CyberArk is a good, profitable, and most valuable solution.
Security specialist at Kavitech
A stable and profitable solution for privileged access
What is our primary use case?
What is most valuable?
While testing the functionality of PAM, we weren't merely conducting a standard PAM evaluation. We aimed to establish a connection and successfully received a response from the target PAM component.
What needs improvement?
The product’s pricing could be improved.
For how long have I used the solution?
I have been using CyberArk Privileged Access Manager as a partner and implementor.
Buyer's Guide
CyberArk Privileged Access Manager
February 2025

Learn what your peers think about CyberArk Privileged Access Manager. Get advice and tips from experienced pros sharing their opinions. Updated: February 2025.
838,713 professionals have used our research since 2012.
What do I think about the stability of the solution?
The product is stable. If you make some changes or something, it's stable.
What do I think about the scalability of the solution?
The solution is scalable. We cater it to enterprise businesses.
How are customer service and support?
Customer support takes too much time to provide some response. When you open some cases, sometimes it takes one or two weeks to get some people to know the problem and how they will help us.
How would you rate customer service and support?
Neutral
How was the initial setup?
The initial setup takes a few days to complete.
I rate the initial setup a six out of ten, where one is difficult and ten is easy.
What's my experience with pricing, setup cost, and licensing?
The product is expensive.
I rate the product’s pricing a seven out of ten, where one is cheap and ten is expensive.
What other advice do I have?
Overall, I rate the solution a nine out of ten.
Which deployment model are you using for this solution?
On-premises
Disclosure: My company has a business relationship with this vendor other than being a customer: Partner

Team Lead Information Security Control at a financial services firm with 5,001-10,000 employees
Good support, reliable, and straightforward implementation
Pros and Cons
- "CyberArk Privileged Access Manager is stable."
- "CyberArk Privileged Access Manager could improve the integration docking, it should have more layers. For example, integration with OpenShift."
What is our primary use case?
We are using CyberArk Privileged Access Manager because we have too many accounts and we need to manage them.
How has it helped my organization?
CyberArk Privileged Access Manager has helped our organization by controlling users' access.
What needs improvement?
CyberArk Privileged Access Manager could improve the integration docking, it should have more layers. For example, integration with OpenShift.
For how long have I used the solution?
I have been using CyberArk Privileged Access Manager for approximately two years.
What do I think about the stability of the solution?
CyberArk Privileged Access Manager is stable.
What do I think about the scalability of the solution?
We have thousands of users using CyberArk Privileged Access Manager in my organization.
How are customer service and support?
The support from CyberArk Privileged Access Manager is good.
How was the initial setup?
The initial setup of CyberArk Privileged Access Manager was straightforward.
What about the implementation team?
We had a local third-party company help us with the implementation of CyberArk Privileged Access Manager. The maintenance is sometimes a challenge for our consulting team that does it.
What other advice do I have?
I would recommend this solution to others.
I rate CyberArk Privileged Access Manager a nine out of ten.
Which deployment model are you using for this solution?
On-premises
Disclosure: I am a real user, and this review is based on my own experience and opinions.
Buyer's Guide
CyberArk Privileged Access Manager
February 2025

Learn what your peers think about CyberArk Privileged Access Manager. Get advice and tips from experienced pros sharing their opinions. Updated: February 2025.
838,713 professionals have used our research since 2012.
Cyber security architect at a financial services firm with 10,001+ employees
Helpful support, reliable, and useful privileged support manager
Pros and Cons
- "The privileged support manager is the most valuable feature of CyberArk Enterprise Password Vault."
- "The interface could be improved it is not user-friendly, but they have improved but it could still improve. In the policies configuration, it would be a benefit to have more details."
What is our primary use case?
CyberArk Enterprise Password Vault is important to do privileged session management, access a privileged access manager. Additionally, it is important to do segmentation in your core environment with the support team. For example, it is doing access monitoring support in our servers.
What is most valuable?
The privileged support manager is the most valuable feature of CyberArk Enterprise Password Vault.
What needs improvement?
The interface could be improved it is not user-friendly, but they have improved but it could still improve. In the policies configuration, it would be a benefit to have more details.
For how long have I used the solution?
I have been using CyberArk Enterprise Password Vault for approximately five years.
What do I think about the stability of the solution?
CyberArk Enterprise Password Vault is stable.
What do I think about the scalability of the solution?
I have found CyberArk Enterprise Password Vault not to be scalable. There are hardware limitations.
How are customer service and support?
The technical support is very good and helpful.
How was the initial setup?
The initial installation is difficult because of the configuration. The process involved with the privileged access cycle is not easy to connect the process with the technology from CyberArk Enterprise Password Vault.
What other advice do I have?
I rate CyberArk Enterprise Password Vault an eight out of ten.
Which deployment model are you using for this solution?
On-premises
Disclosure: I am a real user, and this review is based on my own experience and opinions.
Security Architect at a financial services firm with 10,001+ employees
Easy to set up and gives us the flexibility to grant access when we need it
Pros and Cons
- "The most valuable feature is the ability to delegate access to admins when they need it."
- "I would prefer that this is a fully-managed service, rather than have to manage the software ourselves and keep it up to date."
What is our primary use case?
This solution is used primarily for privileged segment access and break-glass access. We also use it for log-on session recording and access control, where we can grant access to our key systems for ad-hoc use.
What is most valuable?
The most valuable feature is the ability to delegate access to admins when they need it. It allows us to have some kind of proof on the approval process, rather than give people standing access on a full-time basis.
What needs improvement?
I would prefer that this is a fully-managed service, rather than have to manage the software ourselves and keep it up to date. A cloud-based deployment would ultimately be better for us than an on-premises appliance.
What do I think about the stability of the solution?
Stability has not been a problem.
What do I think about the scalability of the solution?
We didn't have any issues with scalability, although we only have 30 or 40 systems integrated. There were not tens of thousands.
How are customer service and technical support?
We did not need to contact technical support.
How was the initial setup?
The initial setup was not very hard, although it took a little while to get it set up. The only difficult part is making sure that it is integrated with all of the applications. If you've got Active Directory then it is easy, and pretty straightforward. If instead, you have all local accounts then it can get a lot harder, although I don't think that any other application can improve it if you've got local accounts everywhere.
The actual installation that included getting it up and running was pretty quick, taking only a couple of days. Going through all of the change management and other processes took much longer, on the order of months. The more problems there are with accounts inside the organization, the longer the deployment will take.
What about the implementation team?
Our in-house team was responsible for the deployment.
What's my experience with pricing, setup cost, and licensing?
The price of this solution is expensive.
What other advice do I have?
My advice for anybody who is implementing this product is to get the admins familiar with the setup. They have to learn how to get the process approved, especially in an ad-hoc scenario. The scheduled changes are ok, but the ad-hoc ones can be a little bit problematic if you don't have enough approvals ready to approve access.
If an organization can afford it then the Cyberark Enterprise Password Vault works well.
I would rate this solution a nine out of ten.
Which deployment model are you using for this solution?
On-premises
Disclosure: I am a real user, and this review is based on my own experience and opinions.
Principal Consultant, IAM Projects at a tech services company with 201-500 employees
The threat analytics is an important feature. This is a robust product.
Pros and Cons
- "The threat analytics is an important feature."
- "The usual workload is sometimes delayed by the solution."
What is our primary use case?
The primary use case is password management.
What is most valuable?
I find the threat analytics is an important feature. CyberArk can look at the log details, and analyze who is using the applications, which are their locations, and which are the IP locations from which they are accessing. This enables the solution to find the exact location the threat is emanating from. We really value this feature.
What needs improvement?
The usual workload on the system is sometimes delayed by CyberArk. So, any major work is getting delayed, and may take twice the amount of time that it usually does. For instance, if there's a password change of an account it will take time because you have to log in, then authenticate, and this is followed by delays. It becomes cumbersome and frustrating.
For how long have I used the solution?
Less than one year.
What do I think about the stability of the solution?
It is a stable product.
What do I think about the scalability of the solution?
The scalability of the solution is good. We expanded, and we found the biggest part was a bit unfomfortable in terms of product. They are designing, leveraging the features so greater different markets are joined. On the ground it was difficult initially.
How is customer service and technical support?
I found techincal support is adequate. The Indian team is not so good. They are OK with helping, but not all of the engineers are entirely experienced.
How was the initial setup?
The initial setup was OK. If I set up one box, one automation, one machine, within one program, it is O. But, if I have multiple locations in Japan, China, Asia, Singapore, and the like, I will have some trouble. I have faced this problem in the past.
What's my experience with pricing, setup cost, and licensing?
It is quite costly. The license is a concern for some of the clients.
Which other solutions did I evaluate?
I have previous experience with Oracle in the past. There is an ease of use with Oracle, because it is small and not very complex. You can wrap your work in a single day with Oracle. In comparison, the API is quite small with CyberArk. But, the product itself is so robust.
Disclosure: I am a real user, and this review is based on my own experience and opinions.
Security Technical Consultant at a tech services company with 10,001+ employees
It allows you to target application-level access as opposed to just the underlying operating system.
What is most valuable?
The ability to create custom connector components is the most valuable feature of the product. Once the organisation matures in their privileged access strategy, CyberArk’s customisation capability allows you to target application-level access (e.g., web-based management consoles) as opposed to just the underlying operating system. The API allows operational efficiency improvements, through being able to programmatically provision accounts into the Vault.
How has it helped my organization?
It has improved our organization by being able to consolidate several privileged access technologies into a unified tool. Session recording and auditing capability, and approval workflows allow a high degree of control over the organisation’s privileged access requirements for compliance purposes.
What needs improvement?
- Authentication to the solution: Authentication to the PVWA utilises integration to IIS. Therefore, it is not as strong as desired.
- Reporting capability and customisation: Reporting utilises predefined templates with limited customisation capability.
For how long have I used the solution?
I have used it for 15 months; approximately nine months in a large enterprise.
What do I think about the stability of the solution?
I have not encountered any stability issues.
What do I think about the scalability of the solution?
I have not encountered any scalability issues. The solution is fairly scalable. All presentation-level components are operable in highly available configurations.
How are customer service and technical support?
Technical support is 8/10; level of engagement depends on severity of problem.
Which solution did I use previously and why did I switch?
I did not previously use a different solution.
How was the initial setup?
Initial configuration is quite complex and takes a considerable amount of time. However, this depends on the management requirements of the organisation. An example of this is connectors to mainframes, which might require a degree of customisation and knowledge of how the password manager functions (and relevant training). Setup regarding installation is straightforward, as the provided guides are quite expansive and include several installation possibilities (e.g., standalone, HA, DR, etc.)
What's my experience with pricing, setup cost, and licensing?
Appropriately scope the organisation’s requirements to ensure licenses are not over-provisioned.
Which other solutions did I evaluate?
I was not part of the selection process.
What other advice do I have?
If an organisation has not utilised a PAM tool before, it is a large cultural change fundamentally in how a user works, and should be taken into consideration accordingly. The solution is complex depending on the requirements; therefore, the implementation should not be rushed and it should be tested appropriately.
Disclosure: I am a real user, and this review is based on my own experience and opinions.
Sr. Technical Consultant at a tech company with 51-200 employees
The integration of Auto IT provided the flexibility to add thick clients and websites. It is expensive and the professional service team charges for each and every thing.
Valuable Features
I see the Auto IT integration as the most valuable feature.
Improvements to My Organization
I have seen improvements compared to the older versions and the integration of Auto IT provided the flexibility to add thick clients and websites.
Room for Improvement
Session recording search capability has to be improved. It should include more platforms for password management. It should include more thick client integrations.
Use of Solution
I used it for almost six years.
Stability Issues
There is dependency on Windows tasks and if any AD GPO changes are pushed, it affects the system and stops working.
Scalability Issues
I have not encountered any scalability issues. The product scales as the organisation grows.
Customer Service and Technical Support
Technical support from the vendor is the worst and that is one reason I stopped using CyberArk.
Initial Setup
The initial setup is not so complex, but CyberArk does require more servers for a full-fledged installation.
Pricing, Setup Cost and Licensing
The solution is costly and the licensing is very complex.
Other Solutions Considered
I was using CyberArk for more than six years and I have now switched to ARCOS. I was impressed with ARCOS because of the following reasons:
- Cost-effective solution
- Fewer servers required
- Flexibility, performance
- More features
- Simple licensing
- Good support
I evaluated other solutions such as Leiberman, ManageEngine, TPAM, and Xceedium.
ARCOS seems to be very promising and cost effective. Also, ARCOS doesn’t have a traditional jump server concept, which saves the customer from spending more on hardware. The licensing is very simple (number of admins & target IPs), where most of the features are available by default with the basic license.
Other Advice
CyberArk architecture is good and more secure, but I see the solution as expensive. Support is the worst; CyberArkstaff is not supportive, their professional service team charges for each and every thing.
Disclosure: My company has a business relationship with this vendor other than being a customer: We were the distributor for Cyber Ark.
Technical Consultant at a outsourcing company with 51-200 employees
Resource and administration costs are less but support needs to improve knowledge and quality
Pros and Cons
- "The accounts are maintained automatically. Hence, resource and administration costs are less."
- "CyberArk Enterprise Password Vault's deployment is complex for resources with little experience. Tech support needs to be improved as well based on quality and knowledge."
What is most valuable?
The accounts are maintained automatically. Hence, resource and administration costs are less.
What needs improvement?
CyberArk Enterprise Password Vault's deployment is complex for resources with little experience. Tech support needs to be improved as well based on quality and knowledge.
For how long have I used the solution?
I have been working with the product for more than five years.
What do I think about the stability of the solution?
The product is very stable.
What do I think about the scalability of the solution?
CyberArk Enterprise Password Vault is scalable.
How was the initial setup?
CyberArk Enterprise Password Vault's deployment can be done with two to three resources.
What other advice do I have?
I rate the solution a nine out of ten.
Disclosure: My company has a business relationship with this vendor other than being a customer: Partner

Buyer's Guide
Download our free CyberArk Privileged Access Manager Report and get advice and tips from experienced pros
sharing their opinions.
Updated: February 2025
Product Categories
Privileged Access Management (PAM) User Activity Monitoring Enterprise Password Managers Mainframe Security Operational Technology (OT) SecurityPopular Comparisons
Okta Workforce Identity
Delinea Secret Server
CyberArk Endpoint Privilege Manager
BeyondTrust Endpoint Privilege Management
WALLIX Bastion
One Identity Safeguard
BeyondTrust Privileged Remote Access
BeyondTrust Password Safe
ARCON Privileged Access Management
Delinea Privileged Access Service
ManageEngine PAM360
Symantec Privileged Access Manager
Buyer's Guide
Download our free CyberArk Privileged Access Manager Report and get advice and tips from experienced pros
sharing their opinions.
Quick Links
Learn More: Questions:
- CyberArk vs. ManageEngine Password Manager Pro
- How does Sailpoint IdentityIQ compare with CyberArk PAM?
- Which PAM tool do you prefer: CyberArk Privileged Access Manager, One Identity Safeguard, Delinea Secret Server, or BeyondTrust Privileged Remote A
- What is the difference between Privileged Users and Privileged Accounts
- When evaluating Privileged Identity Management, what aspect do you think is the most important to look for?
- How was the 2020 Twitter Hack carried out? How could it have been prevented?
- Which is the best Privileged Account Management solution?
- What are the top 5 PAM solutions that can be implemented which cover both hybrid and cloud?
- What are the top 5 PAM solutions?
- How will AI and ML help or work with PIM/PAM?