CyberArk is a good, profitable, and most valuable solution.
Security specialist at Kavitech
A stable and profitable solution for privileged access
What is our primary use case?
What is most valuable?
While testing the functionality of PAM, we weren't merely conducting a standard PAM evaluation. We aimed to establish a connection and successfully received a response from the target PAM component.
What needs improvement?
The product’s pricing could be improved.
For how long have I used the solution?
I have been using CyberArk Privileged Access Manager as a partner and implementor.
Buyer's Guide
CyberArk Privileged Access Manager
November 2024
Learn what your peers think about CyberArk Privileged Access Manager. Get advice and tips from experienced pros sharing their opinions. Updated: November 2024.
816,660 professionals have used our research since 2012.
What do I think about the stability of the solution?
The product is stable. If you make some changes or something, it's stable.
What do I think about the scalability of the solution?
The solution is scalable. We cater it to enterprise businesses.
How are customer service and support?
Customer support takes too much time to provide some response. When you open some cases, sometimes it takes one or two weeks to get some people to know the problem and how they will help us.
How would you rate customer service and support?
Neutral
How was the initial setup?
The initial setup takes a few days to complete.
I rate the initial setup a six out of ten, where one is difficult and ten is easy.
What's my experience with pricing, setup cost, and licensing?
The product is expensive.
I rate the product’s pricing a seven out of ten, where one is cheap and ten is expensive.
What other advice do I have?
Overall, I rate the solution a nine out of ten.
Which deployment model are you using for this solution?
On-premises
Disclosure: My company has a business relationship with this vendor other than being a customer: Partner
Senior Partner at a tech consulting company with 51-200 employees
Integrates well, flexible, but custom connectors
Pros and Cons
- "The integrations are the most valuable aspect of CyberArk Privileged Access Manager. The software offers pre-built integrations, and our team can also create custom connectors. This flexibility allows us to integrate with systems that we previously didn't consider integrating with, making it a significant advantage for us."
- "There is room for improvement in the availability of custom connectors on the marketplace for this solution. Additionally, their services for the CICD pipeline and ease of integration could be improved."
What is our primary use case?
CyberArk Privileged Access Manager is used for identity and privilege access management.
What is most valuable?
The integrations are the most valuable aspect of CyberArk Privileged Access Manager. The software offers pre-built integrations, and our team can also create custom connectors. This flexibility allows us to integrate with systems that we previously didn't consider integrating with, making it a significant advantage for us.
What needs improvement?
There is room for improvement in the availability of custom connectors on the marketplace for this solution. Additionally, their services for the CICD pipeline and ease of integration could be improved.
For how long have I used the solution?
I have been using CyberArk Privileged Access Manager for approximately three years.
What do I think about the stability of the solution?
Once the implementation is completed and the solution is hardened, I consider it to be stable.
What do I think about the scalability of the solution?
CyberArk Privileged Access Manager is scalable on-premise but not on the cloud.
I rate the scalability of CyberArk Privileged Access Manager a seven out of ten.
How was the initial setup?
The time it took for the deployment was approximately two years. It was not a simple process for the vendor. It should have been completed in one year, it took too long.
Our process steps for deployment involve specific stages, starting with onboarding Windows and Linux devices, and concluding with the onboarding of application service accounts and related components.
I rate the initial setup of CyberArk Privileged Access Manager an eight out of ten.
What about the implementation team?
The solution's deployment was completed by the vendor.
A team of two to three people was required for the deployment of our solution. One of them had a high level of expertise in architecture and a thorough understanding of the solution. The remaining team members were junior-level personnel in charge of activities including connection development, data collection, and deployment. The vendor was also used by the team to help with data collection, planning, and execution.
What's my experience with pricing, setup cost, and licensing?
The license CyberArk Privileged Access Manager is on an annual basis.
What other advice do I have?
A team of five to six people would be sufficient to maintain 24/7 operations.
I would recommend reducing the fee for cancellations, but when it comes to cloud services, there are superior options available in the market.
I rate CyberArk Privileged Access Manager a seven out of ten.
Disclosure: My company has a business relationship with this vendor other than being a customer: Partner
Buyer's Guide
CyberArk Privileged Access Manager
November 2024
Learn what your peers think about CyberArk Privileged Access Manager. Get advice and tips from experienced pros sharing their opinions. Updated: November 2024.
816,660 professionals have used our research since 2012.
Identity and Access Management Analyst at Security Finance Corporation
Stable feature functionality and usage has been reliable
Pros and Cons
- "The solution is stable and reliable."
- "The solution is too complicated to use and should be simplified. It took me a long time to understand how to use it. There is a lot that the solution can improve for the future."
What needs improvement?
The solution is too complicated to use and should be simplified. It took me a long time to understand how to use it. There is a lot that the solution can improve for the future.
For how long have I used the solution?
I used CyberArk Enterprise Password within the last 12 months.
What do I think about the stability of the solution?
The solution is stable and reliable.
What do I think about the scalability of the solution?
We have approximately eight people in my organization that use this solution.
What other advice do I have?
I did not like the solution at all and I was happy when we stopped using it.
I rate CyberArk Enterprise Password an eight out of ten.
Disclosure: I am a real user, and this review is based on my own experience and opinions.
Identity and Access Management Advisor at a energy/utilities company with 5,001-10,000 employees
Improves our ability to control, secure, and manage access across the enterprise
Pros and Cons
- "Service count rotation is probably one of my favorite features... The ability to automatically rotate any password I need to really helps with the entire enterprise strategy that we're pushing right now."
- "I'd like it to be a little more granular. I want a little bit more control over exactly what we do. I know if you do that, you add more knobs and dials to deal with, but that's just my personal approach: granular access."
How has it helped my organization?
It was originally just a glorified KeePass. We scaled it up to an enterprise-wide solution for all our IT support teams. In that way, it improves our ability to control, secure, and manage access across the enterprise for different support teams, whether it be IAM, Exchange, or server admin. It's been a really fantastic growth opportunity for me and for the company.
What is most valuable?
Service count rotation is probably one of my favorite features. Even though we're not using it right now, we're going to be using it in the future. The ability to automatically rotate any password I need to really helps with the entire enterprise strategy that we're pushing right now.
The solution's ability to manage all our access requirements at scale is interesting, actually. It does everything we need it to, and it's not a tool that I expected we would be using at this scale, as an enterprise-wide client. A little bit of history on that being that when we first started using it, it was a glorified password vault. It was a store. It was KeePass. So we really scaled it up and it's been a really interesting journey.
What needs improvement?
I'd like it to be a little more granular. I want a little bit more control over exactly what we do. I know if you do that, you add more knobs and dials to deal with, but that's just my personal approach: granular access.
What do I think about the stability of the solution?
Lately, due to an upgrade, it hasn't been as stable as we need it to be, but I don't think that's any fault of the product. I think it's the fault of just infrastructure as a whole.
However, in the past, the product has never been down. It's been incredibly stable. And in terms of interface and usage, it's actually been really stable. There haven't been any bugs or glitches or anything of the sort to impede me from doing my job.
What do I think about the scalability of the solution?
I didn't think we'd be here. However, it's incredibly scalable. We are able to use it in two different environments: one is IT and one is OT. And the scalability, as a whole, has been able to translate to an enterprise-wide process, so it's been really great to see. We're hoping that, should we acquire anything or divest something, it would be that easy to actually deal with it in terms of scalability.
How are customer service and technical support?
Technical support has been good, even great. They have come in and assisted us whenever we had issues. If there was ever an outage, they were already on the phone by the time we needed them. They've been doing a great job helping us out so far.
Which solution did I use previously and why did I switch?
We did not have a previous solution.
What was our ROI?
We have seen ROI. Our adoption rate is way up. More teams are involved in using it. That alone stands as a return on investment when we have more adopters, more people using the tool, more people logging into the tool and utilizing its capabilities.
What other advice do I have?
Use the tool, but communicate with your user base. If you're not going to communicate with your user base, then you're dead in the water already. Don't force this on someone. Work with them in order to use it.
The product has delivered innovation with each update. When I first started, we weren't able to run scans and pull service-account information and reset those service accounts at any endpoint. That, as a whole, as I mentioned earlier, was my favorite feature of the product. That innovation alone is probably one of my favorites, and definitely something that deserves praise.
I would rate the product a nine because nobody gets a 10. It's been a fantastic product and it's been easy to use. The training courses involved have been great, so I would rate it a nine.
I wouldn't say CyberArk has been a huge impact on my career, but it's definitely played a role in helping me advance, in terms of being able to communicate with clients, utilizing my skill sets, both the technical and soft-skill use. It's allowed me to really branch out and see my growth through business liaison.
Disclosure: PeerSpot contacted the reviewer to collect the review and to validate authenticity. The reviewer was referred by the vendor, but the review is not subject to editing or approval by the vendor.
Senior Specialist Identity System Support at Roche
The master policy allows us to establish a security baseline for our privileged accounts
What is our primary use case?
We are using CyberArk to store credentials of privileged assets in a secure way. In addition, CyberArk helps us to meet our security policy effortlessly, defining the complexity of the passwords, rotation period, etc.
We are also using the Privileged Session Manager to provide remote access to servers with security controls in place (session isolated and recorded).
How has it helped my organization?
With CyberArk, we can meet our compliance requirements reducing security risks without introducing additional operational complexity. This is very valuable for our company because we have regular audits where we have to provide evidence about the use of our privileged accounts (password use, password rotation, etc.)
In addition, we have several third parties that need access to our infrastructure. CyberArk PAS helps us to provide this access in a quick and secure way.
What is most valuable?
- Master policy: allows us to establish a security baseline for our privileged accounts.
- CPM: allows us to rotate passwords following the policy defined.
- PSM: allows us to provide isolated sessions to the customer with additional controls (real-time monitoring, session isolation, and session recording).
What needs improvement?
- We would like to have more flexibility in the RBAC model and have more options to define who should have access to what, not only based on safe membership.
- In addition, the user interface could be improved. When a team manages thousands of accounts, advanced filters are very valuable to search the accounts.
For how long have I used the solution?
More than five years.
Disclosure: I am a real user, and this review is based on my own experience and opinions.
Senior Consultant at a tech services company with 5,001-10,000 employees
Allows secure, logged access to highly sensitive servers and services
Pros and Cons
- "Allows secure, logged access to highly sensitive servers and services."
- "It's hard to find competent resellers/support."
- "Initial setup is complex. Lots of architecture, lots of planning, and lots of education and training are needed."
- "it manages creds based on Organizational Units. That is, a "safe" is limited to specific OUs. That makes for very elaborate OU structure, or you risk exposing too many devices by putting most of them in fewer OUs."
How has it helped my organization?
It has made things more complex, but has eliminated the possibility of Pass The Hash.
What is most valuable?
Allows secure, logged access to highly sensitive servers and services.
What needs improvement?
Perhaps by design, but it manages creds based on Organizational Units. That is, a "safe" is limited to specific OUs. That makes for very elaborate OU structure, or you risk exposing too many devices by putting most of them in fewer OUs.
For how long have I used the solution?
Three to five years.
What do I think about the stability of the solution?
No scalability issues.
What do I think about the scalability of the solution?
Yes. The OU limitations, noted above.
How is customer service and technical support?
It's hard to find competent resellers/support.
How was the initial setup?
Complex. Lots of architecture, lots of planning, and lots of education and training are needed. Technically, roll-out isn’t bad. It’s the support, training, education, philosophy, and integration within existing ways of doing things that are challenging.
What other advice do I have?
I’m a consultant. I help implement and train others on how to use it in a highly secure environment.
I’d give it a nine out of 10. It is very, very secure.
Plan for major culture change, especially in non-progressive shops. This is a necessary evil to endure for the sake of real security.
Disclosure: I am a real user, and this review is based on my own experience and opinions.
Senior Consultant - Information Security Engineering at a financial services firm with 10,001+ employees
Can provide transparent connection to targeted systems and record activities
Pros and Cons
- "Rather than multiple tools for maintaining regulatory compliance around passwords and privileged accounts, we have centralized as much as possible with CyberArk. This is now a one stop shop for end users to access their elevated credentials."
- "You can gradually implement CyberArk, starting with more easily attainable goals."
What is our primary use case?
We proactively vault and manage all elevated accounts across multiple platforms.
For especially sensitive business units, we additionally leverage Privilege Session Manager to provide transparent connection to targeted systems and record activities.
How has it helped my organization?
Rather than multiple tools for maintaining regulatory compliance around passwords and privileged accounts, we have centralized as much as possible with CyberArk. This is now a one stop shop for end users to access their elevated credentials.
What is most valuable?
You can gradually implement CyberArk, starting with more easily attainable goals, such as basic vaulting and password rotation and build on that with additional modules, such as Privileged Session Manager and Application Identity Manager.
What needs improvement?
While in the past, administration required several tools and multiple screens/options in those products, v10 is moving towards a single pane of glass with common functions easily found and information regarding privileged accounts given to users in plain, easy to understand terms, now enhanced with graphics.
For how long have I used the solution?
Three to five years.
Disclosure: I am a real user, and this review is based on my own experience and opinions.
Information Security Engineer - Pre-sales at a tech services company with 11-50 employees
Beneficial privileged threat analytics, high availability, and priced well
Pros and Cons
- "The most valuable feature of CyberArk Privileged Access Manager is privileged threat analytics."
- "The issue of technical support is crucial, as there are not many specialized partners available in Brazil to provide this service. While English language support is of good quality, there is a significant shortage of partners capable of meeting the demand locally."
What is our primary use case?
We currently employ CyberArk Privileged Access Management, which involves extremely complex processes for ensuring the secure management, verification, and guarantee of credentials. Implementing the professional installation tool represents another challenging aspect of this task.
What is most valuable?
The most valuable feature of CyberArk Privileged Access Manager is privileged threat analytics.
What needs improvement?
The support could improve for CyberArk Privileged Access Manager.
For how long have I used the solution?
I have been using CyberArk Privileged Access Manager for approximately three years.
What do I think about the stability of the solution?
The solution has high availability.
What do I think about the scalability of the solution?
CyberArk Privileged Access Manager is highly scalable. When compared to other solutions it scales well.
I plan to use the solution more in the future.
How are customer service and support?
The issue of technical support is crucial, as there are not many specialized partners available in Brazil to provide this service. While English language support is of good quality, there is a significant shortage of partners capable of meeting the demand locally.
How was the initial setup?
The initial setup of CyberArk Privileged Access Manager is easy.
What was our ROI?
We have received a high ROI using CyberArk Privileged Access Manager.
What's my experience with pricing, setup cost, and licensing?
The price of the solution is reasonable.
I rate the price CyberArk Privileged Access Manager a seven out of ten.
What other advice do I have?
Individuals who wish to utilize CyberArk should be cautious when selecting a partner to implement the solution, as proper architecture design is essential to ensure a streamlined and effective implementation.
I rate CyberArk Privileged Access Manager a nine out of ten.
Which deployment model are you using for this solution?
On-premises
Disclosure: I am a real user, and this review is based on my own experience and opinions.
Buyer's Guide
Download our free CyberArk Privileged Access Manager Report and get advice and tips from experienced pros
sharing their opinions.
Updated: November 2024
Product Categories
Privileged Access Management (PAM) User Activity Monitoring Enterprise Password Managers Mainframe Security Operational Technology (OT) SecurityPopular Comparisons
Okta Workforce Identity
Delinea Secret Server
CyberArk Endpoint Privilege Manager
BeyondTrust Endpoint Privilege Management
WALLIX Bastion
One Identity Safeguard
BeyondTrust Privileged Remote Access
BeyondTrust Password Safe
ARCON Privileged Access Management
Delinea Privileged Access Service
ManageEngine PAM360
Symantec Privileged Access Manager
Buyer's Guide
Download our free CyberArk Privileged Access Manager Report and get advice and tips from experienced pros
sharing their opinions.
Quick Links
Learn More: Questions:
- CyberArk vs. ManageEngine Password Manager Pro
- How does Sailpoint IdentityIQ compare with CyberArk PAM?
- Which PAM tool do you prefer: CyberArk Privileged Access Manager, One Identity Safeguard, Delinea Secret Server, or BeyondTrust Privileged Remote A
- What is the difference between Privileged Users and Privileged Accounts
- When evaluating Privileged Identity Management, what aspect do you think is the most important to look for?
- Which is the best Privileged Account Management solution?
- What are the top 5 PAM solutions that can be implemented which cover both hybrid and cloud?
- What are the top 5 PAM solutions?
- How will AI and ML help or work with PIM/PAM?
- Is BeyondTrust Endpoint Privilege Management really expensive compared to other tools or software?