Overview
Product Information on CyberArk Privileged Access Manager
What is CyberArk Privileged Access Manager?
CyberArk Privileged Access Manager Pricing
Overall experience with CyberArk Privileged Access Manager
“CyberArc PAM Delivers Strong Security and Compliance, but Requires Careful Planning and Administration”
“CyberArk - Plan accordingly ”
About Company
Company Description
Focusing on Identity Security, CyberArk is a specialist in privileged access management. It develops secure solutions for diverse identities - human or machine to cater to numerous business applications. The company ensures protection across varied work environments like distributed workforces, hybrid cloud workloads, and throughout the DevOps lifecycle. CyberArk's primary objective is to avert cyberattacks that abuse insider privileges and pose a threat to crucial enterprise assets. In addition to this focus, the company offers security solutions aimed at preventing the progression of cyber threats, thus protecting businesses from substantial damage. CyberArk's security solutions align with rigorous compliance and audit requirements to service businesses' need to guard their most valued possessions. The company has a global presence with offices spread across countries like the U.S., Israel, U.K., Singapore, Australia, France, Germany, Italy, Japan, Netherlands, and Turkey.
Company Details
Key Insights
A Snapshot of What Matters - Based on Validated User Reviews
User Sentiment About CyberArk Privileged Access Manager
Reviewer Insights for: CyberArk Privileged Access Manager
Deciding Factors: CyberArk Privileged Access Manager Vs. Market Average
Performance of CyberArk Privileged Access Manager Across Market Features
CyberArk Privileged Access Manager Likes & Dislikes
Highly secure privileged credential management capabilities, session isolation, rotation and secure vaulting are all reliable to a large extent. Privileged session recording and auditing contribute to the existence of detailed visibility that allows compliance and investigation. Ability to grow and integrate: This solution is also compatible with external security products, security tools for on-prem environments, and different types of cloud security technologies.
Read Full ReviewSecurity First Architecture for the end user is what I do like, but unfortunately the journey has been very long in the implementation phase which is what lets this product down. Remote access, when it works, is smooth, there's not much latency. Future updates look good with AI driven analytics and TDR.
Read Full Review1. the seamless integration 2. The granular access controls 3. The intelligent credential management.
Read Full ReviewSetting up for the first time is complicated, a proper and effective usage needs a great amount of work and the expert knowledge of the user. The user interface is functional, however it might be somewhat less user-friendly, particularly if compared to the latest PAM competitors. Continuous administrative costs managing the software in different aspects such as upgrades, onboarding accounts and policies is a very lengthy process
Read Full ReviewConfigurations can vary (on premise, cloud, LDAP etc). CA didn't initially offer best practices or tell us some of those don't work with password rotations etc. Check ins are a major pain with the teams due to needing an admin user to manually check them out. 365 logins don't work for us. It just takes us to our tenant due to browser addons being blocked on our company.
Read Full Review1. Their costs can spiral out of control if you do not understand your own budget and what you can afford. 2. Integration - please have someone experienced with you, it was easy because we had someone with prior knowledge of the tools. 3. Learning Curve, and that plays on the previous one, with some of our new engineers, it took a bit to get up to speed on how to use it, but with the knowledge-based articles and the community, it helped to get them up to speed faster.
Read Full ReviewTop CyberArk Privileged Access Manager Alternatives
Peer Discussions
CyberArk Privileged Access Manager Reviews and Ratings
- Senior Technical Lead50M-1B USDIT ServicesReview Source
CyberArk - Plan accordingly
Customers want a PAM solution, so we looked at Cyber Ark to reduce the risks associated with privilege sprawl. It provides advanced auditing, video recording and credential rotation capabilities that are intended to add value to a secure by design methodology. The journey thus far has been mixed. While the platform offers strong features, there are technical gaps. Password rotation only works in specific setups - don't expect it to work with all configurations. If you use scanners or zealot firewalls in your own environment, expect some features such as 365 access etc to not work as it requires an add-on in your browser which most environments will look to block. Check-ins and check-outs don't work reliably. Administrators have to constantly unlock accounts, even while following best practices. Support is okay - they do help but to a point, as if it's hosted on your own environment they can't help as much. When it does work, and in the right setups (PAM servers hosted locally in the customer's environment), it works fine for the most part (minus check in/outs). - NETWORK AND SECURITY ENGINEER<50M USDIT ServicesReview Source
CyberArc PAM Delivers Strong Security and Compliance, but Requires Careful Planning and Administration
We have been using CyberArk PAM to handle credentials and secure our privileged accounts through our hybrid architecture and the platform has been dependable. It also minimized the hazards linked to unlawful access and improved compliance readiness to a great extent. - AVP, IT Security and Risk Management1B-10B USDBankingReview Source
Implementation Achieves Security and Scalability Despite Integration and Cost Challenges
Overall experience was rewarding, and they exceeded expectations. From the first call until the end of the implementation, the team was right there and was ready and willing to assist in any way we needed. The procurement process was smooth and transparent, and the licensing was something that we were able to work through as well as ensure it was in the budget. The implementation was a standout success. We worked with the deployment specialist as well as with our internal teams and were able to securely roll it out, as well as make sure it was scalable. Our admins were quickly able to get up to speed with the help of the resources and knowledge-based articles. I will say that there were a few hiccups that happened, but with all the teams coming together for a quick call/chat, they were resolved without issues. So far with post-deployment, it has been successful, and it was made immediately clear that the users loved it and its ease of use. Of course, they did not like having the additional steps, but we made sure they were comfortable and understood the need for the change. - Manager, IT Security and Risk Management50M-1B USDIT ServicesReview Source
CyberArk PAM Offers Robust Features but Faces Usability and Integration Challenges
Good Experience working with CyberArk PAM, we encountered multiple challenges during the implementation of the product. - Information Security Administrator II50M-1B USDHealthcare and BiotechReview Source
CyberArk Effective Privileged Account Management
I brought CyberArk on 13 years ago and it has been a great product to work with. We manage all of our service accounts and local server accounts successfully.



