We use the solution for password vaulting, password rotation, session management, and secret management.
Information Security Consultant at a tech vendor with 10,001+ employees
Reduces organizational risk with password vaulting, password rotation, session management, and secret management
Pros and Cons
- "We use the solution for password vaulting, password rotation, session management, and secret management."
- "CyberArk Enterprise Password Vault must incorporate connectors for password and session managers in the marketplace."
What is our primary use case?
What needs improvement?
CyberArk Enterprise Password Vault must incorporate connectors for password and session managers in the marketplace.
For how long have I used the solution?
I have been working with the product for seven years.
What do I think about the stability of the solution?
The product is highly stable.
Buyer's Guide
CyberArk Privileged Access Manager
February 2025

Learn what your peers think about CyberArk Privileged Access Manager. Get advice and tips from experienced pros sharing their opinions. Updated: February 2025.
838,713 professionals have used our research since 2012.
What do I think about the scalability of the solution?
CyberArk Enterprise Password Vault is highly scalable. My company has over 3000 users. We use it regularly.
How are customer service and support?
CyberArk Enterprise Password Vault's support quality is good, but there are delays.
How would you rate customer service and support?
Neutral
How was the initial setup?
I rate the tool's deployment an eight out of ten. Experienced engineers can complete the deployment in a few days. We need three to four resources to complete the deployment.
What was our ROI?
CyberArk Enterprise Password Vault reduces risks.
What's my experience with pricing, setup cost, and licensing?
I rate the tool's pricing an eight out of ten.
What other advice do I have?
I rate CyberArk Enterprise Password Vault a nine out of ten.
Which deployment model are you using for this solution?
On-premises
Disclosure: I am a real user, and this review is based on my own experience and opinions.

Lead Automation Developer at COUNTRY Financial
CyberArk's Password Vault is a must have for Privileged Account & Identity management
Pros and Cons
- "AIM has been a great help in automating password retrieval which removes the need for hard-coded credentials."
What is our primary use case?
To securely manage privileged accounts within the enterprise and automate password compliance where possible. Bringing multiple account types all into a single central repository with an intuitive user interface has greatly improved our security standing. Instead of managing each account in its disparate location like Database, Active Directory, LDAP, and Mainframe, we can now do it from a single solution. This has enabled great strides in standardizations across account types for password and access management.
How has it helped my organization?
CyberArk has enabled my organization to monitor and manage privileged accounts in a secure manner while also giving the ability to adhere to password compliance automatically. CyberArk has helped us to remove hard-coded credentials in applications and scripts. Traditional password policies often fall short of providing adequate protection, but CyberArk's PAM has allowed my organization to set robust password policies that require a combination of uppercase and lowercase letters, numbers, and special characters.
What is most valuable?
AIM has been a great help in automating password retrieval which removes the need for hard-coded credentials. Hard-coded credentials are a risk to organizations as they are easy for attackers to target. Therefore less hard-coded credentials increase the security stance of the enterprise. We have greatly utilized the out-of-the-box usage automation like Windows Scheduled tasks and password config files. The reconcile feature is another must-have to give users the ability to not only change their password but to unlock it as well where needed.
What needs improvement?
CyberArk's Privileged Access Management (PAM) stands out as an industry leader, and it is often considered at the top of its class. This comprehensive solution has consistently delivered robust features and innovative security measures that make it an essential component of any organization's cybersecurity strategy. While no system is without room for advancement, CyberArk has continuously demonstrated its commitment to innovation and improvement, and many of the potential areas of improvement are already being actively addressed.
For how long have I used the solution?
I have been using this solution for 13 years.
What do I think about the stability of the solution?
This solution is very stable with the ability of satellite vaults and HA.
What do I think about the scalability of the solution?
CyberArk is incredibly scalable. Make sure to check out the unlimited option.
How are customer service and support?
Excellent service and quick responses with engineers who understand the product.
How would you rate customer service and support?
Positive
Which solution did I use previously and why did I switch?
We started out with CyberArk. When we started to look into using a PAM solution they were the leader in the space (and still are).
What was our ROI?
For the time saved and security added, the benefit far outweighs the cost.
What's my experience with pricing, setup cost, and licensing?
Check out the unlimited model as it can save money and make for a more scalable solution depending on the size and needs of your organization.
Which other solutions did I evaluate?
My company evaluated other options, but I was not with the company when this occurred.
What other advice do I have?
Contact the professional help for a demo, and you will not be disappointed. Even if you do not choose CyberArk, they can help identify current security gaps.
Which deployment model are you using for this solution?
On-premises
Disclosure: I am a real user, and this review is based on my own experience and opinions.
Buyer's Guide
CyberArk Privileged Access Manager
February 2025

Learn what your peers think about CyberArk Privileged Access Manager. Get advice and tips from experienced pros sharing their opinions. Updated: February 2025.
838,713 professionals have used our research since 2012.
Great password management, API password retrieval functionality and Rest API retrieval
Pros and Cons
- "The most valuable aspects of the solution include password management and Rest API retrieval of vaulted credentials."
- "The solution needs better features for end users to manage their own whitelisting for API retrieval."
What is our primary use case?
We primarily use the product as part of the growing security posture of the company.
How has it helped my organization?
The solution provided password management and API password retrieval functionality.
What is most valuable?
The most valuable aspects of the solution include password management and Rest API retrieval of vaulted credentials.
What needs improvement?
The solution needs better features for end users to manage their own whitelisting for API retrieval.
For how long have I used the solution?
I've used the solution for over a decade.
Disclosure: I am a real user, and this review is based on my own experience and opinions.
Consultant at a recruiting/HR firm with 10,001+ employees
Reliable and great for securing environments but could be more user-friendly
Pros and Cons
- "The solution is scalable."
- "It can be made user-friendly, in the sense of the console is pretty outdated."
What is our primary use case?
CyberArk is for Privileged Access Management, so we secure our privileged accounts using CyberArk.
What is most valuable?
The main, most valuable aspect is its capability to secure our environment. That's the main reason why we are using it.
What needs improvement?
It can be made user-friendly, in the sense of the console is pretty outdated. They could add more enhancements, et cetera.
They could add more built-in connection components to support various other application platforms. The built-in connection components available are mostly not fit for our purpose. We need to do additional customization to make it work.
For how long have I used the solution?
I’ve used the solution for almost two years.
What do I think about the stability of the solution?
Stability is fine so far, other than a couple of phishes every once in a while.
What do I think about the scalability of the solution?
25 people are using the solution.
The solution is scalable. It’s on the cloud, which makes it simple.
How are customer service and support?
We have enterprise support from the vendors.
The response time could be a bit better. Some people don’t have the access to be able to jump in right away. Sometimes we need someone from the development team who has access to help.
How would you rate customer service and support?
Neutral
Which solution did I use previously and why did I switch?
I’ve never had experience with any other vendors.
How was the initial setup?
The initial setup was not that straightforward. However, we had vendor support, and we were able to fix all the issues.
It took us almost a month to deploy the solution.
I’d rate the solution a three out of five in terms of ease of setup.
In terms of maintenance, some of the components are not in the cloud, so we handle these aspects ourselves. We have a dedicated team for it.
What about the implementation team?
We initiated the setup with the help of the vendor.
What's my experience with pricing, setup cost, and licensing?
I don’t deal with the licensing. That said, my understanding is that it is on the higher side.
When we need enhancements, we do have to pay more.
What other advice do I have?
We are CyberArk partners. I’m a consultant.
We’re always using the most up-to-date solution version, as we are utilizing the cloud.
We use it mostly to secure our privileged accounts. We don't actively use any other products of CyberArk.
I’d recommend the solution. It’s ideal for smaller organizations.
I would rate it seven out of ten.
Which deployment model are you using for this solution?
Public Cloud
Disclosure: My company has a business relationship with this vendor other than being a customer: Partner
IT Support Specialist / Project Lead at a energy/utilities company with 10,001+ employees
Provides a more secure computing environment, allowing only approved programs to run securely
What is our primary use case?
Used to allow the removal of local administrators from 12,000 endpoints and yet still allows users to have the applications they need with the proper permissions required.
How has it helped my organization?
Users were removed from local administrators group on all desktop endpoints providing a more secure computing environment, allowing only those programs approved to run securely.
What is most valuable?
- The visibility of what is being run and control of those applications.
- Limiting the unnecessary application users think they need, and producing security vulnerabilities.
What needs improvement?
Better search functionality in the EPM console. It becomes difficult to search lengthy policies for specific items. Additionally, some of the windows sizes cannot be manipulated to allow a better user experience.
For how long have I used the solution?
Less than one year.
What do I think about the stability of the solution?
The product is relatively stable, but as with most software, it has room for improvement.
What do I think about the scalability of the solution?
This solution is very scalable from what we have seen.
How are customer service and technical support?
Our experience with tech support has been positive with slight delays due to the location of some of the deep-level resources.
Which solution did I use previously and why did I switch?
No, we used no other services/software previous to EPM.
How was the initial setup?
Straightforward setup with a substantial learning curve to implement.
What about the implementation team?
We implemented in-house with the direction of a third-party.
What was our ROI?
Our ROI is currently being looked at.
What's my experience with pricing, setup cost, and licensing?
Setup, costs, and licensing are fairly straightforward and easy to navigate. Questions to the account manager typically resulted in the answers needed.
Which other solutions did I evaluate?
We looked at several different vendors and conducted detailed POCs on each to ensure we were getting what we needed.
Disclosure: I am a real user, and this review is based on my own experience and opinions.
Data Security Analyst II at a financial services firm with 5,001-10,000 employees
It hardens access and makes the organization more secure, therefore reducing chances of a breach
Pros and Cons
- "The central password manager is the most valuable feature because the password is constantly changing. If an outsider threat came in and gained access to one of those passwords, they would not have access for long."
- "The product is for hardening access and making the organization more secure, therefore reducing chances of a breach."
- "One of the main things that could be improved would be filtering accounts on the main page and increasing the functionality of the filters. There are some filters on the side which are very specific, but I feel there could be more."
What is our primary use case?
Our primary use case is to secure privileged access.
Right now, it is performing fairly well. We have had instances where we have had to work with the customer support to integrate a custom plugin and struggled a bit there. It took a bit longer than we expected, but it ended up working out. Most of our focus now is getting our systems into CyberArk, which has nothing to do with the CyberArk software. It is just being able to communicate with our internal team to get them in there. So far, we haven't had a problem with CyberArk.
How has it helped my organization?
The product is for hardening access and making the organization more secure, therefore reducing chances of a breach. That is the most beneficial to any company, avoiding any type of data loss which will reflect negatively on your company. Once that happens, you are frowned upon, and nobody wants that.
It plays a huge role in enhancing our organization's privileged access and security hygiene. We are using it for most of our open systems, like Windows and Unix. Our plan is to integrate it with our entire internal network.
What is most valuable?
The central password manager is the most valuable feature because the password is constantly changing. If an outsider threat came in and gained access to one of those passwords, they would not have access for long. That is critical and very important for the stability of our company.
What needs improvement?
One of the main things that could be improved would be filtering accounts on the main page and increasing the functionality of the filters. There are some filters on the side which are very specific, but I feel there could be more. For example, I want to look at accounts which are not working within a specific safe all at the same time.
What do I think about the stability of the solution?
So far, so good with stability. We have done a couple disaster recovery exercises with CyberArk, and they have gone according to plan.
What do I think about the scalability of the solution?
We have not gotten to scalability yet, because we are still working on integrating our systems. We have a very minute portion of it.
So, scalability will come afterwards, once we have everything there and we understand how much capacity we have used. As of now, scalability has not been an issue.
The product should meet our needs in the future.
How is customer service and technical support?
The technical support is good at communicating. I learned a lot yesterday about how to figure out a support case quicker by helping them help you, and by giving them as much information as you can. In the past, I have not done that as well as I could have.
How was the initial setup?
I was not involved in the initial setup.
What was our ROI?
Not applicable.
Which other solutions did I evaluate?
I do not have much experience with other solutions, so I don't think I can adequately compare and contrast it with others.
What other advice do I have?
CyberArk is on top of its game. The product has worked well for our company.
If you are looking at implementing this solution, buy the training and go to it. If you do not train, it is hard to understand it. It is hard to pick it up by cross-training with other people. You really want to start off strong.
Most important criteria when evaluating a technical solution:
Be brutally honest about all the factors that go into the solution that you are looking for (buyer) and what the solution can offer (seller).
Disclosure: PeerSpot contacted the reviewer to collect the review and to validate authenticity. The reviewer was referred by the vendor, but the review is not subject to editing or approval by the vendor.
CyberSecurity Service Support Specialist at Integrity Partners
Good password management with good integrations and security capabilities
Pros and Cons
- "I like the integrations for external applications."
- "The Vault's disaster recovery features need improvement."
What is our primary use case?
The primary use case and the most used functionality of CyberArk PAM is managing privileged access (an easy way to pass permissions to specific servers to specific users granularly) and password management (an automated solution that manages password validity, expiration, etc.). PSM gives a possibility to set all connections secure and it is possible to re-trace actions made by users during such sessions. It is a good tool for extending usage to new end targets sometimes even out of the box.
How has it helped my organization?
CyberArk PAM ended a scenario where several dozens or even hundreds of privileged accounts had the same password or administrators had passwords written down on sticky notes.
I have experience with onboarding thousands of accounts - mostly Windows, Unix, and network devices. I have developed (customized based on defaults) password management plugins for Unix systems and network devices.
What is most valuable?
I like the integrations for external applications. There are actually infinite possibilities of systems to integrate with - you would just need to have more time to do that. It is not an easy job, yet really valuable. I am not an expert on that, however, I try every day to be better and better. I have the support of other experienced engineers I work with so there is always someone to ask if I face any problems. End-customers sometimes have really customized needs and ideas for PSM-related usage.
What needs improvement?
The Vault's disaster recovery features need improvement. There is no possibility to automatically manage Vault's roles and for some customers, it is not an easy topic to understand.
I noticed that CyberArk changed a little in terms of the documentation about disaster recovery failover and failback scenarios. Still, it is a big field for CyberArk developers. Logically it is an easy scenario to understand - yet not for everyone, surely.
For how long have I used the solution?
I've used the solution for around five years. I have been using CyberArk PAM as an end customer for three years. For another two, I work as a CyberArk support specialist.
What do I think about the stability of the solution?
Stability is overall good. However, there are many error messages that are like false-positive - they do not produce any issue yet logs are full of information.
What do I think about the scalability of the solution?
The scaling has been mostly positive. It seems not hard to scale it up.
How are customer service and support?
Sometimes it is hard to understand the capabilities, limitations, etc. They try to help with that.
How would you rate customer service and support?
Positive
Which solution did I use previously and why did I switch?
I've never used another solution that would have the same or similar capabilities.
How was the initial setup?
The initial setup can be complex. It is important to go really carefully step-by-step with instructions. When you do that, you can be 100% sure everything will work well.
What about the implementation team?
When I was an end-customer I recall using a vendor for the implementation and support. Now, I am a vender and therefore I do it by myself.
What's my experience with pricing, setup cost, and licensing?
Licensing may sometimes seem a little complicated. A good partner from CyberArk can work it out.
Which other solutions did I evaluate?
Unfortunately, I have not participated in evaluating other options.
What other advice do I have?
Overall, I am really glad I worked with CyberArk for five years.
Which deployment model are you using for this solution?
Hybrid Cloud
Disclosure: My company has a business relationship with this vendor other than being a customer: Just like I said above - I work as a CyberArk Support Specialist mostly. My company is an integrator of cybersecurity services such as CyberArk. We also use CyberArk PAM as a product inside our organization. But still - I am a real user and this review is based on my own experience and options. I think my review is really valuable because I have sight on this product either as a end-customer and a support.
Network Engineer at Pronet
Works well and is easy to set up but support needs a faster response time
Pros and Cons
- "The solution is stable."
- "The support services could act faster when people reach out to resolve issues."
What is our primary use case?
It is a PAM solution, in which we provide privileged access to CyberArk and the users who are using to try to access their devices. They onboard on the CyberArk and then, whenever they need to access the devices, they get access to CyberArk which means they have to log in on CyberArk.
What is most valuable?
The models as a whole are great. I'm not sure if I can pull out specific features. I like that if we execute the user can't access their devices. If you remove the session manager, the user can't access their devices. It helps ensure we can protect our organization and data. The session manager is the most critical part of CyberArk's PAM solution.
It works perfectly well.
The solution is pretty easy to set up.
The solution is stable.
It's scalable.
What needs improvement?
The support services could act faster when people reach out to resolve issues.
For how long have I used the solution?
I've been using the solution for the last two years.
What do I think about the stability of the solution?
It's a stable product.
We have deployed CyberArk for two years, and so far, we haven't received any issues regarding any bugs or anything like that. We haven't faced any issues. There are some challenges regarding user access. We have to explain to users who are not familiar with the PAM solution what to do, however, regarding stability, or regarding bugs we haven't faced any issues.
What do I think about the scalability of the solution?
It's a scalable product. For example, in my scenario, the deployment that I have done, if I want to scale it up or if I want to extend it, I can easily add the next module in that. There are no challenges regarding scalability.
I have only one deployment in Pakistan. It is at one of the largest banks in Pakistan here which has thousands of users on CyberArk.
How are customer service and support?
Technical support is good. I haven't faced any issues. If you're looking at the response time, I will say that it's quite a long wait.
How was the initial setup?
The setup process of CyberArk is quite typical. Once you understand the process, it is very easy for you. That said, for a newbie, it may be a bit difficult. For example, for the PSM module, we have to make changes in the registry of the devices. You have to collaborate with your system team to make a configuration. I can get complex. That said, once you know, it's very easy.
What about the implementation team?
I have been through the process of implementing the solution for clients.
What's my experience with pricing, setup cost, and licensing?
The licensing can be yearly or over a couple of years. Support needs to be renewed every year.
What other advice do I have?
We have four models which we are using.
The first one has a wall that which we have deployed on the particular server. The next one is the CPM which is the Central Policy Manager through which we enforce the password policy and password rotation policies.
I'd recommend the solution to others.
We have conducted a POC in Pakistan on multiple sites with different customers. CyberArk is a quite typical product and can be a bit expensive, so it's a good idea to try it out first and make sure it is what you need.
I'd rate the solution seven out of ten.
Which deployment model are you using for this solution?
On-premises
Disclosure: My company has a business relationship with this vendor other than being a customer: Partner

Buyer's Guide
Download our free CyberArk Privileged Access Manager Report and get advice and tips from experienced pros
sharing their opinions.
Updated: February 2025
Product Categories
Privileged Access Management (PAM) User Activity Monitoring Enterprise Password Managers Mainframe Security Operational Technology (OT) SecurityPopular Comparisons
Okta Workforce Identity
Delinea Secret Server
CyberArk Endpoint Privilege Manager
BeyondTrust Endpoint Privilege Management
WALLIX Bastion
One Identity Safeguard
BeyondTrust Privileged Remote Access
BeyondTrust Password Safe
ARCON Privileged Access Management
Delinea Privileged Access Service
ManageEngine PAM360
Symantec Privileged Access Manager
Buyer's Guide
Download our free CyberArk Privileged Access Manager Report and get advice and tips from experienced pros
sharing their opinions.
Quick Links
Learn More: Questions:
- CyberArk vs. ManageEngine Password Manager Pro
- How does Sailpoint IdentityIQ compare with CyberArk PAM?
- Which PAM tool do you prefer: CyberArk Privileged Access Manager, One Identity Safeguard, Delinea Secret Server, or BeyondTrust Privileged Remote A
- What is the difference between Privileged Users and Privileged Accounts
- When evaluating Privileged Identity Management, what aspect do you think is the most important to look for?
- How was the 2020 Twitter Hack carried out? How could it have been prevented?
- Which is the best Privileged Account Management solution?
- What are the top 5 PAM solutions that can be implemented which cover both hybrid and cloud?
- What are the top 5 PAM solutions?
- How will AI and ML help or work with PIM/PAM?