It was originally just a glorified KeePass. We scaled it up to an enterprise-wide solution for all our IT support teams. In that way, it improves our ability to control, secure, and manage access across the enterprise for different support teams, whether it be IAM, Exchange, or server admin. It's been a really fantastic growth opportunity for me and for the company.
Identity and Access Management Advisor at a energy/utilities company with 5,001-10,000 employees
Improves our ability to control, secure, and manage access across the enterprise
Pros and Cons
- "Service count rotation is probably one of my favorite features... The ability to automatically rotate any password I need to really helps with the entire enterprise strategy that we're pushing right now."
- "I'd like it to be a little more granular. I want a little bit more control over exactly what we do. I know if you do that, you add more knobs and dials to deal with, but that's just my personal approach: granular access."
How has it helped my organization?
What is most valuable?
Service count rotation is probably one of my favorite features. Even though we're not using it right now, we're going to be using it in the future. The ability to automatically rotate any password I need to really helps with the entire enterprise strategy that we're pushing right now.
The solution's ability to manage all our access requirements at scale is interesting, actually. It does everything we need it to, and it's not a tool that I expected we would be using at this scale, as an enterprise-wide client. A little bit of history on that being that when we first started using it, it was a glorified password vault. It was a store. It was KeePass. So we really scaled it up and it's been a really interesting journey.
What needs improvement?
I'd like it to be a little more granular. I want a little bit more control over exactly what we do. I know if you do that, you add more knobs and dials to deal with, but that's just my personal approach: granular access.
What do I think about the stability of the solution?
Lately, due to an upgrade, it hasn't been as stable as we need it to be, but I don't think that's any fault of the product. I think it's the fault of just infrastructure as a whole.
However, in the past, the product has never been down. It's been incredibly stable. And in terms of interface and usage, it's actually been really stable. There haven't been any bugs or glitches or anything of the sort to impede me from doing my job.
Buyer's Guide
CyberArk Privileged Access Manager
February 2025

Learn what your peers think about CyberArk Privileged Access Manager. Get advice and tips from experienced pros sharing their opinions. Updated: February 2025.
838,713 professionals have used our research since 2012.
What do I think about the scalability of the solution?
I didn't think we'd be here. However, it's incredibly scalable. We are able to use it in two different environments: one is IT and one is OT. And the scalability, as a whole, has been able to translate to an enterprise-wide process, so it's been really great to see. We're hoping that, should we acquire anything or divest something, it would be that easy to actually deal with it in terms of scalability.
How are customer service and support?
Technical support has been good, even great. They have come in and assisted us whenever we had issues. If there was ever an outage, they were already on the phone by the time we needed them. They've been doing a great job helping us out so far.
Which solution did I use previously and why did I switch?
We did not have a previous solution.
What was our ROI?
We have seen ROI. Our adoption rate is way up. More teams are involved in using it. That alone stands as a return on investment when we have more adopters, more people using the tool, more people logging into the tool and utilizing its capabilities.
What other advice do I have?
Use the tool, but communicate with your user base. If you're not going to communicate with your user base, then you're dead in the water already. Don't force this on someone. Work with them in order to use it.
The product has delivered innovation with each update. When I first started, we weren't able to run scans and pull service-account information and reset those service accounts at any endpoint. That, as a whole, as I mentioned earlier, was my favorite feature of the product. That innovation alone is probably one of my favorites, and definitely something that deserves praise.
I would rate the product a nine because nobody gets a 10. It's been a fantastic product and it's been easy to use. The training courses involved have been great, so I would rate it a nine.
I wouldn't say CyberArk has been a huge impact on my career, but it's definitely played a role in helping me advance, in terms of being able to communicate with clients, utilizing my skill sets, both the technical and soft-skill use. It's allowed me to really branch out and see my growth through business liaison.
Disclosure: PeerSpot contacted the reviewer to collect the review and to validate authenticity. The reviewer was referred by the vendor, but the review is not subject to editing or approval by the vendor.

Security Analyst at a retailer with 10,001+ employees
We can manage many accounts and broker connections between devices without needing to know passwords
Pros and Cons
- "We know when passwords will be expiring so we can force users to change their passwords, as well as requiring specific password requirements for length, complexity, etc."
- "Technical support has been very responsive in navigating challenges. It is very easy to open a ticket."
- "I would like easier integrations for creating an online dashboard that executives would look at or are able to run reports from the tool."
What is our primary use case?
The primary use case is for privileged account management. It is performing well.
We are currently using CyberArk for applications running in the cloud. We are also using them for DevOps. We have some new things that we are implementing, and are working non-stop to leverage these features.
In addition, we are using CyberArk to secure applications and endpoints.
How has it helped my organization?
We know when passwords will be expiring so we can force users to change their passwords, as well as requiring specific password requirements for length, complexity, etc.
Our security goal would be to keep people from putting the passwords in text files, do online shares, etc. This gives us more granular control.
What is most valuable?
The most valuable feature is the ability to manage many accounts and broker connections between devices without needing to know passwords.
It is a customizable product.
What needs improvement?
I like that they have continued with the RESTful API and the ability to leverage automation. I would like to see that continue.
I would like easier integrations for creating an online dashboard that executives would look at or are able to run reports from the tool.
For how long have I used the solution?
Three to five years.
What do I think about the stability of the solution?
The stability has been very good.
What do I think about the scalability of the solution?
The scalability has been good, and will meet our needs in five year's time.
How are customer service and technical support?
Technical support has been very responsive in navigating challenges. It is very easy to open a ticket.
Which solution did I use previously and why did I switch?
We were previously using HPM.
How was the initial setup?
It was complex. Because at that point. I had only recently joined the security team. I was told, "Here's a share with the files. Go install this."
What was our ROI?
I don't know that we are able to measure that at this point, other than no data breaches.
What other advice do I have?
Make sure you have a development or QA environment.
I did training today on the new plugin generator utility.
I would rate it about a nine for ease of use and deployment. They are continuously improving the product. It works great, and there is a lot of documentation available.
Most important criteria when selecting a vendor: Longevity and length of time in the business. Not that there is anything wrong with startups, but these folks have been out there with a proven track record. We talk to other people, look at the reports, etc.
Disclosure: PeerSpot contacted the reviewer to collect the review and to validate authenticity. The reviewer was referred by the vendor, but the review is not subject to editing or approval by the vendor.
Buyer's Guide
CyberArk Privileged Access Manager
February 2025

Learn what your peers think about CyberArk Privileged Access Manager. Get advice and tips from experienced pros sharing their opinions. Updated: February 2025.
838,713 professionals have used our research since 2012.
CyberArk Consultant at a hospitality company with 10,001+ employees
Helped us to identify, store, protect, and monitor usage of privileged accounts
Pros and Cons
- "CyberArk has helped us to identify, store, protect, and monitor the usage of privileged accounts."
- "The Vault offers great capabilities for structuring and accessing data."
- "Central Password Manager is useful for agentless automated password management through AD integration as well as endpoints for different devices."
- "Online help needs to be looked into with live agent support."
- "The product documentation has to be more precise in certain aspects with explanations for functionality limitations along with reference material or screenshots."
- "New functionalities and discovered bugs take longer to patch. We would greatly appreciate quicker development of security patches and bug corrections."
What is our primary use case?
Managing and securing the access to the environment.
I have worked with CyberArk solutions/applications for more than three years.
I have completed several implementations, proofs of concept, operational, and development activities. I have also worked with or checked most CyberArk releases since version 8.7.
How has it helped my organization?
Much stricter rotation of credentials.
Unmanaged and highly privileged accounts increase risks that can be exploited. The security controls defined by the organization require protection of the privileged account passwords. CyberArk has helped us to identify, store, protect, and monitor the usage of privileged accounts.
What is most valuable?
- Controlled access and rotation of credentials.
- The Vault offers great capabilities for structuring and accessing data.
- Central Password Manager is useful for agentless automated password management through AD integration as well as endpoints for different devices.
- Privileged Session Manager is for provisioning, securing, and recording sessions.
What needs improvement?
- The product documentation has to be more precise in certain aspects with explanations for functionality limitations along with reference material or screenshots.
- New functionalities and discovered bugs take longer to patch. We would greatly appreciate quicker development of security patches and bug corrections.
- Online help also needs to be looked into with live agent support.
For how long have I used the solution?
One to three years.
Disclosure: I am a real user, and this review is based on my own experience and opinions.
Senior Consultant - Information Security Engineering at a financial services firm with 10,001+ employees
Can provide transparent connection to targeted systems and record activities
Pros and Cons
- "Rather than multiple tools for maintaining regulatory compliance around passwords and privileged accounts, we have centralized as much as possible with CyberArk. This is now a one stop shop for end users to access their elevated credentials."
- "You can gradually implement CyberArk, starting with more easily attainable goals."
What is our primary use case?
We proactively vault and manage all elevated accounts across multiple platforms.
For especially sensitive business units, we additionally leverage Privilege Session Manager to provide transparent connection to targeted systems and record activities.
How has it helped my organization?
Rather than multiple tools for maintaining regulatory compliance around passwords and privileged accounts, we have centralized as much as possible with CyberArk. This is now a one stop shop for end users to access their elevated credentials.
What is most valuable?
You can gradually implement CyberArk, starting with more easily attainable goals, such as basic vaulting and password rotation and build on that with additional modules, such as Privileged Session Manager and Application Identity Manager.
What needs improvement?
While in the past, administration required several tools and multiple screens/options in those products, v10 is moving towards a single pane of glass with common functions easily found and information regarding privileged accounts given to users in plain, easy to understand terms, now enhanced with graphics.
For how long have I used the solution?
Three to five years.
Disclosure: I am a real user, and this review is based on my own experience and opinions.
CyberArk PAS Solution Professional | Project Manager at a tech services company with 10,001+ employees
Provides automatic password management. We can monitor, record, and control sessions.
What is most valuable?
All features of the CyberArk PAS solution are valuable.
The Digital Vault is one of the key components of the solution along with many other great benefits. The highly secured vault stores the privileged account passwords and data files using encryption. In version v9.7, CyberArk has introduced the Cluster Vault feature, which enhances high availability of the Vault server.
Other important features:
- Automatic password management
- Monitor, record, and control privileged sessions
- Flexible architecture
- Clientless product
- Custom plug-ins for managing privileged accounts and sessions
How has it helped my organization?
Unmanaged, highly privileged accounts increase risks that can be exploited by attackers. The security controls defined by the organization require protection of the privileged account passwords. CyberArk helps organizations to identify, store, protect, and monitor the usage of privileged accounts.
What needs improvement?
An immediate improvement was the implementation of security controls to protect, control and monitor privileged accounts through CyberArk solution.
For how long have I used the solution?
I have used CyberArk for over two and a half years.
What do I think about the stability of the solution?
It’s a very stable product. I haven’t encountered any stability issues.
What do I think about the scalability of the solution?
I haven’t encountered any scalability issues. All the components are scalable.
How are customer service and technical support?
I would give technical support a rating of 4.5/5.
Which solution did I use previously and why did I switch?
This is the first PAM product that I have used.
How was the initial setup?
The initial installation was straightforward. The configuration or integration can be complex depending on the requirements, design, and infrastructure of the organization.
What's my experience with pricing, setup cost, and licensing?
The pricing and licensing depend on many factors and on the components considered for implementation.
What other advice do I have?
The PAM solution brings cultural change and adds a layer to the way IT administrators access the privileged accounts before implementing the PAM tool. A great, valuable product like CyberArk requires good planning and time to implement all the features.
Disclosure: I am a real user, and this review is based on my own experience and opinions.
Information Security Engineer - Pre-sales at a tech services company with 11-50 employees
Beneficial privileged threat analytics, high availability, and priced well
Pros and Cons
- "The most valuable feature of CyberArk Privileged Access Manager is privileged threat analytics."
- "The issue of technical support is crucial, as there are not many specialized partners available in Brazil to provide this service. While English language support is of good quality, there is a significant shortage of partners capable of meeting the demand locally."
What is our primary use case?
We currently employ CyberArk Privileged Access Management, which involves extremely complex processes for ensuring the secure management, verification, and guarantee of credentials. Implementing the professional installation tool represents another challenging aspect of this task.
What is most valuable?
The most valuable feature of CyberArk Privileged Access Manager is privileged threat analytics.
What needs improvement?
The support could improve for CyberArk Privileged Access Manager.
For how long have I used the solution?
I have been using CyberArk Privileged Access Manager for approximately three years.
What do I think about the stability of the solution?
The solution has high availability.
What do I think about the scalability of the solution?
CyberArk Privileged Access Manager is highly scalable. When compared to other solutions it scales well.
I plan to use the solution more in the future.
How are customer service and support?
The issue of technical support is crucial, as there are not many specialized partners available in Brazil to provide this service. While English language support is of good quality, there is a significant shortage of partners capable of meeting the demand locally.
How was the initial setup?
The initial setup of CyberArk Privileged Access Manager is easy.
What was our ROI?
We have received a high ROI using CyberArk Privileged Access Manager.
What's my experience with pricing, setup cost, and licensing?
The price of the solution is reasonable.
I rate the price CyberArk Privileged Access Manager a seven out of ten.
What other advice do I have?
Individuals who wish to utilize CyberArk should be cautious when selecting a partner to implement the solution, as proper architecture design is essential to ensure a streamlined and effective implementation.
I rate CyberArk Privileged Access Manager a nine out of ten.
Which deployment model are you using for this solution?
On-premises
Disclosure: I am a real user, and this review is based on my own experience and opinions.
Technical consultant at a healthcare company with 1,001-5,000 employees
Gives us the flexibility to integrate with other technologies and applications
Pros and Cons
- "The flexibility of integrating with other technologies is important because of a lot of applications - a lot of COTS products - are not supported when we are bringing the application IDs. The CyberArk platform provides a lot of opportunities to do customization."
- "CyberArk has a lot on the privileged access side but they have to concentrate more on the application side as well."
What is our primary use case?
We use it for all application IDs to onboard into CyberArk. So far, the performance is good because we have onboarded more than 40,000 accounts, and it's growing every day.
We plan to utilize CyberArk's secure infrastructure application running in the cloud. We are conducting workshops with CyberArk on this. So it is planned but not yet confirmed. We are not using CyberArk's secure application credentials and endpoints.
How has it helped my organization?
Previously, we didn't have any password rotation policy for application IDs. Once we implemented CyberArk, we created a policy. It's good to rotate the passwords every two weeks. That is the biggest value for us.
It gives us one place to store the keys to the kingdom, so if there is any breach we know where it is and what to do.
What is most valuable?
The flexibility of integrating with other technologies is important because of a lot of applications - a lot of COTS products - are not supported when we are bringing the application IDs. The CyberArk platform provides a lot of opportunities to do customization.
What needs improvement?
CyberArk has a lot on the privileged access side but they have to concentrate more on the application side as well.
For how long have I used the solution?
More than five years.
What do I think about the stability of the solution?
So far, we haven't seen any major hurdles. We haven't had any downtime because of CyberArk.
What do I think about the scalability of the solution?
I would rate scalability at seven or eight out of 10. There is a need to improve the usage on for the consumer side. I hope in the upcoming product, the version may fulfill this.
How are customer service and technical support?
Technical support is good but the problem is when we are using the application side. The support people have a security background, so they may not know the application technology, so it's a challenge right now. Once they understand, then they make progress but, until then, we have to educate them.
Which solution did I use previously and why did I switch?
Before CyberArk we had a number of solutions, CA and IBM products, but CyberArk meets our requirements regarding application password management.
How was the initial setup?
I was involved in the initial setup and I actually used CyberArk's Professional Services. It was straightforward. We didn't have any hurdles during the setup.
What was our ROI?
It's very hard to quantify because previously we didn't have anything like this. You can imagine, there was a policy not to rotate the passwords, but now after implementing CyberArk, every two weeks we are rotating the password without business impact, so that is the biggest ROI, even though we cannot quantify it.
Which other solutions did I evaluate?
We evaluated Thycotic and one other.
What other advice do I have?
If you want to use it as an application password management cloud solution, think about it not as a security person but as an application person. If CyberArk does not meet your requirements, it has a way to meet them through customization.
Our most important criteria when selecting a vendor include scalability and stability as well meeting our security requirements for applications
From the application perspective, I would rate it at eight out of 10 because it's very easy to use and stable.
Disclosure: PeerSpot contacted the reviewer to collect the review and to validate authenticity. The reviewer was referred by the vendor, but the review is not subject to editing or approval by the vendor.
Principal entity management engineer at a retailer with 10,001+ employees
The ability to record sessions through PSM makes people more careful about what they do
What is our primary use case?
We are using this product for our privileged identities and account management. We have some accounts that we consider privileged, the ones that have access to systems, software, tools, and our database and files and folders, etc. We try to maintain these accounts safely and try to grant access to these systems securely. We try and manage other non-human accounts that are DBAs, DB accounts, etc., through CyberArk.
Another initiative for this was the PCA compliance that we wanted to meet.
We don't have many applications in the cloud, we are getting one or two now. So in the future, we plan to utilize CyberArk's secure infrastructure applications running in the cloud. It's on the roadmap. We are utilizing CyberArk's secure application credentials but not endpoints. I have only just learned about the Plugin Generator Utility, so I don't have experience with it yet. It's pretty cool. We intend to use it now.
How has it helped my organization?
One way it has improved the organization is we now have restricted access for all users to go through CyberArk. It has also enforced firewall restrictions across other places so they don't go through other means, they go through CyberArk. That brings in compliance and their account is now two-factored, so that is more compliant with PCI regulations.
The way it manages privileged accounts and managed access to privileged systems such that, right now, we are recording every session through PSM and people are more aware that the session is recorded, and they're more careful with what they do.
What is most valuable?
We are using the VSM proxy solution. That's what we are mainly using. We will try to use the PTA and AIM in the future.
What needs improvement?
I think it pretty much covers a lot of the privileged identity space, things that other vendors are not thinking about. I think they are doing a very good job. I don't have any suggestions.
For how long have I used the solution?
Three to five years.
What do I think about the stability of the solution?
We have not had any stability issues so far. We have not had any serious downtime. We do see performance issues with PSM which gets very busy, and we just keep scaling the number of PSMs. When many people log in at the same time, we have some issues with connecting through PSM. We doubled our PSM software and it's better now.
What do I think about the scalability of the solution?
It's pretty scalable. Like I said, we just doubled our servers. If there are more users logging in, we'll probably go for a greater number of servers again.
How is customer service and technical support?
Technical support is pretty responsive and knowledgeable. We do get the right person.
What other advice do I have?
Others have spoken a lot about security hygiene and I believe that's where you should start.
l would rate CyberArk at nine out of 10. The way for it to get to a 10 is with a lot of features, the amount of cost involved in buying the product, and the PSM proxy issue that we've been facing.
In terms of important criteria when working with a vendor one thing is, as we said, getting to the right person. We go to support only if there is a critical situation where we are not able to solve it. Getting to the right person at the right time, and getting the issues resolved in a timely fashion is what we are looking for.
Disclosure: PeerSpot contacted the reviewer to collect the review and to validate authenticity. The reviewer was referred by the vendor, but the review is not subject to editing or approval by the vendor.

Buyer's Guide
Download our free CyberArk Privileged Access Manager Report and get advice and tips from experienced pros
sharing their opinions.
Updated: February 2025
Product Categories
Privileged Access Management (PAM) User Activity Monitoring Enterprise Password Managers Mainframe Security Operational Technology (OT) SecurityPopular Comparisons
Okta Workforce Identity
Delinea Secret Server
CyberArk Endpoint Privilege Manager
BeyondTrust Endpoint Privilege Management
WALLIX Bastion
One Identity Safeguard
BeyondTrust Privileged Remote Access
BeyondTrust Password Safe
ARCON Privileged Access Management
Delinea Privileged Access Service
ManageEngine PAM360
Symantec Privileged Access Manager
Buyer's Guide
Download our free CyberArk Privileged Access Manager Report and get advice and tips from experienced pros
sharing their opinions.
Quick Links
Learn More: Questions:
- CyberArk vs. ManageEngine Password Manager Pro
- How does Sailpoint IdentityIQ compare with CyberArk PAM?
- Which PAM tool do you prefer: CyberArk Privileged Access Manager, One Identity Safeguard, Delinea Secret Server, or BeyondTrust Privileged Remote A
- What is the difference between Privileged Users and Privileged Accounts
- When evaluating Privileged Identity Management, what aspect do you think is the most important to look for?
- How was the 2020 Twitter Hack carried out? How could it have been prevented?
- Which is the best Privileged Account Management solution?
- What are the top 5 PAM solutions that can be implemented which cover both hybrid and cloud?
- What are the top 5 PAM solutions?
- How will AI and ML help or work with PIM/PAM?