Our primary use case for his solution is privileged identity and application identity management, and we deploy the solution on-premises.
Pre sales Engineer (West Africa) at StarLink - Trusted Security Advisor
A useful solution for privileged identity and application identity management
Pros and Cons
- "It's a good solution, it works, and the bank is happy with it."
- "The architecture needs to be improved."
What is our primary use case?
What is most valuable?
We have found the core features of the product most valuable, such as password management, session recording and vaulting.
What needs improvement?
The architecture needs to be improved. For example, the whole solution can come within a single software bundle instead of the distributed components we have for the on-premise deployments. I think there's room for improvements in that area because the competitors within that space have appliances and software that are just a single software. You don't have to split functionality across several servers like the current deployment.
For how long have I used the solution?
We have been using this solution for approximately five years.
Buyer's Guide
CyberArk Privileged Access Manager
November 2024
Learn what your peers think about CyberArk Privileged Access Manager. Get advice and tips from experienced pros sharing their opinions. Updated: November 2024.
816,660 professionals have used our research since 2012.
What do I think about the scalability of the solution?
The solution is scalable. At the point of implementation, 300 users in our organization were using it, but that number may have increased.
How was the initial setup?
The initial setup is not very complex because of my experience and skills. Still, the end users are only in charge of the administrative aspects, but I think the set up is a bit complex for those who are not very savvy with the solution. Implementation took approximately two weeks.
What other advice do I have?
I rate the solution nine out of ten. The solution is good, but the main feature to be improved is having the product in a consolidated software bundle. So the moment we have PSM, it's a dedicated server. We can also have a PVWA in another server, so having a singular bundle is just like the cloud offering. The infrastructure is abstracted from the end user. So if we can have something like that for on-premises, that would simplify implementation. Regardless it's a good solution, it works, and the bank is happy with it. My recommendation to people considering implementing this product is to get the scoping appropriately done. It comes down to scoping the initial deployment, so it doesn't take forever. Still, if you're not scoping correctly, you could have a situation where people keep adding new accounts continuously, and your project never ends. Hence, scoping is kind of important.
Disclosure: I am a real user, and this review is based on my own experience and opinions.
Director Of Technical Operations at BNB Security Alliance
Beneficial integration, helpful support, and scales well
Pros and Cons
- "The most valuable feature of CyberArk Privileged Access Manager is the vault. I am satisfied with the interface and the documentation."
- "CyberArk Privileged Access Manager could improve the integration with other solutions and ease of use. Additionally, there should be a feature to have remote connections without a VPN."
What is most valuable?
The most valuable feature of CyberArk Privileged Access Manager is the vault. I am satisfied with the interface and the documentation.
What needs improvement?
CyberArk Privileged Access Manager could improve the integration with other third-party secret managers, and vault solutions.
For how long have I used the solution?
I have been working with CyberArk Privileged Access Manager for approximately three years. Our clients are typically financial institutions.
What do I think about the stability of the solution?
CyberArk Privileged Access Manager is stable.
What do I think about the scalability of the solution?
The scalability of CyberArk Privileged Access Manager is good.
Most of our clients are enterprise-sized companies.
How are customer service and support?
I am satisfied with the vendor's support.
How would you rate customer service and support?
Positive
Which solution did I use previously and why did I switch?
I have used Balabit and One Identity prior to using CyberArk Privileged Access Manager. I found that CyberArk has more integration out of the box with other solutions and it solves a lot of problems for customers if they have different solutions.
How was the initial setup?
The initial setup CyberArk Privileged Access Manager is easy.
What's my experience with pricing, setup cost, and licensing?
The price of CyberArk Privileged Access Manager could be less expensive.
What other advice do I have?
My advice to others is this solution can solve a lot of problems.
I rate CyberArk Privileged Access Manager a nine out of ten.
Which deployment model are you using for this solution?
On-premises
Disclosure: My company has a business relationship with this vendor other than being a customer: B&B Security Alliance has been established in 2019 and only deals with cyber security. B&B Security Alliance provides cyber security solutions to customers wanting to be resilient against new and existing threats. We offer professional services, advisory and through our vendor network we will help you select a suite of best in class products that enhances your reputation and company value.
Buyer's Guide
CyberArk Privileged Access Manager
November 2024
Learn what your peers think about CyberArk Privileged Access Manager. Get advice and tips from experienced pros sharing their opinions. Updated: November 2024.
816,660 professionals have used our research since 2012.
Cyber security architect at a financial services firm with 10,001+ employees
Helpful support, reliable, and useful privileged support manager
Pros and Cons
- "The privileged support manager is the most valuable feature of CyberArk Enterprise Password Vault."
- "The interface could be improved it is not user-friendly, but they have improved but it could still improve. In the policies configuration, it would be a benefit to have more details."
What is our primary use case?
CyberArk Enterprise Password Vault is important to do privileged session management, access a privileged access manager. Additionally, it is important to do segmentation in your core environment with the support team. For example, it is doing access monitoring support in our servers.
What is most valuable?
The privileged support manager is the most valuable feature of CyberArk Enterprise Password Vault.
What needs improvement?
The interface could be improved it is not user-friendly, but they have improved but it could still improve. In the policies configuration, it would be a benefit to have more details.
For how long have I used the solution?
I have been using CyberArk Enterprise Password Vault for approximately five years.
What do I think about the stability of the solution?
CyberArk Enterprise Password Vault is stable.
What do I think about the scalability of the solution?
I have found CyberArk Enterprise Password Vault not to be scalable. There are hardware limitations.
How are customer service and support?
The technical support is very good and helpful.
How was the initial setup?
The initial installation is difficult because of the configuration. The process involved with the privileged access cycle is not easy to connect the process with the technology from CyberArk Enterprise Password Vault.
What other advice do I have?
I rate CyberArk Enterprise Password Vault an eight out of ten.
Which deployment model are you using for this solution?
On-premises
Disclosure: I am a real user, and this review is based on my own experience and opinions.
Senior Manager - Privileged Access Management at a tech services company with 10,001+ employees
Has the ability to standardize our PAM across a diverse estate
What is our primary use case?
- PAM interface for staff to support customers which may include CyberArk solutions of their own.
- Managing large environments with varied and diverse environments.
How has it helped my organization?
Improved our user access and tracking, thereby safeguarding the organization and its customers. Being a user makes us a better reseller.
What is most valuable?
Shared-service accounts reducing the number of potential entry points as well as the ability to standardise our PAM across a diverse estate.
What needs improvement?
Multi-tenancy vaults should really have the same release cycle as single tenancy vaults; this will enable us to meet even more customer demand. We are striving to be at least on the latest release minus 1 (n-1) and for us to run both Single and Multi-Tenant core systems the difference in release cycles will result in a wide gap. Considering the considerable changes including user interface we have seen recently, the one concern is that we may end up with users having different interfaces to deal with different customers.
For how long have I used the solution?
Three to five years.
What do I think about the stability of the solution?
Very stable with no own goals in three years.
What do I think about the scalability of the solution?
Scalability is very good.
How are customer service and technical support?
We get excellent feedback from customer service, irrespective of the level of issues raised.
Which solution did I use previously and why did I switch?
Yes, we decided to change to CyberArk in line with our strategic intent to provide as safe a central and customer environment as possible.
How was the initial setup?
Initial setup was complex and time-consuming but the later versions are a lot faster to implement.
What about the implementation team?
We implemented through in-house specialists.
What's my experience with pricing, setup cost, and licensing?
Standardised offerings that allow for customer-specific flexibility.
Disclosure: I am a real user, and this review is based on my own experience and opinions.
Principal entity management engineer at a retailer with 10,001+ employees
The ability to record sessions through PSM makes people more careful about what they do
What is our primary use case?
We are using this product for our privileged identities and account management. We have some accounts that we consider privileged, the ones that have access to systems, software, tools, and our database and files and folders, etc. We try to maintain these accounts safely and try to grant access to these systems securely. We try and manage other non-human accounts that are DBAs, DB accounts, etc., through CyberArk.
Another initiative for this was the PCA compliance that we wanted to meet.
We don't have many applications in the cloud, we are getting one or two now. So in the future, we plan to utilize CyberArk's secure infrastructure applications running in the cloud. It's on the roadmap. We are utilizing CyberArk's secure application credentials but not endpoints. I have only just learned about the Plugin Generator Utility, so I don't have experience with it yet. It's pretty cool. We intend to use it now.
How has it helped my organization?
One way it has improved the organization is we now have restricted access for all users to go through CyberArk. It has also enforced firewall restrictions across other places so they don't go through other means, they go through CyberArk. That brings in compliance and their account is now two-factored, so that is more compliant with PCI regulations.
The way it manages privileged accounts and managed access to privileged systems such that, right now, we are recording every session through PSM and people are more aware that the session is recorded, and they're more careful with what they do.
What is most valuable?
We are using the VSM proxy solution. That's what we are mainly using. We will try to use the PTA and AIM in the future.
What needs improvement?
I think it pretty much covers a lot of the privileged identity space, things that other vendors are not thinking about. I think they are doing a very good job. I don't have any suggestions.
For how long have I used the solution?
Three to five years.
What do I think about the stability of the solution?
We have not had any stability issues so far. We have not had any serious downtime. We do see performance issues with PSM which gets very busy, and we just keep scaling the number of PSMs. When many people log in at the same time, we have some issues with connecting through PSM. We doubled our PSM software and it's better now.
What do I think about the scalability of the solution?
It's pretty scalable. Like I said, we just doubled our servers. If there are more users logging in, we'll probably go for a greater number of servers again.
How is customer service and technical support?
Technical support is pretty responsive and knowledgeable. We do get the right person.
What other advice do I have?
Others have spoken a lot about security hygiene and I believe that's where you should start.
l would rate CyberArk at nine out of 10. The way for it to get to a 10 is with a lot of features, the amount of cost involved in buying the product, and the PSM proxy issue that we've been facing.
In terms of important criteria when working with a vendor one thing is, as we said, getting to the right person. We go to support only if there is a critical situation where we are not able to solve it. Getting to the right person at the right time, and getting the issues resolved in a timely fashion is what we are looking for.
Disclosure: PeerSpot contacted the reviewer to collect the review and to validate authenticity. The reviewer was referred by the vendor, but the review is not subject to editing or approval by the vendor.
Senior server administrator at a financial services firm with 1,001-5,000 employees
Significantly decreases the amount of time our teams spend mitigating security issues
Pros and Cons
- "Because we now have the ability to grant access to management utilities like DNS Manager, Sequel Studio, and MMC, in a secure fashion, without system admins being required to continually reenter various passwords that are stored who knows where, it has really made the system admin's job much easier. It has made the PSM's job much easier. It has made the auditor's job and the security team's job and the access manager's job significantly easier, because we're able to move much more quickly toward a role-based access management system, and that is really streamlining the whole onboarding/offboarding management process."
- "I would like to see better automation in granting access, better tools, more efficient tools, to be able to customize the solution that CyberArk provides."
What is our primary use case?
We use CyberArk to assist with implementing security solutions that our auditors require. It also assists us in giving secure, monitored, audited access to non-technical people who, because of their jobs, or because of the application, require direct access to servers.
We are utilizing CyberArk's secure application credentials and endpoints.
It is performing very well.
We're not planning to utilize CyberArk's secure infrastructure or applications running in the cloud because our industry is, for the present, barred from using cloud resources. We don't yet have experience using the Plugin Generator Utility and we are not using any of the other integrations available through CyberArk marketplace.
How has it helped my organization?
Because we now have the ability to grant access to management utilities like DNS Manager, Sequel Studio, and MMC, in a secure fashion, without system admins being required to continually reenter various passwords that are stored who knows where, it has really made the system admin's job much easier. It has made the PSM's job much easier. It has made the auditor's job and the security team's job and the access manager's job significantly easier, because we're able to move much more quickly toward a role-based access management system, and that is really streamlining the whole onboarding/offboarding management process.
CyberArk is the key technology around which we have built our security management solution. We chose it four years ago to assist with password management, and it has grown to where it is managing the entire security posture of the company at this point.
What is most valuable?
Number one would be the company, CyberArk, itself. The support, the ongoing assistance that is there, the ongoing ideas that are out there from champions, and from the other community forums that are out there, is just phenomenal.
What needs improvement?
My list of enhancement requests on the portal is quite extensive.
My goal as a system administrator is to enable people to do their jobs more easily, more efficiently. So, I'm looking for ways to enable people to leverage the security posture in CyberArk, and still be able to do their jobs. Better yet, to be able to do their jobs more easily, and that's exactly what I've been finding. There are a lot of ways that CyberArk is able to be used to give people access to things that they normally wouldn't be able to access, in a secure fashion, but there are still some roadblocks in the way there. I would like to see better automation in granting access, better tools, more efficient tools, to be able to customize the solution that CyberArk provides.
For how long have I used the solution?
One to three years.
What do I think about the stability of the solution?
It is very stable. We started off on version 7, moved to 8, to 9, and now we're moving to 10, and each revision has brought about an increase in confidence and stability.
What do I think about the scalability of the solution?
It is very scalable for an organization of our size, and I have talked with other CyberArk administrators running worldwide enterprises with CyberArk.
How is customer service and technical support?
The tech support for CyberArk is definitely one of the best I've used, and I've been in IT for 35 years.
How was the initial setup?
I wasn't involved in the initial setup but I am involved in upgrade processing. Now, it is very straightforward. When we did the first major upgrade, it was very complex and required Professional Services for two weeks. Since we made it to version 9, the upgrades have been as simple as you could possibly hope for.
What was our ROI?
The amount of time that the security team spends mitigating risk has gone down. The amount of time that the server team spends managing security issues, mitigating security issues, has gone down tremendously.
What other advice do I have?
My advice to a colleague would be: First, don't allow the security team to be the driving force. It has to be the server team that implements it, that is the driving force behind it, and the for that reason is there is always animosity between the people who are there to enforce security and the people who are there to get a job done.
When you are on the enforcement team, you are dictating to the people who are trying to get a job done, "Here is something that I'm going to put in your way to make it harder for you to get your job done." Regardless of what happens, that's the way it comes across. Going to the server team saying, 'I've got a solution that's going to make our lives easier, and oh, by the way, it's also going to be more secure," you have a much easier time selling it, much lower push-back, because you're one of them.
Second, you've got to have buy-in before you pull the trigger. You can't just force it on them: "Oh, we just took away all your admin rights." You have to give them a new solution, let them prove to themselves that this solution works, that it does exactly what they need, and that it really is easier. Now, when you revoke the rights that they've had for probably decades, there is much less push-back.
In terms of selecting or working with a vendor, our most important criterion is the ability to connect with a vendor that not only gives us the solution we need but can also work with us to customize exactly what we need.
I would rate CyberArk a nine out of 10 for two reasons:
- there is always room for growth
- there are still gaps in what the solution provides.
It's not complete across the board. If it were, it would be a 10. But I do see its potential to eventually reach that.
Disclosure: PeerSpot contacted the reviewer to collect the review and to validate authenticity. The reviewer was referred by the vendor, but the review is not subject to editing or approval by the vendor.
Works at a financial services firm with 10,001+ employees
Securely protects our TAP/NUID and privileged access accounts within the company
Pros and Cons
- "The regulation of accounts is by far the most needed and valuable part of the application."
- "Helped us meet our standards and requirements to help us comply with industry standards and banking regulations."
- "Securely protects our TAP/NUID and privileged access accounts within the company."
What is our primary use case?
Our main use is for CyberArk to hold, maintain, and securely protect our TAP/NUID and "privileged access" accounts within the company.
How has it helped my organization?
For audit and risk purposes, CyberArk EPV has helped us meet our standards and requirements to help us comply with industry standards and banking regulations. Reports and other quick audit checks make this possible.
What is most valuable?
EPV, as a whole, is very valuable to the company. However, the regulation of accounts is by far the most needed and valuable part of the application.
What needs improvement?
Cost efficiency is the number one thing that can be improved in my mind. This would change lots of companies minds on purchasing the product.
For how long have I used the solution?
Less than one year.
Disclosure: I am a real user, and this review is based on my own experience and opinions.
Global Privilege Access Management Technical Architect at a consultancy with 10,001+ employees
All access to our servers, by both staff and vendors, is monitored and recorded
Pros and Cons
- "CyberArk has resulted in a massive increase in our security footprint."
- "All access to our servers by both staff and vendors is monitored and recorded."
- "The current user interface is a little dated. However, I hear there are changes coming in the next version."
- "There is a learning curve when it comes to planning out the deployment strategy, but once it is defined, it runs itself."
What is our primary use case?
We are leveraging CyberArk to provide Windows server access management across our enterprise. All our staff is looking for access to a server and needs to use CyberArk.
How has it helped my organization?
CyberArk has resulted in a massive increase in our security footprint. All access to our servers, by both staff and vendors, is monitored and recorded.
What is most valuable?
Session recording and key logging. We can track down not only who made a change, but exactly what they changed or did.
What needs improvement?
The current user interface is a little dated. However, I hear there are changes coming in the next version.
There is a learning curve when it comes to planning out the deployment strategy, but once it is defined, it runs itself.
For how long have I used the solution?
More than five years.
Disclosure: I am a real user, and this review is based on my own experience and opinions.
Buyer's Guide
Download our free CyberArk Privileged Access Manager Report and get advice and tips from experienced pros
sharing their opinions.
Updated: November 2024
Product Categories
Privileged Access Management (PAM) User Activity Monitoring Enterprise Password Managers Mainframe Security Operational Technology (OT) SecurityPopular Comparisons
Okta Workforce Identity
Delinea Secret Server
CyberArk Endpoint Privilege Manager
BeyondTrust Endpoint Privilege Management
WALLIX Bastion
One Identity Safeguard
BeyondTrust Privileged Remote Access
BeyondTrust Password Safe
ARCON Privileged Access Management
Delinea Privileged Access Service
ManageEngine PAM360
Symantec Privileged Access Manager
Buyer's Guide
Download our free CyberArk Privileged Access Manager Report and get advice and tips from experienced pros
sharing their opinions.
Quick Links
Learn More: Questions:
- CyberArk vs. ManageEngine Password Manager Pro
- How does Sailpoint IdentityIQ compare with CyberArk PAM?
- Which PAM tool do you prefer: CyberArk Privileged Access Manager, One Identity Safeguard, Delinea Secret Server, or BeyondTrust Privileged Remote A
- What is the difference between Privileged Users and Privileged Accounts
- When evaluating Privileged Identity Management, what aspect do you think is the most important to look for?
- Which is the best Privileged Account Management solution?
- What are the top 5 PAM solutions that can be implemented which cover both hybrid and cloud?
- What are the top 5 PAM solutions?
- How will AI and ML help or work with PIM/PAM?
- Is BeyondTrust Endpoint Privilege Management really expensive compared to other tools or software?
The UI has been completely revamped in Version 10. It has a differently look and feel. We will be looking to test it in our Development landscape and possibly go to Production towards the end of the year.