CyberArk is a good, profitable, and most valuable solution.
Privileged Access Management
CyberArkExternal reviews
External reviews are not included in the AWS star rating for the product.
A stable and profitable solution for privileged access
What is our primary use case?
What is most valuable?
While testing the functionality of PAM, we weren't merely conducting a standard PAM evaluation. We aimed to establish a connection and successfully received a response from the target PAM component.
What needs improvement?
The product’s pricing could be improved.
For how long have I used the solution?
I have been using CyberArk Privileged Access Manager as a partner and implementor.
What do I think about the stability of the solution?
The product is stable. If you make some changes or something, it's stable.
What do I think about the scalability of the solution?
The solution is scalable. We cater it to enterprise businesses.
How are customer service and support?
Customer support takes too much time to provide some response. When you open some cases, sometimes it takes one or two weeks to get some people to know the problem and how they will help us.
How would you rate customer service and support?
Neutral
How was the initial setup?
The initial setup takes a few days to complete.
I rate the initial setup a six out of ten, where one is difficult and ten is easy.
What's my experience with pricing, setup cost, and licensing?
The product is expensive.
I rate the product’s pricing a seven out of ten, where one is cheap and ten is expensive.
What other advice do I have?
Overall, I rate the solution a nine out of ten.
Reduces organizational risk with password vaulting, password rotation, session management, and secret management
What is our primary use case?
We use the solution for password vaulting, password rotation, session management, and secret management.
What needs improvement?
CyberArk Enterprise Password Vault must incorporate connectors for password and session managers in the marketplace.
For how long have I used the solution?
I have been working with the product for seven years.
What do I think about the stability of the solution?
The product is highly stable.
What do I think about the scalability of the solution?
CyberArk Enterprise Password Vault is highly scalable. My company has over 3000 users. We use it regularly.
How are customer service and support?
CyberArk Enterprise Password Vault's support quality is good, but there are delays.
How would you rate customer service and support?
Neutral
How was the initial setup?
I rate the tool's deployment an eight out of ten. Experienced engineers can complete the deployment in a few days. We need three to four resources to complete the deployment.
What was our ROI?
CyberArk Enterprise Password Vault reduces risks.
What's my experience with pricing, setup cost, and licensing?
I rate the tool's pricing an eight out of ten.
What other advice do I have?
I rate CyberArk Enterprise Password Vault a nine out of ten.
CyberArk is a Identity and access management tool which used managed user and & account.
Resource and administration costs are less but support needs to improve knowledge and quality
What is most valuable?
The accounts are maintained automatically. Hence, resource and administration costs are less.
What needs improvement?
CyberArk Enterprise Password Vault's deployment is complex for resources with little experience. Tech support needs to be improved as well based on quality and knowledge.
For how long have I used the solution?
I have been working with the product for more than five years.
What do I think about the stability of the solution?
The product is very stable.
What do I think about the scalability of the solution?
CyberArk Enterprise Password Vault is scalable.
How was the initial setup?
CyberArk Enterprise Password Vault's deployment can be done with two to three resources.
What other advice do I have?
I rate the solution a nine out of ten.
The definitive solution for Privileged Access Manager
Great session management, password management, and temporary access capabilities
What is our primary use case?
We use CyberArk to secure the last resort accounts by introducing dual control approval, ticket validation, temporary access, and regular password rotation.
It also allows us to introduce location-aware access controls with multiple sites having access to specific location-protected content.
Finally, the session management capabilities allowed us to introduce delegated accounts to secure access to all sorts of devices in an easy way, but without losing the individual traceability.
How has it helped my organization?
It allows us to comply with the regulator requirements allowing us to operate in the different countries and to fulfil the security and compliance requirements.
In the end, it secures all the highly privileged accounts and protects the company from internal and external threat actors.
The solution is multifaceted and includes session management, password management, temporary access, ticketing validation, API access, single sign-on integration, load balancing, and high availability principles.
What is most valuable?
The credentials management capability is key to ensuring that the credentials are kept secure and that access to them is done on a temporary and event-driven basis.
The session isolation reduces the risk of exposure of the credentials and applying simpler network controls.
Web access allows the introduction of location-aware controlled access so that different locations can only access the data that is allowed to be retrieved from their sites allowing centralisation but fulfilling the regional requirements.
What needs improvement?
The product is very vaulting-focused. I'd love to see it expanding its capabilities a bit further into areas like just-in-time elevation, and access with non-vaulted credentials.
The upgrade options are good but could be further simplified.
The high availability options could be improved, and the load distribution as well for both the vaults and the credentials managers.
The web interface should allow having multiple sites for location-aware access control within the same web server.
For how long have I used the solution?
I've used the solution for more than ten years.
Scalable, reliable, fully fledged and highly customisable
Can be deployed in hybrid self-hosted on-prem and private cloud environments.
Supports the cross-border restrictions by allowing the deployment of as many satellites as required.
However for business as usual tasks it's better to implement fine grained just in time solutions.
To cover all the security use cases, it has to be combined with additional solutions like CyberArk Identity or CyberArk Conjur.
Agentless temporary access with password based accounts (Quite useful in those scenarios where agents cannot be implemented, or when temporary access elevation is not an easy to implement option).
Good reporting and MFA with easy integration capabilities
What is our primary use case?
In my organization, we are using CyberArk Privileged Access Manager to enhance the security of an organization's critical systems, mainly by securing privileged accounts (e.g. administrator passwords, SSH keys, and API tokens).
We are also using Cyber-Ark for access control by ensuring that only authorized personnel can access privileged accounts and sensitive systems.
very important for us is also Session Recording and Monitoring. We can record and monitor privileged user sessions in real time for auditing purposes.
How has it helped my organization?
CyberArk Privileged Access Manager significantly improved our organization's security. Mainly, it has enhanced our ability to secure privileged accounts. Centralized management of identities ensures that credentials are stored securely. Also, the automated rotation of passwords reduces the risk of leaks.
The session recording feature adds great value and helps with auditing administrative activities.
CyberArk PAM can be easily automated, which saves a lot of time and administrative effort.
What is most valuable?
For our organization, the most valuable features of CyberArk PAM are:
- Credential Management. The automation of the retrieval and injection of credentials into sessions, and automation of password rotation.
- Session Recording. It gives us the possibility to record privileged user sessions for auditing and compliance purposes.
- Ease of integration. CyberArk can by integrated with multiple systems and applications.
- The possibility of using Multi Factor Authentication (MFA) which increases security
- Reporting module. This allows us to generate reports based on session activity
What needs improvement?
Cost management. There should be more models and licensing plans for this software. They should also be flexible, allowing you to purchase selected features at a favorable price.
User Experience. The current interface is OK, however, sometimes it is not very intuitive. There is also no possibility of advanced modification and adaptation to your own needs and requirements.
Performance. The performance of the application could be a bit better, especially in the case of remote sessions - delays in remote sessions can be annoying.
For how long have I used the solution?
I've used the solution for about five years.