Overview
CyberArk Privileged Access Management solutions provide end-to-end security for internal IT admins & 3rd party vendors enabling secure high-risk access used to migrate, scale and operate applications on-premises or in the cloud. CyberArk allows IT teams to implement role-specific least privilege, and workflows for both secure standing access and Just-in-Time access with Zero Standing Privileges.
CyberArk PAM solutions holistically secure both standing and just-in-time privileged access across the IT estate. With industry-leading capabilities for credential management, session isolation and monitoring, and detection of privileged access misuse, organizations can leverage CyberArk PAM to rapidly achieve their risk reduction, audit and compliance objectives.
Vendor PAM capabilities help organizations defend against attacks targeting external vendors, contractors and other third parties with high-risk access to critical IT and OT assets. The authentication and provisioning processes are enabled by the biometric capabilities of the users smartphone. Vendor PAM integrates with CyberArk PAM solutions to allow passwordless, Just-in-Time access to accounts managed by CyberArk, eliminating the cost and operational overhead of deploying VPNs, agents, and dedicated laptops to vendors.
For custom pricing, EULA, or a private contract, please contact AWS-Marketplace@cyberark.com , for a private offer.
Highlights
- Protect against the leading cause of breaches - compromised identities and credentials.
- Deliver digital experiences that balance security and a frictionless experience.
- A unified solution to address identity-oriented audit and compliance requirements.
Details
Unlock automation with AI agent solutions

Features and programs
Buyer guide

Financing for AWS Marketplace purchases
Pricing
Dimension | Description | Cost/12 months |
---|---|---|
AWS_25_PRIV_STDANDARD_USER_SAAS | Standard Privilege Cloud users - 25 users | $44,712.00 |
Vendor refund policy
For refund policy, visit <www.cyberark.com/terms-service-saas/Â >
Custom pricing options
How can we make this page better?
Legal
Vendor terms and conditions
Content disclaimer
Delivery details
Software as a Service (SaaS)
SaaS delivers cloud-based software applications directly to customers over the internet. You can access these applications through a subscription model. You will pay recurring monthly usage fees through your AWS bill, while AWS handles deployment and infrastructure management, ensuring scalability, reliability, and seamless integration with other AWS services.
Resources
Vendor resources
Support
Vendor support
Contact CyberArk for support related questions: <www.cyberark.com/customer-support >
AWS infrastructure support
AWS Support is a one-on-one, fast-response support channel that is staffed 24x7x365 with experienced and technical support engineers. The service helps customers of all sizes and technical abilities to successfully utilize the products and features provided by Amazon Web Services.

Standard contract
Customer reviews
Secures critical infrastructures with essential user session audit records
What is our primary use case?
We are working with CyberArk solutions such as PAM on-premises. We are working with CyberArk Privileged Access Manager , including AIM, PSM, and PSMP components.Â
How has it helped my organization?
The ability of CyberArk Privileged Access Manager to safeguard financial service infrastructure is important; without it, banking and financial clients cannot secure their operations. Despite various attacks affecting other companies, CyberArk's implementations ensured that we remained unaffected.
CyberArk Privileged Access Manager has been helpful in managing over 125,000 privileged accounts in a single environment for our client, and we have multiple CyberArk environments for different clients with different numbers of accounts. CyberArk Privileged Access Manager is excellent at helping companies meet regulatory requirements due to its ability to cater to the specific needs of clients across different countries, ensuring compliance without data transfer issues.
What is most valuable?
CyberArk Privileged Access Manager provides security and video recording of user sessions for audit purposes. This feature is critical in financial sectors where auditing who performed specific actions is essential. Having video records adds a layer of proof and ensures compliance with audit requirements.
The key feature of CyberArk Privileged Access Manager is that it's a comprehensive package rather than just dependent on components such as Vault or Privileged Session Manager. Each component is necessary, and the Vault is the heart of CyberArk; everything connects via PSM and PSMP. I particularly appreciate PSM and PSMP because they simplify troubleshooting and charging.
What needs improvement?
A potential area for improvement is enhancing support for cluster environments and distributed Vaults. Clients in multiple countries that need central access have different challenges that require better solutions from CyberArk.
For financial services, CyberArk can improve incident response by ensuring fast support for critical priority tickets to meet compliance requirements. Providing more documentation on CyberArk is recommended for new team members to enhance their troubleshooting capabilities. I understand it's up to the client, but 99% fail to change the demo key, so it's crucial for CyberArk to emphasize changing the key and documenting it as part of the installation process.
For how long have I used the solution?
I have been working with CyberArk Privileged Access Manager for more than nine years.
What do I think about the stability of the solution?
For stability, I would rate CyberArk Privileged Access Manager a nine out of ten.
What do I think about the scalability of the solution?
I would rate the scalability of CyberArk Privileged Access Manager as a nine.
How are customer service and support?
Regarding technical support from CyberArk, while L2 and L3 teams are effective, L1 support requires improvement due to longer response times in critical situations. Coordination with higher support levels sometimes takes longer than expected, which should be addressed.
How would you rate customer service and support?
Positive
How was the initial setup?
After implementing CyberArk Privileged Access Manager, it typically takes about four to five months for a company to realize time to value, assuming they have a strong implementation team and infrastructure in place.
What about the implementation team?
Integrating CyberArk Privileged Access Manager is very simple due to the provided connectors for Windows and UNIX, as well as plugins for databases. Custom integrations may take longer, around one month, due to development requirements.
What's my experience with pricing, setup cost, and licensing?
Regarding costs, CyberArk Privileged Access Manager is not a cheap product; hence, many companies struggle with its high licensing cost. While it's valuable, it comes with a high price tag, making it hard for every company to afford it.
Which other solutions did I evaluate?
After comparing with other products, I find that no other product currently matches CyberArk's performance; the performance issues in alternative solutions make them less desirable. While there are competitors, I cannot definitively name one that compares with CyberArk Privileged Access Manager.
What other advice do I have?
The requirements for CyberArk, particularly in India, have evolved significantly since the company acquired several businesses in 2014. Every organization needs an identity and access management (IAM) and privileged access management (PAM) solution. CyberArk stands out as the leading product in this category. While there are other protocols available in the market, CyberArk is known for its security, reliability, and user-friendly access.
In my experience working with multiple companies and clients using CyberArk, I have not encountered any cases of breaches or malicious activity associated with the platform. This track record provides a strong sense of security and assurance regarding CyberArk’s capabilities. Although the privileged access management solution can be costly, it offers extensive security features, including multi-factor authentication (MFA). Overall, CyberArk is an excellent product for organizations seeking robust security solutions.
Regarding granularity of PAM controls in CyberArk Privileged Access Manager, it means having centralized control in the Vault. Standalone CyberArk Vaults perform best compared to cluster systems, which present challenges during maintenance or network connectivity issues.
Overall, I would rate CyberArk Privileged Access Manager a nine out of ten.
Which deployment model are you using for this solution?
Granular control provides compliance and automates credential security
What is our primary use case?
Mainly, I use the CyberArk Privileged Access Manager for securely storing and managing the credentials, and its main features include the Password Vault and automatic password rotation.
What is most valuable?
The granularity of the controls in the CyberArk Privileged Access Manager is good; they have provided compliance which is required, helping us in auditing and reducing the risk of insider misuse of credential theft while also saving time for the IT guys with automating password rotations.
It's a valuable tool. The main function is securing data from theft and saving all the passwords in the same place, as the whole organization's main API endpoints are stored here.
The feature I appreciate the most about the CyberArk Privileged Access Manager is the secure data, which acts as a centralized store where credentials are securely stored.
What needs improvement?
The interface of the CyberArk Privileged Access Manager could be smoother, and the GUI could be more user-friendly and modern.
For how long have I used the solution?
I have been using the CyberArk Privileged Access Manager for one year.
What do I think about the stability of the solution?
I have not really seen any lagging, crashing, or downtime with the stability of the CyberArk Privileged Access Manager.
How are customer service and support?
I have contacted their technical support and customer support a couple of times, and the quality and speed are good. The service is great.
How would you rate customer service and support?
How was the initial setup?
When I first started using the CyberArk Privileged Access Manager, it was easy to learn how to use it. It's a simple and straightforward tool. It took me approximately three days to fully learn how to use the CyberArk Privileged Access Manager, which is less than a week.
Which other solutions did I evaluate?
I have not tried using any alternatives to the CyberArk Privileged Access Manager.
What other advice do I have?
On a scale from 1 to 10, I would rate the CyberArk Privileged Access Manager overall as 9.5.
Protects financial infrastructure with credential security and audits while continuously recording sessions
What is our primary use case?
We use CyberArk Privileged Access Manager for least privilege and accountability purposes, while we also utilize the EPM solution for endpoint protection. Additionally, PTA is one of the most important tools from CyberArk Privileged Access Manager , which we use on a real-time protection basis. CyberArk Privileged Access Manager effectively prevents attacks on the financial service infrastructure, as we protect against lateral movement, credential stuffing, and since no passwords are available because they are rotated through CyberArk Privileged Access Manager, we can isolate every session and record all activity while monitoring in real-time.
What is most valuable?
The ability of CyberArk Privileged Access Manager to safeguard the financial services infrastructure by protecting credentials is extremely important, as every activity in a financial organization needs to be recorded for accountability in auditing. Therefore, CyberArk Privileged Access Manager is a crucial tool, and we utilize credential rotation as 85% of successful attacks in the last 10 years have been initiated through credential theft. Monitoring, recording, and credential rotating activities are crucial because if CyberArk Privileged Access Manager goes out of service, the total environment would collapse due to the lack of passwords for respective servers.
What needs improvement?
While I cannot suggest major changes, I did encounter a vulnerability concerning RADIUS blasts, which was recently mitigated by CyberArk Privileged Access Manager in their latest version, indicating an area for improvement in vulnerability assessments. Improvements in vulnerability assessment are essential. A notable request I have regarding CyberArk Privileged Access Manager is to address the issues of database corruption identified in cluster environments experienced by multiple clients.
For how long have I used the solution?
From 2021 to now, I have been working on CyberArk Privileged Access Manager.
What do I think about the stability of the solution?
I have not experienced any stability issues with CyberArk Privileged Access Manager.
What do I think about the scalability of the solution?
It is easy to scale.
How are customer service and support?
In terms of technical support, CyberArk Privileged Access Manager has provided excellent support without any doubt. Based on the issue resolution and support quality, I rate the support 10 out of 10.
How would you rate customer service and support?
Which solution did I use previously and why did I switch?
Before using CyberArk Privileged Access Manager, I did not evaluate any other PAM tools.
How was the initial setup?
Setting up CyberArk Privileged Access Manager is not complex, especially if you properly follow the recommendations from CyberArk.
What about the implementation team?
I handled the deployment myself.
What was our ROI?
CyberArk Privileged Access Manager has been very effective in helping my company meet compliance and regulatory requirements. Implementing CyberArk Privileged Access Manager saved time on compliance requirements in finance, typically around one hour.
What's my experience with pricing, setup cost, and licensing?
There has been no reduced cost associated with CyberArk Privileged Access Manager, as when it is required, you must pay for their licensing and prepare the full environment. While there are costs for the licensing of CyberArk Privileged Access Manager, it definitely provides value when I need any accountability or session recording.
What other advice do I have?
CyberArk Privileged Access Manager is one of the most important components from CyberArk, along with EPM (Endpoint Privilege Manager ) and PTA (Privileged Threat Analytics tool). I recommend anyone considering CyberArk Privileged Access Manager to view it as a friendly environment, as it stands out among the other PAM solutions I have encountered. CyberArk Privileged Access Manager is highly recommended for its user-friendly nature. I rate CyberArk Privileged Access Manager a ten out of ten.
Which deployment model are you using for this solution?
Privilege Access Managed Environment Vulnerabilities
One of the best tools for PAM and functionality it has to integrate with multiple critical platforms gives us one of key controls
Challenges in Operations
Privileged access management achieves full control with comprehensive features
What is our primary use case?
For CyberArk Privileged Access Manager , use cases are providing just-in-time privileged access. The most simple use case is hosting all privileged credentials in a secure manner and managing and controlling access to those credentials. Therefore, controlling access to privileged endpoints is the usual thing that will be done with PAM.
What is most valuable?
CyberArk Privileged Access Manager has several valuable features. The basic feature is privileged access management with all the processes and procedures that are needed. It has all the relevant features required to provide a PAM project or PAM program. It does everything that is needed. A tangible benefit is that we already have full control of privileged access. We have just started and have onboarded all privileged accounts into the system.
What needs improvement?
I have noticed areas of CyberArk Privileged Access Manager that could be improved or enhanced in integration with automation tools. It's not quite the same in the cloud, the Privilege Cloud version. The on-premises version allows users to do absolutely everything. When they took it to the cloud, they started cutting things out. The other issue with CyberArk is that they are marketing their new product, SIA, which is based on Privilege Cloud. Users still need to have Privilege Cloud to achieve the same level of functionality as the on-premises version.
We are still early in the roadmap and haven't progressed far enough to identify additional needs. When organizations reach the end of their maturity roadmap, they can better identify specific tool requirements that aren't currently available.
For how long have I used the solution?
We have been deploying CyberArk Privileged Access Manager for two years now and counting.
How are customer service and support?
The evaluation of customer service and technical support for CyberArk Privileged Access Manager depends on several factors. When receiving support directly from CyberArk, they are the most knowledgeable, though they don't always have immediate solutions as they might need to create them, which can take considerable time. For instance, the Ansible integration for the cloud version has been requested for years.
When working with CyberArk partners for support, it's crucial to ensure they have actual knowledge and aren't just acting as middlemen. There have been instances where third parties are hired to provide first and second line support, but they simply forward requests to CyberArk without adding value to the process.
How would you rate customer service and support?
What about the implementation team?
We used a deployment partner recommended by CyberArk for the deployment and maintenance process. One crucial step that should be done first is creating an inventory of how privileged access is currently handled and where it is needed. Without this inventory, you might deploy CyberArk and realize it doesn't work with your existing architecture or infrastructure.
Our implementation team consisted of approximately 15 people, including architects, engineers, application owners, network specialists, Windows and Linux administrators, database administrators, and cloud specialists. While maintenance requires fewer people, input from all these stakeholders is crucial for successful implementation as they each have different requirements.
Most importantly, this needs to be a management-driven initiative with a top-down approach. Management must establish new working methods, as the biggest barrier to acceptance is typically resistance to changes in working procedures.
For ongoing operations, the staffing requirements depend on the company's operations. Typically, 24/7 coverage requires at least three people per shift in a follow-the-sun model. This accounts for first and second line support only, with additional staff needed for server maintenance, totaling around nine people.
What other advice do I have?
The primary problem addressed by implementing CyberArk Privileged Access Manager is the lack of control over privileged access - where it happens, how it occurs, and what is done with that access. When attempting to attack an enterprise, attackers target the highest-privilege credentials available. Therefore, protecting the most critical credentials within your organization is essential.
For those planning to deploy CyberArk Privileged Access Manager, it's crucial to understand that it's a multi-year program. It's not just about deploying the tool; it needs policies and governance around it. Additionally, infrastructure modifications are necessary to ensure PAM is the only way to provide privileged access to endpoints.
It's a great product that does everything required from a PAM tool. I would rate CyberArk Privileged Access Manager as a nine out of ten.