Listing Thumbnail

    CyberArk Privileged Access Manager for GovCloud (US)

     Info
    Sold by: CyberArk 
    Deployed on AWS
    Enterprises can achieve the highest level of security for cloud, on-premises and hybrid environments by implementing the CyberArk Privileged Access Manager solution. This solution allows you to secure, control, monitor and audit all privileged access to your most critical systems and applications.
    4.4

    Overview

    CyberArk Privileged Access Manager enables enterprises to protect both traditional and modern workloads by providing powerful solutions for securing passwords, credentials, and secrets. The solution enables enterprises to consistently enforce privileged access security policies across cloud, on-premises, and hybrid environments.

    Additionally, CyberArk cloud automation tools simplify and accelerate the deployment of CyberArk in cloud environments. See below for standard pricing. For custom orders, or orders greater than 100 named users please contact AWS-Marketplace@cyberark.com .

    Highlights

    • Discover, secure, and protect account passwords, SSH Keys, API keys, cloud console access, and other privileged credentials to reduce risk from cyber attacks and meet compliance requirements
    • Isolate, monitor and control all privileged session activity across your cloud and on-premises infrastructure and applications, including suspending or terminating high-risk privileged sessions
    • Eliminate the use of hard-coded secrets by securely storing and rotating application credentials based on policy without impacting application performance

    Details

    Sold by

    Categories

    Delivery method

    Deployed on AWS
    New

    Introducing multi-product solutions

    You can now purchase comprehensive solutions tailored to use cases and industries.

    Multi-product solutions

    Features and programs

    Financing for AWS Marketplace purchases

    AWS Marketplace now accepts line of credit payments through the PNC Vendor Finance program. This program is available to select AWS customers in the US, excluding NV, NC, ND, TN, & VT.
    Financing for AWS Marketplace purchases

    Pricing

    Custom pricing options

    Pricing is based on your specific requirements and eligibility. Request a private offer to receive a custom quote. Sign in to view any offers that have been extended to you.

    How can we make this page better?

    We'd like to hear your feedback and ideas on how to improve this page.
    We'd like to hear your feedback and ideas on how to improve this page.

    Legal

    Content disclaimer

    Vendors are responsible for their product descriptions and other product content. AWS does not warrant that vendors' product descriptions or other product content are accurate, complete, reliable, current, or error-free.

    Usage information

     Info

    Delivery details

    Software as a Service (SaaS)

    SaaS delivers cloud-based software applications directly to customers over the internet. You can access these applications through a subscription model. You will pay recurring monthly usage fees through your AWS bill, while AWS handles deployment and infrastructure management, ensuring scalability, reliability, and seamless integration with other AWS services.

    Support

    Vendor support

    Ensuring your CyberArk Privileged Access Manager solution is up-to-date and running efficiently is a priority. If you encounter a technical problem in your production environment, CyberArk's Enterprise Support Team offers expertise to assist with a resolution. Our standard maintenance offers a range of contact options and includes access to online resources. Off-hours access to support is available via the Maintenance Plus 24x7 plan. <www.cyberark.com/customer-support/ > Contact CyberArk for any support related questions: support@cyberark.com 

    AWS infrastructure support

    AWS Support is a one-on-one, fast-response support channel that is staffed 24x7x365 with experienced and technical support engineers. The service helps customers of all sizes and technical abilities to successfully utilize the products and features provided by Amazon Web Services.

    Product comparison

     Info
    Updated weekly

    Accolades

     Info
    Top
    10
    In Financial Services
    Top
    100
    In Infrastructure as Code

    Customer reviews

     Info
    Sentiment is AI generated from actual customer reviews on AWS and G2
    Reviews
    Functionality
    Ease of use
    Customer service
    Cost effectiveness
    18 reviews
    Insufficient data
    Positive reviews
    Mixed reviews
    Negative reviews

    Overview

     Info
    AI generated from product descriptions
    Credential Management
    Discover, secure, and protect account passwords, SSH Keys, API keys, cloud console access, and other privileged credentials
    Session Monitoring and Control
    Isolate, monitor and control all privileged session activity across cloud and on-premises infrastructure with capability to suspend or terminate high-risk sessions
    Secrets Rotation
    Securely store and rotate application credentials based on policy without impacting application performance
    Multi-Environment Support
    Enforce privileged access security policies consistently across cloud, on-premises, and hybrid environments
    Cloud Deployment Automation
    Cloud automation tools simplify and accelerate deployment in cloud environments
    Centralized Identity and Access Visibility
    Provides centralized view of identities, accounts, entitlements, and privileged access across IT estate with threat detection capabilities for compromised identities and privileged access misuse
    Privileged Credential Management
    Manages privileged passwords, accounts, credentials, secrets, and sessions for both human and machine identities with complete control and security enforcement
    Least Privilege Enforcement
    Enforces least privilege access dynamically across Windows, macOS, Unix, and Linux environments while preventing malware, phishing attacks, and controlling application execution
    Cross-Cloud Entitlement Visibility
    Delivers cross-cloud visibility of entitlements, detects account permission anomalies, and ensures access originates only from trusted sources with privilege right-sizing guidance
    Granular Remote Access Control
    Provides granular control, management, and auditing of remote privileged access for employees, vendors, developers, and cloud operations engineers with support for multiple device types and operating systems
    Zero Trust Access Model
    Implements rule-based and condition-based access control requiring continuous verification of user and device identity and trust before granting access to resources
    Multi-Cloud and Hybrid Infrastructure Support
    Provides secure remote access across AWS workloads, on-premises resources, and other cloud environments without requiring VPN
    Conditional and Contextual Access Control
    Delivers remote conditional and contextual access to resources with capability to reduce overprivileged access and associated third-party risks
    Device and Endpoint Management
    Supports instant provisioning of company-owned devices, employee-owned devices, and unmanaged contractor endpoints for remote access
    Seamless Access Provisioning
    Enables instant provisioning and seamless access experience for remote workers without requiring awareness of underlying zero trust security implementation

    Contract

     Info
    Standard contract
    No
    No
    No

    Customer reviews

    Ratings and reviews

     Info
    4.4
    67 ratings
    5 star
    4 star
    3 star
    2 star
    1 star
    69%
    25%
    4%
    0%
    1%
    0 AWS reviews
    |
    67 external reviews
    External reviews are from G2 .
    amit s.

    Powerful, Secure CyberArk PAM for Enterprise Privileged Access Control

    Reviewed on Jan 14, 2026
    Review provided by G2
    What do you like best about the product?
    I have been using CyberArk for the past 5+ years, and this review is based on my experience. In my view, CyberArk PAM is a powerful and reliable solution for managing and securing privileged access. It provides strong password vaulting, session monitoring, and credential rotation capabilities. While the implementation can be complex, the platform itself is highly secure, scalable, and well suited for enterprise environments.

    Overall, CyberArk Privileged Access Management is a comprehensive solution for securing privileged accounts in hybrid/cloud environments. The features we have found most valuable are password vaulting and compliance reporting. CyberArk PAM has significantly improved our privileged access controls and helps us meet security and compliance requirements.
    What do you dislike about the product?
    I don’t really have any dislikes, apart from the fact that the initial setup and integration required some effort.
    What problems is the product solving and how is that benefiting you?
    CyberArk integrates smoothly with a broad range of operating systems, databases, cloud platforms, and enterprise applications, which makes it a strong fit for complex, hybrid environments.
    Deepak N.

    Seamless Password Management with Room for Web password management

    Reviewed on Dec 02, 2025
    Review provided by G2
    What do you like best about the product?
    I greatly appreciate CyberArk Privileged Access Manager's robust integration capabilities with multiple operating systems and databases, which significantly streamlines our operational workflow. Its ease of access and user-friendly graphical user interface make navigating the platform straightforward, thereby enhancing user experience and reducing the learning curve. The secure storage of every password in the vault offers enhanced security, eliminating the need for me to manually save passwords on my system, and removing the burden of having to remember multiple passwords. Additionally, the straightforward and smooth deployment process of CyberArk Privileged Access Manager was impressive, making the initial setup less daunting.
    What do you dislike about the product?
    I dislike CyberArk Privileged Access Manager's compatibility with web applications. Specifically, passwords stored in web browsers and login credentials used for web access are not properly rotated, which is a significant concern for maintaining security and efficiency.
    What problems is the product solving and how is that benefiting you?
    I use CyberArk Privileged Access Manager for password rotation on Windows and Linux, storing passwords securely in the vault, eliminating manual password management and enhancing security.
    Kingshuk S.

    Privilege Access Managed Environment Vulnerabilities

    Reviewed on Aug 09, 2025
    Review provided by G2
    What do you like best about the product?
    Integration with tools
    One of the best tools for PAM and functionality it has to integrate with multiple critical platforms gives us one of key controls
    What do you dislike about the product?
    Complex architecture design which needs to be established
    Challenges in Operations
    What problems is the product solving and how is that benefiting you?
    Restrict Privilege Access to various critical platform and helps us govern privilege user access management. Audit recording capabilities of sessions and providing just in time access with what is required and when access is required
    Aditya K.

    Cyberark

    Reviewed on Jun 02, 2025
    Review provided by G2
    What do you like best about the product?
    What I love the most is that it provides a secure connection for end users without revealing the credentials. It also has integrated MFA, and we can define policies accordingly.
    What do you dislike about the product?
    Everything is good but classical UI should be more effective. It's looking old fashion.
    What problems is the product solving and how is that benefiting you?
    CyberArk understands the biggest security challenge protecting against threats — and provides a secure way to manage it. It ensures that users get exactly the level of access they need, nothing more, nothing less.
    Computer Software

    Robust PAM for Enterprise

    Reviewed on May 31, 2025
    Review provided by G2
    What do you like best about the product?
    It is SaaS based tool, where all other major PAM leaders and tools were working as on prem solution. And workflow automation and integration with IDP solution in cloud benefits us more.

    There are few I liked,

    Session recording and live monitoring
    Audit logs for any activity done within the PAM session and by PAM administrator.
    Integration with SIEM
    UBA is also presented
    What do you dislike about the product?
    While security features are top class with cyberark, the UI might feel intuitive for administrators and users.All the initial set up require significant time and technical expertise.

    And there are more I could say as dislike points,

    1. Not be able to use their administration PAM IOS or android app
    2. PAM password automation often causing issue with switches
    3. Integration with jumpcloud password automation has major risk and challenges
    4. VPN less security open nee risk to organisation
    What problems is the product solving and how is that benefiting you?
    Primarily, it helps secure, manage and monitor privilege account. Few of specific areas would be below,

    1. Centralising all privilege credentials within untouchable vault
    2. Manual credential managements
    3. Session monitoring on limited visibility privileged accounts
    4. Compliance and gaps
    View all reviews