Try our new research platform with insights from 80,000+ expert users
reviewer1329747 - PeerSpot reviewer
Security at a tech services company with 201-500 employees
Consultant
Its privileged session management is valuable for monitoring your inside threats, but it's a lot of work to set up
Pros and Cons
  • "Password Vault's main advantage is its scalability. We constantly see huge enterprises implementing something like this, and the privileged session management is an excellent piece. You can kind of watch videos of whatever an admin has done."
  • "There are upwards of six components you need to set it up. And you might need anywhere from two to five servers. It takes some work to set that up, especially in a larger environment."

What is our primary use case?

Companies often have an enormous amount of admin credentials out there. They want to find out how many they have, start cleaning them up, and ensure they're all kept in an encrypted vault. Password Vault is probably the top product in that space, and it's a monster to implement, but CyberArk is great at what they do.

What is most valuable?

Password Vault's main advantage is its scalability. We constantly see huge enterprises implementing something like this, and the privileged session management is an excellent piece. You can kind of watch videos of whatever an admin has done. So, for example, if an admin doesn't check out their password and fires up a session on a machine, you can see playback. Scalability and those particular features are pretty valuable for monitoring your insider threat.

What do I think about the stability of the solution?

Our customers haven't complained about any stability issues, and we've set Password Vault up for quite a few customers. However, the stability depends on the equipment unless they do it in the cloud. But if they're setting up on a bunch of VMs, and that VM store goes down, that's not necessarily a CyberArk problem. That's more of a problem with Windows or VMware, etc., or something like that. So I guess the stability's fine.

How was the initial setup?

There are upwards of six components you need to set it up. And you might need anywhere from two to five servers. It takes some work to set that up, especially in a larger environment.

Buyer's Guide
CyberArk Privileged Access Manager
February 2025
Learn what your peers think about CyberArk Privileged Access Manager. Get advice and tips from experienced pros sharing their opinions. Updated: February 2025.
838,713 professionals have used our research since 2012.

What's my experience with pricing, setup cost, and licensing?

On-prem CyberArk is pretty expensive. It's pricey and you get what you pay for. It's an incredible product for what it does, but it's significantly cheaper to go to the cloud.

What other advice do I have?

I would rate Password Vault seven out of 10. I'd only go that low because of how challenging the installation can be. I advise our customers to consider using CyberArk's cloud option because many people just reflexively lean toward the on-prem solution. The cloud solution is considerably less expensive. It's still complex to set up the different components and make it all work together, so I suggest you make sure you need all those components. Maybe you don't even want to use everything there, but consider the cloud version. It's the same product, but it's more straightforward and cost-effective. You're not losing any functionality.

Which deployment model are you using for this solution?

Hybrid Cloud
Disclosure: My company has a business relationship with this vendor other than being a customer: Partner
PeerSpot user
PeerSpot user
Senior Specialist Identity System Support at Roche
Real User
The master policy allows us to establish a security baseline for our privileged accounts

What is our primary use case?

We are using CyberArk to store credentials of privileged assets in a secure way. In addition, CyberArk helps us to meet our security policy effortlessly, defining the complexity of the passwords, rotation period, etc.

We are also using the Privileged Session Manager to provide remote access to servers with security controls in place (session isolated and recorded).

How has it helped my organization?

With CyberArk, we can meet our compliance requirements reducing security risks without introducing additional operational complexity. This is very valuable for our company because we have regular audits where we have to provide evidence about the use of our privileged accounts (password use, password rotation, etc.)

In addition, we have several third parties that need access to our infrastructure. CyberArk PAS helps us to provide this access in a quick and secure way.

What is most valuable?

  • Master policy: allows us to establish a security baseline for our privileged accounts.
  • CPM: allows us to rotate passwords following the policy defined.
  • PSM: allows us to provide isolated sessions to the customer with additional controls (real-time monitoring, session isolation, and session recording).

What needs improvement?

  • We would like to have more flexibility in the RBAC model and have more options to define who should have access to what, not only based on safe membership. 
  • In addition, the user interface could be improved. When a team manages thousands of accounts, advanced filters are very valuable to search the accounts.

For how long have I used the solution?

More than five years.
Disclosure: I am a real user, and this review is based on my own experience and opinions.
PeerSpot user
Buyer's Guide
CyberArk Privileged Access Manager
February 2025
Learn what your peers think about CyberArk Privileged Access Manager. Get advice and tips from experienced pros sharing their opinions. Updated: February 2025.
838,713 professionals have used our research since 2012.
it_user1333062 - PeerSpot reviewer
Director at a tech services company with 11-50 employees
Reseller
Every aspect of the solution is very well integrated and it is fail-safe
Pros and Cons
  • "Every aspect of the solution is very well integrated, and even that gives comfort. It is a fail-safe kind of environment."
  • "Having a cloud version would be very helpful. You have to invest a lot of money for the infrastructure hardware so the cloud version would help."

What is our primary use case?

There are threats that get opened because of the vulnerability of privileged access that says to directly put it in a vault.

What is most valuable?

Every aspect of the solution is very well integrated, and that gives comfort. It is a fail-safe kind of environment. I think that's the fail-safe feature makes customers comfortable because there are no non-integrable stuff or cures. For example, a vault would have its own anti-virus,  its own application, its own operating system to stay hardened. It is absolutely hardened for it to be protected from the outside world.

What needs improvement?

Having a cloud version would be very helpful. You have to invest a lot of money for the infrastructure hardware so the cloud version would help.

For how long have I used the solution?

My organization has been using this solution for a few years but I joined the company three months back.

What do I think about the stability of the solution?

It is very stable.

What do I think about the scalability of the solution?

Our clients are large enterprises. It is easy to scale.

How are customer service and technical support?

Our customers contact us for any technical support, but we are able to sort out customer issues to a very large extent. We only had to connect with CyberArk at L-3 level or L-4 level. We are able to address most of our customer's issues. 

I would rate their support a nine out of ten. 

Which solution did I use previously and why did I switch?

We have had customers use a competitive product that CyberArk has replaced but it is not very common. It is not very easy to change your Privileged Access Management framework so easily.

CyberArk is fail-safe, it has a threat intelligence filter, and prevention threat attacks. That sets the product apart from others, and I think the other part is their ability to onboard a maximum number of resources like storage network, security, IoT devices, and RPAs. Its ability to pervasively onboard almost all critical privileges and resources across the organization is where it stands out in a really big way.

How was the initial setup?

I didn't implement it. I don't believe we've had any problems implementing it. I've never heard any issues. I'd say it's neutral.

What's my experience with pricing, setup cost, and licensing?

There are costs in addition to the standard licensing. There is an implementation fee. Those are additional fees and the customer has the annual maintenance, the software, and whole maintenance cost added to that. So there are additional costs besides this standard license.

What other advice do I have?

The most important phase is the discovery phase. Pay the most attention to that. Spend the most amount of time on the discovery phase, which is really the startup planning. The project becomes smoother. Book stricter guidelines on timelines and let there be a senior sponsor part of the project so that you are able to get milestones addressed quickly otherwise, these projects tend to drag longer.

In the next release, I would like to have the cloud option and all of the features that come with it. 

I would rate CyberArk a nine out of ten. 

Which deployment model are you using for this solution?

On-premises
Disclosure: My company has a business relationship with this vendor other than being a customer: Reseller.
PeerSpot user
PeerSpot user
Identity and Access Management Analyst at a financial services firm with 1,001-5,000 employees
Real User
We're now able to start managing service accounts with AIM

What is our primary use case?

We use CyberArk to manage anything privileged including our admin IDs, AWS root credentials, service accounts, etc.

How has it helped my organization?

It's been a big win for us as we're now able to start managing service accounts with AIM. This is a big win, especially with our web hosting team.

What is most valuable?

There are several features we've found valuable. We're auto-discovering our new Windows servers, we're managing root in our Unix environment, and now we're pushing for SA password rotation this year.

What needs improvement?

As we have not yet moved to the core licensing model, we don't have the benefit of PSM and a few other things that were not previously included.

For how long have I used the solution?

One to three years.
Disclosure: I am a real user, and this review is based on my own experience and opinions.
PeerSpot user
reviewer990891 - PeerSpot reviewer
Information Technology Specialist (Contract role) at a tech services company with 10,001+ employees
Consultant
Top 20
Takes away all ambiguity around "known" admin accounts

What is our primary use case?

Privileged account access into customer environments.

How has it helped my organization?

A higher level of password rotation and usage auditing.

What is most valuable?

  • OTP
  • Session recording
  • Auditing
  • It takes away all ambiguity around "known" admin accounts.

What needs improvement?

The native PSM components are really good, however, if you have to apply environmental tweaks to an application launch, custom AutoIt scripts are needed. 

Options for specifying drive mappings or script execution without the need for AutoIt based scripting in the native components would be good.

Disclosure: I am a real user, and this review is based on my own experience and opinions.
PeerSpot user
reviewer990891 - PeerSpot reviewer
Information Technology Specialist (Contract role) at a tech services company with 10,001+ employees
Consultant
Top 20
Auditing and recording functionality has made compliance with customer requirements a much clearer and easily managed process

What is our primary use case?

Primary use case: having privileged access management and ingress into customer networks and infrastructure.

How has it helped my organization?

The auditing and recording functionality along with stringent password-change policies and one-time password use has made compliance with customer requirements a much clearer and easily managed process.

What is most valuable?

  • Recordings
  • Exclusive use, and 
  • OTP. 

There can be no ambiguity: An account can only be in use by one single known user, and they have no knowledge of the password.

What needs improvement?

Functionality to enable drive mappings to platforms and default connectors without the need to use AutoIt.

Disclosure: I am a real user, and this review is based on my own experience and opinions.
PeerSpot user
it_user620580 - PeerSpot reviewer
Security Engineer at a tech services company with 51-200 employees
Consultant
Enables us to manage passwords of highly privileged accounts.

What is most valuable?

The product enables us manage passwords of highly privileged (service) accounts. These are not tied to a person, and they include a full audit trail and approval workflow functionality.

How has it helped my organization?

Management of these accounts is typically required to prevent abuse and gain control of this.

What needs improvement?

Perhaps improve the user registry integration. It is already fine, but a bit atypical.

My experience with the product was with older versions, so this may not represent the actual case anymore. In essence, user registry integration is atypical in the sense that the product creates a copy of the user inside the product itself (to accommodate for license seat counting, I guess).

Depending upon the size of the user base and license model, it may not allow new users to log in to the platform. I doubt the vendor considers this an issue, though.

For how long have I used the solution?

I have used this for three years, including the implementation of the product

What do I think about the stability of the solution?

There were no issues with stability.

What do I think about the scalability of the solution?

There were no issues with scalability.

How is customer service and technical support?

Technical support is OK. The product is not very difficult to install, but there are some considerations that need to be taken into account. Tech support is very well aware of this.

How was the initial setup?

The initial setup was simple. It is windows based and leverages installation wizards to perform installation. Also, sufficient documentation exists to guide the setup procedure.

What's my experience with pricing, setup cost, and licensing?

Look well at the user base and frequency of use. A lot of licensing models exist, but having this clear will immediately indicate what fits best.

As for pricing, I cannot comment.

Which other solutions did I evaluate?

We did not evaluate other solutions.

What other advice do I have?

Make sure that the organization is ready and willing to adopt this, as the typical business cases cannot be addressed by the product alone.

Disclosure: My company has a business relationship with this vendor other than being a customer: We are a CyberArk business partner.
PeerSpot user
it_user685302 - PeerSpot reviewer
Technical Lead at a tech services company with 10,001+ employees
Real User
​Enterprise Password Vault, Privilege Session Manager & Application Identity Management have been very useful for our client environment.​
Pros and Cons
  • "Enterprise Password Vault, Privilege Session Manager, and Application Identity Management have been very useful for our client environment."
  • "Performance of PIM could be better and intended for usability as well as security."

How has it helped my organization?

Its features like detailed audit and reporting, automated workflows, granulated privileged access controls, automated password rotation, and centralized and secure storage have helped us in developing a secure environment for customers, along with audit and compliance coverage.

What is most valuable?

Enterprise Password Vault, Privilege Session Manager, and Application Identity Management have been very useful for our client environment.

What needs improvement?

Performance of PIM could be better and intended for usability as well as security. Another point is that the free trials should be in place for all components so that PoC could be made easy.

What do I think about the stability of the solution?

No.

What do I think about the scalability of the solution?

No.

How are customer service and technical support?

Technical support is quite efficient and they always provide a timely response.

Which solution did I use previously and why did I switch?

Haven’t use any solution prior to CyberArk.

How was the initial setup?

As this was new product, there were some small challenges in understanding but the setup was straightforward.

What's my experience with pricing, setup cost, and licensing?

As our deployment was not so large, our client was happy with the pricing and licensing.

Which other solutions did I evaluate?

Yes, we did a research and chose CyberArk above all due to its components that were suitable to our environment.

What other advice do I have?

Proper implementation and prior study of product will give you efficient results. Organizations looking for a product that can provide proper paper trail for risk and compliance audits should certainly give it a try because the product's auditing and reporting capabilities are really bliss.

Disclosure: I am a real user, and this review is based on my own experience and opinions.
PeerSpot user
it_user3396 - PeerSpot reviewer
it_user3396Team Lead at Tata Consultancy Services
Top 5Real User

Cool review

Buyer's Guide
Download our free CyberArk Privileged Access Manager Report and get advice and tips from experienced pros sharing their opinions.
Updated: February 2025
Buyer's Guide
Download our free CyberArk Privileged Access Manager Report and get advice and tips from experienced pros sharing their opinions.