at the click of a button.
Pros and Cons
- "The logs and reporting features are impressive."
- "CyberArk's license is too expensive. I rate it seven out of 10 for affordability."
What is our primary use case?
We Enterprise Password Vault to manage privileged credentials as well as some server and activity logging.
How has it helped my organization?
Before we implemented CyberArk, we had no password vault, so it was challenging to keep a record of who made changes and had access. With CyberArk, everything is a click away for us. We don't need to worry about reporting and other things. We can on our server to check who had access and the changes they made.
What is most valuable?
The logs and reporting features are impressive.
For how long have I used the solution?
We've been using CyberArk for about five years now.
What do I think about the stability of the solution?
CyberArk is stable, and the performance is awesome.
What do I think about the scalability of the solution?
CyberArk is highly scalable. You don't need to worry about being dependent on only one server because you can deploy to multiple ones and manage it with all of them. If one fails, you can still use your access, so I think it's scalable.
We aren't using the solution extensively, but we plan to expand, and we'll definitely we'll continue with the same solution.
How are customer service and support?
I rate CyberArk support 10 out of 10. We have contacted tech support a few times for help with some of the cases, and the support was perfect.
How would you rate customer service and support?
Positive
Which solution did I use previously and why did I switch?
We didn't have a password vault solution before CyberArk.
How was the initial setup?
The initial setup was straightforward for us, but it depends on how you want to use it. It will become a little complex, and you need to gain some knowledge to customize it how you want. That applies to any product. I'll rate CyberArk 10 out of 10 for ease of setup.
It took us around five or six months to deploy because we were also testing out some other products at the same time. And after testing for a few months, we decided to go with CyberArk for the final production rollout. Once you complete the setup, you don't need much maintenance, but we have around 40 system administrators managing the CyberArk server.
What about the implementation team?
We did the deployment with our in-house team.
What's my experience with pricing, setup cost, and licensing?
CyberArk's license is too expensive. I rate it seven out of 10 for affordability.
Which other solutions did I evaluate?
We tried a couple of solutions before selecting CyberArk. Some of them are highly secure, but the reporting functions were tricky. A few were highly scalable, but they required a lot of resources to manage. We preferred CybeArk because it's easy to use and set up. Once you complete the setup, you have everything at the click of a button.
What other advice do I have?
I rate CyberArk Enterprise Password Vault nine out of 10. If you're worried about privileged ID management, security, and scalability, you should go with CyberArk.
Which deployment model are you using for this solution?
Private Cloud
Disclosure: I am a real user, and this review is based on my own experience and opinions.
Senior Product Manager and Technology Consultant at Barikat
A robust, stable, and scalable solution for protecting passwords
Pros and Cons
- "It is useful for protecting passwords. If you need to do access security management, you can first use the CyberArk console, and after that, you can connect the firewall interface or firewall command line. Similarly, if you need to do an RDP session, you need to first log in to CyberArk before connecting to the Windows RDP session. This way, the admin doesn't know the password, and that password is changed immediately. To change the password, you first discover the old password in the network, and after that, you can change the password."
- "It can be integrated with other systems, but it is not easy to integrate. It takes too long to integrate it. Its integration should be easier and simpler."
What is most valuable?
It is useful for protecting passwords. If you need to do access security management, you can first use the CyberArk console, and after that, you can connect the firewall interface or firewall command line. Similarly, if you need to do an RDP session, you need to first log in to CyberArk before connecting to the Windows RDP session. This way, the admin doesn't know the password, and that password is changed immediately. To change the password, you first discover the old password in the network, and after that, you can change the password.
What needs improvement?
It can be integrated with other systems, but it is not easy to integrate. It takes too long to integrate it. Its integration should be easier and simpler.
What do I think about the stability of the solution?
Its stability is very good. It is a very robust and stable product if you have the correct installation and configuration. Otherwise, you would have problems.
What do I think about the scalability of the solution?
It is scalable. Our customers are enterprises with a minimum of 2,000 users and maybe 100 admin users.
How are customer service and technical support?
We are satisfied with their support. Our customers need local support, and CyberArk provides that. Their documentation is also good.
How was the initial setup?
It is a little complex as compared to its competitors. Its deployment took a long time.
What about the implementation team?
We had a consultant, and we were satisfied with the service. You need someone with one or two years of experience.
What's my experience with pricing, setup cost, and licensing?
They have two types of licensing: purchase and subscription. You have to pay for each admin user, such as Microsoft admin, mail admin, database admin, etc.
What other advice do I have?
I would rate CyberArk Privileged Access Security an eight out of ten. It is a good product.
Disclosure: My company has a business relationship with this vendor other than being a customer: Partner
IT Security at a manufacturing company with 10,001+ employees
It gives us the capability to rotate passwords
Pros and Cons
- "It gives us the capability to rotate passwords."
- "There were a lot of manual steps in the initial setup which could have been automated. I read the 10.4 release that was sent out about a month or two ago, and I saw the steps required for upgrade have been reduced by about 90%. That was a big thing for me, but I still haven't seen that yet because we have not upgrade past 9.9.5."
- "We need a bit more education for our user community because they are not using it to its capabilities."
What is our primary use case?
We use it for service accounts and local accounts for the machine. We are basically using it to rotate passwords or reconciling passwords, as needed. We do have a number which get changed on a yearly basis (most do). Some get changed on a more frequent basis. Users go into the safes that they have access to or whatever account they need, and they pull it. That is our use case.
It is performing well. However, we need a bit more education for our user community because they are not using it to its capabilities.
We are interested in utilizing the CyberArk secure infrastructure or running applications in the cloud. We are actively implementing Conjur right now just on a test basis to see how it goes.
How has it helped my organization?
It gives us the capability to rotate passwords. That is the biggest thing. We do not want them being stagnant so every service account that we have needs to be rotated at least once a year.
What is most valuable?
Being able to automatically change usages, whenever the password is reconciled. However, we still have to educate the user community, because not all our users enter the usages.
What needs improvement?
PSM: I am going to go back to my company and push for it a little bit more within our groups, because I know that my counterpart has brought it up a number of times in the past. It has been getting blocked, but I have a couple of other paths that we can pursue so we can try to get it, at least, in our infrastructure and tested.
For how long have I used the solution?
More than five years.
What do I think about the stability of the solution?
It has been stable. We have not had too many issues with it or any downtime.
What do I think about the scalability of the solution?
It should be able to meet our needs going forward. I don't foresee us leveraging thousands more accounts than we already do. I think it will be fine.
How was the initial setup?
I have done many upgrades on many different systems and applications. It was more of a difficult upgrade path only because there were a lot of small things which could have been done if it were prepackaged into scripts inside the executable during the installation. For example, it automatically stops services so it can do the upgrade.
There were a lot of manual steps which could have been automated. I read the 10.4 release that was sent out about a month or two ago, and I saw the steps required for upgrade have been reduced by about 90%. That was a big thing for me, but I still haven't seen that yet because we have not upgrade past 9.9.5.
What was our ROI?
The ROI on this is just being able to rotate on a 365 day schedule the passwords.
What other advice do I have?
Educate the user community once you get it actively deployed and set up a strict policy on it.
Most important criteria when selecting a vendor:
- Good reputation for technical support
- Product that does what it is supposed to do.
Disclosure: PeerSpot contacted the reviewer to collect the review and to validate authenticity. The reviewer was referred by the vendor, but the review is not subject to editing or approval by the vendor.
CyberArk Consultant at a hospitality company with 10,001+ employees
Preemptively helps us detect major threats and vulnerabilities and to address them
Pros and Cons
- "The most important feature is managing the credentials and implementing those policies which rotate the credentials. Session Manager is also key in not letting the users have access to those credentials. Instead, CyberArk actually manages everything by itself."
- "As a customer, I might need a plugin for a specific product, or an application, and CyberArk might have already worked with some other client on it. There has to be some platform where it is available for everybody else to go and grab it, instead of my having to reinvent the wheel."
What is our primary use case?
CyberArk is managing our privileged accounts: most of the service accounts, admin accounts, and all other privileged accounts on different platforms including Windows and Linux. A lot of databases have already been onboarded. At the moment we are working towards integrating, or implementing, the AIM product to make sure those hard-coded credentials are being managed by CyberArk, instead of being directly coded in.
The plan is to utilize CyberArk secure infrastructure applications running in the cloud, but we will definitely have to upgrade our knowledge. Conjur is one of the very important things we are currently considering, in addition to, of course, AWS and Azure. We have to get ourselves up to speed. So at the moment, we are setting up the platform, but eventually, that is what the goal is.
Currently, we are not using CyberArk secure application credentials and endpoints.
How has it helped my organization?
It helps us in identifying and detecting the major threats and vulnerabilities and to make sure those vulnerabilities are addressed before something bad happens. It is more of a preemptive solution, to take care of our weaknesses and overcome them.
We have been continuously monitoring, reporting, and observing where we were a few years ago, or a few months ago, and where we are now. There is continuous improvement in our security posture and that is where the satisfaction is. The solution is really doing what it is supposed to be doing, helping us to improve our security.
What is most valuable?
The most important feature is managing the credentials and implementing those policies which rotate the credentials. Session Manager is also key in not letting the users have access to those credentials. Instead, CyberArk actually manages everything by itself.
What needs improvement?
As a customer, I might need a plugin for a specific product, or an application, and CyberArk might have already worked with some other client on it. There has to be some platform where it is available for everybody else to go and grab it, instead of my having to reinvent the wheel.
For how long have I used the solution?
Three to five years.
What do I think about the stability of the solution?
So far it has been absolutely wonderful. Of course, the initial glitches, the initial testing, the adjustments in implementation are there. It takes a lot of effort but, once it was all set and it started doing its processes, I haven't seen any concerns or issues.
We haven't had any post-implementation downtime at all, because we have our infrastructure set up in a way that we have active-passive standby on the CPMs. We have PVWAs in a load-balanced environment, we have multiple PSMs in a load-balanced environment as well. They compliment each other, so even if there is work or maintenance happening on one of the components, the other component is there to provide support, and ongoing access to all the users, without having any downtime.
What do I think about the scalability of the solution?
The scalability is definitely very powerful. We did upgrade it, migrate it, a couple of times in the past. Previously I was involved in migrations and, of course, adding more resources, or more accounts - onboarding. It has been amazing.
How is customer service and technical support?
Occasionally when we are doing a new integration, or run into issues we are not able to fix by ourselves, we use technical support. Escalations have been done, and the support has been absolutely outstanding.
How was the initial setup?
For the initial setup, where there are out-of-the-box plugins, it is pretty straightforward. But when we start going into a more advanced level, where a new plugin has to be developed, or the connection component has to be developed, there is a bit of a complexity. But again, nothing too complex, nothing which cannot be achieved.
What was our ROI?
Technically, just managing all those privileged accounts and securing our environment, we feel it is much more secure than it was before. So the ROI it is definitely working out.
What other advice do I have?
Take this solution over any other solution. In fact, I have personally brought a couple of my old colleagues with a technical background into this product line so that most of them are now certified on CyberArk and working in the same environment as well.
Without doubt CyberArk is a 10 out of 10. From my experience, the kind of work I have done with this solution, it's absolutely amazing. It has the capabilities to secure the environment, which is the most important part. Anytime we hear any news of breaches elsewhere, that's when we say, "Hey, they should have done something, implemented the solution before they were hit." Once they are hit, they run around and try to fix the problems. But CyberArk, it's an amazing solution.
When it comes to selecting or working with a vendor, our most important criteria are access to support, what level of support is available, how fast the turnaround can be. The executives or the account team have to be very accessible to us, so if we need to implement a new product or new integration we should at least be able to get hold of the people who can guide us in the right direction.
Disclosure: PeerSpot contacted the reviewer to collect the review and to validate authenticity. The reviewer was referred by the vendor, but the review is not subject to editing or approval by the vendor.
Buyer's Guide
Download our free CyberArk Privileged Access Manager Report and get advice and tips from experienced pros
sharing their opinions.
Updated: November 2024
Product Categories
Privileged Access Management (PAM) User Activity Monitoring Enterprise Password Managers Mainframe Security Operational Technology (OT) SecurityPopular Comparisons
Okta Workforce Identity
Delinea Secret Server
CyberArk Endpoint Privilege Manager
BeyondTrust Endpoint Privilege Management
WALLIX Bastion
One Identity Safeguard
BeyondTrust Privileged Remote Access
BeyondTrust Password Safe
ARCON Privileged Access Management
Delinea Privileged Access Service
ManageEngine PAM360
Symantec Privileged Access Manager
Buyer's Guide
Download our free CyberArk Privileged Access Manager Report and get advice and tips from experienced pros
sharing their opinions.
Quick Links
Learn More: Questions:
- CyberArk vs. ManageEngine Password Manager Pro
- How does Sailpoint IdentityIQ compare with CyberArk PAM?
- Which PAM tool do you prefer: CyberArk Privileged Access Manager, One Identity Safeguard, Delinea Secret Server, or BeyondTrust Privileged Remote A
- What is the difference between Privileged Users and Privileged Accounts
- When evaluating Privileged Identity Management, what aspect do you think is the most important to look for?
- Which is the best Privileged Account Management solution?
- What are the top 5 PAM solutions that can be implemented which cover both hybrid and cloud?
- What are the top 5 PAM solutions?
- How will AI and ML help or work with PIM/PAM?
- Is BeyondTrust Endpoint Privilege Management really expensive compared to other tools or software?