Centralized cloud access has strengthened identity control and simplified keyless logins
What is our primary use case?
CyberArk Secure Cloud Access is our primary solution for access identity management across different cloud platforms including AWS, Azure, and Google.
A specific example of how I use CyberArk Secure Cloud Access for access identity management across cloud platforms is when a developer signs in with their company identity and receives the appropriate permissions across the Azure cloud platform. Previously, the company was unable to track the changes or determine who logged into the virtual machines. CyberArk Secure Cloud Access enables access identity management that allows users to check what changes they have made, who has made changes, who has access, and audit trails can be easily tracked.
We use CyberArk Secure Cloud Access as one identity provider for cloud IAM roles and for different users. For example, a DevOps user builds pipelines that run twenty-four seven. Whenever someone updates the pipeline, runs the pipeline, or makes changes to the pipeline, it becomes easy to track who has made the changes. Another use case is that people outside of the organization cannot access the pipelines or anything deployed in CyberArk.
What is most valuable?
The best feature of CyberArk Secure Cloud Access is that private keys can be configured once and users can log in using CyberArk credentials. Instead of providing the private key every time into the system, it is not needed. With CyberArk, we do not require it and can directly use CyberArk credentials to access the virtual machines or run the pipelines.
Using CyberArk credentials instead of private keys has made things easier for our team because previously every user had to remember the private key and store it somewhere else and insert it whenever they attempted to log into the server. This was cumbersome. Instead, organizations use CyberArk to configure the private keys, which helps because it is no longer required for users to store it on their system or somewhere else to maintain security. This additionally prevents users without access to the server from logging in.
This feature of CyberArk Secure Cloud Access also reduces time and dependency on other people. Once a user is given access, they can be tracked anytime and anywhere. Access is revocable whenever people leave the organization.
CyberArk Secure Cloud Access has positively impacted our organization because we have observed many changes. One significant impact is that since implementing it, the dependency on people has drastically been reduced. Additionally, we do not need to log in or store the private keys every time as they can be automatically configured.
What needs improvement?
I do not think there are many improvements needed for CyberArk Secure Cloud Access. As of now, the configurations done to CyberArk are excellent and up to the mark.
One small thing I think could be made better or easier to use in CyberArk Secure Cloud Access is that it is continuously evolving. I do not think there are many improvements needed as it is now aligned with industry standards. As the AI generation is evolving continuously, whenever a user mistakenly provides any secure data into AI, that prevention needs to be handled in CyberArk, possibly in future scenarios.
For how long have I used the solution?
I have been using CyberArk Secure Cloud Access for the last two years.
What do I think about the stability of the solution?
CyberArk Secure Cloud Access is very stable.
What do I think about the scalability of the solution?
CyberArk Secure Cloud Access is highly scalable.
How are customer service and support?
The customer support for CyberArk Secure Cloud Access is pretty good.
How would you rate customer service and support?
Which solution did I use previously and why did I switch?
We had not used a solution previously. Once there was a breach in the organization, that is when the company attempted to implement secure access management.
When we were looking for products that provide secure access management to the organization, we moved directly to CyberArk Secure Cloud Access after the breach because we found that CyberArk is the most valued product.
We were using a single sign-on login, but that does not align with the industry standards now, which led us to choose CyberArk Secure Cloud Access.
How was the initial setup?
The experience with pricing, setup cost, and licensing for CyberArk Secure Cloud Access is that the setup cost initially will be higher as it needs to be integrated with different applications that the organization has. The initial setup cost may increase, but in the long run, that will drastically decrease.
What was our ROI?
I definitely would like to share the relevant metrics regarding the return on investment. We have seen a lot of time saved instead of saving the private keys over the system, which can be configured to CyberArk. Additionally, we have money saved in the long run on infrastructure costs. Fewer employees are needed for certain tasks, though it does require people to maintain the security policies and all those aspects that need to be upgraded every time.
What's my experience with pricing, setup cost, and licensing?
The experience with pricing, setup cost, and licensing for CyberArk Secure Cloud Access is that the setup cost initially will be higher as it needs to be integrated with different applications that the organization has. The initial setup cost may increase, but in the long run, that will drastically decrease. Additionally, pricing is aligned with industry standards.
Which other solutions did I evaluate?
Before choosing CyberArk Secure Cloud Access, we evaluated other options such as Okta single sign-on, but that does not have much value, so we chose CyberArk.
What other advice do I have?
My advice to others looking into using CyberArk Secure Cloud Access is that it is a must-go product if they want to have a secure platform and secure product, and integrate it with the different products that the organization is using or virtual machines. Whether it is a SaaS, PaaS, or IaaS, CyberArk is one of the market leaders and is a definite go. I would rate this product a ten out of ten.
Which deployment model are you using for this solution?
Private Cloud
If public cloud, private cloud, or hybrid cloud, which cloud provider do you use?
Amazon Web Services (AWS)
Best PAM based Application
What do you like best about the product?
The security of the accounts, safes or servers with user friendly GUI.
What do you dislike about the product?
More features to be added to the new GUI
What problems is the product solving and how is that benefiting you?
It is helping users secure there servers and privelege access to those servers as management application.
Good for Authentication and security Purpose
What do you like best about the product?
It's Identity User Portal which helps apps to be open from one window no need to login everytime in every other app. Also can add your mobile as authenticator device with push notifications.
What do you dislike about the product?
Nothing so far I have experienced, its working as desired.
What problems is the product solving and how is that benefiting you?
It's solving my problem to remember Login username & passwords and login URL's which is a hassle to keep some where. It's displaying every app on the portal which I can acces by single click.
Secure Your Cloud Platforms Using CyberArk Cloud Entitlements Manager
What do you like best about the product?
Cross platform support, i.e all the market leader cloud service provider is supported.
What do you dislike about the product?
Subscription model, which entitles to purchase license based on no. of workspace. Doesnt think it will help for large organisation.
What problems is the product solving and how is that benefiting you?
It actually scans my entire workspace, and gives me the insight or nalaytics of how the seurity breach can be mitigated.
It has been a very useful tool to get the production access with maximum security.
What do you like best about the product?
Its a one stop solution to all the mainframe cloud requirements without requiring to reach to higher management for approvals whenever there are changes to be implemented and also with maximum security.
What do you dislike about the product?
Nothing to dislike about this. This is the best in market right now.
What problems is the product solving and how is that benefiting you?
It is providing service to manage multicloud environments with safety.