Try our new research platform with insights from 80,000+ expert users
PeerSpot user
ITSM & AntiFraud Consultant at a tech company with 51-200 employees
Consultant
The ability to start the project, install and add the passwords in just a few days is valuable.

What is most valuable?

The most valuable feature is the password Vault which gives the administrator control over privileged accounts. The other components that are valuable are Private Session Manager, OPM, Viewfinity, and AIM, which came as an add-on to the organisation's needs. The ability to start the project, install and add the passwords in just a few days brings a big advantage for CyberArk.

How has it helped my organization?

The client can see all the users sessions through PSM, and can protect the applications on servers using AIM. Also, the Privileged Threat Assessment helps the organisation to see all the account risks, including accounts not managed by CyberArk, and accounts/machines with unusual behavior, etc.

What needs improvement?

The DNA scan should be able to scan Unix machines for privileged accounts.

For how long have I used the solution?

PIM tested in the last 2 years.

Buyer's Guide
CyberArk Privileged Access Manager
September 2024
Learn what your peers think about CyberArk Privileged Access Manager. Get advice and tips from experienced pros sharing their opinions. Updated: September 2024.
801,394 professionals have used our research since 2012.

What was my experience with deployment of the solution?

We didn't have any issues with the deployment.

What do I think about the stability of the solution?

The product is very stable.

What do I think about the scalability of the solution?

I didn't have any issues with the stability. I usually recommend the client to increase the system requirements with 10%.

How are customer service and support?

Customer Service:

Customer service is OK in Romania.

Technical Support:

I had direct contact with the local team and they are OK.

Which solution did I use previously and why did I switch?

No.

How was the initial setup?

Straightforward when you have the use cases and a SoW. Usually you follow the Installation Manual, and perform the after-installation tests, and you are sure that everything is OK. The only issue I had was with the anti-virus that was left on the server and that deleted some PSM files. You must always double-check the prerequisites, as you can have some surprises with the GPO that overrides your settings.

What about the implementation team?

I was part of the implementation team with support from the vendor.

Which other solutions did I evaluate?

We also looked at BalaBit Shell Control Box.

Disclosure: My company has a business relationship with this vendor other than being a customer: Implementation partner with CyberArk.
PeerSpot user
it_user326337 - PeerSpot reviewer
it_user326337Customer Success Manager at PeerSpot
Consultant

Tanmay, have you been able to make progress in your investigations of how to solve the difficulties you've been having with MS Clustering?

See all 4 comments
it_user225765 - PeerSpot reviewer
IT Security Engineer at a tech services company with 51-200 employees
Consultant
The user interface needs some work, however, our security has improved.

What is most valuable?

It has the ability to monitor privileged sessions.

How has it helped my organization?

Our security has improved since implementing CyberArk.

What needs improvement?

The user interface needs to be improved. It could be done by getting the GUI to work with other programs from within internet browsers out of box.

For how long have I used the solution?

I've used it for one year.

What was my experience with deployment of the solution?

No issues encountered.

What do I think about the stability of the solution?

No issues encountered.

What do I think about the scalability of the solution?

No issues encountered.

How are customer service and technical support?

Customer Service:

It's good.

Technical Support:

It's good.

Which solution did I use previously and why did I switch?

I didn't use a previous solution.

How was the initial setup?

It was straightforward as the documentation was rather clear. This made the implementation simple.

What about the implementation team?

I implemented myself.

Which other solutions did I evaluate?

I didn't evaluate any other options.

Disclosure: I am a real user, and this review is based on my own experience and opinions.
PeerSpot user
Rodney Dapilmoto - PeerSpot reviewer
Rodney DapilmotoSystems Admin Analyst 3 at CPS Energy
Real User

Being the primary administrator of CyberArk at my company, one of the biggest complaints I hear from end users is the user interface through the web browser. It has been recommended to use Internet Explorer for the PVWA, but we have found that Chrome and FireFox will also work for some end users. The ability to change the timeout value for the PVWA to remain in session also helps with customer experience and satisfaction. However, security requirements within your company will need to be taken into account when deciding how much time to allow the PVWA to remain in session.

Buyer's Guide
CyberArk Privileged Access Manager
September 2024
Learn what your peers think about CyberArk Privileged Access Manager. Get advice and tips from experienced pros sharing their opinions. Updated: September 2024.
801,394 professionals have used our research since 2012.
Security Team Lead at a tech services company with 10,001+ employees
Real User
This product helps us complete financial audits. It is a nice solution.
Pros and Cons
  • "Technical support is very helpful whenever we have any questions."
  • "It is scalable."
  • "Over the past seven years, I have seen a lot of ups and downs with the product."

What is our primary use case?

Our primary use case for this solution is it provides a security solution that includes password management. This defends against threats.

What is most valuable?

The most valuable feature to me is the recording feature. I can track all of the records, the commands, the server, any misguidance, etc.

What needs improvement?

Over the past seven years, I have seen a lot of ups and downs with the product, but now I am happy with the version that we are using now. 

For how long have I used the solution?

One to three years.

What do I think about the stability of the solution?

I have no issues with stability. 

What do I think about the scalability of the solution?

It is scalable. We have added new equipment, and this solution has been relevant. 

How is customer service and technical support?

They are very helpful for us whenever we have any questions. 

What's my experience with pricing, setup cost, and licensing?

No, I do not have any advice on the price of the product. It is a great product that I recommend to others. 

Which other solutions did I evaluate?

I did not consider any other options. 

What other advice do I have?

This product is helpful for financial auditing needs, as well.

Disclosure: I am a real user, and this review is based on my own experience and opinions.
PeerSpot user
Junior Product Consultant at a tech services company with 501-1,000 employees
Real User
Good technical support with helpful third party vendors and good at recording actions
Pros and Cons
  • "The technical support is good."
  • "We found a lot of errors during the initial setup. They should work to improve the implementation experience and to remove errors from the process."

What is our primary use case?

I primarily use the solution to record any actions taken on specific important targets. It allows management to look at actions and play them back to see what was done within the environment.

What is most valuable?

The technical support is good.

It's pretty good at recording actions taken within an environment.

What needs improvement?

We found a lot of errors during the initial setup. They should work to improve the implementation experience and to remove errors from the process.

The solution could be more stable. 

 It should have more specific configurations. There are lots of types of servers and devices. The product should have a more detailed, specific configuration and integration with other products.

For how long have I used the solution?

I've been using the solution for about three months at this point.

What do I think about the stability of the solution?

This was my first experience in the solution's UI and UX user experience and user interface. I didn't find the solution to be very stable at all.

What do I think about the scalability of the solution?

We do plan to continue to use the solution, however, it's unclear as to if we will scale it further.

How are customer service and technical support?

We're pretty satisfied with technical support. They are helpful. I find them knowledgable and responsive and I've been happy with the level of service we've been given thus far.

How was the initial setup?

We found the initial setup quite difficult. There were a lot of errors and we found the process to be a bit complex. I wouldn't describe the implementation as straightforward.

In total, the deployment took about one week from beginning to end.

What about the implementation team?

We did not handle the entire implementation ourselves. We had assistance from an outside firm. They were helpful.

What other advice do I have?

We're just users of the solution. We're customers. We aren't resellers or consultants. We don't have a business relationship with the solution.

I'm using the latest version of the solution.

I'd recommend the product to others.

Overall, we've been mostly happy with the solution. I'd rate it at an eight out of ten so far.

Which deployment model are you using for this solution?

Public Cloud
Disclosure: I am a real user, and this review is based on my own experience and opinions.
PeerSpot user
reviewer1052523 - PeerSpot reviewer
Works with 10,001+ employees
Real User
Automatic password management based on a strong password policy

What is our primary use case?

It provides a tamper-proof solution for privileged accounts and third-party access to corporate assets.

How has it helped my organization?

We have different teams that hire out consultants from various vendors. For those consultants, there was a challenge in providing access to our critical infrastructure. CyberArk PAS provides isolated and recorded sessions for third-party/outsourced admin access. 

What is most valuable?

Automatic password management based on a strong password policy. Because still, many people choose not strong enough passwords for administrative accounts.

What needs improvement?

The product should be improved in order to support more platforms. It will be awesome if google cloud API keys are being supported like AWS and Azure.

For how long have I used the solution?

One to three years.

What do I think about the scalability of the solution?

Pretty scalable in the sense of PSM and storage.

Which solution did I use previously and why did I switch?

No, we didn't use any.

Which other solutions did I evaluate?

Yes, there was a POC which took place among BeyondTrust, Thycotic and CyberArk.

Disclosure: I am a real user, and this review is based on my own experience and opinions.
PeerSpot user
it_user685299 - PeerSpot reviewer
IT Security Specialist at a tech services company with 11-50 employees
Consultant
Password rotation, session recording & isolation and on-demand privileges.
Pros and Cons
  • "Password rotation, session recording & isolation and on-demand privileges."
  • "For users to access a system via CyberArk Privileged Session Manager, a universal connector needs to be coded in a language called AutoIT and its support for web browsers is so-so. Other products like Centrify have browser plugins that can help automate the process when using their products."

What is most valuable?

Password rotation, session recording & isolation and on-demand privileges.

What needs improvement?

For users to access a system via CyberArk Privileged Session Manager, a universal connector needs to be coded in a language called AutoIT and its support for web browsers is so-so. Other products like Centrify have browser plugins that can help automate the process when using their products.

What do I think about the stability of the solution?

No

What do I think about the scalability of the solution?

No

How is customer service and technical support?

Very good.

How was the initial setup?

Basic setup is pretty straightforward, but to fully utilise the product it can get complicated as it ties in with a lot of other products. Suggest a phased installation so staff can adjust to new processes.

What's my experience with pricing, setup cost, and licensing?

It can be an expensive product. I Suggest only licensing basics to begin with and as need arises, start to license extensions (AIM, etc.) during next phase of implementation.

Which other solutions did I evaluate?

Centrify and Lieberman ERPM.

What other advice do I have?

CyberArk offers extensive training, utilise it. Also their support staff are very good and can assist with everything.

Disclosure: I am a real user, and this review is based on my own experience and opinions.
PeerSpot user
SecArch3081 - PeerSpot reviewer
SecArch3081IT Security Consultant and Platform Architect at a pharma/biotech company with 10,001+ employees
Real User

Have you assessed TPAM/Safeguard? (was a Dell product, now One Identity)

it_user529902 - PeerSpot reviewer
Network Security Consultant at a comms service provider with 501-1,000 employees
Vendor
Session recording is a valuable feature. Better documentation of error codes would be helpful.

What is most valuable?

How has it helped my organization?

  • Increased security and visibility

What needs improvement?

Error messages are useless; better documentation of error codes would be helpful.

For how long have I used the solution?

I have used it for two years.

What do I think about the stability of the solution?

I encountered stability issues.

What do I think about the scalability of the solution?

I have not encountered any scalability issues.

How are customer service and technical support?

Due to meaningless error messages, it is not possible to repair non-trivial errors without support. However, with support, we solved every problem.

Which solution did I use previously and why did I switch?

I did not previously use a different solution.

How was the initial setup?

You have to exactly follow the installation manual; otherwise, installation can crash with a non-solvable error.

Which other solutions did I evaluate?

Before choosing this product, I evaluated BalaBit and ObserveIT.

What other advice do I have?

You have to exactly follow the installation manual.

Disclosure: I am a real user, and this review is based on my own experience and opinions.
PeerSpot user
it_user326337 - PeerSpot reviewer
it_user326337Customer Success Manager at PeerSpot
Consultant

How would documenting error codes help you in the short term and/or long term?

it_user674070 - PeerSpot reviewer
Senior Technical Trainer at a tech services company with 501-1,000 employees
Consultant
Improves the privilege account security in the organization. I would like to see improvement in the custom connector.
Pros and Cons
  • "PSM (Privilege Session Manager."
  • "I would like to see improvement in the custom connector for integration with different devices."

How has it helped my organization?

This product helps to improve the privilege account security in the organization. Privilege accounts were involved in all the breaches.

What is most valuable?

PSM (Privilege Session Manager)

What needs improvement?

I would like to see improvement in the custom connector for integration with different devices. Currently, it needs professional services and lots of time for out-of-the-box custom connectors.

What do I think about the stability of the solution?

There were no issues with stability. However, there were a few times when there were stability issues because the solution was deployed on a Windows platform.

What do I think about the scalability of the solution?

There were no issues with scalability.

How are customer service and technical support?

Technical support is average. They are not so great, because the first level support partner or distributor has to provide the support and customers cannot contact CyberArk support directly.

Which solution did I use previously and why did I switch?

We moved from version 8 to Version 9.

How was the initial setup?

The initial setup is a bit complex because it has lots of prerequisites and dependencies on Windows' features.

What's my experience with pricing, setup cost, and licensing?

It is not a cheap solution. It is expensive as compared with other solutions. However, it is one of the best solutions in their domain.

Which other solutions did I evaluate?

I worked in the CyberArk distribution company. However, I have seen that other products do not provide all the features that CyberArk can provide.

What other advice do I have?

For implementation, you will need professional services or other experts.

Disclosure: My company has a business relationship with this vendor other than being a customer: My ex-company is the distributor of CyberArk.
PeerSpot user
Buyer's Guide
Download our free CyberArk Privileged Access Manager Report and get advice and tips from experienced pros sharing their opinions.
Updated: September 2024
Buyer's Guide
Download our free CyberArk Privileged Access Manager Report and get advice and tips from experienced pros sharing their opinions.