We implement this solution for our customers. We are system integrators, not end-users.
The main use case is for secure access, and monitoring the access by IT administrators.
We implement this solution for our customers. We are system integrators, not end-users.
The main use case is for secure access, and monitoring the access by IT administrators.
I like the performance of CyberArk Enterprise Password Vault.
Definitely, it's a reliable solution.
It has a wide range of features. They are probably the widest range of features on the market. It is the main reason customers usually select this product.
This solution works very well, and the feedback from our customers is very good.
Integration is one of the strongest capabilities of this solution. There are hundreds of integrations that are ready to use. It is continuously growing, which is one of its strengths.
The interface is really user-friendly.
It's a highly flexible solution that can adapt to each customer's needs.
Another strength, for both performance and the security levels, is the segregation of the different rules of the solution.
The initial setup could be simpler but it may not be as effective.
I've been using CyberArk Enterprise Password Vault for three years, and the company began using it in 2003.
This solution is used mainly on-premises, but the trend is to go with hybrid and cloud deployment for new projects.
CyberArk Enterprise Password Vault is a stable product.
CyberArk Enterprise Password Vault is easy to scale.
I have not contacted technical support. I deal in the presales department. I don't manage the technical aspects of delivery and support.
We needed to build a specific project that is tailored for each customer. It requires a bit of design with the first part of the project, which is a benefit because the solution has high performance and is built on the needs of the customer.
There is a bit of a setup initially, but it provides them with a good result for the project.
It's an affordable platform.
It is not the cheapest solution available on the market, but if you want a good project, you need to have the value of the solution you are selecting.
In my opinion, it is a good compromise between the cost and the benefits. I think the price is fair.
I would definitely recommend this solution to others who are interested in using it.
I do not have visibility with other solutions that may be better or more up-to-date.
I would rate CyberArk Enterprise Password Vault a ten out of ten.
We use it for storing and rotating passwords.
Within our organization, a lot of people are using this solution for a lot of projects. We have already implemented CyberArk as a SaaS solution. We are not using the core parts, but we are using the software as a service for a project.
At my previous job, there was a team of seven people who were in charge of maintenance. Mostly analysts, senior analysts, and a technical lead used this solution.
It completely depends on the requirement. For some of the RPA robotic types of user identity, we prefer for it to happen in an automatic way, but some of them are highly critical, so we don't do it automatically. As for the end-user experience or expectation, if they want to change it at their end, they can do it.
I don't see any problems because it's highly secure and very flexible. It gives us all types of storage options and it gives us a high level of security. From my experience, overall, I don't see many problems that need to be rectified.
The only problem involves granting access to people who are authorized to view it. This user management area is the most critical. We have to constantly check on that area and we have to review and give proper access. Nobody should have more access than they are authorized for.
I have been using CyberArk Enterprise Password Vault for eight years.
It's scalable at the component level. If you want to add some of the latest components, or if you want to implement biometrics or MFA, this solution can handle that — it's very easy to implement.
The tech support is amazing. If you have any issues that you need help with, the CyberArk support team reaches out very quickly, depending on the criticality of the issue. If it's critical, they will reach out to you within hours.
The vendor support is really good.
The initial setup is quite straightforward. These days they have an automatic script — It is much less time-consuming.
We used to do it manually which would take almost two to three hours in total.
We did it in-house. I'm certified in CyberArk; I've also installed it for clients as well.
The licensing plan is either six months or one year — it's not on a monthly basis.
Every company will have a different license fee, but ultimately, it comes down to how many users you want to manage and how many companies you want to support. If you want three CPMs, then you'll need licensing for three. It's per-company, license-based.
I am currently evaluating other solutions. A few of them do not support PTA. Some of them don't have DevOps properly managed. Others don't give you the DNE facility, which is free of charge with CyberArk.
I would definitely recommend CyberArk Enterprise Password Vault.
On a scale from one to ten, I would give this solution a rating of eight.
Improved our user access and tracking, thereby safeguarding the organization and its customers. Being a user makes us a better reseller.
Shared-service accounts reducing the number of potential entry points as well as the ability to standardise our PAM across a diverse estate.
Multi-tenancy vaults should really have the same release cycle as single tenancy vaults; this will enable us to meet even more customer demand. We are striving to be at least on the latest release minus 1 (n-1) and for us to run both Single and Multi-Tenant core systems the difference in release cycles will result in a wide gap. Considering the considerable changes including user interface we have seen recently, the one concern is that we may end up with users having different interfaces to deal with different customers.
Very stable with no own goals in three years.
Scalability is very good.
We get excellent feedback from customer service, irrespective of the level of issues raised.
Yes, we decided to change to CyberArk in line with our strategic intent to provide as safe a central and customer environment as possible.
Initial setup was complex and time-consuming but the later versions are a lot faster to implement.
We implemented through in-house specialists.
Standardised offerings that allow for customer-specific flexibility.
We use this solution for ID purposes. When we remove a user from the server, we need a privileged ID password.
We are a University. It's a large organization.
It's not very different when compared with other products.
From what I can see, the Systems Integrator is useless. When I ask for the information, nothing is given to me. They need to provide better training for the System Integrator.
I have been working with this solution for two years.
Its' quite stable.
It's a scalable solution but could be improved. On a scale of one to five, I would rate it a four.
I have not used technical support.
The initial setup is pretty easy. It is not complex.
We used a reseller, integrators, but they were useless to me.
Pricing is quite high and it could be improved.
I would rate CyberArk Privileged Access Security a six out of ten.
The primary use case of this solution is for third-party developers that come into our infrastructure from VPN to connect. They are organizations that are outside of our organization.
Before CyberArk, our developers would connect from the VPN directly to the jump servers to get all of their access. We have removed the jump servers to connect to CyberArk.
The security has improved. We know who is accessing and what they are doing. The access is secure.
CyberArk has increased our security.
The most valuable feature is that it is flexible. It has many connectors. that have done well, the EPV and SSH sessions are all being recorded and everything works fine.
This solution does not support the SQL Developer. We have to purchase separately from CyberArk and we have to ask them to develop it.
This solution is a bit complex compared to other solutions. The installation and administration are complex.
Some things can be done through the interface, but the whole installation process and upgrade process can be done with the installation script but it's complex.
This is too complex for some organizations that do not have a large scale.
In the next release, they could simplify the setup and I would like some tasks added like file sharing. When a client connects to CyberArk and wants to put a file on the server, they cannot.
I thought that the client would be able to drop a file onto the server and the file would be visible on the server.
I have to disable the connection to provide a copy and this is a security issue, and I closed this file to the client then he can't upload and files to us.
They need to come up with a way for the client to file share with CyberArk.
I have been using this solution for six months.
This solution is stable. We have not had any issues.
This solution is scalable but pricey.
There are fifty users and they are developers.
I have not contacted technical support. I am not an engineer, I work for the bank and I have implemented this solution.
Previously we used Fudo and jump servers with OTP. It is not the same, but from a security perspective, it is also quite good and less expensive.
The initial setup is complex.
You need at least one engineer to manage the software. I must have dedicated people to administer it.
We worked with integrators for the installation. The first step was the installation process and the hardening. This process took two weeks to implement.
The migration process was more complex and more time-consuming.
This solution is expensive.
My advice would be to compare with other products and if they don't want such a large solution they could try Fudo or a similar solution that is easier and can scale like CyberArk.
I would rate this solution a nine out of ten.
We are using it for privileged access management.
We haven't had issues with scalability.
We have good support from support. They are very helpful.
We did not have a previous solution.
The initial setup was somewhat complex, but we received help from the product support team with the installation.
The product is costly due to its active management features.
The product is the best in the market at the moment.
I would recommend the product for sales learning.
We use it all.
CyberArk PAS helps ensure accounts are managed according to corporate policies. In short, it takes people out of the machine work of ensuring credentials remain up-to-date, and handles connection brokering such that human usage and credential management remain independent.
All of the features we use have helped our security posture in some way. All of these have their place in defining and supporting the security posture:
Overall, I think it is a fantastic product, when used as designed and intended.
One of its biggest downfalls is also one of its biggest strengths. It is easily customized, and that customization makes it very easy to start trying to shoehorn the solution into roles it was never intended to fill.
I think that one of the advantages of the CyberArk PAS suite is that it is modular. On top of the basics, you can implement modules to:
Even those components can extend their operational area by use of, e.g., plug-ins, making it possible to manage about any kind of privileged account or session.
I see companies that already have thought about their privileged accounts, while others have not (to that extent). Implementing the CyberArk solution, it helps (and sometimes forces) these companies to think about their privileged accounts. Are they really needed? Who needs access to them? What kind of privileges do these accounts need (service accounts/log on accounts/etc.)? And so on. Thinking about these things helps customers to organize their data/privilege accounts in the CyberArk solution. It then helps the organizations to get control of their privileged accounts and to safely store and manage these, knowing that only the correct persons can access these accounts and that the different devices can only be managed via one central entry point to the datacenter.
With every version, I can see that the product wins on functionality and user experience. On the latter though, I hear from customers that on the UI level, things could be better. CyberArk continuously asks for feedback on the product (e.g., via support, yearly summits) from customers and partners, and hence, with version 10, they are addressing these remarks already.
The web portal (and hence the user interface) has some legacy behavior:
Nevertheless, even with those remarks, it does what it is supposed to do.
I’m working as a partner of CyberArk for about four years now. I started on version v7.1 (currently on v9.7) and I have served about 20 happy customers.
As no software is perfect, I don’t think it is any different with CyberArk. Their support, however, is able to tackle most of the problems. Sometimes patches are distributed. The CyberArk solution highly integrates with different platforms (Windows/Linux) and applications (AD, SIEM, email, etc.). So, not configuring it well can result in unexpected behavior. You need to consider the limitations of the platforms it is installed on, as well.
As mentioned, one of the advantages of the CyberArk PAS suite is the modular build up; not only on covering the functional area, but also on size of your network/datacenter. If you, e.g., notice that the number of privileged accounts to manage increases, you can simply add an additional module/component that manages those passwords.
Their support is good. It is split up into different areas (technical, implementation, etc.) and I always have a quick answer. And they go all the way for their customers.
I saw customers using another product for their privileged accounts. Due to its limitations (e.g., on password and session management) and stability, they decided to switch to CyberArk.
This question goes both ways; initial setup can be straightforward and it can become complex. The architecture in the network and installation of the software itself is pretty straightforward. Most of the modules/components are agentless. This makes it possible to install the solution in the datacenter without impacting any existing devices (no impact on running systems, and simplifying change and release management). Integrating the systems (privileged accounts) in the CyberArk solution can happen gradually.
The flexibility of the product, on the other hand, has as a consequence that there is a lot to configure. Depending on the existing infrastructure and functional demands at the different organizations, care has to be taken to have a correct implementation.
As far as pricing, personally, I’m not involved in the sales part. So, I cannot elaborate on this topic. For licensing, I can advise the same thing as mentioned elsewhere: Start small and gradually grow.
Before choosing this product, I did not evaluate other options (being a partner, not customer).
The Privileged Account Security product is a suite. That means that the product consists of different components/modules that cover a particular functional area (check their website) on privileged accounts. Plugging in more of those components in the environment results in covering a greater part of that area. Of course, there is a common layer that is used by all components. This is the security layer that holds and protects the privileged accounts.
Start small. Use first the basic components that, e.g., include password management. Gradually grow the number of components/modules/functional area to include, e.g., other types of accounts, session management, intrusion detection, end-point protection, etc. Having a project scope that is too large will make the step of using the solution too big. Make sure every stakeholder in the project is aware and let them gradually ‘grow’ with the product.
Which improvements are you waiting to see in the product's UI?