The concern on our end was separating the components, including the password storage component, and having everything completely separated.
Technical Manager at Gulf IT
Lots of features with a great performance and the ability to expand
Pros and Cons
- "Performance-wise, it is excellent."
- "Sometimes the infrastructure team is hesitant to provide more resources."
What is our primary use case?
What is most valuable?
The scalability is very easy.
The most valuable aspect was being to be able to manage it through multiple mediums. We can manage it through its command line interface, web view, and directly logging into the digital environment with permission. You have multiple mediums. You don't have to give direct access to the world every time you want to limit what admins should do and what they should not do.
CyberArk has the biggest number of features available when you compare it to other PAN solutions like BeyondTrust, Thycotic, and Delinea. They tend to have a lot of separate components.
Performance-wise, it is excellent.
What needs improvement?
The components of their web view, policy manager, and session manager, most of them are separated. We need something which can unify those components into a single appliance. Sometimes the infrastructure team is hesitant to provide more resources.
They have a lot of out-of-the-box integrations with a lot of other products. However, I would want them to bring on some kind of similar platform. If they can bring up the SSO on-prem, that would be ideal, as they don't have those things on-premises. They only provide that for the cloud. If they can do that, it would actually help a lot of us and keep us from trying to acquire multiple technologies for solutions.
For how long have I used the solution?
I've used the solution for six or seven years at this point.
Buyer's Guide
CyberArk Privileged Access Manager
November 2024
Learn what your peers think about CyberArk Privileged Access Manager. Get advice and tips from experienced pros sharing their opinions. Updated: November 2024.
816,660 professionals have used our research since 2012.
What do I think about the stability of the solution?
We are very stringent on the performance metrics and would rate the solution very high. It's stable.
What do I think about the scalability of the solution?
We found that scalability was much easier in CyberArk. In BeyondTrust, scalability required purchasing extra virtual machines every time we wanted to scale it up. However, in CyberArk, we don't need to purchase extra components. It comes along with the line.
Currently, we have around 78 to 80 admins, and there are around 200 underlying accounts.
Which solution did I use previously and why did I switch?
We previously used BeyondTrust.
Which other solutions did I evaluate?
I haven't compared it to Thycotic yet, however, from what I have read, it looks like CyberArk is better. I've also looked into Delinea.
What other advice do I have?
We are reselling the solution to customers.
I'd rate the solution nine out of ten. It's quite a good product.
Which deployment model are you using for this solution?
On-premises
Disclosure: My company has a business relationship with this vendor other than being a customer:
IEM tower manager at Capgemini
Useful session monitoring and password vault features
Pros and Cons
- "The password vault and session monitoring are useful."
- "The turnaround time for technical support is lengthy."
What is most valuable?
The password vault and session monitoring are useful.
For how long have I used the solution?
We have been using this solution since 2016.
What do I think about the stability of the solution?
The solution is stable, but some features in BeyondTrust are unavailable in CyberArk Privileged Access Manager. For example, there is a PMUL feature in BeyondTrust where you can do a deeper dive with the keys for login, but it is not available in CyberArk Privileged Access Manager.
How are customer service and support?
The technical support is good, and they fix any issues we have. However, the turnaround time for technical support is lengthy.
How was the initial setup?
We set up huge environments.
What's my experience with pricing, setup cost, and licensing?
Regarding pricing, we have an APAC sheet and a contact person from CyberArk Singapore that provides a pricing sheet when we need one.
What other advice do I have?
I rate this solution an eight out of ten. I would recommend having a proper plan before implementing this solution. It will be a smoother process if you jot down the granular execution level and get senior resources with hands-on experience.
Disclosure: My company has a business relationship with this vendor other than being a customer: Partner
Buyer's Guide
CyberArk Privileged Access Manager
November 2024
Learn what your peers think about CyberArk Privileged Access Manager. Get advice and tips from experienced pros sharing their opinions. Updated: November 2024.
816,660 professionals have used our research since 2012.
Security Architect at AutoCont CZ a. s.
Protects accounts and has a password rotation feature that thwarts hackers; technical support was good
Pros and Cons
- "What I found most valuable in CyberArk Privileged Access Manager is the Session Manager as it allows you to split the connection between the administrator site and the target site. I also found the Password Manager valuable as it lets you rotate the passwords of privileged users."
- "In the beginning, CyberArk Privileged Access Manager didn't have a multifactor authentication feature, so that was an area for improvement, but now it's part of the solution. Having just one console for two CyberArk products would be good, particularly for the CyberArk Privileged Access Manager and the CyberArk Endpoint Privilege Manager, with the latter being a product for endpoint management that supports the workstations and allows you to manage workstations. In the next update of CyberArk Privileged Access Manager, it would be good to have a local agent where you can manage all users and processes, and have an agent on the servers such as Linux and Windows."
What is our primary use case?
We use CyberArk Privileged Access Manager for our customers who want to monitor and protect the access from the vendor side or the partner side. These customers want to cover external users who want to gain access.
What is most valuable?
What I found most valuable in CyberArk Privileged Access Manager is the Session Manager as it allows you to split the connection between the administrator site and the target site. I also found the Password Manager valuable as it lets you rotate the passwords of privileged users.
What needs improvement?
In the beginning, CyberArk Privileged Access Manager didn't have a multifactor authentication feature, so that was an area for improvement, but now it's part of the solution.
Having just one console for two CyberArk products would be good, particularly for the CyberArk Privileged Access Manager and the CyberArk Endpoint Privilege Manager, with the latter being a product for endpoint management that supports the workstations and allows you to manage workstations.
In the next update of CyberArk Privileged Access Manager, it would be good to have a local agent where you can manage all users and processes, and have an agent on the servers such as Linux and Windows.
For how long have I used the solution?
I've been working with CyberArk Privileged Access Manager for four years.
What do I think about the stability of the solution?
CyberArk Privileged Access Manager is a stable solution.
What do I think about the scalability of the solution?
CyberArk Privileged Access Manager is easy to scale. You can divide the solution into different parts and connect them, then you can add a new feature, a new appliance, or a new system. The solution works.
How are customer service and support?
In terms of the technical support for CyberArk Privileged Access Manager, I sometimes contact the service engineer in this region. I also have access to the support portal which I use in some issues, but it's not so often. I found the technical support team very professional and I would rate support for CyberArk Privileged Access Manager five out of five.
How was the initial setup?
The initial setup for CyberArk Privileged Access Manager was complex because, in the beginning, you must get the information from the customer such as how he wants to install it, how he wants to protect privileged accounts, how password rotation would work, etc., before you can install the solution.
The time it takes to deploy CyberArk Privileged Access Manager depends on several factors such as how many admins a customer has, how many devices, and the types of devices, for example, does the customer have servers such as Windows or Linux, some other network solution, or some applications, etc.? It could take between ten, fifteen, or one hundred days. My company needs to analyze at the beginning to define how long the process will take.
On a scale of one to five, with one being complex and five being very easy, I would rate the initial setup for CyberArk Privileged Access Manager four out of five.
What's my experience with pricing, setup cost, and licensing?
I'm a technician so I don't handle the licensing for CyberArk Privileged Access Manager, but I know that the price for the core license is about €140 per year. There's another type of license, the external vendor license, and that's about €600 and you can manage twenty devices. From what I know, the price for one device in a subscription is about €65 per year.
You can buy the CyberArk Endpoint Privilege Manager too, or you can buy some other application or application license with CyberArk Privileged Access Manager, but all other features, such as the Analytics Server is included in the basic CyberArk license. With WALLIX, you need to buy separate licenses for the features.
Which other solutions did I evaluate?
I've evaluated WALLIX, apart from CyberArk Privileged Access Manager.
CyberArk Privileged Access Manager is a global solution that applies to all customers, from small scale to enterprise businesses, but the solution has a little bit more servers that you need for the installation. WALLIX, on the other hand, is just one appliance that focuses on small-scale customers. Its deployment is much easier because you just install one appliance with all the features inside. Deployment is easier with WALLIX versus CyberArk Privileged Access Manager which has a complex deployment. In the end, CyberArk Privileged Access Manager has more features that you can define or set up, while WALLIX has some limitations.
What other advice do I have?
I'm working for a company that sells privileged access management solutions, including CyberArk Privileged Access Manager.
The version of the solution which I'm dealing with is an old version. Most of the deployment is on-premises, but my company will start cloud deployment for CyberArk Privileged Access Manager as well.
My company resells, implements, and also provides support for CyberArk Privileged Access Manager for the customers.
The solution requires upgrading regularly, and if there's a new system or application, you need to set it up for privileged access management on CyberArk Privileged Access Manager, so maintenance is important. Currently, in my company, five people work with the solution where there are about two hundred devices with fifty administrators. In the beginning, CyberArk Privileged Access Manager was for large-sized businesses. Nowadays, it's also used by medium-sized businesses.
I would recommend CyberArk Privileged Access Manager to others looking into implementing it because it's very important to protect privileged accounts in the company and do password rotation, so the hackers won't have a chance to detect and find the real passwords in the system. You can also use CyberArk Privileged Access Manager to protect external users and the admins from the direct connection to the server and after that, you can see what the users and admins do because the system makes video recordings and session logs. It's important to see what the admins do from time to time.
For me, CyberArk Privileged Access Manager is the best product, and even Gartner says the same, so I would rate it a ten out of ten.
My company is a partner and reseller of CyberArk Privileged Access Manager.
Which deployment model are you using for this solution?
On-premises
Disclosure: My company has a business relationship with this vendor other than being a customer: Partner
Threat Protection Architect at a consumer goods company with 10,001+ employees
Guarantees the password is known by no one or for a maximum of eight hours
Pros and Cons
- "The risk of lost password and forbidden access to resources has been drastically reduced which increased the security level for the entire company,"
- "It needs better documentation with more examples for the configuration files and API/REST integration"
What is our primary use case?
Our primary use case is to control the technical accounts used in our DevOps environnment. The primary goal was to automate to the maximum all privileged accounts used by applications. It was a big issue because al dev guys were always using the same account/password couple. CyberArk is doing this for them transparently. Through time the scope was extended to all interactive users with the target to avoid them knowing the password. The automated password change was implemented to 99% of all accounts inside the company.
How has it helped my organization?
Before the CyberArk implementation passwords were never changed and known by everyone. We were also not able to track who is supposed to have access to what and who did what. With the successful CyberArk implementation, we are able now to:
- Guarantee the password is known by no one or for a maximum of eight hours.
- Full visibility about who is doing what.
- Full control about who is supposed to access what.
The risk of lost password and forbidden access to resources has been drastically reduced which increased the security level for the entire company,
What is most valuable?
In order to reduce the attack surface, the automated password change was pushed to the maximum. This way we know that no password is known or not for more than eight hours. It simplified the life of the operational teams because they do not need to take care of the secrets and keep their attention to maintain the infrastructure.
What also helped is the ability to constantly track who accessed which object. We took the opportunity to change our process in order to comply it. Now the activities can be done faster with better user experience.
What needs improvement?
CyberArk lacks the following functions for a better IAM like solution:
- Provision accounts for systems and directories.
- Create access to the systems.
- Monitor if any new account has been created into the system.
- Better GUI for the end-user and also for administrators. The learning curve is quite long and requires lots of training for good usage.
- More automated process for account provisioning into CyberArk. For example when a new DB is created.
- Better documentation with more examples for the configuration files and API/REST integration.
For how long have I used the solution?
I have been using CyberArk PAS for eight years.
What do I think about the stability of the solution?
The stability is very good. We never had any crash in eight years.
What do I think about the scalability of the solution?
Scalability is good because of the big variety of modules. Except for the redundancy which is quite limited with the not live replication. Also, the speed is quite slow for application accounts.
How are customer service and technical support?
Very good always reactive. The commercial part was more difficult.
How was the initial setup?
The initial setup is complex because it requires a clear company structure which was not the case. Technically also CyberArk is hard to address at the start because of its technical complexity and abilities.
What about the implementation team?
In house. Very good.
What was our ROI?
Not calculated. Users and administrators more happy than before which is the best RIO.
What's my experience with pricing, setup cost, and licensing?
CyberArk is quite expensive and they should have a better pricing model.
Which other solutions did I evaluate?
BeyondTrust, Hitachi ID, CA.
What other advice do I have?
Hard to implement and to get acceptance from the users and management. But when installed the solution is rock solid.
Which deployment model are you using for this solution?
Private Cloud
If public cloud, private cloud, or hybrid cloud, which cloud provider do you use?
Other
Disclosure: I am a real user, and this review is based on my own experience and opinions.
Manager II, Cyber Operations at OPTIV
Comes with automatic password rotation feature but UI and pricing needs improvement
Pros and Cons
- "Previously, we used to share passwords for service and normal admin accounts among team members. However, since we started managing it through the product, we've transitioned to individual admin accounts or implemented dual control for shared accounts. With dual control, exclusive checking and checkout options are available, and passwords are not stored in clear text anywhere in the credentials."
- "The tool's UI has bugs and lags. It needs to be improved. The deployment process can be complex due to multiple components for various functionalities, each requiring separate infrastructure management. To simplify this process, consolidating all these components into a single platform could be beneficial. The product's pricing could be cheaper."
What is most valuable?
Previously, we used to share passwords for service and normal admin accounts among team members. However, since we started managing it through the product, we've transitioned to individual admin accounts or implemented dual control for shared accounts. With dual control, exclusive checking and checkout options are available, and passwords are not stored in clear text anywhere in the credentials.
The solution's most valuable features are automatic password rotation, privilege manager, and secret manager. Previously, IT personnel had admin rights on their regular accounts, allowing them to log in to domain controllers. However, this posed a security risk as compromised accounts could grant unauthorized access to domain controllers. To mitigate this risk, we implemented separate DA accounts for IT staff. These DA accounts were restricted from logging in to domain controllers and did not have associated email addresses. They were dedicated AD accounts solely for accessing domain controllers, and the solution handled their management.
Previously, manually rotating admin credentials was a time-consuming task. However, implementing the tool's automatic password management feature has made this process easier. We've configured defined policies within the solution to dictate when these credentials should be changed.
What needs improvement?
The tool's UI has bugs and lags. It needs to be improved. The deployment process can be complex due to multiple components for various functionalities, each requiring separate infrastructure management. To simplify this process, consolidating all these components into a single platform could be beneficial. The product's pricing could be cheaper.
For how long have I used the solution?
I have been using the product for eight to nine years.
What do I think about the stability of the solution?
I rate the product's stability a seven out of ten.
What do I think about the scalability of the solution?
I rate the tool's scalability a seven out of ten.
How are customer service and support?
The tool's support gets worse each year. Support is outsourced to smaller companies, which doesn't work fine. Its support was good eight to nine years back. Over the years, it hasn't improved but degraded.
How would you rate customer service and support?
Negative
Which solution did I use previously and why did I switch?
I work with BeyondTrust. BeyondTrust's UI and support are good and never lag. BeyondTrust is also cheaper.
How was the initial setup?
CyberArk Enterprise Password Vault's implementation timeline largely depends on the size and complexity of the infrastructure. A smaller infrastructure with around a thousand servers can typically be implemented within a week or two. However, the implementation process may extend to four or five months for more extensive infrastructures with tens or hundreds of thousands of workstations and accounts. The tool's transition into a security-focused product necessitates strong integration with security orchestration platforms. Prebuilt packages with ready-made integrations are required instead of developing everything from scratch. It lags in automation.
What was our ROI?
We have seen 40-50 percent improvements after using the solution.
What other advice do I have?
I rate the product a seven out of ten.
Disclosure: My company has a business relationship with this vendor other than being a customer: Partner
Information Security Consultant at a tech vendor with 10,001+ employees
Reduces organizational risk with password vaulting, password rotation, session management, and secret management
Pros and Cons
- "We use the solution for password vaulting, password rotation, session management, and secret management."
- "CyberArk Enterprise Password Vault must incorporate connectors for password and session managers in the marketplace."
What is our primary use case?
We use the solution for password vaulting, password rotation, session management, and secret management.
What needs improvement?
CyberArk Enterprise Password Vault must incorporate connectors for password and session managers in the marketplace.
For how long have I used the solution?
I have been working with the product for seven years.
What do I think about the stability of the solution?
The product is highly stable.
What do I think about the scalability of the solution?
CyberArk Enterprise Password Vault is highly scalable. My company has over 3000 users. We use it regularly.
How are customer service and support?
CyberArk Enterprise Password Vault's support quality is good, but there are delays.
How would you rate customer service and support?
Neutral
How was the initial setup?
I rate the tool's deployment an eight out of ten. Experienced engineers can complete the deployment in a few days. We need three to four resources to complete the deployment.
What was our ROI?
CyberArk Enterprise Password Vault reduces risks.
What's my experience with pricing, setup cost, and licensing?
I rate the tool's pricing an eight out of ten.
What other advice do I have?
I rate CyberArk Enterprise Password Vault a nine out of ten.
Which deployment model are you using for this solution?
On-premises
Disclosure: I am a real user, and this review is based on my own experience and opinions.
CyberSecurity Service Support Specialist at Integrity Partners
Good password management with good integrations and security capabilities
Pros and Cons
- "I like the integrations for external applications."
- "The Vault's disaster recovery features need improvement."
What is our primary use case?
The primary use case and the most used functionality of CyberArk PAM is managing privileged access (an easy way to pass permissions to specific servers to specific users granularly) and password management (an automated solution that manages password validity, expiration, etc.). PSM gives a possibility to set all connections secure and it is possible to re-trace actions made by users during such sessions. It is a good tool for extending usage to new end targets sometimes even out of the box.
How has it helped my organization?
CyberArk PAM ended a scenario where several dozens or even hundreds of privileged accounts had the same password or administrators had passwords written down on sticky notes.
I have experience with onboarding thousands of accounts - mostly Windows, Unix, and network devices. I have developed (customized based on defaults) password management plugins for Unix systems and network devices.
What is most valuable?
I like the integrations for external applications. There are actually infinite possibilities of systems to integrate with - you would just need to have more time to do that. It is not an easy job, yet really valuable. I am not an expert on that, however, I try every day to be better and better. I have the support of other experienced engineers I work with so there is always someone to ask if I face any problems. End-customers sometimes have really customized needs and ideas for PSM-related usage.
What needs improvement?
The Vault's disaster recovery features need improvement. There is no possibility to automatically manage Vault's roles and for some customers, it is not an easy topic to understand.
I noticed that CyberArk changed a little in terms of the documentation about disaster recovery failover and failback scenarios. Still, it is a big field for CyberArk developers. Logically it is an easy scenario to understand - yet not for everyone, surely.
For how long have I used the solution?
I've used the solution for around five years. I have been using CyberArk PAM as an end customer for three years. For another two, I work as a CyberArk support specialist.
What do I think about the stability of the solution?
Stability is overall good. However, there are many error messages that are like false-positive - they do not produce any issue yet logs are full of information.
What do I think about the scalability of the solution?
The scaling has been mostly positive. It seems not hard to scale it up.
How are customer service and support?
Sometimes it is hard to understand the capabilities, limitations, etc. They try to help with that.
How would you rate customer service and support?
Positive
Which solution did I use previously and why did I switch?
I've never used another solution that would have the same or similar capabilities.
How was the initial setup?
The initial setup can be complex. It is important to go really carefully step-by-step with instructions. When you do that, you can be 100% sure everything will work well.
What about the implementation team?
When I was an end-customer I recall using a vendor for the implementation and support. Now, I am a vender and therefore I do it by myself.
What's my experience with pricing, setup cost, and licensing?
Licensing may sometimes seem a little complicated. A good partner from CyberArk can work it out.
Which other solutions did I evaluate?
Unfortunately, I have not participated in evaluating other options.
What other advice do I have?
Overall, I am really glad I worked with CyberArk for five years.
Which deployment model are you using for this solution?
Hybrid Cloud
Disclosure: My company has a business relationship with this vendor other than being a customer: Just like I said above - I work as a CyberArk Support Specialist mostly. My company is an integrator of cybersecurity services such as CyberArk. We also use CyberArk PAM as a product inside our organization. But still - I am a real user and this review is based on my own experience and options. I think my review is really valuable because I have sight on this product either as a end-customer and a support.
Principal Information Security Engineer/Lead Active Directory Architect at a healthcare company with 10,001+ employees
Helps our organization in supporting privileged identities but requires more connectors to other third-party systems
Pros and Cons
- "The password management feature is valuable."
- "The initial setup was a bit complex."
What is our primary use case?
Our primary use case for the solution is to support privileged identities.
What is most valuable?
The password management feature is valuable.
What needs improvement?
The solution can be improved by including more connectors to other third-party systems for integration.
For how long have I used the solution?
We have been using the solution for approximately five years.
What do I think about the stability of the solution?
The solution is stable.
What do I think about the scalability of the solution?
The solution is scalable. Approximately 150,000 people are using the solution.
Which solution did I use previously and why did I switch?
We previously used One Identity.
How was the initial setup?
The initial setup was a bit complex.
What about the implementation team?
We deployed the solution in-house.
What was our ROI?
We have seen a return on investment. The solution makes our procedures better, making the environment more secure and changing the mindset of people.
What other advice do I have?
I rate the solution a seven out of ten.
Disclosure: I am a real user, and this review is based on my own experience and opinions.
Buyer's Guide
Download our free CyberArk Privileged Access Manager Report and get advice and tips from experienced pros
sharing their opinions.
Updated: November 2024
Product Categories
Privileged Access Management (PAM) User Activity Monitoring Enterprise Password Managers Mainframe Security Operational Technology (OT) SecurityPopular Comparisons
Okta Workforce Identity
Delinea Secret Server
CyberArk Endpoint Privilege Manager
BeyondTrust Endpoint Privilege Management
WALLIX Bastion
One Identity Safeguard
BeyondTrust Privileged Remote Access
BeyondTrust Password Safe
ARCON Privileged Access Management
Delinea Privileged Access Service
ManageEngine PAM360
Symantec Privileged Access Manager
Buyer's Guide
Download our free CyberArk Privileged Access Manager Report and get advice and tips from experienced pros
sharing their opinions.
Quick Links
Learn More: Questions:
- CyberArk vs. ManageEngine Password Manager Pro
- How does Sailpoint IdentityIQ compare with CyberArk PAM?
- Which PAM tool do you prefer: CyberArk Privileged Access Manager, One Identity Safeguard, Delinea Secret Server, or BeyondTrust Privileged Remote A
- What is the difference between Privileged Users and Privileged Accounts
- When evaluating Privileged Identity Management, what aspect do you think is the most important to look for?
- Which is the best Privileged Account Management solution?
- What are the top 5 PAM solutions that can be implemented which cover both hybrid and cloud?
- What are the top 5 PAM solutions?
- How will AI and ML help or work with PIM/PAM?
- Is BeyondTrust Endpoint Privilege Management really expensive compared to other tools or software?