Leaderboard for CyberArk Privileged Access Manager
Check out the members with the highest scores who have reviewed CyberArk Privileged Access Manager.
#1. S Azeem
525
Points
Technology Manager at a computer software company
Reviewed CyberArk Privileged Access Manager:
A scalable and easy-to-deploy solution that provides password rotation and password encryption…#2. BRUNO REYNAUD
435
Points
Information Security Engineer - Pre-sales at a tech services company
Reviewed CyberArk Privileged Access Manager:
Beneficial privileged threat analytics, high availability, and priced well375
Points
Security Engineer at Suraksha
Reviewed CyberArk Privileged Access Manager:
A highly scalable PAM solution that needs to improve its GUI#4. Omar_Jaimes
365
Points
Cybersecurity Architecture Manager at Data Warden
Reviewed CyberArk Privileged Access Manager:
An excellent product with immediate ROI and good password security#5. Joble John
275
Points
Vice President - Global Head of Privilege Access Management, Data Services and Certification at Barclays Capital
Reviewed CyberArk Privileged Access Manager:
Helps to store system accounts #6. ProbalThakurta
235
Points
Senior Partner at a tech consulting company
Reviewed CyberArk Privileged Access Manager:
Integrates well, flexible, but custom connectors#7. Anil Kumar 1
215
Points
PAM Security Consultant at Cybersec Consulting
Reviewed CyberArk Privileged Access Manager:
A versatile product that can be configured with a number of different components#8. Deepak Sahani
190
Points
Manager II, Cyber Operations at OPTIV
Reviewed CyberArk Privileged Access Manager:
Comes with automatic password rotation feature but UI and pricing needs improvement 185
Points
Cyber Security Engineer at eprocessconsulting
Reviewed CyberArk Privileged Access Manager:
Highly stable and efficiently automates application authorization#10. Jonathan Hawes
185
Points
CyberArk PAS Administrator at L3Harris Technologies
Reviewed CyberArk Privileged Access Manager:
Easy to secure, control, and monitor privileged access on highly critical networks