Listing Thumbnail

    Privileged Access Management

     Info
    Sold by: CyberArk 
    Deployed on AWS
    CyberArk PAM solutions provide end-to-end security for internal IT admins & 3rd party vendors enabling secure high-risk access used to migrate, scale and operate applications on-premises or in the cloud. CyberArk allows IT teams to implement role-specific least privilege, and workflows for both secure standing access and Just-in-Time/Zero Standing Privileges workflows.

    Overview

    CyberArk Privileged Access Management solutions provide end-to-end security for internal IT admins & 3rd party vendors enabling secure high-risk access used to migrate, scale and operate applications on-premises or in the cloud. CyberArk allows IT teams to implement role-specific least privilege, and workflows for both secure standing access and Just-in-Time access with Zero Standing Privileges.

    CyberArk PAM solutions holistically secure both standing and just-in-time privileged access across the IT estate. With industry-leading capabilities for credential management, session isolation and monitoring, and detection of privileged access misuse, organizations can leverage CyberArk PAM to rapidly achieve their risk reduction, audit and compliance objectives.

    Vendor PAM capabilities help organizations defend against attacks targeting external vendors, contractors and other third parties with high-risk access to critical IT and OT assets. The authentication and provisioning processes are enabled by the biometric capabilities of the users smartphone. Vendor PAM integrates with CyberArk PAM solutions to allow passwordless, Just-in-Time access to accounts managed by CyberArk, eliminating the cost and operational overhead of deploying VPNs, agents, and dedicated laptops to vendors.

    For custom pricing, EULA, or a private contract, please contact AWS-Marketplace@cyberark.com , for a private offer.

    Highlights

    • Protect against the leading cause of breaches - compromised identities and credentials.
    • Deliver digital experiences that balance security and a frictionless experience.
    • A unified solution to address identity-oriented audit and compliance requirements.

    Details

    Delivery method

    Deployed on AWS

    Unlock automation with AI agent solutions

    Fast-track AI initiatives with agents, tools, and solutions from AWS Partners.
    AI Agents

    Features and programs

    Buyer guide

    Gain valuable insights from real users who purchased this product, powered by PeerSpot.
    Buyer guide

    Financing for AWS Marketplace purchases

    AWS Marketplace now accepts line of credit payments through the PNC Vendor Finance program. This program is available to select AWS customers in the US, excluding NV, NC, ND, TN, & VT.
    Financing for AWS Marketplace purchases

    Pricing

    Privileged Access Management

     Info
    Pricing is based on the duration and terms of your contract with the vendor. This entitles you to a specified quantity of use for the contract duration. If you choose not to renew or replace your contract before it ends, access to these entitlements will expire.
    Additional AWS infrastructure costs may apply. Use the AWS Pricing Calculator  to estimate your infrastructure costs.

    12-month contract (1)

     Info
    Dimension
    Description
    Cost/12 months
    AWS_25_PRIV_STDANDARD_USER_SAAS
    Standard Privilege Cloud users - 25 users
    $44,712.00

    Vendor refund policy

    For refund policy, visit <www.cyberark.com/terms-service-saas/ >

    Custom pricing options

    Request a private offer to receive a custom quote.

    How can we make this page better?

    We'd like to hear your feedback and ideas on how to improve this page.
    We'd like to hear your feedback and ideas on how to improve this page.

    Legal

    Vendor terms and conditions

    Upon subscribing to this product, you must acknowledge and agree to the terms and conditions outlined in the vendor's End User License Agreement (EULA) .

    Content disclaimer

    Vendors are responsible for their product descriptions and other product content. AWS does not warrant that vendors' product descriptions or other product content are accurate, complete, reliable, current, or error-free.

    Usage information

     Info

    Delivery details

    Software as a Service (SaaS)

    SaaS delivers cloud-based software applications directly to customers over the internet. You can access these applications through a subscription model. You will pay recurring monthly usage fees through your AWS bill, while AWS handles deployment and infrastructure management, ensuring scalability, reliability, and seamless integration with other AWS services.

    Support

    Vendor support

    Contact CyberArk for support related questions: <www.cyberark.com/customer-support >

    AWS infrastructure support

    AWS Support is a one-on-one, fast-response support channel that is staffed 24x7x365 with experienced and technical support engineers. The service helps customers of all sizes and technical abilities to successfully utilize the products and features provided by Amazon Web Services.

    Product comparison

     Info
    Updated weekly
    By BeyondTrust Corporation
    By Barracuda Networks

    Accolades

     Info
    Top
    25
    In Application Development, Monitoring, Security
    Top
    10
    In Financial Services
    Top
    100
    In Infrastructure as Code

    Customer reviews

     Info
    Sentiment is AI generated from actual customer reviews on AWS and G2
    Reviews
    Functionality
    Ease of use
    Customer service
    Cost effectiveness
    19 reviews
    Insufficient data
    Positive reviews
    Mixed reviews
    Negative reviews

    Overview

     Info
    AI generated from product descriptions
    Privileged Access Control
    Implements role-specific least privilege access management across on-premises and cloud environments
    Authentication Workflow
    Supports secure standing access and Just-in-Time/Zero Standing Privileges authentication mechanisms
    Credential Management
    Provides industry-leading capabilities for managing, isolating, and monitoring privileged access credentials
    Vendor Access Security
    Enables passwordless, biometric-based authentication for external vendors and third-party contractors
    Threat Detection
    Offers detection capabilities for identifying and mitigating potential misuse of privileged access
    Identity Threat Detection
    Advanced discovery and intelligence system for detecting identity-based threats across infrastructure
    Privileged Access Management
    Comprehensive control and management of privileged passwords, accounts, credentials, and sessions for human and machine identities
    Remote Access Security
    Granular control, management, and auditing of privileged remote access for employees, vendors, developers, and cloud operations engineers
    Endpoint Privilege Control
    Dynamic least privilege enforcement across Windows, macOS, Linux, and mobile platforms to prevent malware and unauthorized access
    Cloud Entitlement Management
    Cross-cloud visibility of access permissions, detection of account permission anomalies, and guidance for privilege optimization
    Zero Trust Access Model
    Implements a dynamic access control framework based on continuous verification of user and device identity before granting resource access
    Multi-Cloud Resource Protection
    Provides secure access across AWS, on-premises, and multi-cloud environments without traditional VPN infrastructure
    Contextual Access Control
    Applies granular access rules and conditions that dynamically evaluate user and device trust before permitting workload access
    Identity Verification Mechanism
    Requires accessing entities to prove their authorization through comprehensive authentication and validation processes
    Remote Access Security Framework
    Enables secure, conditional access to corporate applications and cloud workloads with reduced attack surface exposure

    Contract

     Info
    Standard contract
    No
    No
    No

    Customer reviews

    Ratings and reviews

     Info
    4
    1 ratings
    5 star
    4 star
    3 star
    2 star
    1 star
    0%
    100%
    0%
    0%
    0%
    1 AWS reviews
    |
    130 external reviews
    Star ratings include only reviews from verified AWS customers. External reviews can also include a star rating, but star ratings from external reviews are not averaged in with the AWS customer star ratings.
    Atul-Gujar

    Secures critical infrastructures with essential user session audit records

    Reviewed on Sep 02, 2025
    Review from a verified AWS customer

    What is our primary use case?

    We are working with CyberArk solutions such as PAM on-premises. We are working with CyberArk Privileged Access Manager , including AIM, PSM, and PSMP components. 

    How has it helped my organization?

    The ability of CyberArk Privileged Access Manager to safeguard financial service infrastructure is important; without it, banking and financial clients cannot secure their operations. Despite various attacks affecting other companies, CyberArk's implementations ensured that we remained unaffected.

    CyberArk Privileged Access Manager has been helpful in managing over 125,000 privileged accounts in a single environment for our client, and we have multiple CyberArk environments for different clients with different numbers of accounts. CyberArk Privileged Access Manager is excellent at helping companies meet regulatory requirements due to its ability to cater to the specific needs of clients across different countries, ensuring compliance without data transfer issues.

    What is most valuable?

    CyberArk Privileged Access Manager provides security and video recording of user sessions for audit purposes. This feature is critical in financial sectors where auditing who performed specific actions is essential. Having video records adds a layer of proof and ensures compliance with audit requirements.

    The key feature of CyberArk Privileged Access Manager is that it's a comprehensive package rather than just dependent on components such as Vault or Privileged Session Manager. Each component is necessary, and the Vault is the heart of CyberArk; everything connects via PSM and PSMP. I particularly appreciate PSM and PSMP because they simplify troubleshooting and charging.

    What needs improvement?

    A potential area for improvement is enhancing support for cluster environments and distributed Vaults. Clients in multiple countries that need central access have different challenges that require better solutions from CyberArk.

    For financial services, CyberArk can improve incident response by ensuring fast support for critical priority tickets to meet compliance requirements. Providing more documentation on CyberArk is recommended for new team members to enhance their troubleshooting capabilities. I understand it's up to the client, but 99% fail to change the demo key, so it's crucial for CyberArk to emphasize changing the key and documenting it as part of the installation process.

    For how long have I used the solution?

    I have been working with CyberArk Privileged Access Manager for more than nine years.

    What do I think about the stability of the solution?

    For stability, I would rate CyberArk Privileged Access Manager a nine out of ten.

    What do I think about the scalability of the solution?

    I would rate the scalability of CyberArk Privileged Access Manager as a nine.

    How are customer service and support?

    Regarding technical support from CyberArk, while L2 and L3 teams are effective, L1 support requires improvement due to longer response times in critical situations. Coordination with higher support levels sometimes takes longer than expected, which should be addressed.

    How would you rate customer service and support?

    Positive

    How was the initial setup?

    After implementing CyberArk Privileged Access Manager, it typically takes about four to five months for a company to realize time to value, assuming they have a strong implementation team and infrastructure in place.

    What about the implementation team?

    Integrating CyberArk Privileged Access Manager is very simple due to the provided connectors for Windows and UNIX, as well as plugins for databases. Custom integrations may take longer, around one month, due to development requirements.

    What's my experience with pricing, setup cost, and licensing?

    Regarding costs, CyberArk Privileged Access Manager is not a cheap product; hence, many companies struggle with its high licensing cost. While it's valuable, it comes with a high price tag, making it hard for every company to afford it.

    Which other solutions did I evaluate?

    After comparing with other products, I find that no other product currently matches CyberArk's performance; the performance issues in alternative solutions make them less desirable. While there are competitors, I cannot definitively name one that compares with CyberArk Privileged Access Manager.

    What other advice do I have?

    The requirements for CyberArk, particularly in India, have evolved significantly since the company acquired several businesses in 2014. Every organization needs an identity and access management (IAM) and privileged access management (PAM) solution. CyberArk stands out as the leading product in this category. While there are other protocols available in the market, CyberArk is known for its security, reliability, and user-friendly access.

    In my experience working with multiple companies and clients using CyberArk, I have not encountered any cases of breaches or malicious activity associated with the platform. This track record provides a strong sense of security and assurance regarding CyberArk’s capabilities. Although the privileged access management solution can be costly, it offers extensive security features, including multi-factor authentication (MFA). Overall, CyberArk is an excellent product for organizations seeking robust security solutions.

    Regarding granularity of PAM controls in CyberArk Privileged Access Manager, it means having centralized control in the Vault. Standalone CyberArk Vaults perform best compared to cluster systems, which present challenges during maintenance or network connectivity issues.

    Overall, I would rate CyberArk Privileged Access Manager a nine out of ten.

    Which deployment model are you using for this solution?

    On-premises
    Sourabh Patidar

    Granular control provides compliance and automates credential security

    Reviewed on Aug 28, 2025
    Review provided by PeerSpot

    What is our primary use case?

    Mainly, I use the CyberArk Privileged Access Manager  for securely storing and managing the credentials, and its main features include the Password Vault and automatic password rotation.

    What is most valuable?

    The granularity of the controls in the CyberArk Privileged Access Manager  is good; they have provided compliance which is required, helping us in auditing and reducing the risk of insider misuse of credential theft while also saving time for the IT guys with automating password rotations.


    It's a valuable tool. The main function is securing data from theft and saving all the passwords in the same place, as the whole organization's main API endpoints are stored here.

    The feature I appreciate the most about the CyberArk Privileged Access Manager is the secure data, which acts as a centralized store where credentials are securely stored.

    What needs improvement?

    The interface of the CyberArk Privileged Access Manager could be smoother, and the GUI could be more user-friendly and modern.

    For how long have I used the solution?

    I have been using the CyberArk Privileged Access Manager for one year.

    What do I think about the stability of the solution?

    I have not really seen any lagging, crashing, or downtime with the stability of the CyberArk Privileged Access Manager.

    How are customer service and support?

    I have contacted their technical support and customer support a couple of times, and the quality and speed are good. The service is great.

    How would you rate customer service and support?

    How was the initial setup?

    When I first started using the CyberArk Privileged Access Manager, it was easy to learn how to use it. It's a simple and straightforward tool. It took me approximately three days to fully learn how to use the CyberArk Privileged Access Manager, which is less than a week.

    Which other solutions did I evaluate?

    I have not tried using any alternatives to the CyberArk Privileged Access Manager.

    What other advice do I have?

    On a scale from 1 to 10, I would rate the CyberArk Privileged Access Manager overall as 9.5.

    Surajit-Sutradhar

    Protects financial infrastructure with credential security and audits while continuously recording sessions

    Reviewed on Aug 19, 2025
    Review provided by PeerSpot

    What is our primary use case?

    We use CyberArk Privileged Access Manager  for least privilege and accountability purposes, while we also utilize the EPM solution for endpoint protection. Additionally, PTA is one of the most important tools from CyberArk Privileged Access Manager , which we use on a real-time protection basis. CyberArk Privileged Access Manager effectively prevents attacks on the financial service infrastructure, as we protect against lateral movement, credential stuffing, and since no passwords are available because they are rotated through CyberArk Privileged Access Manager, we can isolate every session and record all activity while monitoring in real-time.

    What is most valuable?

    The ability of CyberArk Privileged Access Manager to safeguard the financial services infrastructure by protecting credentials is extremely important, as every activity in a financial organization needs to be recorded for accountability in auditing. Therefore, CyberArk Privileged Access Manager is a crucial tool, and we utilize credential rotation as 85% of successful attacks in the last 10 years have been initiated through credential theft. Monitoring, recording, and credential rotating activities are crucial because if CyberArk Privileged Access Manager goes out of service, the total environment would collapse due to the lack of passwords for respective servers.

    What needs improvement?

    While I cannot suggest major changes, I did encounter a vulnerability concerning RADIUS blasts, which was recently mitigated by CyberArk Privileged Access Manager in their latest version, indicating an area for improvement in vulnerability assessments. Improvements in vulnerability assessment are essential. A notable request I have regarding CyberArk Privileged Access Manager is to address the issues of database corruption identified in cluster environments experienced by multiple clients.

    For how long have I used the solution?

    From 2021 to now, I have been working on CyberArk Privileged Access Manager.

    What do I think about the stability of the solution?

    I have not experienced any stability issues with CyberArk Privileged Access Manager.

    What do I think about the scalability of the solution?

    It is easy to scale.

    How are customer service and support?

    In terms of technical support, CyberArk Privileged Access Manager has provided excellent support without any doubt. Based on the issue resolution and support quality, I rate the support 10 out of 10.

    How would you rate customer service and support?

    Which solution did I use previously and why did I switch?

    Before using CyberArk Privileged Access Manager, I did not evaluate any other PAM tools.

    How was the initial setup?

    Setting up CyberArk Privileged Access Manager is not complex, especially if you properly follow the recommendations from CyberArk.

    What about the implementation team?

    I handled the deployment myself.

    What was our ROI?

    CyberArk Privileged Access Manager has been very effective in helping my company meet compliance and regulatory requirements. Implementing CyberArk Privileged Access Manager saved time on compliance requirements in finance, typically around one hour.

    What's my experience with pricing, setup cost, and licensing?

    There has been no reduced cost associated with CyberArk Privileged Access Manager, as when it is required, you must pay for their licensing and prepare the full environment. While there are costs for the licensing of CyberArk Privileged Access Manager, it definitely provides value when I need any accountability or session recording.

    What other advice do I have?

    CyberArk Privileged Access Manager is one of the most important components from CyberArk, along with EPM (Endpoint Privilege Manager ) and PTA (Privileged Threat Analytics tool). I recommend anyone considering CyberArk Privileged Access Manager to view it as a friendly environment, as it stands out among the other PAM solutions I have encountered. CyberArk Privileged Access Manager is highly recommended for its user-friendly nature. I rate CyberArk Privileged Access Manager a ten out of ten.

    Which deployment model are you using for this solution?

    On-premises
    Kingshuk S.

    Privilege Access Managed Environment Vulnerabilities

    Reviewed on Aug 09, 2025
    Review provided by G2
    What do you like best about the product?
    Integration with tools
    One of the best tools for PAM and functionality it has to integrate with multiple critical platforms gives us one of key controls
    What do you dislike about the product?
    Complex architecture design which needs to be established
    Challenges in Operations
    What problems is the product solving and how is that benefiting you?
    Restrict Privilege Access to various critical platform and helps us govern privilege user access management. Audit recording capabilities of sessions and providing just in time access with what is required and when access is required
    Manuel Carrillo

    Privileged access management achieves full control with comprehensive features

    Reviewed on Jul 25, 2025
    Review provided by PeerSpot

    What is our primary use case?

    For CyberArk Privileged Access Manager , use cases are providing just-in-time privileged access. The most simple use case is hosting all privileged credentials in a secure manner and managing and controlling access to those credentials. Therefore, controlling access to privileged endpoints is the usual thing that will be done with PAM.

    What is most valuable?

    CyberArk Privileged Access Manager  has several valuable features. The basic feature is privileged access management with all the processes and procedures that are needed. It has all the relevant features required to provide a PAM project or PAM program. It does everything that is needed. A tangible benefit is that we already have full control of privileged access. We have just started and have onboarded all privileged accounts into the system.

    What needs improvement?

    I have noticed areas of CyberArk Privileged Access Manager that could be improved or enhanced in integration with automation tools. It's not quite the same in the cloud, the Privilege Cloud version. The on-premises version allows users to do absolutely everything. When they took it to the cloud, they started cutting things out. The other issue with CyberArk is that they are marketing their new product, SIA, which is based on Privilege Cloud. Users still need to have Privilege Cloud to achieve the same level of functionality as the on-premises version.

    We are still early in the roadmap and haven't progressed far enough to identify additional needs. When organizations reach the end of their maturity roadmap, they can better identify specific tool requirements that aren't currently available.

    For how long have I used the solution?

    We have been deploying CyberArk Privileged Access Manager for two years now and counting.

    How are customer service and support?

    The evaluation of customer service and technical support for CyberArk Privileged Access Manager depends on several factors. When receiving support directly from CyberArk, they are the most knowledgeable, though they don't always have immediate solutions as they might need to create them, which can take considerable time. For instance, the Ansible  integration for the cloud version has been requested for years.

    When working with CyberArk partners for support, it's crucial to ensure they have actual knowledge and aren't just acting as middlemen. There have been instances where third parties are hired to provide first and second line support, but they simply forward requests to CyberArk without adding value to the process.

    How would you rate customer service and support?

    What about the implementation team?

    We used a deployment partner recommended by CyberArk for the deployment and maintenance process. One crucial step that should be done first is creating an inventory of how privileged access is currently handled and where it is needed. Without this inventory, you might deploy CyberArk and realize it doesn't work with your existing architecture or infrastructure.

    Our implementation team consisted of approximately 15 people, including architects, engineers, application owners, network specialists, Windows and Linux administrators, database administrators, and cloud specialists. While maintenance requires fewer people, input from all these stakeholders is crucial for successful implementation as they each have different requirements.

    Most importantly, this needs to be a management-driven initiative with a top-down approach. Management must establish new working methods, as the biggest barrier to acceptance is typically resistance to changes in working procedures.

    For ongoing operations, the staffing requirements depend on the company's operations. Typically, 24/7 coverage requires at least three people per shift in a follow-the-sun model. This accounts for first and second line support only, with additional staff needed for server maintenance, totaling around nine people.

    What other advice do I have?

    The primary problem addressed by implementing CyberArk Privileged Access Manager is the lack of control over privileged access - where it happens, how it occurs, and what is done with that access. When attempting to attack an enterprise, attackers target the highest-privilege credentials available. Therefore, protecting the most critical credentials within your organization is essential.

    For those planning to deploy CyberArk Privileged Access Manager, it's crucial to understand that it's a multi-year program. It's not just about deploying the tool; it needs policies and governance around it. Additionally, infrastructure modifications are necessary to ensure PAM is the only way to provide privileged access to endpoints.

    It's a great product that does everything required from a PAM tool. I would rate CyberArk Privileged Access Manager as a nine out of ten.

    View all reviews