Try our new research platform with insights from 80,000+ expert users
it_user620580 - PeerSpot reviewer
Security Engineer at a tech services company with 51-200 employees
Consultant
Provides a full audit trail and approval workflow functionality.

What is most valuable?

  • Ability to manage passwords for highly privileged, service accounts, which are not tied to a person
  • The inclusion of a full audit trail
  • Approval workflow functionality

How has it helped my organization?

Management of these accounts is typically required to prevent abuse and prove compliance.

What needs improvement?

Perhaps improve the user registry integration. User registry integration is atypical in the sense that the product creates a copy of the user inside the product itself. This is done to accommodate for license seat counting.

Depending upon the size of the user base and license model, it may not allow new users to log in to the platform. I doubt that the vendor considers this an issue.

For how long have I used the solution?

I have used CyberArk for three years, including the implementation of the product.

Buyer's Guide
CyberArk Privileged Access Manager
February 2025
Learn what your peers think about CyberArk Privileged Access Manager. Get advice and tips from experienced pros sharing their opinions. Updated: February 2025.
838,713 professionals have used our research since 2012.

What do I think about the stability of the solution?

I did not have stability issues.

What do I think about the scalability of the solution?

I did not have scalability issues.

How are customer service and support?

The product is not very difficult to install. However, there are some considerations that need to be taken into account. Technical support is very well aware of this.

How was the initial setup?

The setup was simple. It is Windows based and leverages installation wizards to perform the installation. Also, sufficient documentation exists to guide you through the setup procedure.

What's my experience with pricing, setup cost, and licensing?

Examine the user base and frequency of use. A lot of licensing models exist. However, having this clear will immediately indicate what fits best. As for pricing, I cannot comment.

Which other solutions did I evaluate?

We didn’t look at alternatives.

What other advice do I have?

Assure that the organization is ready and willing to adopt this. The typical business cases cannot be addressed by the product alone.

Disclosure: My company has a business relationship with this vendor other than being a customer: We are a CyberArk business partner implementing for customers.
PeerSpot user
it_user1026123 - PeerSpot reviewer
Pre-sales Engineer at StarLink - Trusted Security Advisor
Real User
Storing User Passwords and Credentials, Facilitates auditing by recording activity
Pros and Cons
  • "The most valuable feature is the special management. It records the activity and the actions that we use for auditing."
  • "The stability depends on the infrastructure it is installed on, which is important because CyberArk does not have the hardware appliance."

What is our primary use case?

The primary use case is for storing user passwords and administration credentials.

I am the engineer for a company that sells this solution mostly to financial institutions. 

It is also useful for auditing and securing shared accounts or co-shared accounts.

What is most valuable?

The most valuable feature is the special management. It records the activity and the actions that we use for auditing.

What needs improvement?

The deployment architecture, the ability to locate and change credentials and the stability need to be improved. They need to install or include an appliance-based option, which CyberArk does not have.

The technical support can improve on the time that it takes to get a callback.

The integration is great but needs to be a bit more user-friendly.

Also, a feature with the ability to create password sync.

In the next release, I would like to see the following:

  • Availability on the cloud and the appliance.
  • More documentation for the setup. 
  • Simplify the deployment.
  • Continuous operation with this solution.
  • Simplify the infrastructure for better stability.
  • Increase the support for applications.
  • Invest in local on the ground staff in various regions.
  • The ability to search by the activities, especially for Windows Servers.
  • Improve the auditing capabilities for their searches.

For how long have I used the solution?

I have been using this solution for three years.

What do I think about the stability of the solution?

The stability depends on the infrastructure it is installed on, which is important because CyberArk does not have the hardware appliance.

What do I think about the scalability of the solution?

This solution is scalable. It scales very well, there are no issues.

How are customer service and technical support?

The technical support is good, there are no issues.

They know what to do when you call them, they are competent.

Sometimes they can take too long before getting back to you, which is something that can be improved.

Which solution did I use previously and why did I switch?

Previously I was using Centrify and One Identity. We switched because CyberArk has a lot of strength in my region. Some partners do not want to deploy CyberArk to their customers because they feel it will create competition when it comes to renewal. They don't want the price to be affected.

How was the initial setup?

The initial setup is complex. The architecture needs improvement in the documentation for the setup and the manageability.

If you have everything provided for you, it can take three to four hours to deploy this solution.

What's my experience with pricing, setup cost, and licensing?

I think that it might be cheaper than the other competitors in our region.

What other advice do I have?

I have learned that the deployment can be tricky. Always plan your deployment in phases.

Don't unload all of your privilege credentials at once, otherwise, you have an issue with the passwords. 

Always, have help available on standby when you are deploying this solution to prevent issues.

This solution is quite efficient. You don't always have to have your applications. If you are encrypting the server, you don't need the applications. You are required to do it on your workstation. The server will deliver that to you from the managing pack when you try to implement the sessions.

I would rate this solution an eight out of ten.

Which deployment model are you using for this solution?

On-premises
Disclosure: I am a real user, and this review is based on my own experience and opinions.
PeerSpot user
Buyer's Guide
CyberArk Privileged Access Manager
February 2025
Learn what your peers think about CyberArk Privileged Access Manager. Get advice and tips from experienced pros sharing their opinions. Updated: February 2025.
838,713 professionals have used our research since 2012.
Presales Engineer/Network Security Technical Consultant at a tech services company with 51-200 employees
Consultant
Good integration, excellent session monitoring and very good password protection
Pros and Cons
  • "Session monitoring is excellent. It may be the solution's most valuable aspect."
  • "The initial setup could be simplified. Right now, in comparison to its nearest competitors, it's quite complex."

What is most valuable?

The solution is very complete. It has the most features on the market.

Session monitoring is excellent. It may be the solution's most valuable aspect.

The solution offers very good password protection.

It offers great integration with many products.

What needs improvement?

The initial setup could be simplified. Right now, in comparison to its nearest competitors, it's quite complex.

For how long have I used the solution?

I've been using the solution for one year.

What do I think about the stability of the solution?

The solution is very stable.

What do I think about the scalability of the solution?

The solution is easy to scale.

How are customer service and technical support?

I've never had to reach out to technical support.

How was the initial setup?

The initial setup is complex. You need to install many virtual machines. You must do many configurations. It's not just one machine to another; you'll also have to handle the configuration of independent machines as well.

What's my experience with pricing, setup cost, and licensing?

The price is higher than the competition, but if the customer wants the best product for their company, they won't mind the price.

We have a permanent license. Licensing is based on how man users you have, so the pricing varies according to the size of the company.

What other advice do I have?

We're a partner of CyberArk.

I'd rate the solution nine out of ten.

Disclosure: I am a real user, and this review is based on my own experience and opinions.
PeerSpot user
Lead Systems Architect at IT Specialist LLC
Real User
Very good security, good scalability and a recently lowered pricing model
Pros and Cons
  • "Security is the solution's most valuable feature. As far as I know, this solution is the most secure system of this class on the market today, even considering another management system like Fudo Security, which we also use. The integration capabilities are very good; it helps strengthen our overall security."
  • "The solution is too big and complex for any businesses that are small or medium-sized. They should offer a more compact version or make a solution better suited to smaller businesses."

What is our primary use case?

The primary use case of the solution is to gather privileged accounts from different systems and to contain privileged accounts in one secure place.

What is most valuable?

Security is the solution's most valuable feature. As far as I know, this solution is the most secure system of this class on the market today, even considering another management system like Fudo Security, which we also use. The integration capabilities are very good; it helps strengthen our overall security.

What needs improvement?

The interface and user experience could be improved. In comparison, in Fudo Security, items are very searchable and it's very comfortable to work with. CyberArk is not very good at that. It could be improved and it wouldn't be too complicated to do so. The solution is too big and complex for any business that is small or medium-sized. They should offer a more compact version or make a solution better suited to smaller businesses.

For how long have I used the solution?

I've been using the solution for five to ten years.

What do I think about the scalability of the solution?

It's an enterprise-level solution. So long as you can afford it, you can scale.

How are customer service and technical support?

I've never had to reach out to technical support.

Which solution did I use previously and why did I switch?

We didn't really use a different solution. We use Fudo Security, but it's not for password management alone. It's more of an all-in-one solution. We still use it; it's cheap and it's a very simple solution in comparison to CyberArk.

How was the initial setup?

The initial setup is okay; I'd rate it seven out of ten in terms of ease of use compared to other solutions.

Many different things during installation are not straightforward. For example, it would be better to make some kind of pre-installed machine or virtual machine or to make it easy to deploy various ISO files. There are competitors that have just one machine and no infrastructure involved. It would also be better if they embedded the license or offered some free options.

Deployment took about a month.

What's my experience with pricing, setup cost, and licensing?

As far as I know, CyberArk changed its pricing policy for our region. Overall it was very expensive a few years ago, but now, just around a year ago, it became less expensive and it's easier for us to sell it.

What other advice do I have?

We use the on-premises deployment model.

In terms of advice, I'd suggest others follow the implementation carefully.

I'd rate the solution eight out of ten. It's not easy to install and it's got too many components which means it's not really suitable for small or medium-sized businesses.

Disclosure: I am a real user, and this review is based on my own experience and opinions.
PeerSpot user
it_user665142 - PeerSpot reviewer
SD/Infr Coordinator at a computer software company with 201-500 employees
Vendor
We helped a telecom to migrate from a standard .XLS with accounts.
Pros and Cons
  • "You can easily manage more than 4000 accounts with one PSM."
  • "I would like to see better usability for non-technical people."

How has it helped my organization?

The fact that there are more and more plugins developed make it easier for implementation.

What is most valuable?

It is difficult to say what the valuable features are. I use all the different parts together to get the full power of CyberArk.

What needs improvement?

I would like to see better usability for non-technical people. If you use the PVWA interface, I noticed that the end user would need some extra training. The portal doesn't navigate so easily, if you don't know it.

With Facebook, for example, people find their way around easily. In PVWA, it takes some time to know how it works from an end-user point of view.

What do I think about the stability of the solution?

I did not encounter any issues with stability.

What do I think about the scalability of the solution?

There have been no issues with scalability. You can easily manage more than 4000 accounts with one PSM.

How are customer service and technical support?

I haven't needed any support yet, as it is well documented.

Which solution did I use previously and why did I switch?

We did not use a previous solution. Basically, we helped a telecom to migrate from a standard .XLS with accounts to CyberArk.

How was the initial setup?

The most difficult part was convincing the technical teams to use it.

What's my experience with pricing, setup cost, and licensing?

Pricing and licensing depend on the environment. First, make a good plan.

What other advice do I have?

Basically, build it up step-by-step, starting with the EPV of course :-).

Disclosure: My company has a business relationship with this vendor other than being a customer: There is no business relationship in my current company. But my previous company, Devoteam, is officially the point of contact for Belgium.
PeerSpot user
reviewer1762503 - PeerSpot reviewer
Engineering Lead PAM with 10,001+ employees
MSP
Session management isolates users' machines, maintaining privileged session in the event of an attack
Pros and Cons
  • "The biggest feature is the security of the overall solution. It's very secure. The vaulting technology and the number of security layers involved in the vault, where privileged accounts are actually stored, is the heart of the solution."
  • "More than the product itself, there is room for improvement in the documentation. The documentation should be very detailed and very structured. It has a lot of good information, on one level, but I feel that it could be more elaborate and more structured."

What is our primary use case?

The primary use case of CyberArk is controlling privileged access. It is good at providing various privileged access controls. The CyberArk use case can be implemented on various platforms.

Password rotation is another key use case. There are many integrations available on the CyberArk Marketplace, plugins and connectors with different technologies to be integrated with CyberArk to achieve this use case.

I've had an experience of deploying CyberArk in on-premise and in the cloud.

How has it helped my organization?

For any use case, session management is a key because it isolates users' machines to the target system. That way then, if an attack happens on a user's machine, the privileged session is still an isolated session. The privileged session is not interrupted.

What is most valuable?

In general, all CyberArk's features are very useful from a privileged account control point of view, and for session management and password rotation. 

The biggest feature is the security of the overall solution. It's very secure. The vaulting technology and the number of security layers involved in the vault, where privileged accounts are actually stored, is the heart of the solution.

There are many other important features of CyberArk: 

  • Privileged Session Manager (PSM) connects you to the target platform. 
  • Password management (CPM) provides automatic password rotations, including password verification and reconciliation. 
  • Auditability, which means CyberArk keeps track of logs and audit trails, including session recording, which is another key feature. 

The password management enables the rotation of passwords per an organization's policy. Passwords can be rotated after N number of hours or based on a particular day. It's a very key feature from a security point of view, because passwords are meant to be rotated very frequently. CyberArk does it very well with different plugins.

What needs improvement?

More than the product itself, there is room for improvement in the documentation. The documentation should be very detailed and very structured. It has a lot of good information, on one level, but I feel that it could be more elaborate and more structured. That would make it easier when somebody is implementing it or referencing the documentation.

For how long have I used the solution?

I have used CyberArk Privileged Access Manager for approximately seven years.

What do I think about the stability of the solution?

It is a very stable and reliable product.

What do I think about the scalability of the solution?

It is scalable and scaling it is straightforward. It has been designed and planned well, making it easy to scale the environment.

How are customer service and support?

We have frequently worked with CyberArk technical support. In the last year their support has been changed. I would rate it at about seven out of 10. It depends on the person who picks up the support ticket. If that person is fairly proficient in his experience, the response will be quick. Otherwise, it can take time. But, in general, it's good.

How would you rate customer service and support?

Neutral

How was the initial setup?

The complexity of the initial setup depends on the organization's underlying infrastructure, on the environment in which the development is happening. Sometimes the environment on which the product is being installed is more of a challenge than the product. That plays a key role. And, as I mentioned, it's a bit of a challenge because of the documentation at the moment. It needs to be much more user-friendly

The time for deployment also depends on the environment in which the product is being deployed. The technology landscape is very complex. With an end-to-end implementation, it can vary depending on whether the environment is small or medium or complex, and what types of use cases are involved. If it is just a simple environment and minimal features need to be configured, it can be straightforward and take a few days. But if it's a really large-scale, complex environment, where multiple integrations are required, because the underlying requirement to deploy CyberArk with other applications is complex, it will definitely take longer.

What's my experience with pricing, setup cost, and licensing?

Generally, I don't get involved in the licensing or the purchasing side of it, but I do know that the licenses are expensive.

What other advice do I have?

It's a long journey and it needs to be set out in phases very well, starting with something small and gradually implementing PAM controls across whatever multiple technologies an organization uses. It's a long-term project to fully deploy and benefit from all of CyberArk's features. 

Rather than being about the product, it's more about the overall PAM journey that a company decides to take. It's a very complex world, integrating multiple applications within CyberArk. There are various technical complexities involved, not with CyberArk, but with the other products. 

But it's worthwhile. CyberArk does its job very well. All the components are very useful and the benefits are all evident. CyberArk is the number-one PAM solution.

Disclosure: PeerSpot contacted the reviewer to collect the review and to validate authenticity. The reviewer was referred by the vendor, but the review is not subject to editing or approval by the vendor. The reviewer's company has a business relationship with this vendor other than being a customer: Implementer
PeerSpot user
reviewer1749054 - PeerSpot reviewer
Security Delivery Analyst at a computer software company with 10,001+ employees
Real User
Good policy configuration and tech support
Pros and Cons
  • "Password Vault's policy configuration is very good - when you receive an attack, you can segment the structure of the project in order to isolate parts or users."
  • "Upgrading the product is very difficult, so this could be an area for improvement."

What is our primary use case?

My primary use case is the digital identity for access management of users and the configuration of passwords, or MSA, or SSO.

What is most valuable?

Password Vault's policy configuration is very good - when you receive an attack, you can segment the structure of the project in order to isolate parts or users.

What needs improvement?

Upgrading the product is very difficult, so this could be an area for improvement.

For how long have I used the solution?

I've been using this solution for six months.

What do I think about the stability of the solution?

There have been a few lags when connecting with RDP, but otherwise, the stability is good.

What do I think about the scalability of the solution?

Password Vault's scalability is good.

How are customer service and support?

The technical support is very good in general but could provide more help when upgrading.

What other advice do I have?

I would rate this solution eight out of ten.

Which deployment model are you using for this solution?

Private Cloud
Disclosure: My company has a business relationship with this vendor other than being a customer: Partner
PeerSpot user
reviewer794646 - PeerSpot reviewer
Information Security Analyst at a financial services firm with 1,001-5,000 employees
Real User
User-friendly GUI but more expensive than most competitors
Pros and Cons
  • "CyberArk's GUI is user friendly."
  • "Password Vault is much pricier than other solutions. A vendor team might struggle to explain why that price is justified. There are good alternatives that cost less."

What is our primary use case?

The primary use case is to monitor the official activity of a privileged user for privilege violations.

What is most valuable?

CyberArk's GUI is user friendly.

For how long have I used the solution?

I have been using CyberArk for only six months.

What do I think about the stability of the solution?

Password Vault is a reasonably stable solution.

What do I think about the scalability of the solution?

I've only used it for a few months, so it's hard for me to say how scalable Password Vault is. Those who've used it longer and deployed it on more endpoints could answer that question better.

How are customer service and support?

We're served by CyberArk's regional support based in India and Singapore, but I want country-level support in Bangladesh, so I can get help quickly. Also, online support is annoying. I would like to get face-to-face support from a local CyberArk representative. 

How was the initial setup?

Setting up Password Vault is not easy. We needed an online consultant to help us.

What's my experience with pricing, setup cost, and licensing?

Password Vault is much pricier than other solutions. A vendor team might struggle to explain why that price is justified. There are good alternatives that cost less.

What other advice do I have?

I rate CyberArk Enterprise Password Vault seven out of 10

Which deployment model are you using for this solution?

On-premises
Disclosure: I am a real user, and this review is based on my own experience and opinions.
PeerSpot user
Buyer's Guide
Download our free CyberArk Privileged Access Manager Report and get advice and tips from experienced pros sharing their opinions.
Updated: February 2025
Buyer's Guide
Download our free CyberArk Privileged Access Manager Report and get advice and tips from experienced pros sharing their opinions.