Sign in
Categories
Your Saved List Become a Channel Partner Sell in AWS Marketplace Amazon Web Services Home Help

Reviews from AWS customer

1 AWS reviews
  • 5 star
    0
  • 1
  • 3 star
    0
  • 2 star
    0
  • 1 star
    0

External reviews

130 reviews
from and

External reviews are not included in the AWS star rating for the product.


    Narasimha M.

Best tool for remote access management

  • July 24, 2024
  • Review provided by G2

What do you like best about the product?
I like the way we can securely connect to the servers and perform the activity without worrying about the cyberattacks or security threats and the implementation is also very easy
What do you dislike about the product?
Sometimes I felt could not connect to any servers after logging into MFA with SSO. It says username or password is incorrect
What problems is the product solving and how is that benefiting you?
Connecting to servers securely and without worrying about sharing credentials to anyone


    JAVEED AKTHAR S.

CyberArk is a one Stop solution for all Privilege access management related services

  • June 01, 2024
  • Review provided by G2

What do you like best about the product?
CyberArk is a SAAS based application which is used to manage all privilege application, Vaulting of secrets and other services
What do you dislike about the product?
The password rotation is bit need improvement compared to other privilege access management tools such as Delinea/Thycotic secret servers
What problems is the product solving and how is that benefiting you?
It is benifits.e to password voluting and secret creation


    Carlos Augusto C.

Helps to store password and do authentication

  • May 13, 2024
  • Review provided by PeerSpot

What is our primary use case?

We have the identity provider for all the authentication processes. However, sometimes, we need access to different applications for customers or clients that are not integrated into the identity provider. For these, we need to store a password to gain access. For example, we use the CyberArk Password Vault for third-party services. This vault needs to be shared with many people in our company. 

This allows us to store passwords and create privileged access for some users without them needing to know the password. The system inputs the password into the endpoint URLs they use for authentication, but the users never see the password. This is crucial because people may leave the company, posing a high risk. If we had integrated it into the identity provider, we would have policies for active directory users but not for users outside the company.

For example, our development teams need to connect to databases, systems, and cloud services during development. The developers don’t get access to third-party services. We use the solution to manage this access. The application being developed and deployed integrates with CyberArk Password Vault services.

What needs improvement?

The main challenge was integrating with in-house IT and business applications, which are not standard. We needed to create special updates for that kind of integration.

For how long have I used the solution?

I have been working with the product for three to four years. 

What do I think about the scalability of the solution?

The solution is 99 percent scalable. 

How are customer service and support?

Sometimes, support is not easy because you need to share the company's architecture. Maybe they are on time, but they don't understand the specifics we're talking about. Communication can be an issue, especially when speaking with people whose first language isn't English. There can be difficulties with understanding and making sense of conversations. So, outsourcing support can sometimes be challenging.

How would you rate customer service and support?

Neutral

How was the initial setup?

CyberArk Enterprise Password Vault's deployment is complex. 

What other advice do I have?

I have been working with the new services and don't see any additional issues at this hour. The key requirement is to have people who understand not only the tool but also the concepts and how to view it from an architectural perspective. 

One problem is that people may not know how to work with the tool, and another is that they don't understand the concepts. So, I think focusing on proof of concepts is good. For example, what I do at first is request information for identity providers and key management services.

I rate the overall solution a nine out of ten. 

Which deployment model are you using for this solution?

Public Cloud


    UmeshKumar4

Offers password rotation and makes session recordings compulsory for data protection

  • May 10, 2024
  • Review provided by PeerSpot

What is our primary use case?

I use the solution mainly for credential tasks. For instance, if the company I work for has recent data stored in a privileged report and needs security from cyber attackers, CyberArk Privileged Access Manager is used. The solution helps provide access only to authorized users and rotate passwords every sixty or ninety days. CyberArk Privileged Access Manager also allows the configuration of the password either manually or automatically. 

In our organization, Privileged Session Managers (PSM) assist in recording sessions of a particular server using the solution. The product allows users to utilize different permissions, such as end-user, auditor, and administrator permissions. For CyberArk Privileged Access Manager, administrators have the major access to implement tasks like creating, changing, rotating the password and adding new users. 

What is most valuable?

The most valuable feature of this tool is the password rotation feature. Another vital feature of the solution is the Safe feature, which acts as a container. Only accounts included within the Safe can access a particular server. 

The solution allows the distinguished use of PSM and PSMP for a Windows and Linux server, respectively. The tool makes all session recordings compulsory and cannot be tampered with. It also eliminates hard-coded credentials and supports demand-based applications.  

CyberArk is very popular and provides a lot of features compared to competitors' PAM tools, which is why many customers are migrating to CyberArk's Privileged Access Manager. 

What needs improvement?

The solution should be able to completely mitigate internal threats. For instance, if an employee of a company saves the CyberArk passwords in a system, then another employee might be able to use it and log in, so there remains an internal threat when using the solution.  

The feature of giving user access through a Safe should be modified. The solution should allow users access directly through an account, and the Safe concept needs to be improved. 

For how long have I used the solution?

I have been using CyberArk Privileged Access Manager for the past two years. 

What do I think about the scalability of the solution?

In my organization, about ninety to one hundred people are using CyberArk Privileged Access Manager. 

How was the initial setup?

It's easy to setup and install CyberArk Privileged Access Manager. Multiple components need to be installed for the solution. Often, the PVWA, PSM, and CPM need to be installed. If an organization has a Linux account, then PSMP needs to be installed for using the solution. While installing the solution, the Vaults need to be defined, if it's a standalone Vault or a cluster Vault. A cluster Vault is mostly implemented for disaster recovery to replicate data when something happens to the main Vault. 

What's my experience with pricing, setup cost, and licensing?

CyberArk Privileged Access Manager comes at a high cost. But the solution is worth its price. 

What other advice do I have?

I would recommend the solution to others depending on their goals. If the aim is to protect an organization's data and use PAM, then one should use CyberArk Privileged Access Manager. If the goals include detecting malicious activity, onboarding privileged accounts, and maintaining data accounts, then an organization should adopt the solution.   

I have used the solution's session monitoring capabilities to monitor user activities. The solution's session monitoring feature can be useful for monitoring a user while the person logs in or performs other molecular activities.  

CyberArk Privileged Access Manager is difficult and time-consuming to learn in comparison to other IAM tools. There are multiple components, like the vault, that need to be understood before using the solution. But basic administrator tasks like onboarding accounts and rotating passwords will be easy for a beginner user of CyberArk Privileged Access Manager. A beginner-level user of the solution may face challenges with secret rotating, management and AIM handling.  

I would rate CyberArk Privileged Access Manager an eight out of ten. 

Which deployment model are you using for this solution?

On-premises


    Thang N.

CyberArk PAM is the strongest PAM I've ever tried.

  • April 07, 2024
  • Review provided by G2

What do you like best about the product?
CyberArk capabilities to manage authentication is really strong. It can help every enterprises to setup complex rules to manage the session & also monitor it.
What do you dislike about the product?
CyberArk redundancy is hard to manage. Sometimes you need to manually bring it up after a failure.
What problems is the product solving and how is that benefiting you?
It can manage authentication, helping us to implement 2FA to secure the authentication - the most common attack surface.


    Américo Silva

Passwords are stored securely within the vault and eliminates the need for users to store passwords in less secure locations

  • March 25, 2024
  • Review provided by PeerSpot

What is our primary use case?

Primarily, I import accounts from our critical systems.  

How has it helped my organization?

Knowing that our passwords are stored securely within the vault has been a big improvement. It eliminates the need for users to store passwords in less secure locations.

We want to integrate it with our IT service management platform and our SOC solution, but that's a future project.

What is most valuable?

The password protection itself is the most important feature. It's something we didn't have before.

Moreover, the interface is intuitive. It is clear and user-friendly. 

What needs improvement?

The session monitoring and recording feature is also a good feature feature, but we're currently experiencing an issue with session monitoring not working correctly. We're working with CyberArk to resolve it.

We aren't able to view active sessions or historical recordings of sessions.

It is complex, which is something I know CyberArk is working on. They're trying to simplify certain administration tasks because a common critique is the level of complexity. But overall, we can do everything we need with it.

So, CyberArk could still focus on making it more user-friendly.

For how long have I used the solution?

I have been using it for a year. 

What do I think about the scalability of the solution?

So far, we haven't had any scalability problems.

We have around 50 licensed users – primarily administrators. We currently manage about 5,000 accounts with CyberArk.

How are customer service and support?

Sometimes, the initial response time is a bit slow, but once the customer service and support take on a case, they resolve issues quickly.

How would you rate customer service and support?

Positive

What about the implementation team?

CyberArk handled the primary setup tasks. We worked with a partner to implement additional components and now have the knowledge to manage the solution ourselves.

The implementation process took around eight months. 

What was our ROI?

There has been an ROI. 

We expect to see a full return on investment within the next three years. This was part of our long-term security plan.

What's my experience with pricing, setup cost, and licensing?

It is expensive, but the cost is justified considering the security it provides. Compared to other solutions, it is costly. We have not tried other solutions, but the price is high. 

We only license Password Vault.

Which other solutions did I evaluate?

My company evaluated another solution like Delinea but preferred CyberArk due to its robustness and flexibility.

I like its flexibility, while adding some complexity, allows us to fully customize the solution to our needs.

One of the main advantages is the way we can connect from outside. We use a portal that provides secure access to our systems without needing a VPN. We just scan a QR code, and we're connected. We do not need to use a password and we are in through the QR code scan. 

What other advice do I have?

I would recommend using it. Overall, I would rate the solution a nine out of ten.

It's a very complete solution for what we need.


    Deepak Sahani

Comes with automatic password rotation feature but UI and pricing needs improvement

  • February 08, 2024
  • Review provided by PeerSpot

What is most valuable?

Previously, we used to share passwords for service and normal admin accounts among team members. However, since we started managing it through the product, we've transitioned to individual admin accounts or implemented dual control for shared accounts. With dual control, exclusive checking and checkout options are available, and passwords are not stored in clear text anywhere in the credentials.

The solution's most valuable features are automatic password rotation, privilege manager, and secret manager. Previously, IT personnel had admin rights on their regular accounts, allowing them to log in to domain controllers. However, this posed a security risk as compromised accounts could grant unauthorized access to domain controllers. To mitigate this risk, we implemented separate DA accounts for IT staff. These DA accounts were restricted from logging in to domain controllers and did not have associated email addresses. They were dedicated AD accounts solely for accessing domain controllers, and the solution handled their management.

Previously, manually rotating admin credentials was a time-consuming task. However, implementing the tool's automatic password management feature has made this process easier. We've configured defined policies within the solution to dictate when these credentials should be changed.

What needs improvement?

The tool's UI has bugs and lags. It needs to be improved. The deployment process can be complex due to multiple components for various functionalities, each requiring separate infrastructure management. To simplify this process, consolidating all these components into a single platform could be beneficial. The product's pricing could be cheaper. 

For how long have I used the solution?

I have been using the product for eight to nine years. 

What do I think about the stability of the solution?

I rate the product's stability a seven out of ten. 

What do I think about the scalability of the solution?

I rate the tool's scalability a seven out of ten. 

How are customer service and support?

The tool's support gets worse each year. Support is outsourced to smaller companies, which doesn't work fine. Its support was good eight to nine years back. Over the years, it hasn't improved but degraded. 

How would you rate customer service and support?

Negative

Which solution did I use previously and why did I switch?

I work with BeyondTrust. BeyondTrust's UI and support are good and never lag. BeyondTrust is also cheaper. 

How was the initial setup?

CyberArk Enterprise Password Vault's implementation timeline largely depends on the size and complexity of the infrastructure. A smaller infrastructure with around a thousand servers can typically be implemented within a week or two. However, the implementation process may extend to four or five months for more extensive infrastructures with tens or hundreds of thousands of workstations and accounts. The tool's transition into a security-focused product necessitates strong integration with security orchestration platforms. Prebuilt packages with ready-made integrations are required instead of developing everything from scratch. It lags in automation. 

What was our ROI?

We have seen 40-50 percent improvements after using the solution. 

What other advice do I have?

I rate the product a seven out of ten.


    Volodymir Kolisnyk

A stable and profitable solution for privileged access

  • January 03, 2024
  • Review provided by PeerSpot

What is our primary use case?

CyberArk is a good, profitable, and most valuable solution.

What is most valuable?

While testing the functionality of PAM, we weren't merely conducting a standard PAM evaluation. We aimed to establish a connection and successfully received a response from the target PAM component.

What needs improvement?

The product’s pricing could be improved.

For how long have I used the solution?

I have been using CyberArk Privileged Access Manager as a partner and implementor.

What do I think about the stability of the solution?

The product is stable. If you make some changes or something, it's stable.

What do I think about the scalability of the solution?

The solution is scalable. We cater it to enterprise businesses.

How are customer service and support?

Customer support takes too much time to provide some response. When you open some cases, sometimes it takes one or two weeks to get some people to know the problem and how they will help us.

How would you rate customer service and support?

Neutral

How was the initial setup?

The initial setup takes a few days to complete.

I rate the initial setup a six out of ten, where one is difficult and ten is easy.

What's my experience with pricing, setup cost, and licensing?

The product is expensive.

I rate the product’s pricing a seven out of ten, where one is cheap and ten is expensive.

What other advice do I have?

Overall, I rate the solution a nine out of ten.

Which deployment model are you using for this solution?

On-premises


    reviewer1398690

Reduces organizational risk with password vaulting, password rotation, session management, and secret management

  • December 08, 2023
  • Review provided by PeerSpot

What is our primary use case?

We use the solution for password vaulting, password rotation, session management, and secret management. 

What needs improvement?

CyberArk Enterprise Password Vault must incorporate connectors for password and session managers in the marketplace.

For how long have I used the solution?

I have been working with the product for seven years. 

What do I think about the stability of the solution?

The product is highly stable. 

What do I think about the scalability of the solution?

CyberArk Enterprise Password Vault is highly scalable. My company has over 3000 users. We use it regularly. 

How are customer service and support?

CyberArk Enterprise Password Vault's support quality is good, but there are delays. 

How would you rate customer service and support?

Neutral

How was the initial setup?

I rate the tool's deployment an eight out of ten. Experienced engineers can complete the deployment in a few days. We need three to four resources to complete the deployment. 

What was our ROI?

CyberArk Enterprise Password Vault reduces risks. 

What's my experience with pricing, setup cost, and licensing?

I rate the tool's pricing an eight out of ten. 

What other advice do I have?

I rate CyberArk Enterprise Password Vault a nine out of ten. 

Which deployment model are you using for this solution?

On-premises


    Kush Kumar K.

CyberArk is a Identity and access management tool which used managed user and & account.

  • December 06, 2023
  • Review provided by G2

What do you like best about the product?
CyberArk is one the best Privilege Access Management tools which used for enable or disable access of admin credentials as per our requirement. We can easily integrate with third party application access management.
What do you dislike about the product?
CyberArk tools logout again and again and sometimes password not updated account organizational policy which setup for reset password.
What problems is the product solving and how is that benefiting you?
I am using CyberArk for managed Admin credentials access privileged and servers password management to access the organization server.