Try our new research platform with insights from 80,000+ expert users
it_user1002711 - PeerSpot reviewer
Presales Engineer/Network Security Technical Consultant at a tech services company with 51-200 employees
Consultant
Good integration, excellent session monitoring and very good password protection
Pros and Cons
  • "Session monitoring is excellent. It may be the solution's most valuable aspect."
  • "The initial setup could be simplified. Right now, in comparison to its nearest competitors, it's quite complex."

What is most valuable?

The solution is very complete. It has the most features on the market.

Session monitoring is excellent. It may be the solution's most valuable aspect.

The solution offers very good password protection.

It offers great integration with many products.

What needs improvement?

The initial setup could be simplified. Right now, in comparison to its nearest competitors, it's quite complex.

For how long have I used the solution?

I've been using the solution for one year.

What do I think about the stability of the solution?

The solution is very stable.

Buyer's Guide
CyberArk Privileged Access Manager
April 2025
Learn what your peers think about CyberArk Privileged Access Manager. Get advice and tips from experienced pros sharing their opinions. Updated: April 2025.
848,989 professionals have used our research since 2012.

What do I think about the scalability of the solution?

The solution is easy to scale.

How are customer service and support?

I've never had to reach out to technical support.

How was the initial setup?

The initial setup is complex. You need to install many virtual machines. You must do many configurations. It's not just one machine to another; you'll also have to handle the configuration of independent machines as well.

What's my experience with pricing, setup cost, and licensing?

The price is higher than the competition, but if the customer wants the best product for their company, they won't mind the price.

We have a permanent license. Licensing is based on how man users you have, so the pricing varies according to the size of the company.

What other advice do I have?

We're a partner of CyberArk.

I'd rate the solution nine out of ten.

Disclosure: I am a real user, and this review is based on my own experience and opinions.
PeerSpot user
it_user1113180 - PeerSpot reviewer
Lead Systems Architect at IT Specialist LLC
Real User
Very good security, good scalability and a recently lowered pricing model
Pros and Cons
  • "Security is the solution's most valuable feature. As far as I know, this solution is the most secure system of this class on the market today, even considering another management system like Fudo Security, which we also use. The integration capabilities are very good; it helps strengthen our overall security."
  • "The solution is too big and complex for any businesses that are small or medium-sized. They should offer a more compact version or make a solution better suited to smaller businesses."

What is our primary use case?

The primary use case of the solution is to gather privileged accounts from different systems and to contain privileged accounts in one secure place.

What is most valuable?

Security is the solution's most valuable feature. As far as I know, this solution is the most secure system of this class on the market today, even considering another management system like Fudo Security, which we also use. The integration capabilities are very good; it helps strengthen our overall security.

What needs improvement?

The interface and user experience could be improved. In comparison, in Fudo Security, items are very searchable and it's very comfortable to work with. CyberArk is not very good at that. It could be improved and it wouldn't be too complicated to do so. The solution is too big and complex for any business that is small or medium-sized. They should offer a more compact version or make a solution better suited to smaller businesses.

For how long have I used the solution?

I've been using the solution for five to ten years.

What do I think about the scalability of the solution?

It's an enterprise-level solution. So long as you can afford it, you can scale.

How are customer service and technical support?

I've never had to reach out to technical support.

Which solution did I use previously and why did I switch?

We didn't really use a different solution. We use Fudo Security, but it's not for password management alone. It's more of an all-in-one solution. We still use it; it's cheap and it's a very simple solution in comparison to CyberArk.

How was the initial setup?

The initial setup is okay; I'd rate it seven out of ten in terms of ease of use compared to other solutions.

Many different things during installation are not straightforward. For example, it would be better to make some kind of pre-installed machine or virtual machine or to make it easy to deploy various ISO files. There are competitors that have just one machine and no infrastructure involved. It would also be better if they embedded the license or offered some free options.

Deployment took about a month.

What's my experience with pricing, setup cost, and licensing?

As far as I know, CyberArk changed its pricing policy for our region. Overall it was very expensive a few years ago, but now, just around a year ago, it became less expensive and it's easier for us to sell it.

What other advice do I have?

We use the on-premises deployment model.

In terms of advice, I'd suggest others follow the implementation carefully.

I'd rate the solution eight out of ten. It's not easy to install and it's got too many components which means it's not really suitable for small or medium-sized businesses.

Disclosure: I am a real user, and this review is based on my own experience and opinions.
PeerSpot user
Buyer's Guide
CyberArk Privileged Access Manager
April 2025
Learn what your peers think about CyberArk Privileged Access Manager. Get advice and tips from experienced pros sharing their opinions. Updated: April 2025.
848,989 professionals have used our research since 2012.
it_user685299 - PeerSpot reviewer
IT Security Specialist at a tech services company with 11-50 employees
Consultant
Password rotation, session recording & isolation and on-demand privileges.
Pros and Cons
  • "Password rotation, session recording & isolation and on-demand privileges."
  • "For users to access a system via CyberArk Privileged Session Manager, a universal connector needs to be coded in a language called AutoIT and its support for web browsers is so-so. Other products like Centrify have browser plugins that can help automate the process when using their products."

What is most valuable?

Password rotation, session recording & isolation and on-demand privileges.

What needs improvement?

For users to access a system via CyberArk Privileged Session Manager, a universal connector needs to be coded in a language called AutoIT and its support for web browsers is so-so. Other products like Centrify have browser plugins that can help automate the process when using their products.

What do I think about the stability of the solution?

No

What do I think about the scalability of the solution?

No

How is customer service and technical support?

Very good.

How was the initial setup?

Basic setup is pretty straightforward, but to fully utilise the product it can get complicated as it ties in with a lot of other products. Suggest a phased installation so staff can adjust to new processes.

What's my experience with pricing, setup cost, and licensing?

It can be an expensive product. I Suggest only licensing basics to begin with and as need arises, start to license extensions (AIM, etc.) during next phase of implementation.

Which other solutions did I evaluate?

Centrify and Lieberman ERPM.

What other advice do I have?

CyberArk offers extensive training, utilise it. Also their support staff are very good and can assist with everything.

Disclosure: I am a real user, and this review is based on my own experience and opinions.
PeerSpot user
SecArch3081 - PeerSpot reviewer
SecArch3081IT Security Consultant and Platform Architect at a pharma/biotech company with 10,001+ employees
Real User

Have you assessed TPAM/Safeguard? (was a Dell product, now One Identity)

it_user531600 - PeerSpot reviewer
Advanced CyberArk Specialist at a tech services company with 1,001-5,000 employees
Consultant
Secured vault storage provides the capabilities for structuring and accessing data.

What is most valuable?

The secured vault storage offers great capabilities for structuring and accessing data.
Central Password Manager is useful for agentless automated password management on endpoints.

Privileged Session Manager is good for provisioning, securing, and recording sessions to the endpoints.

How has it helped my organization?

CyberArk provided an audit trail for all account operations, including session recordings for all activities performed with high privilege accounts. It also gave us the ability to define various access controls per group, enabling us to differentiate between internal and external IT staff accessing the accounts.

What needs improvement?

The product documentation could be a little more precise in certain aspects with clearer explanations for functionality limitations. New functionalities or discovered bugs take a little longer to patch. We would greatly appreciate quicker development of security patches and bug corrections.

For how long have I used the solution?

I have been working with CyberArk solutions for 7 years already.

I was involved in many implementations, proofs of concept, operational and development activities. I have worked with or test all CyberArk releases since version 5.5.

What do I think about the stability of the solution?

Unfortunately, I did have some problems with stability caused by not following the recommended configurations. But the recommended configurations are very strict, and it is not always possible to implement in a corporate infrastructure. Interference with other applications can also cause problems with CyberArk components.

What do I think about the scalability of the solution?

We did not have any problems with scalability. Each component of the solution is highly scalable and enables us to quickly increase capacity.

How are customer service and technical support?

Customer Service:

Customer service is very responsive and they are willing to help you with any deployment decisions, production issues or just various questions you might have.

Technical Support:

The technical support was great. They were very responsive and eager to help. We were able to have professional communication and the involvement of all levels of technical personnel as needed.

Which solution did I use previously and why did I switch?

I used another solution before CyberArk and its limited functionalities were the main reason for switching. We chose CyberArk because of its great functionalities, the ability to be deployed granularly at a different scale for each function, and the ability to be deployed in a distributed infrastructure.

How was the initial setup?

The initial setup is straightforward if you prepare for it properly and test the major functionalities using the configurations that you’ll actually require before you use it in a production deployment.

CyberArk documentation contains a lot of information, so the hardest part is to choose the right setup and deployment strategy.

What's my experience with pricing, setup cost, and licensing?

Plan ahead regarding the licensing costs. You can get a better prices per license as the number of licenses increases. CyberArk is open to providing a test license so you can test any particular functionalities prior to buying the real license.

Which other solutions did I evaluate?

We evaluated ObserveIT and IBM’s Privileged Identity Manager solution, which was still under development back in the times. We chose CyberArk because of its flexible installations, so that it was able to cover most of the deployment scenarios we required.

What other advice do I have?

Study and test it first, before going wild in the production.

It is very easy to create a disaster in production with even the smallest changes.
CyberArk has great resiliency capabilities; use them wherever you can.

Disclosure: My company has a business relationship with this vendor other than being a customer: My current company is a partner with CyberArk for selling the product as a service.
PeerSpot user
it_user1386480 - PeerSpot reviewer
Junior Product Consultant at a tech services company with 501-1,000 employees
Real User
Good technical support with helpful third party vendors and good at recording actions
Pros and Cons
  • "The technical support is good."
  • "We found a lot of errors during the initial setup. They should work to improve the implementation experience and to remove errors from the process."

What is our primary use case?

I primarily use the solution to record any actions taken on specific important targets. It allows management to look at actions and play them back to see what was done within the environment.

What is most valuable?

The technical support is good.

It's pretty good at recording actions taken within an environment.

What needs improvement?

We found a lot of errors during the initial setup. They should work to improve the implementation experience and to remove errors from the process.

The solution could be more stable. 

 It should have more specific configurations. There are lots of types of servers and devices. The product should have a more detailed, specific configuration and integration with other products.

For how long have I used the solution?

I've been using the solution for about three months at this point.

What do I think about the stability of the solution?

This was my first experience in the solution's UI and UX user experience and user interface. I didn't find the solution to be very stable at all.

What do I think about the scalability of the solution?

We do plan to continue to use the solution, however, it's unclear as to if we will scale it further.

How are customer service and technical support?

We're pretty satisfied with technical support. They are helpful. I find them knowledgable and responsive and I've been happy with the level of service we've been given thus far.

How was the initial setup?

We found the initial setup quite difficult. There were a lot of errors and we found the process to be a bit complex. I wouldn't describe the implementation as straightforward.

In total, the deployment took about one week from beginning to end.

What about the implementation team?

We did not handle the entire implementation ourselves. We had assistance from an outside firm. They were helpful.

What other advice do I have?

We're just users of the solution. We're customers. We aren't resellers or consultants. We don't have a business relationship with the solution.

I'm using the latest version of the solution.

I'd recommend the product to others.

Overall, we've been mostly happy with the solution. I'd rate it at an eight out of ten so far.

Which deployment model are you using for this solution?

Public Cloud
Disclosure: I am a real user, and this review is based on my own experience and opinions.
PeerSpot user
PeerSpot user
ITSM & AntiFraud Consultant at a tech company with 51-200 employees
Real User
The ability to start the project, install and add the passwords in just a few days is valuable.

What is most valuable?

The most valuable feature is the password Vault which gives the administrator control over privileged accounts. The other components that are valuable are Private Session Manager, OPM, Viewfinity, and AIM, which came as an add-on to the organisation's needs. The ability to start the project, install and add the passwords in just a few days brings a big advantage for CyberArk.

How has it helped my organization?

The client can see all the users sessions through PSM, and can protect the applications on servers using AIM. Also, the Privileged Threat Assessment helps the organisation to see all the account risks, including accounts not managed by CyberArk, and accounts/machines with unusual behavior, etc.

What needs improvement?

The DNA scan should be able to scan Unix machines for privileged accounts.

For how long have I used the solution?

PIM tested in the last 2 years.

What was my experience with deployment of the solution?

We didn't have any issues with the deployment.

What do I think about the stability of the solution?

The product is very stable.

What do I think about the scalability of the solution?

I didn't have any issues with the stability. I usually recommend the client to increase the system requirements with 10%.

How are customer service and technical support?

Customer Service:

Customer service is OK in Romania.

Technical Support:

I had direct contact with the local team and they are OK.

Which solution did I use previously and why did I switch?

No.

How was the initial setup?

Straightforward when you have the use cases and a SoW. Usually you follow the Installation Manual, and perform the after-installation tests, and you are sure that everything is OK. The only issue I had was with the anti-virus that was left on the server and that deleted some PSM files. You must always double-check the prerequisites, as you can have some surprises with the GPO that overrides your settings.

What about the implementation team?

I was part of the implementation team with support from the vendor.

Which other solutions did I evaluate?

We also looked at BalaBit Shell Control Box.

Disclosure: My company has a business relationship with this vendor other than being a customer: Implementation partner with CyberArk.
PeerSpot user
it_user326337 - PeerSpot reviewer
it_user326337Customer Success Manager at PeerSpot
Real User

Tanmay, have you been able to make progress in your investigations of how to solve the difficulties you've been having with MS Clustering?

See all 4 comments
it_user225765 - PeerSpot reviewer
IT Security Engineer at a tech services company with 51-200 employees
Consultant
The user interface needs some work, however, our security has improved.

What is most valuable?

It has the ability to monitor privileged sessions.

How has it helped my organization?

Our security has improved since implementing CyberArk.

What needs improvement?

The user interface needs to be improved. It could be done by getting the GUI to work with other programs from within internet browsers out of box.

For how long have I used the solution?

I've used it for one year.

What was my experience with deployment of the solution?

No issues encountered.

What do I think about the stability of the solution?

No issues encountered.

What do I think about the scalability of the solution?

No issues encountered.

How are customer service and technical support?

Customer Service:

It's good.

Technical Support:

It's good.

Which solution did I use previously and why did I switch?

I didn't use a previous solution.

How was the initial setup?

It was straightforward as the documentation was rather clear. This made the implementation simple.

What about the implementation team?

I implemented myself.

Which other solutions did I evaluate?

I didn't evaluate any other options.

Disclosure: I am a real user, and this review is based on my own experience and opinions.
PeerSpot user
Rodney Dapilmoto - PeerSpot reviewer
Rodney DapilmotoSystems Admin Analyst 3 at CPS Energy
Real User

Being the primary administrator of CyberArk at my company, one of the biggest complaints I hear from end users is the user interface through the web browser. It has been recommended to use Internet Explorer for the PVWA, but we have found that Chrome and FireFox will also work for some end users. The ability to change the timeout value for the PVWA to remain in session also helps with customer experience and satisfaction. However, security requirements within your company will need to be taken into account when deciding how much time to allow the PVWA to remain in session.

reviewer1052523 - PeerSpot reviewer
Works with 10,001+ employees
Real User
Automatic password management based on a strong password policy

What is our primary use case?

It provides a tamper-proof solution for privileged accounts and third-party access to corporate assets.

How has it helped my organization?

We have different teams that hire out consultants from various vendors. For those consultants, there was a challenge in providing access to our critical infrastructure. CyberArk PAS provides isolated and recorded sessions for third-party/outsourced admin access. 

What is most valuable?

Automatic password management based on a strong password policy. Because still, many people choose not strong enough passwords for administrative accounts.

What needs improvement?

The product should be improved in order to support more platforms. It will be awesome if google cloud API keys are being supported like AWS and Azure.

For how long have I used the solution?

One to three years.

What do I think about the scalability of the solution?

Pretty scalable in the sense of PSM and storage.

Which solution did I use previously and why did I switch?

No, we didn't use any.

Which other solutions did I evaluate?

Yes, there was a POC which took place among BeyondTrust, Thycotic and CyberArk.

Disclosure: I am a real user, and this review is based on my own experience and opinions.
PeerSpot user
Buyer's Guide
Download our free CyberArk Privileged Access Manager Report and get advice and tips from experienced pros sharing their opinions.
Updated: April 2025
Buyer's Guide
Download our free CyberArk Privileged Access Manager Report and get advice and tips from experienced pros sharing their opinions.