Try our new research platform with insights from 80,000+ expert users
Cyber security architect at a financial services firm with 10,001+ employees
Real User
Helpful support, reliable, and useful privileged support manager
Pros and Cons
  • "The privileged support manager is the most valuable feature of CyberArk Enterprise Password Vault."
  • "The interface could be improved it is not user-friendly, but they have improved but it could still improve. In the policies configuration, it would be a benefit to have more details."

What is our primary use case?

CyberArk Enterprise Password Vault is important to do privileged session management, access a privileged access manager. Additionally, it is important to do segmentation in your core environment with the support team. For example, it is doing access monitoring support in our servers.

What is most valuable?

The privileged support manager is the most valuable feature of CyberArk Enterprise Password Vault.

What needs improvement?

The interface could be improved it is not user-friendly, but they have improved but it could still improve. In the policies configuration, it would be a benefit to have more details.

For how long have I used the solution?

I have been using CyberArk Enterprise Password Vault for approximately five years.

Buyer's Guide
CyberArk Privileged Access Manager
March 2025
Learn what your peers think about CyberArk Privileged Access Manager. Get advice and tips from experienced pros sharing their opinions. Updated: March 2025.
842,690 professionals have used our research since 2012.

What do I think about the stability of the solution?

CyberArk Enterprise Password Vault is stable.

What do I think about the scalability of the solution?

I have found CyberArk Enterprise Password Vault not to be scalable. There are hardware limitations.

How are customer service and support?

The technical support is very good and helpful.

How was the initial setup?

The initial installation is difficult because of the configuration. The process involved with the privileged access cycle is not easy to connect the process with the technology from CyberArk Enterprise Password Vault.

What other advice do I have?

I rate CyberArk Enterprise Password Vault an eight out of ten.

Which deployment model are you using for this solution?

On-premises
Disclosure: I am a real user, and this review is based on my own experience and opinions.
PeerSpot user
reviewer1337610 - PeerSpot reviewer
Security Architect at a financial services firm with 10,001+ employees
Real User
Easy to set up and gives us the flexibility to grant access when we need it
Pros and Cons
  • "The most valuable feature is the ability to delegate access to admins when they need it."
  • "I would prefer that this is a fully-managed service, rather than have to manage the software ourselves and keep it up to date."

What is our primary use case?

This solution is used primarily for privileged segment access and break-glass access. We also use it for log-on session recording and access control, where we can grant access to our key systems for ad-hoc use.

What is most valuable?

The most valuable feature is the ability to delegate access to admins when they need it. It allows us to have some kind of proof on the approval process, rather than give people standing access on a full-time basis.

What needs improvement?

I would prefer that this is a fully-managed service, rather than have to manage the software ourselves and keep it up to date. A cloud-based deployment would ultimately be better for us than an on-premises appliance.

What do I think about the stability of the solution?

Stability has not been a problem.

What do I think about the scalability of the solution?

We didn't have any issues with scalability, although we only have 30 or 40 systems integrated. There were not tens of thousands.

How are customer service and technical support?

We did not need to contact technical support.

How was the initial setup?

The initial setup was not very hard, although it took a little while to get it set up. The only difficult part is making sure that it is integrated with all of the applications. If you've got Active Directory then it is easy, and pretty straightforward. If instead, you have all local accounts then it can get a lot harder, although I don't think that any other application can improve it if you've got local accounts everywhere.

The actual installation that included getting it up and running was pretty quick, taking only a couple of days. Going through all of the change management and other processes took much longer, on the order of months. The more problems there are with accounts inside the organization, the longer the deployment will take.

What about the implementation team?

Our in-house team was responsible for the deployment.

What's my experience with pricing, setup cost, and licensing?

The price of this solution is expensive.

What other advice do I have?

My advice for anybody who is implementing this product is to get the admins familiar with the setup. They have to learn how to get the process approved, especially in an ad-hoc scenario. The scheduled changes are ok, but the ad-hoc ones can be a little bit problematic if you don't have enough approvals ready to approve access.

If an organization can afford it then the Cyberark Enterprise Password Vault works well.

I would rate this solution a nine out of ten.

Which deployment model are you using for this solution?

On-premises
Disclosure: I am a real user, and this review is based on my own experience and opinions.
PeerSpot user
Buyer's Guide
CyberArk Privileged Access Manager
March 2025
Learn what your peers think about CyberArk Privileged Access Manager. Get advice and tips from experienced pros sharing their opinions. Updated: March 2025.
842,690 professionals have used our research since 2012.
Principal Consultant, IAM Projects at a tech services company with 201-500 employees
Consultant
The threat analytics is an important feature. This is a robust product.
Pros and Cons
  • "The threat analytics is an important feature."
  • "The usual workload is sometimes delayed by the solution."

What is our primary use case?

The primary use case is password management. 

What is most valuable?

I find the threat analytics is an important feature. CyberArk can look at the log details, and analyze who is using the applications, which are their locations, and which are the IP locations from which they are accessing. This enables the solution to find the exact location the threat is emanating from. We really value this feature.

What needs improvement?

The usual workload on the system is sometimes delayed by CyberArk. So, any major work is getting delayed, and may take twice the amount of time that it usually does. For instance, if there's a password change of an account it will take time because you have to log in, then  authenticate, and this is followed by delays. It becomes cumbersome and frustrating.

For how long have I used the solution?

Less than one year.

What do I think about the stability of the solution?

It is a stable product. 

What do I think about the scalability of the solution?

The scalability of the solution is good. We expanded, and we found the biggest part was a bit unfomfortable in terms of product. They are designing, leveraging the features so greater different markets are joined. On the ground it was difficult initially.

How is customer service and technical support?

I found techincal support is adequate. The Indian team is not so good. They are OK with helping, but not all of the engineers are entirely experienced. 

How was the initial setup?

The initial setup was OK. If I set up one box, one automation, one machine, within one program, it is O. But, if I have multiple locations in Japan, China, Asia, Singapore, and the like, I will have some trouble. I have faced this problem in the past. 

What's my experience with pricing, setup cost, and licensing?

It is quite costly. The license is a concern for some of the clients. 

Which other solutions did I evaluate?

I have previous experience with Oracle in the past. There is an ease of use with Oracle, because it is small and not very complex. You can wrap your work in a single day with Oracle. In comparison, the API is quite small with CyberArk. But, the product itself is so robust.

Disclosure: I am a real user, and this review is based on my own experience and opinions.
PeerSpot user
it_user514596 - PeerSpot reviewer
Security Technical Consultant at a tech services company with 10,001+ employees
Consultant
It allows you to target application-level access as opposed to just the underlying operating system.

What is most valuable?

The ability to create custom connector components is the most valuable feature of the product. Once the organisation matures in their privileged access strategy, CyberArk’s customisation capability allows you to target application-level access (e.g., web-based management consoles) as opposed to just the underlying operating system. The API allows operational efficiency improvements, through being able to programmatically provision accounts into the Vault.

How has it helped my organization?

It has improved our organization by being able to consolidate several privileged access technologies into a unified tool. Session recording and auditing capability, and approval workflows allow a high degree of control over the organisation’s privileged access requirements for compliance purposes.

What needs improvement?

  • Authentication to the solution: Authentication to the PVWA utilises integration to IIS. Therefore, it is not as strong as desired.
  • Reporting capability and customisation: Reporting utilises predefined templates with limited customisation capability.

For how long have I used the solution?

I have used it for 15 months; approximately nine months in a large enterprise.

What do I think about the stability of the solution?

I have not encountered any stability issues.

What do I think about the scalability of the solution?

I have not encountered any scalability issues. The solution is fairly scalable. All presentation-level components are operable in highly available configurations.

How are customer service and technical support?

Technical support is 8/10; level of engagement depends on severity of problem.

Which solution did I use previously and why did I switch?

I did not previously use a different solution.

How was the initial setup?

Initial configuration is quite complex and takes a considerable amount of time. However, this depends on the management requirements of the organisation. An example of this is connectors to mainframes, which might require a degree of customisation and knowledge of how the password manager functions (and relevant training). Setup regarding installation is straightforward, as the provided guides are quite expansive and include several installation possibilities (e.g., standalone, HA, DR, etc.)

What's my experience with pricing, setup cost, and licensing?

Appropriately scope the organisation’s requirements to ensure licenses are not over-provisioned.

Which other solutions did I evaluate?

I was not part of the selection process.

What other advice do I have?

If an organisation has not utilised a PAM tool before, it is a large cultural change fundamentally in how a user works, and should be taken into consideration accordingly. The solution is complex depending on the requirements; therefore, the implementation should not be rushed and it should be tested appropriately.

Disclosure: I am a real user, and this review is based on my own experience and opinions.
PeerSpot user
it_user512235 - PeerSpot reviewer
Sr. Technical Consultant at a tech company with 51-200 employees
Vendor
The integration of Auto IT provided the flexibility to add thick clients and websites. It is expensive and the professional service team charges for each and every thing.

Valuable Features

I see the Auto IT integration as the most valuable feature.

Improvements to My Organization

I have seen improvements compared to the older versions and the integration of Auto IT provided the flexibility to add thick clients and websites.

Room for Improvement

Session recording search capability has to be improved. It should include more platforms for password management. It should include more thick client integrations.

Use of Solution

I used it for almost six years.

Stability Issues

There is dependency on Windows tasks and if any AD GPO changes are pushed, it affects the system and stops working.

Scalability Issues

I have not encountered any scalability issues. The product scales as the organisation grows.

Customer Service and Technical Support

Technical support from the vendor is the worst and that is one reason I stopped using CyberArk.

Initial Setup

The initial setup is not so complex, but CyberArk does require more servers for a full-fledged installation.

Pricing, Setup Cost and Licensing

The solution is costly and the licensing is very complex.

Other Solutions Considered

I was using CyberArk for more than six years and I have now switched to ARCOS. I was impressed with ARCOS because of the following reasons:

  • Cost-effective solution
  • Fewer servers required
  • Flexibility, performance
  • More features
  • Simple licensing
  • Good support

I evaluated other solutions such as Leiberman, ManageEngine, TPAM, and Xceedium.

ARCOS seems to be very promising and cost effective. Also, ARCOS doesn’t have a traditional jump server concept, which saves the customer from spending more on hardware. The licensing is very simple (number of admins & target IPs), where most of the features are available by default with the basic license.

Other Advice

CyberArk architecture is good and more secure, but I see the solution as expensive. Support is the worst; CyberArkstaff is not supportive, their professional service team charges for each and every thing.

Disclosure: My company has a business relationship with this vendor other than being a customer: We were the distributor for Cyber Ark.
PeerSpot user
reviewer1513359 - PeerSpot reviewer
Technical Consultant at a outsourcing company with 51-200 employees
Consultant
Top 20
Resource and administration costs are less but support needs to improve knowledge and quality
Pros and Cons
  • "The accounts are maintained automatically. Hence, resource and administration costs are less."
  • "CyberArk Enterprise Password Vault's deployment is complex for resources with little experience. Tech support needs to be improved as well based on quality and knowledge."

What is most valuable?

The accounts are maintained automatically. Hence, resource and administration costs are less. 

What needs improvement?

CyberArk Enterprise Password Vault's deployment is complex for resources with little experience. Tech support needs to be improved as well based on quality and knowledge. 

For how long have I used the solution?

I have been working with the product for more than five years. 

What do I think about the stability of the solution?

The product is very stable. 

What do I think about the scalability of the solution?

CyberArk Enterprise Password Vault is scalable. 

How was the initial setup?

CyberArk Enterprise Password Vault's deployment can be done with two to three resources. 

What other advice do I have?

I rate the solution a nine out of ten. 

Disclosure: My company has a business relationship with this vendor other than being a customer: Partner
PeerSpot user
it_user871449 - PeerSpot reviewer
IT Analyst at a tech services company with 10,001+ employees
Real User
Enables us to connect to the target system component and helps us with recordings
Pros and Cons
  • "There are no issues with scalability. Our clients are very happy to use the product."
  • "The initial setup of CyberArk is a challenge if you do not have prior experience with it."

What is our primary use case?

We have different privileged accounts in our enterprise. All of the application owners and the stakeholders want to store those accounts CyberArk privileged security, so they can connect to the target systems. It also allows for session recordings at the time of auditing.

What is most valuable?

We can be connected to the target system and the PSM component comes into play. In addition, a true asset is the recordings the solution keeps.

What needs improvement?

We have found with the recent upgrade a lot of issues we had with the connection have been resolved.

For how long have I used the solution?

One to three years.

What do I think about the stability of the solution?

It is stable.

What do I think about the scalability of the solution?

There are no issues with scalability. Our clients are very happy to use the product.

How is customer service and technical support?

Tech support is very quick to answer our request tickets. 

How was the initial setup?

It is necessary to use professional service for the setup of the solution. It is a challenge if you are not well-versed in CyberArk.

What's my experience with pricing, setup cost, and licensing?

In comparison to other products on the market, CyberArk is a more costly product.

Disclosure: I am a real user, and this review is based on my own experience and opinions.
PeerSpot user
PeerSpot user
Technical Director at Unique Performance Techsoft Pvt Ltd
Real User
Anomaly detection and prevention for all privilege accounts
Pros and Cons
  • "Automatic password management, which will automatically change passwords based on compliance requirements."
  • "DVR like video recording and text-based recording for easier audits."
  • "This product needs professional consulting services to onboard accounts effectively based user profiles."

What is our primary use case?

We provide privilege account security and consulting to our customers. Organisations that we work with use CyberArk Privileged Account Security to secure their privilege accounts, which are shared between users in the organisation. It provides automatic password management and provides the single sign-on experience to users for all privilege accounts (Windows - administrator, Linux - root, MS SQL - SA, Oracle - SYS, SSH keys, etc.).

It also provides DVR like recording for all privilege access and text-based recording to easily audit all privilege activities.

The new Privilege Threat Analytics platform provides proactive protection by suspending the user session when it detects an anomaly based on past user login and session activity details. In addition, we can configure the solution to detect scoring on all privilege sessions for easier audits.

The Application Identity Manager module helps to eliminate hard-coded passwords in the application and enables us to easily change database passwords.

How has it helped my organization?

  1. Automatic password management, which will automatically change passwords based on compliance requirements.
  2. DVR like video recording and text-based recording for easier audits.
  3. Easily scan the network for all privilege accounts and has an easier onboarding process.
  4. SSH key management
  5. Command level restriction for all SSH-based devices.
  6. Anomaly detection and prevention for all privilege accounts.
  7. Integration with ticketing tools and SIEM solutions.

What is most valuable?

  1. Ability to provide native experience for users to login to privilege accounts. They do not need to go through a portal to access servers and accounts.
  2. Agentless solution which is easy to customise to any platform having network connectivity.
  3. Wide range of devices supported out-of-the-box.
  4. Easy to configure HA and DR options.
  5. Online training enables cost effective valuable training.

What needs improvement?

This product needs professional consulting services to onboard accounts effectively based user profiles.

For how long have I used the solution?

One to three years.

What do I think about the stability of the solution?

No issues.

What do I think about the scalability of the solution?

No issues.

How are customer service and technical support?

Excellent customer support.

Which solution did I use previously and why did I switch?

We did not previously use another solution.

How was the initial setup?

The setup is very straightforward.

What's my experience with pricing, setup cost, and licensing?

The cost is high compared to other products, but CyberArk provides all the features bundled. This is compared to other vendors who provide them as a different license for each functionality.

Which other solutions did I evaluate?

At present, we are only focusing on CyberArk for privilege account security. Comparing it to other providers, Cyberark provides a more user-friendly environment with many more features and benefits.

What other advice do I have?

I have used and deployed it in various environments so far. It really covers all the use cases provided by the customer.

Disclosure: My company has a business relationship with this vendor other than being a customer: We are certified Gold partners for CyberArk and implemented this solution for a customer from various industry verticals.
PeerSpot user
Buyer's Guide
Download our free CyberArk Privileged Access Manager Report and get advice and tips from experienced pros sharing their opinions.
Updated: March 2025
Buyer's Guide
Download our free CyberArk Privileged Access Manager Report and get advice and tips from experienced pros sharing their opinions.