I am a consultant. We are in the process of using this in our clients' companies.
Product Manager at a tech services company with 11-50 employees
Priced well with good support, stable, and scalable
Pros and Cons
- "The most valuable feature is Special Monitoring."
- "The authentication port is available in CyberArk Alero but not Fortinet products."
What is our primary use case?
What is most valuable?
The most valuable feature is Special Monitoring.
What needs improvement?
The authentication port is available in CyberArk Alero but not Fortinet products.
For how long have I used the solution?
I have been working with CyberArk PAS for one year.
Buyer's Guide
CyberArk Privileged Access Manager
January 2025
Learn what your peers think about CyberArk Privileged Access Manager. Get advice and tips from experienced pros sharing their opinions. Updated: January 2025.
825,609 professionals have used our research since 2012.
What do I think about the stability of the solution?
CyberArk is stable.
What do I think about the scalability of the solution?
It's a scalable solution.
How are customer service and support?
I have limited experience with technical support, but our customers like the support.
In general, it appears to be fine.
Which solution did I use previously and why did I switch?
I have also worked with Thycotic, until the completion of the project.
How was the initial setup?
The initial setup is straightforward.
What's my experience with pricing, setup cost, and licensing?
It is best suited for mid to large-size enterprises. It is not the best for smaller companies, largely because of the price.
I believe that this solution is priced well. It's the market leader and I think that it's the best solution.
The price is quite good for us.
What other advice do I have?
For those who are interested in using this product, you have to know your requirements and compare them with CyberArk to see if it is suitable for them and fits their budget.
I would rate this solution a nine out of ten.
Disclosure: My company has a business relationship with this vendor other than being a customer: reseller
Iam Engineer at a tech services company with 201-500 employees
A different server vault is used to store data with several layers of security for protecting it.
What is most valuable?
Some of the valuable features are:
- The different server vault is used to store data with 7 layers of security for protecting the data.
- The Application Identity Management Module is also very useful and easy to handle.
- AutoIt scripting is useful to simulate single sign-on for thick and thin clients.
How has it helped my organization?
It makes compliance of the organization with password management easy. This results in a handy auditing process and adheres to all risk compliance as well.
What needs improvement?
Some areas of improvement are:
- PSM: It should be hosted on UNIX rather than on Windows. In such cases, no extra OS license needs to purchased at the client's end.
- PVWA: The admin console should be in the Windows installer instead of a web application for admin users. It makes the work faster for admins; otherwise, it seems slow for the web interface.
- PSMP: It looks a bit complex to deploy and maintain.
- OPM: This module should be integrated with PrivateArk app.
For how long have I used the solution?
I have used this solution for three years.
What do I think about the stability of the solution?
CyberArk is quite stable and no issues have been exprienced on regards to stability.
What do I think about the scalability of the solution?
We have not encountered any scalability issues. It is very scalable with any requirements.
How is customer service and technical support?
I would give the technical support a 9/10 rating. It has superb technical support for U.S. clients.
However, for Indian origin clients, i.e., for foreign clients, the support is poor thus I have rated it a 4/10.
What's my experience with pricing, setup cost, and licensing?
It is very expensive. They charge for every single thing they offer.
Disclosure: My company has a business relationship with this vendor other than being a customer: My company is a CyberArk reseller.
Buyer's Guide
CyberArk Privileged Access Manager
January 2025
Learn what your peers think about CyberArk Privileged Access Manager. Get advice and tips from experienced pros sharing their opinions. Updated: January 2025.
825,609 professionals have used our research since 2012.
ITSM & AntiFraud Consultant at a tech company with 51-200 employees
The ability to start the project, install and add the passwords in just a few days is valuable.
What is most valuable?
The most valuable feature is the password Vault which gives the administrator control over privileged accounts. The other components that are valuable are Private Session Manager, OPM, Viewfinity, and AIM, which came as an add-on to the organisation's needs. The ability to start the project, install and add the passwords in just a few days brings a big advantage for CyberArk.
How has it helped my organization?
The client can see all the users sessions through PSM, and can protect the applications on servers using AIM. Also, the Privileged Threat Assessment helps the organisation to see all the account risks, including accounts not managed by CyberArk, and accounts/machines with unusual behavior, etc.
What needs improvement?
The DNA scan should be able to scan Unix machines for privileged accounts.
For how long have I used the solution?
PIM tested in the last 2 years.
What was my experience with deployment of the solution?
We didn't have any issues with the deployment.
What do I think about the stability of the solution?
The product is very stable.
What do I think about the scalability of the solution?
I didn't have any issues with the stability. I usually recommend the client to increase the system requirements with 10%.
How are customer service and technical support?
Customer Service:
Customer service is OK in Romania.
Technical Support:I had direct contact with the local team and they are OK.
Which solution did I use previously and why did I switch?
No.
How was the initial setup?
Straightforward when you have the use cases and a SoW. Usually you follow the Installation Manual, and perform the after-installation tests, and you are sure that everything is OK. The only issue I had was with the anti-virus that was left on the server and that deleted some PSM files. You must always double-check the prerequisites, as you can have some surprises with the GPO that overrides your settings.
What about the implementation team?
I was part of the implementation team with support from the vendor.
Which other solutions did I evaluate?
We also looked at BalaBit Shell Control Box.
Disclosure: My company has a business relationship with this vendor other than being a customer: Implementation partner with CyberArk.
IT Security Engineer at a tech services company with 51-200 employees
The user interface needs some work, however, our security has improved.
What is most valuable?
It has the ability to monitor privileged sessions.
How has it helped my organization?
Our security has improved since implementing CyberArk.
What needs improvement?
The user interface needs to be improved. It could be done by getting the GUI to work with other programs from within internet browsers out of box.
For how long have I used the solution?
I've used it for one year.
What was my experience with deployment of the solution?
No issues encountered.
What do I think about the stability of the solution?
No issues encountered.
What do I think about the scalability of the solution?
No issues encountered.
How are customer service and technical support?
Customer Service:
It's good.
Technical Support:It's good.
Which solution did I use previously and why did I switch?
I didn't use a previous solution.
How was the initial setup?
It was straightforward as the documentation was rather clear. This made the implementation simple.
What about the implementation team?
I implemented myself.
Which other solutions did I evaluate?
I didn't evaluate any other options.
Disclosure: I am a real user, and this review is based on my own experience and opinions.
Being the primary administrator of CyberArk at my company, one of the biggest complaints I hear from end users is the user interface through the web browser. It has been recommended to use Internet Explorer for the PVWA, but we have found that Chrome and FireFox will also work for some end users. The ability to change the timeout value for the PVWA to remain in session also helps with customer experience and satisfaction. However, security requirements within your company will need to be taken into account when deciding how much time to allow the PVWA to remain in session.
Security Team Lead at a tech services company with 10,001+ employees
This product helps us complete financial audits. It is a nice solution.
Pros and Cons
- "Technical support is very helpful whenever we have any questions."
- "It is scalable."
- "Over the past seven years, I have seen a lot of ups and downs with the product."
What is our primary use case?
Our primary use case for this solution is it provides a security solution that includes password management. This defends against threats.
What is most valuable?
The most valuable feature to me is the recording feature. I can track all of the records, the commands, the server, any misguidance, etc.
What needs improvement?
Over the past seven years, I have seen a lot of ups and downs with the product, but now I am happy with the version that we are using now.
For how long have I used the solution?
One to three years.
What do I think about the stability of the solution?
I have no issues with stability.
What do I think about the scalability of the solution?
It is scalable. We have added new equipment, and this solution has been relevant.
How is customer service and technical support?
They are very helpful for us whenever we have any questions.
What's my experience with pricing, setup cost, and licensing?
No, I do not have any advice on the price of the product. It is a great product that I recommend to others.
Which other solutions did I evaluate?
I did not consider any other options.
What other advice do I have?
This product is helpful for financial auditing needs, as well.
Disclosure: I am a real user, and this review is based on my own experience and opinions.
Junior Product Consultant at a tech services company with 501-1,000 employees
Good technical support with helpful third party vendors and good at recording actions
Pros and Cons
- "The technical support is good."
- "We found a lot of errors during the initial setup. They should work to improve the implementation experience and to remove errors from the process."
What is our primary use case?
I primarily use the solution to record any actions taken on specific important targets. It allows management to look at actions and play them back to see what was done within the environment.
What is most valuable?
The technical support is good.
It's pretty good at recording actions taken within an environment.
What needs improvement?
We found a lot of errors during the initial setup. They should work to improve the implementation experience and to remove errors from the process.
The solution could be more stable.
It should have more specific configurations. There are lots of types of servers and devices. The product should have a more detailed, specific configuration and integration with other products.
For how long have I used the solution?
I've been using the solution for about three months at this point.
What do I think about the stability of the solution?
This was my first experience in the solution's UI and UX user experience and user interface. I didn't find the solution to be very stable at all.
What do I think about the scalability of the solution?
We do plan to continue to use the solution, however, it's unclear as to if we will scale it further.
How are customer service and technical support?
We're pretty satisfied with technical support. They are helpful. I find them knowledgable and responsive and I've been happy with the level of service we've been given thus far.
How was the initial setup?
We found the initial setup quite difficult. There were a lot of errors and we found the process to be a bit complex. I wouldn't describe the implementation as straightforward.
In total, the deployment took about one week from beginning to end.
What about the implementation team?
We did not handle the entire implementation ourselves. We had assistance from an outside firm. They were helpful.
What other advice do I have?
We're just users of the solution. We're customers. We aren't resellers or consultants. We don't have a business relationship with the solution.
I'm using the latest version of the solution.
I'd recommend the product to others.
Overall, we've been mostly happy with the solution. I'd rate it at an eight out of ten so far.
Which deployment model are you using for this solution?
Public Cloud
Disclosure: I am a real user, and this review is based on my own experience and opinions.
Works with 10,001+ employees
Automatic password management based on a strong password policy
What is our primary use case?
It provides a tamper-proof solution for privileged accounts and third-party access to corporate assets.
How has it helped my organization?
We have different teams that hire out consultants from various vendors. For those consultants, there was a challenge in providing access to our critical infrastructure. CyberArk PAS provides isolated and recorded sessions for third-party/outsourced admin access.
What is most valuable?
Automatic password management based on a strong password policy. Because still, many people choose not strong enough passwords for administrative accounts.
What needs improvement?
The product should be improved in order to support more platforms. It will be awesome if google cloud API keys are being supported like AWS and Azure.
For how long have I used the solution?
One to three years.
What do I think about the scalability of the solution?
Pretty scalable in the sense of PSM and storage.
Which solution did I use previously and why did I switch?
No, we didn't use any.
Which other solutions did I evaluate?
Yes, there was a POC which took place among BeyondTrust, Thycotic and CyberArk.
Disclosure: I am a real user, and this review is based on my own experience and opinions.
IT Security Specialist at a tech services company with 11-50 employees
Password rotation, session recording & isolation and on-demand privileges.
Pros and Cons
- "Password rotation, session recording & isolation and on-demand privileges."
- "For users to access a system via CyberArk Privileged Session Manager, a universal connector needs to be coded in a language called AutoIT and its support for web browsers is so-so. Other products like Centrify have browser plugins that can help automate the process when using their products."
What is most valuable?
Password rotation, session recording & isolation and on-demand privileges.
What needs improvement?
For users to access a system via CyberArk Privileged Session Manager, a universal connector needs to be coded in a language called AutoIT and its support for web browsers is so-so. Other products like Centrify have browser plugins that can help automate the process when using their products.
What do I think about the stability of the solution?
No
What do I think about the scalability of the solution?
No
How is customer service and technical support?
Very good.
How was the initial setup?
Basic setup is pretty straightforward, but to fully utilise the product it can get complicated as it ties in with a lot of other products. Suggest a phased installation so staff can adjust to new processes.
What's my experience with pricing, setup cost, and licensing?
It can be an expensive product. I Suggest only licensing basics to begin with and as need arises, start to license extensions (AIM, etc.) during next phase of implementation.
Which other solutions did I evaluate?
Centrify and Lieberman ERPM.
What other advice do I have?
CyberArk offers extensive training, utilise it. Also their support staff are very good and can assist with everything.
Disclosure: I am a real user, and this review is based on my own experience and opinions.
SecArch3081IT Security Consultant and Platform Architect at a pharma/biotech company with 10,001+ employees
Real User
Have you assessed TPAM/Safeguard? (was a Dell product, now One Identity)
Buyer's Guide
Download our free CyberArk Privileged Access Manager Report and get advice and tips from experienced pros
sharing their opinions.
Updated: January 2025
Product Categories
Privileged Access Management (PAM) User Activity Monitoring Enterprise Password Managers Mainframe Security Operational Technology (OT) SecurityPopular Comparisons
Okta Workforce Identity
Delinea Secret Server
CyberArk Endpoint Privilege Manager
BeyondTrust Endpoint Privilege Management
WALLIX Bastion
One Identity Safeguard
BeyondTrust Privileged Remote Access
BeyondTrust Password Safe
ARCON Privileged Access Management
Delinea Privileged Access Service
ManageEngine PAM360
Symantec Privileged Access Manager
Buyer's Guide
Download our free CyberArk Privileged Access Manager Report and get advice and tips from experienced pros
sharing their opinions.
Quick Links
Learn More: Questions:
- CyberArk vs. ManageEngine Password Manager Pro
- How does Sailpoint IdentityIQ compare with CyberArk PAM?
- Which PAM tool do you prefer: CyberArk Privileged Access Manager, One Identity Safeguard, Delinea Secret Server, or BeyondTrust Privileged Remote A
- What is the difference between Privileged Users and Privileged Accounts
- When evaluating Privileged Identity Management, what aspect do you think is the most important to look for?
- How was the 2020 Twitter Hack carried out? How could it have been prevented?
- Which is the best Privileged Account Management solution?
- What are the top 5 PAM solutions that can be implemented which cover both hybrid and cloud?
- What are the top 5 PAM solutions?
- How will AI and ML help or work with PIM/PAM?
Tanmay, have you been able to make progress in your investigations of how to solve the difficulties you've been having with MS Clustering?