My main use cases at the moment promote security all across the organization.

CyberArk DevSecOps
CyberArkExternal reviews
External reviews are not included in the AWS star rating for the product.
Offers seamless integration and enhances security but requires better documentation
What is our primary use case?
What is most valuable?
The features of CyberArk Secrets Management that I value the most are flexibility and the numerous integration offerings they have. It is not easy to use, but it is secure enough.
I utilize the credential rotation automation feature.
It has helped reduce human error and mitigate the risk of data breaches significantly. From a scale perspective, once configured, there is much less friction in terms of human involvement inside the procedure, which gives us much more confidence that we are getting what we wanted.
I would assess the integration capabilities of CyberArk Secrets Management with existing applications, databases, and dev tools as straightforward. It is very easy as they supported many tools we were using.
I use the audit trails for compliance purposes.
The audit trails have been extremely important for us in helping our organization meet regulatory requirements. It actually enabled us to do things that would have been impossible without it.
CyberArk Secrets Management has been able to enforce granular access controls, and that has impacted our security strategy by giving us more ability to interact with third parties knowing that CyberArk Secrets Management keeps us safe.
What needs improvement?
There is room for improvement with better documentation and less need for CyberArk Secrets Management personnel to assist us with their presence.
For how long have I used the solution?
I have been using CyberArk Secrets Management for three months.
What was my experience with deployment of the solution?
The experience of deployment had constant challenges.
What do I think about the stability of the solution?
It has been reliable so far with no downtime or crashes.
What do I think about the scalability of the solution?
It has scaled with the growing needs of my organization, but we are still in the early stages. It is hard to say, but we do see a lot of potential.
How are customer service and support?
I have had to use their customer support and technical support. We are working with the professional services now to implement the solution.
I would rate them six out of ten for customer service.
How would you rate customer service and support?
Neutral
Which solution did I use previously and why did I switch?
We were using CyberArk products prior to taking on CyberArk Secrets Management. We have multiple CyberArk products already deployed in the organization.
Which other solutions did I evaluate?
I considered Akeyless as another solution before selecting CyberArk Secrets Management.
What other advice do I have?
I would rate CyberArk Secrets Management overall a seven out of ten.
Speedy secret retrieval with monitoring boosts efficiency but documentation needs enhancement
What is our primary use case?
We use CyberArk Secrets Management for applications that utilize GitLab, CI/CD pipelines, and Kubernetes. These are our primary use cases, and we are also exploring additional options.
We implemented CyberArk Secrets Management to ensure seamless application access to the latest passwords during secret rotation, eliminating delays caused by outdated credentials. This proactive approach prevents disruptions in report execution and other critical processes, which can lead to financial losses and operational inefficiencies across various industries.
How has it helped my organization?
CyberArk Secrets Management is adaptable, but transitioning from existing secrets management products takes time. Integration is seamless for existing CyberArk PAM users, requiring minimal effort and resources. For those utilizing other solutions, migration to CyberArk is gradual, often starting with a pilot program. A key feature is the robust monitoring service, which allows for Syslog integration with SIEM solutions like Splunk, enhancing security monitoring capabilities.
CyberArk effectively safeguards our financial services infrastructure. CyberArk remains capable of performing its core functions.
It assists us in meeting compliance and audit requirements. During audits, such as SOX or others, findings often arise regarding accounts that need monitoring or remain unmanaged. By utilizing CyberArk's Privileged Access Management solution and its features, we can address these concerns and fulfill audit requirements. Consequently, by year's end, we successfully managed the targeted number of Windows and Linux accounts.
CyberArk streamlines our workflow by automating report generation. These reports, which can be extracted regularly, are sent to management for auditing purposes, enabling them to monitor our daily progress. The system also facilitates the viewing of recorded sessions and sends logs for Secrets Management, allowing for on-demand report generation.
CyberArk Secrets Management is a critical solution for strengthening our security posture. CyberArk was a strategic decision to enhance our security across all industries, not just financial services. Compliance is crucial whether a company handles financial data or any other type of critical information. Implementing CyberArk PAM, Secrets Management, and IGA is essential for achieving and maintaining compliance standards and protecting sensitive data.
We recently began implementing CyberArk Secrets Management. This solution has the potential to improve our operational efficiency.
What is most valuable?
We are currently trying to use Conjur Cloud. One of the most important features for us is the system's performance, particularly its speed of retrieving secrets.
What needs improvement?
We occasionally experience incidents that delay password injection back into the script. Additionally, we've sometimes focused on vaulting instead of actively managing passwords, which is a concern that requires further exploration.
I'm comparing the capabilities of Conjur and Secret Service with our existing products to ensure all our use cases are covered. Some features, like dynamic tokens for Azure and GCP, are already supported by other products but not yet by Conjur. Additionally, full support for GCP Secrets Manager and CyberArk needs confirmation. While Conjur has potential, implementation was complex and required professional services. Simplifying the setup process, particularly for Conjur Edge and Conjur Cloud, would be beneficial. Improving documentation, especially for daily tasks like creating safes, would make the product more user-friendly for those new to Conjur.
For how long have I used the solution?
I have been using CyberArk Secrets Management for a few months.
What do I think about the stability of the solution?
Which solution did I use previously and why did I switch?
I have experience with Hitachi ID systems, now known as Bravura Security, for PAM and application management credentials. Their orchestration and password randomization processes are different.
Which other solutions did I evaluate?
I have also evaluated HashiCorp Vault, a robust enterprise-level vault system. It's challenging to get people to adapt to new solutions like CyberArk Secrets Management. However, it will be beneficial if CyberArk continues to add features and use cases covered by other solutions.
What other advice do I have?
I would rate CyberArk Secrets Management a seven out of ten. It's important for CyberArk to continue adding features and covering more use cases.
The learning curve is easy for those with prior experience in Secrets Management. However, without the CyberArk Conjur training, the concepts were often challenging to grasp. Improving the training with demos and real-world examples based on the latest use cases would be very beneficial.
CyberArk handles maintenance for its SaaS solutions, but if components are installed in the client environment, regular maintenance, like upgrades and patching, is necessary, particularly for Windows VMs.
If public cloud, private cloud, or hybrid cloud, which cloud provider do you use?
Securely manages credentials with rotation capabilities but should have enhanced documentation
What is our primary use case?
The primary use case for CyberArk Secrets Management is rotating credentials for all service accounts, especially those managed by Puppet for file deployment. This includes rotating AWS keys and credentials used by Terraform. Additionally, we use CyberArk to rotate credentials for Bamboo, our chosen CI/CD tool.
What is most valuable?
CybereArk is vital for effectively managing and securing my credentials. The product is also scalable, so it can expand based on account types and application needs.
What needs improvement?
Improvements for CyberArk Secrets Management include enhanced documentation with more use cases and step-by-step integration guides. Thoroughly educating administrators on these aspects is crucial for successful implementation and utilization of the platform.
For how long have I used the solution?
I don't have much experience with CyberArk Secrets Management yet because it is still new. Most people on my team are conducting proof of concepts and tests.
What do I think about the stability of the solution?
So far, Secrets Management has not presented any performance challenges or issues, even though I am still expanding its scope.
What do I think about the scalability of the solution?
Scalability is a strong point. Secrets Management is scalable based on various account types and applications, allowing extensive use as needed.
How are customer service and support?
CyberArk's support team is knowledgeable and helpful, consistently responding on time. If the assigned support person is unavailable, the ticket is passed to someone else. This is a great service.
How would you rate customer service and support?
Positive
How was the initial setup?
We are finalizing the deployment of CyberArk Secrets Management. While the lower environment deployment is complete, we're facing challenges in production. Our policies require all software to be deployed via Puppet, but CyberArk lacks direct Puppet integration. To overcome this, we are working with third-party vendors to develop a solution for deploying the Conjur module to our Linux servers. This integration complexity is our current obstacle.
What about the implementation team?
For implementation, CyberArk engineers assisted me, and I was significantly involved within my team. I am now utilizing internal and external Puppet experts.
What's my experience with pricing, setup cost, and licensing?
CyberArk Secrets Management has a moderate pricing structure based on a per-tenant licensing model rather than a per-user account model like their PAM solution. This makes Conjur's cost comparatively minimal due to its one-time procurement model for modules.
What other advice do I have?
I would rate CyberArk Secrets Management seven out of ten. Conjur is complex and involves several integrations with different applications and accounts. Implementing it and ensuring seamless password rotations present challenges.
The full benefits of CyberArk Secrets Management are not yet apparent as we are still in the exploration phase of this new tool. We are working to understand its functionalities and potential applications, which are proving to be slightly challenging.
Maintenance is required and managed by administrators and engineers.