Try our new research platform with insights from 80,000+ expert users
PeerSpot user
Cyber Security Consultant at a tech services company with 10,001+ employees
Real User
I can customize it to meet our customers' requirements. Password management is done automatically, and adheres to company compliance policies.

What is most valuable?

  • Client-less feature
  • Flexible architecture support
  • High level of customization for maximize utilization
  • User friendly and Flexibility of multiple choice
  • Adhere to Security Compliance

How has it helped my organization?

This tool is in Leader's quadrant in Gartner Quadrant report. Not just because it has more features than other but also it improves the way organization function. CyberArk can be used as many as you can think of. Such Granular ways of utilizing parameters, features and restrict permissions that no other tool can grant you. This tool has always surprise me with its capability and features.

What needs improvement?

Since this tool major utilizing modules are PAM and PSM, hence AIM and OPM are least considered by client. Client is somehow reluctant to use these features. Yes, i do agree that these Modules are not that friendly but also CyberArk do not providing proper training on these modules. Reports are also one of the major concern, as it gives a very basic kind of reports. CyberArk must provide some graphical reports which can be customized as per client requirement. After all presentation does matter.

For how long have I used the solution?

I have been working with PIM solutions since Apr 2011 and I was introduced to CyberArk around four years ago. I started with version 7.2 and I’m now working with version 9.6. Other than this CyberArk, I had experience on Dell TPAM, CA PUPM, Arcos PAM, BeyondTrust PIM etc with some more expertise on Imperva SecureSphere, Guardium, Tripwire Enterprise, Novell Access Manager etc.

Buyer's Guide
CyberArk Privileged Access Manager
January 2025
Learn what your peers think about CyberArk Privileged Access Manager. Get advice and tips from experienced pros sharing their opinions. Updated: January 2025.
829,541 professionals have used our research since 2012.

What was my experience with deployment of the solution?

Ofcourse, which deployment does not encountered any issue, however it depends upon your planning whether you are facing critical issues or just small hiccups. From my point of view, yes you need to plan it well, think from everyone prospective and also but most important it should be give ease of working not make end user frustrate. Understanding this tool and its utilization is more important in order to deploy it. Since the planning is not only limited to installation of CyberArk components but also it go beyond it such as GPO, AD Configuration, OU Setup, User usage, account management and so on. I face many issues during deployment and also after deployment. Plan it well before implementation.

What do I think about the stability of the solution?

Earlier in 9.0 version I faced some stability issues, yes there are some stability issues with CyberArk such as memory leakage, password unsync etc. These are some common problems but frustrating. In this version of CyberArk, memory leakage is a quite common and frequent issue which lend up access issue to end users.

What do I think about the scalability of the solution?

As I said above, you need to plan wisely before you implement it. You need to consider all prospects of this tool before implementation.

How are customer service and support?

Customer Service:

CyberArk support is one of the best support I have ever seen. I worked on multiple tools and had a conversation with their customer support, CyberArk support is one of best one i have encountered with. They are very patient and calm. However sometime they are not much aware about the issue and could not provide the solution until it escalated to L3. It would give 8 out of 10 to CyberArk support.

Technical Support:

Refer to customer service. Technical support is 8/10.

Which solution did I use previously and why did I switch?

I started my career with Quest TPAM (now Dell TPAM) and also worked on BeyondTrust, CA PUPM, ARCOS, etc. BeyondTrust and ARCOS were introduced in market at that time. These tools are good but doesn't seems to be user friendly as CyberArk PAM. These solutions are bit complex to implement, configure and usage. Even if these tools have some good features which keeps them running in market but one feature in which all these tools are beaten up by CyberArk is User Friendly.

Users are more confident in using CyberArk, more convenient in installing and deployment and easier to customize as per client requirement.

How was the initial setup?

Again, it completely depend upon your architecture design of CyberArk and planning. More complex Architecture leading to more complexity in implementation. Understand the Architecture, understand client requirement and only then design and implement. The sure shot guarantee of successful implementation is "Keep It Short and Simple".

What about the implementation team?

Initially, I took some help but have never got a chance to work with Vendor team. I use to implement CyberArk for my client based on their requirement. I still not consider myself as an expertise, as I am still learning this tool and it always surprise me, however I would rate myself on overall - 6 out of 10.

What was our ROI?

Learning, keep involve yourself in learning. This is best ROI you will get.

What's my experience with pricing, setup cost, and licensing?

Please contact your local CyberArk Sales support, they will better guide you.

Which other solutions did I evaluate?

In case of CyberArk, No .. Never.

Disclosure: I am a real user, and this review is based on my own experience and opinions.
PeerSpot user
SystemsA2327 - PeerSpot reviewer
Systems Admin II at a transportation company with 5,001-10,000 employees
Real User
Lessens the risk with privileged access
Pros and Cons
  • "We are able to rotate credentials and have privileged account access."
  • "Lessens the risk with privileged access."

    What is our primary use case?

    Currently, we use PAS and EPM. Mainly, we did EPM last year to get rid of local admins on about 300 PCs.

    We are looking into utilizing CyberArk to secure infrastructure in the cloud.

    I have been in admin for two years. The company has probably had it for more than seven years.

    How has it helped my organization?

    • Lessens the risk with privileged access.
    • As far as EPM, mitigating the risk of local admins on PCs.

    What is most valuable?

    We are able to rotate credentials and have privileged account access.

    For how long have I used the solution?

    One to three years.

    What do I think about the stability of the solution?

    It is very stable. We have had no downtime.

    What do I think about the scalability of the solution?

    It is meeting our needs now, and will still meet our needs in the future.

    How are customer service and technical support?

    For the most part, technical support is very knowledgeable. Sometimes, you get the one person whom you might have to push back on a little more. With PAS, they escalate our problems in due time, not so much with EPM.

    Which solution did I use previously and why did I switch?

    We did not previously use another solution.

    How was the initial setup?

    I was part of the initial setup with EPM. It was straightforward during the PoC. Once we rolled it out to users, it got a little more complex.

    What about the implementation team?

    CyberArk helped with the implementation. 

    We did not get the EPM training, so we were just flying by the seat of our pants and going with it. For the most part, we were able to figure stuff out, but some stuff gave us a little run for our money.

    What was our ROI?

    With reducing the privileged account access, there has been a huge improvement. They are now bringing more accounts on a little at a time.

    What other advice do I have?

    Do it now. Don't wait.

    Any other issues that we may have come up with, they have always been there to help assist and get us back on the right track. They don't just give you the product, then wipe their hands.

    We just got an upgrade to version 10.4, as we went from 9.2 to 9.9.5 last year. This was a major improvement for us, going to 10.4 with the different dashboards and PTA built-in and PTA on the credential rotation. They are starting to integrate all the different components.

    Most important criteria when selecting a vendor:

    • Ease of access.
    • They are with you going through any problems that may arise. 
    • Good support.
    Disclosure: PeerSpot contacted the reviewer to collect the review and to validate authenticity. The reviewer was referred by the vendor, but the review is not subject to editing or approval by the vendor.
    PeerSpot user
    Buyer's Guide
    CyberArk Privileged Access Manager
    January 2025
    Learn what your peers think about CyberArk Privileged Access Manager. Get advice and tips from experienced pros sharing their opinions. Updated: January 2025.
    829,541 professionals have used our research since 2012.
    reviewer1737573 - PeerSpot reviewer
    Manager at a financial services firm with 5,001-10,000 employees
    Real User
    Super stable and easy to scale
    Pros and Cons
    • "Super stable and easy to scale"

      What is our primary use case?

      Our clients primarily use the CyberArk Password Vault for password rotation and password management.

      What is most valuable?

      The feature I find most valuable is the password credential rotation.

      What needs improvement?

      With regards to potential improvements for the CyberArk product, I find the product quite expensive and I would like to see the cost reduced. 

      For how long have I used the solution?

      I have been using CyberArk Password Vault for 8 years. 

      What do I think about the stability of the solution?

      CyberArk Password Vault is super stable once you are on a tried and true platform version. 

      What do I think about the scalability of the solution?

      The product is also easy to scale. 

      How are customer service and support?

      I have utilized CyberArk technical support for issues and this was very straightforward to work with. The response time was a little slow. 

      Which solution did I use previously and why did I switch?

      I have previously deployed and installed Thycotic as an alternate password vault solution, but I find CyberArk to be much better.

      How was the initial setup?

      With installation of CyberArk Password Vault, there are some complexities to setting it up, I would say it is not straight forward to setup. 

      Which deployment model are you using for this solution?

      Hybrid Cloud
      Disclosure: I am a real user, and this review is based on my own experience and opinions.
      PeerSpot user
      reviewer1757271 - PeerSpot reviewer
      Product Owner at a tech services company with 1,001-5,000 employees
      Real User
      Automated password management and controls mean we can manage risks associated with high privileges
      Pros and Cons
      • "The automatic password management is the most important feature. The second most important feature is the ability to enforce dual control on the release of those passwords. The combination of these two features is the most important thing for us because we can show that we're in control of who uses any non-personal account, and when they do so."
      • "The major pain point that we have is the capacity of CyberArk due to the sheer volume of NPAs that we are managing. We are a large organization and we have hundreds of thousands of non-personal accounts to manage. We have already found out that there are certain capacity limitations within CyberArk that might introduce performance issues. From my perspective, something that would be valuable would be if the vault could hold more passwords and be more scalable."

      What is our primary use case?

      The major use case for us is to securely release and manage passwords for non-personal accounts.

      CyberArk provides an automated and unified approach for securing access across environments. It's a work in progress but that is the goal, for us, of implementing CyberArk. We want to provide a unified way to access all environments. We are in transition, like most big companies, into cloud solutions. So this is also something that is being discussed and analyzed. But that, overall, is the mission of CyberArk in our organization.

      How has it helped my organization?

      CyberArk has made it possible to work with non-personal accounts. Before, there was a much more focus on having privileges associated with personal accounts, and non-personal accounts were scarcely used because doing so required a lot of manual work. That work has been replaced with automated password management and the controls that come with CyberArk. It allows our organization to control the risks associated with high privileges. Previously, anyone could do whatever they wanted, on their own, but now we can enforce dual control. That is very important from a risk perspective. And the fact that we have it automated means it doesn't require that much effort to maintain things.

      Also, when we onboard new employees, the solution saves us time, to a certain extent, when it comes to providing them with secure access to the applications and IT systems they will be working with. Those savings are not directly thanks to CyberArk, but it can be considered part of the bigger solution to make sure that employees have the correct access to the resources they need as soon as possible. That is true after they have been onboarded or when their position has changed and they need to be granted new access.

      What is most valuable?

      The automatic password management is the most important feature. The second most important feature is the ability to enforce dual control on the release of those passwords. The combination of these two features is the most important thing for us because we can show that we're in control of who uses any non-personal account, and when they do so.

      For how long have I used the solution?

      I have been using CyberArk Privileged Access Manager for five years.

      What do I think about the stability of the solution?

      My impression of the solution's stability, in general, is very positive. It's quite robust. There are mechanisms in place that allow you to have high availability and that allow you to have proper disaster recovery. Those mechanisms are very solid, as we have tested them extensively within our processes to assess the risk associated with the use of CyberArk. They have performed very well.

      The only thing that is lacking with respect to the stability is the scalability issue. The amount of data we need processed is too big for CyberArk to manage properly. That mostly impacts performance, not the stability, but to some extent the stability has suffered due to that. 

      But overall, I would rate it very good in terms of stability. We had a minor issue once and, other than that, we have been online the whole time that I have been here. We have tested it thoroughly and have not found any situation where it would become too unstable to perform our tasks.

      What do I think about the scalability of the solution?

      The major pain point that we have is the capacity of CyberArk due to the sheer volume of NPAs that we are managing. We are a large organization and we have hundreds of thousands of non-personal accounts to manage. We have already found out that there are certain capacity limitations within CyberArk that might introduce performance issues. From my perspective, something that would be valuable would be if the Vault could hold more passwords and be more scalable.

      How are customer service and support?

      We have used their tech support extensively and there has been a lot of improvement in the way that CyberArk support operates over the last few years, but it still leaves somewhat to be desired. That is particularly true given the pricing. You would expect, for the amount of money that they charge for their support, and for their product in general, that it would be better. 

      But I've seen major improvements in the last couple of years. I think they are aware of this issue and that it is an area that they are lacking in and they're working towards improving it.

      They need to better recognize who they are dealing with. CyberArk has an extensive training program, the CyberArk University. You put in a lot of effort, resources, and money, to attend the training and become a professional in terms of your knowledge and ability to manage the Vault, and the solution in general. But then, when you require support, you are asked very simple questions, which you have already answered based on the knowledge that you've obtained from CyberArk. It takes a lot of time and effort to convince their support that you indeed have a more complex case to resolve, rather than a very simple fire-and-forget solution. It's generally not the kind of thing where they can give you a link to their knowledge base and look through it to find a solution yourself.

      I have been working with CyberArk for five years and have all the possible certificates, and have extensive knowledge about it. Any time that I report a case to support, it seems the general gist of how such services operate is that they're trying to get rid of you. They give you a solution that, maybe, vaguely resembles the issue, or a solution that you specifically stated that you tried already and it does not work, just to get rid of you. They probably have customers who would be happy with that, but because of the importance of that software within our organization and the level of maturity that we have within my team as administrators of CyberArk, we expect, and we've communicated this to them, that they will approach our requests in a more advanced way. 

      They should recognize that we have probably already done what the first line of support would suggest be done, and that we require some more involved support, but it seems very difficult to communicate this to them. Even if we get through to further lines of support, we often have the feeling that we still know more than they do about their own tools. I think there has been some sort of knowledge drain from CyberArk. We often have the feeling that they are learning on the job. They don't inspire a lot of confidence when it comes to their support.

      How would you rate customer service and support?

      Neutral

      What was our ROI?

      There is a lot of return on investment in CyberArk. Being a financial institution, we are responsible for managing risks, and CyberArk really helps us to be in control with the usage of NPAs. That, in turn, translates into a proper risk score for the organization, and that directly translates into actual money being saved.

      What's my experience with pricing, setup cost, and licensing?

      It's expensive, certainly. But CyberArk is the leader in the market with regards to privileged access management. You pay a lot, but you are paying for the value that is being delivered. 

      It's not a tool for small companies. You need to be a large company with a lot of resources to implement it. But the price tag can be justified, even though it's always hard to quantify these things. It really brings value, regardless of the level at which you implement it. If you use it at a very basic level, as just a password manager, or you go further with all the other elements of the tool, it's expensive, but it's worth the price.

      What other advice do I have?

      We only use it on-prem, but for someone who only wants to solve cloud security challenges with a born-in-the-cloud security solution, I would still tell them CyberArk is one of the potential solutions. I would also tell them to do their assessment because it costs a lot. So it depends on the scale of use and the use cases. It certainly has the most capabilities that could be of use, but it depends on whether you only have some small deployments in the cloud and on the size of the risks involved. For certain scenarios, I would say they should immediately go with CyberArk, and that they shouldn't bother with others' solutions. In other scenarios, I would say they should do a very thorough assessment of the market before they decide because there might be cheaper options that will be sufficient for them.

      Which deployment model are you using for this solution?

      On-premises
      Disclosure: I am a real user, and this review is based on my own experience and opinions.
      PeerSpot user
      Director051a - PeerSpot reviewer
      Director Information Security at a insurance company with 501-1,000 employees
      Real User
      It has helped from an auditing perspective identify who has access to privileged accounts
      Pros and Cons
      • "It has helped from an auditing perspective identify who has access to privileged accounts."
      • "It provides an accountability to the individuals who are using it, knowing that it is audited and tracked."
      • "We utilize PTA, and we are now integrating that into our risk management program so we can identify the uses of the vault which are outside of the norm, e.g., people accessing after hours. It has reduced the amount of time that we are looking through logs and audit logs."
      • "Our DevOps team is looking in the direction of cloud, because we are not in it today. We are hoping to build it with Conjur from the ground up."

      What is our primary use case?

      Its performance is excellent. We have had multiple use cases: 

      • It is PSM, so as a jump box to our servers.
      • We use it as a primary mechanism for all our consultants and auditors to access our systems. So, they come in through a Citrix app, then it is used by PVWA to access all the servers.

      We are currently using CyberArk to secure applications with credentials and endpoints.

      We plan on utilizing CyberArk to secure infrastructure and applications running in the cloud going forward. We are looking into possibly AWS or Azure.

      How has it helped my organization?

      • It has helped from an auditing perspective identify who has access to privileged accounts.
      • We are able to now track who is accessing systems. 
      • It provides an accountability to the individuals who are using it, knowing that it is audited and tracked.

      It has become one of the primary components that we have. We also utilize PTA, and we are now integrating that into our risk management program so we can identify the uses of the vault which are outside of the norm, e.g., people accessing after hours. It has reduced the amount of time that we are looking through logs and audit logs.

      What is most valuable?

      The auditing and recording are incredible. Also, we have started using the AIM product to get rid of embedded passwords.

      What needs improvement?

      Our DevOps team is looking in the direction of cloud, because we are not in it today. We are hoping to build it with Conjur from the ground up.

      For how long have I used the solution?

      More than five years.

      What do I think about the stability of the solution?

      It is very stable. We have never had any downtime; no issues. We worked with support on several upgrades, and are looking forward to the 10.x upgrade.

      What do I think about the scalability of the solution?

      We have no issues with scalability. We are using it in a pretty wide environment. We also use it in our business continuity environment with no issues.

      How are customer service and technical support?

      I evaluate the technical support very highly. Although, the individuals who we worked with were very technical. If they did not know something, they pulled in somebody right away. 

      Also, one of the best attributes is the customer success team. We found great value in working with customer success and their team.

      If there are defects or issues, over the years, CyberArk management has listened to them and resolved those issues. Not many organizations respond to their customer feedback as well as CyberArk has.

      Which solution did I use previously and why did I switch?

      We did not have a previous solution. We have always used CyberArk. 

      From a risk landscape, we knew that privilege accounts were where attackers were going, doing lateral movements. These are keys of the kingdom which protect those, and that is why we focused in this area.

      How was the initial setup?

      The initial setup was very complex. There were a lot of manual process. Over the years, we have seen a significant transition in the installation scripts, the setup, and the custom capabilities. So, CyberArk has come a long way since the beginning.

      The upgrade processes have also improved.

      What was our ROI?

      We now know where our privileged accounts are and how to manage them. So, it is more from an exposure standpoint.

      Which other solutions did I evaluate?

      No.

      What other advice do I have?

      Take your time. It is not a quick hit, where I am going to put it in today and be done. It is a process. The cyber hygiene program is a crucial aspect of how to implement this successfully.

      I do have experience with the new plugin generator utility. We have been using it for a short period of time. It is not fully in production yet, but it seems to be quite good.

      Most important criteria when selecting a vendor: Technical ability, not only in the product, but in the industry as a whole. This helps set CyberArk apart. They are not only experts in their product, but they are experts in the industry, including Red Team capabilities. They are gearing their product towards the defending of what the active exploits are, not something that has been done in the past.

      Disclosure: PeerSpot contacted the reviewer to collect the review and to validate authenticity. The reviewer was referred by the vendor, but the review is not subject to editing or approval by the vendor.
      PeerSpot user
      Security Analyst at a retailer with 10,001+ employees
      Real User
      We can manage many accounts and broker connections between devices without needing to know passwords
      Pros and Cons
      • "We know when passwords will be expiring so we can force users to change their passwords, as well as requiring specific password requirements for length, complexity, etc."
      • "Technical support has been very responsive in navigating challenges. It is very easy to open a ticket."
      • "I would like easier integrations for creating an online dashboard that executives would look at or are able to run reports from the tool."

      What is our primary use case?

      The primary use case is for privileged account management. It is performing well.

      We are currently using CyberArk for applications running in the cloud. We are also using them for DevOps. We have some new things that we are implementing, and are working non-stop to leverage these features.

      In addition, we are using CyberArk to secure applications and endpoints. 

      How has it helped my organization?

      We know when passwords will be expiring so we can force users to change their passwords, as well as requiring specific password requirements for length, complexity, etc.

      Our security goal would be to keep people from putting the passwords in text files, do online shares, etc. This gives us more granular control.

      What is most valuable?

      The most valuable feature is the ability to manage many accounts and broker connections between devices without needing to know passwords.

      It is a customizable product.

      What needs improvement?

      I like that they have continued with the RESTful API and the ability to leverage automation. I would like to see that continue. 

      I would like easier integrations for creating an online dashboard that executives would look at or are able to run reports from the tool.

      For how long have I used the solution?

      Three to five years.

      What do I think about the stability of the solution?

      The stability has been very good.

      What do I think about the scalability of the solution?

      The scalability has been good, and will meet our needs in five year's time.

      How are customer service and technical support?

      Technical support has been very responsive in navigating challenges. It is very easy to open a ticket.

      Which solution did I use previously and why did I switch?

      We were previously using HPM.

      How was the initial setup?

      It was complex. Because at that point. I had only recently joined the security team. I was told, "Here's a share with the files. Go install this."

      What was our ROI?

      I don't know that we are able to measure that at this point, other than no data breaches.

      What other advice do I have?

      Make sure you have a development or QA environment.

      I did training today on the new plugin generator utility.

      I would rate it about a nine for ease of use and deployment. They are continuously improving the product. It works great, and there is a lot of documentation available.

      Most important criteria when selecting a vendor: Longevity and length of time in the business. Not that there is anything wrong with startups, but these folks have been out there with a proven track record. We talk to other people, look at the reports, etc.

      Disclosure: PeerSpot contacted the reviewer to collect the review and to validate authenticity. The reviewer was referred by the vendor, but the review is not subject to editing or approval by the vendor.
      PeerSpot user
      it_user677688 - PeerSpot reviewer
      CyberArk Consultant at a comms service provider with 10,001+ employees
      Real User
      The password management component (CPM) is the most valuable. The installation manual is quite straightforward and extensive.
      Pros and Cons
      • "It enables companies to automate password management on target systems gaining a more secure access management approach."
      • "The current interface doesn't scale that well, and has some screens still in the old layout."

      How has it helped my organization?

      Implementing CyberArk is not only "rolling out" a tool. It also will force the company to have a good look at the access management strategy, improve security processes and clean data. Implementation of CyberArk will increase the insight the company has in their access management implementation.

      What is most valuable?

      The password management component (CPM) is the most valuable. This enables companies to automate password management on target systems gaining a more secure access management approach.

      Another major component is the PSM, which enables session recording and provides additional possibilities to securely connect to target devices.

      What needs improvement?

      Allthough it's highly configurable, the user interface could use a do-over. The current interface doesn't scale that well, has some screens still in the old layout, while others are in the new ones and consistency in layout between pages sometimes is an issue. As I understand, this is scheduled for version 10.

      What do I think about the stability of the solution?

      If there are stability issues, most of the time this relates to the companies infrastructure.

      What do I think about the scalability of the solution?

      CyberArk is highly scalable. Depending on the companies infrastructure, the size of the CyberArk implementation can become quite large.

      How are customer service and technical support?

      I rate support 7/10. Technical knowledge of the support staff is good. Sometimes it is a lengthy process to get to the actual answer you require. One the one hand, that is because lots of information is required (logs, settings, reports, etc.). On the other hand, the support crew sometimes answers on questions that we did not ask.

      Which solution did I use previously and why did I switch?

      We did not have a previous solution.

      How was the initial setup?

      The installation manual is quite straightforward and extensive. There also is an implementation manual to support the function implementation. The installation requires specific hardware which sometimes might not fit the standards within an organisation. Over the last few years the documentation has improved hugely. Of course, there is always room for improvement, but I guess this is one of the better ones in the IT field.

      What's my experience with pricing, setup cost, and licensing?

      I do not have anything to do with pricing.

      Which other solutions did I evaluate?

      I was not involved in the acquisition process, but I know that sometimes a Hitachi solution is considered.

      What other advice do I have?

      Do a detailed assessment of your requirements before you invest. Map the requirements to the functionality and go just that step deeper in the assessment of whether the tool fits your needs. Keep in mind that, although CyberArk is highly configurable and provides lots of functionality, it still is an out-of-the-box solution and customization is limited in some ways.

      Disclosure: I am a real user, and this review is based on my own experience and opinions.
      PeerSpot user
      it_user497118 - PeerSpot reviewer
      Senior Executive Information Security at a manufacturing company with 10,001+ employees
      Vendor
      It helps us proactively protect, detect and respond to in-progress cyberattacks before they strike vital systems and compromise sensitive data.

      Valuable Features

      • Password management and accountability for Privileged accounts
      • Identify, protect and monitor the usage of Privileged accounts
      • Record and control privileged sessions on critical systems i.e. Windows, Unix, DBs
      • Application credentials including SSH keys and hard-coded embedded passwords can be managed
      • Control and monitor the commands super-users can run based on their role
      • PTA is a security intelligence system that allows organizations to detect, alert, and respond to cyberattacks on privileged accounts.

      Improvements to My Organization

      Privileged accounts represent the largest security vulnerability an organization faces today. Most organisations are not aware of the total number of privilege accounts.

      Compromising privilege accounts leads to various breaches. With this growing threat, organisations need controls put in place to proactively protect, detect and respond to in-progress cyberattacks before they strike vital systems and compromise sensitive data.

      On implementing the CyberArk PIM solution, we are able to achieve this goal. Now, we are aware of the total privileged accounts in our enterprise. These are securely stored and managed by the Vault. The end users need not remember passwords for these accounts to use them.

      E.g.: A Unix Admin who has to login to a Unix server using the "root" account needs to log in to CyberArk and search for the root account, click Connect and he can perform all of his activities. We can enforce a command list on this account, monitor his activities and also get to know who has used this root account. The access to this account can also be restricted. The user does not have to remember any credentials.

      Room for Improvement

      Integration of this tool with SAML is a problem, as there is a bug. We’d like to be able to integrate AWS accounts in CyberArk.

      Use of Solution

      I have been using this solution for the past three years. I have implemented this solution for various clients from banking and pharmaceutical companies.

      Stability Issues

      I have not really encountered any issues with stability.

      Scalability Issues

      I have not encountered any scalability issues.

      Customer Service and Technical Support

      I rate technical support 9/10, very good.

      Initial Setup

      Straightforward, easy-to-install setup.

      Pricing, Setup Cost and Licensing

      It is expensive.

      Other Solutions Considered

      Before we chose CyberArk, we evaluated ARCOS.

      Other Advice

      Go ahead and use CyberArk. Request a demo.

      Disclosure: I am a real user, and this review is based on my own experience and opinions.
      PeerSpot user
      Buyer's Guide
      Download our free CyberArk Privileged Access Manager Report and get advice and tips from experienced pros sharing their opinions.
      Updated: January 2025
      Buyer's Guide
      Download our free CyberArk Privileged Access Manager Report and get advice and tips from experienced pros sharing their opinions.