What is our primary use case?
CyberArk Privileged Access Manager solution is used for securing root accounts on Windows, Linux, and network devices, enabling monitoring of remote vendor access via jump servers and securing access to cloud infrastructure and CI/CD pipelines.
What is most valuable?
CyberArk Privileged Access Manager has robust security and is certified by FIPS for securing credential rotations.
It has compliance support in all countries for HIPAA, NIST, SOX, and various types of compliance and regulations.
It is scalable with both hybrid and cloud environments and has a mature ecosystem.
It can integrate seamlessly with other security and IT tools.
The report and audit analytics are excellent as they provide detailed logs and reports for auditors and investigators. The automated analytics is a great feature. It allows automation of data for visualizations and analytics for insight into valuable information.
It has inbuilt functionality, though data extraction, uploading, and downloading incur charges.
What needs improvement?
Regarding pricing for CyberArk Privileged Access Manager, it is quite costly, with premium pricing, making it more suitable for mid-to-large enterprises rather than small businesses and startups.
Another downside is the learning curve, as administrators and users require training to fully leverage the solution's capabilities.
The complexity of initial deployment and configuration is significant, and customization can be challenging as some custom workflows require professional services.
For how long have I used the solution?
The organization has been using CyberArk Privileged Access Manager for three to four years.
What do I think about the stability of the solution?
Stability is not an issue as it is a mature product that demonstrates reliable performance.
What do I think about the scalability of the solution?
CyberArk Privileged Access Manager can be scaled as needed, though additional costs are associated with scaling.
How are customer service and support?
The technical support for CyberArk Privileged Access Manager is professional and knowledgeable about the solution.
CyberArk offers multi-tiered technical support for its customers, with different service levels depending on the tier (one, two, or three). The support is designed to help organizations deploy and troubleshoot PAM solutions effectively.
They provide support through a web portal, email, phone, and assign a dedicated technical account manager.
How would you rate customer service and support?
Which solution did I use previously and why did I switch?
The organization has evaluated HashiCorp, ManageEngine Privileged Access Management 360, and BeyondTrust while maintaining a subscription to CyberArk Privileged Access Manager.
How was the initial setup?
The initial deployment of CyberArk Privileged Access Manager was moderate in difficulty. Technical expertise is required as it involves setting up core infrastructure, integrating with identity systems, and configuring user roles and access for onboarding this PAM solution. Thorough requirements and analysis are necessary for implementation.
Customization is a challenge. Custom workflows require a professional level of services.
It takes two to three weeks to deploy.
It's fully managed by CyberArk once set up. You pay and they manage.
What's my experience with pricing, setup cost, and licensing?
The solution is a bt costly. It offers premium pricing.
Which other solutions did I evaluate?
For organizations that are cloud-first or require rapid environment changes, tools such as HashiCorp may match their requirements. However, for organizations needing rigorous auditing, session playback, and extensive integrations, CyberArk Privileged Access Manager would be the superior choice.
What other advice do I have?
CyberArk Privileged Access Manager is a fully managed service where payment covers complete management.
I rate this solution nine out of ten.
Which deployment model are you using for this solution?
Hybrid Cloud
If public cloud, private cloud, or hybrid cloud, which cloud provider do you use?
Other
Disclosure: PeerSpot contacted the reviewer to collect the review and to validate authenticity. The reviewer was referred by the vendor, but the review is not subject to editing or approval by the vendor.