The primary use case and the most used functionality of CyberArk PAM is managing privileged access (an easy way to pass permissions to specific servers to specific users granularly) and password management (an automated solution that manages password validity, expiration, etc.). PSM gives a possibility to set all connections secure and it is possible to re-trace actions made by users during such sessions. It is a good tool for extending usage to new end targets sometimes even out of the box.
CyberSecurity Service Support Specialist at Integrity Partners
Good password management with good integrations and security capabilities
Pros and Cons
- "I like the integrations for external applications."
- "The Vault's disaster recovery features need improvement."
What is our primary use case?
How has it helped my organization?
CyberArk PAM ended a scenario where several dozens or even hundreds of privileged accounts had the same password or administrators had passwords written down on sticky notes.
I have experience with onboarding thousands of accounts - mostly Windows, Unix, and network devices. I have developed (customized based on defaults) password management plugins for Unix systems and network devices.
What is most valuable?
I like the integrations for external applications. There are actually infinite possibilities of systems to integrate with - you would just need to have more time to do that. It is not an easy job, yet really valuable. I am not an expert on that, however, I try every day to be better and better. I have the support of other experienced engineers I work with so there is always someone to ask if I face any problems. End-customers sometimes have really customized needs and ideas for PSM-related usage.
What needs improvement?
The Vault's disaster recovery features need improvement. There is no possibility to automatically manage Vault's roles and for some customers, it is not an easy topic to understand.
I noticed that CyberArk changed a little in terms of the documentation about disaster recovery failover and failback scenarios. Still, it is a big field for CyberArk developers. Logically it is an easy scenario to understand - yet not for everyone, surely.
Buyer's Guide
CyberArk Privileged Access Manager
June 2025

Learn what your peers think about CyberArk Privileged Access Manager. Get advice and tips from experienced pros sharing their opinions. Updated: June 2025.
857,028 professionals have used our research since 2012.
For how long have I used the solution?
I've used the solution for around five years. I have been using CyberArk PAM as an end customer for three years. For another two, I work as a CyberArk support specialist.
What do I think about the stability of the solution?
Stability is overall good. However, there are many error messages that are like false-positive - they do not produce any issue yet logs are full of information.
What do I think about the scalability of the solution?
The scaling has been mostly positive. It seems not hard to scale it up.
How are customer service and support?
Sometimes it is hard to understand the capabilities, limitations, etc. They try to help with that.
How would you rate customer service and support?
Positive
Which solution did I use previously and why did I switch?
I've never used another solution that would have the same or similar capabilities.
How was the initial setup?
The initial setup can be complex. It is important to go really carefully step-by-step with instructions. When you do that, you can be 100% sure everything will work well.
What about the implementation team?
When I was an end-customer I recall using a vendor for the implementation and support. Now, I am a vender and therefore I do it by myself.
What's my experience with pricing, setup cost, and licensing?
Licensing may sometimes seem a little complicated. A good partner from CyberArk can work it out.
Which other solutions did I evaluate?
Unfortunately, I have not participated in evaluating other options.
What other advice do I have?
Overall, I am really glad I worked with CyberArk for five years.
Which deployment model are you using for this solution?
Hybrid Cloud
Disclosure: My company has a business relationship with this vendor other than being a customer: Just like I said above - I work as a CyberArk Support Specialist mostly. My company is an integrator of cybersecurity services such as CyberArk. We also use CyberArk PAM as a product inside our organization. But still - I am a real user and this review is based on my own experience and options. I think my review is really valuable because I have sight on this product either as a end-customer and a support.

Cyber Security Engineer at eprocessconsulting
Highly stable and efficiently automates application authorization
Pros and Cons
- "It's secure and reliable. I especially appreciate that it's locked down and only allows access to authorized components."
- "One thing that could be improved is to create of a better alternative for fixing group policy fees. We currently use Microsoft, but they have introduced new policies that may not be compatible."
What is our primary use case?
We use it for other use cases, such as automating application authorization, managing files, and securing monetary accounts. We use it for managing privileged accounts.
What is most valuable?
I like everything about it. It's secure and reliable. I especially appreciate that it's locked down and only allows access to authorized components.
What needs improvement?
The issue is that in many environments, what I purchase via text is different. We have some policies that are specific to Microsoft environments. For example, my actual manager may not be able to connect to a Microsoft product due to a policy on it. The issue that comes to mind now is how six credentials are managed.
Currently, if you try to log in to any server within the environment, you would need to log in every time, regardless of whether you have already received the credential or if the connecting device is present or not. It is a problem with CyberArk. If CyberArk could find a way to solve this, it would greatly improve the experience.
I'm not sure if it is possible to fix this. It's not a point of entry, but it may require a longer string than the user might want to know, or maybe cheaper right now. If CyberArk can find a solution that improves the experience, it would be beneficial to customers.
Another thing is that there are some time needs that could be improved in the future. One thing that could be improved is to create of a better alternative for fixing group policy fees. We currently use Microsoft, but they have introduced new policies that may not be compatible.
For how long have I used the solution?
I've been working with it for three years. I'm currently working with version 12 of the solution, and I've also worked with version 10 and partition 11.
What do I think about the stability of the solution?
The number of users is about 3,305, and it is stable. We don't have any small clients, mainly medium and enterprise businesses.
I would rate stability a ten out of ten, and it's very stable.
What do I think about the scalability of the solution?
I would rate scalability an eight out of ten. It's not perfect, but it's fairly scalable.
How are customer service and support?
Some things need improvement. The solution doesn't provide sufficient support. I contacted them at one point, but it took several months to get a response. Additionally, we had an issue with account balances that took a while to resolve. That was four or five years ago, though. Other than that, it's a decent solution.
How would you rate customer service and support?
Positive
How was the initial setup?
Regarding the initial setup, I would say it's pretty straightforward on a scale from one to ten, where one is difficult and ten is easy. I'd give it a nine. Deployment took less than a week.
What about the implementation team?
I deployed the solution.
What's my experience with pricing, setup cost, and licensing?
It is pretty pricey. I would rate it a seven on a scale of one to ten, where one is cheap, and ten is very expensive.
What other advice do I have?
Overall, I would rate the solution a ten out of ten.
Which deployment model are you using for this solution?
On-premises
Disclosure: My company has a business relationship with this vendor other than being a customer: Partner
Buyer's Guide
CyberArk Privileged Access Manager
June 2025

Learn what your peers think about CyberArk Privileged Access Manager. Get advice and tips from experienced pros sharing their opinions. Updated: June 2025.
857,028 professionals have used our research since 2012.
Sri Privileged Access Management Architect at Edgile
Extremely stable, scalable, and has great technical support
Pros and Cons
- "CyberArk has the ability to change the credentials on every platform."
- "The initial setup has room for improvement to be more straightforward."
What is our primary use case?
The primary use case of the solution is mining the credentials on our Windows unique network.
What is most valuable?
The solution is able to rotate the credentials and session recording. CyberArk has the ability to change the credentials on every platform.
What needs improvement?
The initial setup has room for improvement to be more straightforward.
For how long have I used the solution?
I have been using the solution for three months.
What do I think about the stability of the solution?
The solution is extremely stable.
What do I think about the scalability of the solution?
The solution is extremely scalable.
How are customer service and support?
The technical support is fantastic and quick to respond.
How was the initial setup?
I give the initial setup a five out of ten.
The initial deployment requires a couple of weeks and for the on-premises portion an additional two to four weeks. The deployment required one full-time architect and one full-time senior consultant.
What's my experience with pricing, setup cost, and licensing?
The solution is costly but we get what we pay for.
What other advice do I have?
I give the solution a ten out of ten.
For maintenance, we require one part-time architect and two operations people.
I recommend the solution to others.
Which deployment model are you using for this solution?
Hybrid Cloud
Disclosure: My company has a business relationship with this vendor other than being a customer: Partner
Network Engineer at Pronet
Works well and is easy to set up but support needs a faster response time
Pros and Cons
- "The solution is stable."
- "The support services could act faster when people reach out to resolve issues."
What is our primary use case?
It is a PAM solution, in which we provide privileged access to CyberArk and the users who are using to try to access their devices. They onboard on the CyberArk and then, whenever they need to access the devices, they get access to CyberArk which means they have to log in on CyberArk.
What is most valuable?
The models as a whole are great. I'm not sure if I can pull out specific features. I like that if we execute the user can't access their devices. If you remove the session manager, the user can't access their devices. It helps ensure we can protect our organization and data. The session manager is the most critical part of CyberArk's PAM solution.
It works perfectly well.
The solution is pretty easy to set up.
The solution is stable.
It's scalable.
What needs improvement?
The support services could act faster when people reach out to resolve issues.
For how long have I used the solution?
I've been using the solution for the last two years.
What do I think about the stability of the solution?
It's a stable product.
We have deployed CyberArk for two years, and so far, we haven't received any issues regarding any bugs or anything like that. We haven't faced any issues. There are some challenges regarding user access. We have to explain to users who are not familiar with the PAM solution what to do, however, regarding stability, or regarding bugs we haven't faced any issues.
What do I think about the scalability of the solution?
It's a scalable product. For example, in my scenario, the deployment that I have done, if I want to scale it up or if I want to extend it, I can easily add the next module in that. There are no challenges regarding scalability.
I have only one deployment in Pakistan. It is at one of the largest banks in Pakistan here which has thousands of users on CyberArk.
How are customer service and support?
Technical support is good. I haven't faced any issues. If you're looking at the response time, I will say that it's quite a long wait.
How was the initial setup?
The setup process of CyberArk is quite typical. Once you understand the process, it is very easy for you. That said, for a newbie, it may be a bit difficult. For example, for the PSM module, we have to make changes in the registry of the devices. You have to collaborate with your system team to make a configuration. I can get complex. That said, once you know, it's very easy.
What about the implementation team?
I have been through the process of implementing the solution for clients.
What's my experience with pricing, setup cost, and licensing?
The licensing can be yearly or over a couple of years. Support needs to be renewed every year.
What other advice do I have?
We have four models which we are using.
The first one has a wall that which we have deployed on the particular server. The next one is the CPM which is the Central Policy Manager through which we enforce the password policy and password rotation policies.
I'd recommend the solution to others.
We have conducted a POC in Pakistan on multiple sites with different customers. CyberArk is a quite typical product and can be a bit expensive, so it's a good idea to try it out first and make sure it is what you need.
I'd rate the solution seven out of ten.
Which deployment model are you using for this solution?
On-premises
Disclosure: My company has a business relationship with this vendor other than being a customer: Partner
IEM tower manager at Capgemini
Useful session monitoring and password vault features
Pros and Cons
- "The password vault and session monitoring are useful."
- "The turnaround time for technical support is lengthy."
What is most valuable?
The password vault and session monitoring are useful.
For how long have I used the solution?
We have been using this solution since 2016.
What do I think about the stability of the solution?
The solution is stable, but some features in BeyondTrust are unavailable in CyberArk Privileged Access Manager. For example, there is a PMUL feature in BeyondTrust where you can do a deeper dive with the keys for login, but it is not available in CyberArk Privileged Access Manager.
How are customer service and support?
The technical support is good, and they fix any issues we have. However, the turnaround time for technical support is lengthy.
How was the initial setup?
We set up huge environments.
What's my experience with pricing, setup cost, and licensing?
Regarding pricing, we have an APAC sheet and a contact person from CyberArk Singapore that provides a pricing sheet when we need one.
What other advice do I have?
I rate this solution an eight out of ten. I would recommend having a proper plan before implementing this solution. It will be a smoother process if you jot down the granular execution level and get senior resources with hands-on experience.
Disclosure: My company has a business relationship with this vendor other than being a customer: Partner
Security Architect at AutoCont CZ a. s.
Protects accounts and has a password rotation feature that thwarts hackers; technical support was good
Pros and Cons
- "What I found most valuable in CyberArk Privileged Access Manager is the Session Manager as it allows you to split the connection between the administrator site and the target site. I also found the Password Manager valuable as it lets you rotate the passwords of privileged users."
- "In the beginning, CyberArk Privileged Access Manager didn't have a multifactor authentication feature, so that was an area for improvement, but now it's part of the solution. Having just one console for two CyberArk products would be good, particularly for the CyberArk Privileged Access Manager and the CyberArk Endpoint Privilege Manager, with the latter being a product for endpoint management that supports the workstations and allows you to manage workstations. In the next update of CyberArk Privileged Access Manager, it would be good to have a local agent where you can manage all users and processes, and have an agent on the servers such as Linux and Windows."
What is our primary use case?
We use CyberArk Privileged Access Manager for our customers who want to monitor and protect the access from the vendor side or the partner side. These customers want to cover external users who want to gain access.
What is most valuable?
What I found most valuable in CyberArk Privileged Access Manager is the Session Manager as it allows you to split the connection between the administrator site and the target site. I also found the Password Manager valuable as it lets you rotate the passwords of privileged users.
What needs improvement?
In the beginning, CyberArk Privileged Access Manager didn't have a multifactor authentication feature, so that was an area for improvement, but now it's part of the solution.
Having just one console for two CyberArk products would be good, particularly for the CyberArk Privileged Access Manager and the CyberArk Endpoint Privilege Manager, with the latter being a product for endpoint management that supports the workstations and allows you to manage workstations.
In the next update of CyberArk Privileged Access Manager, it would be good to have a local agent where you can manage all users and processes, and have an agent on the servers such as Linux and Windows.
For how long have I used the solution?
I've been working with CyberArk Privileged Access Manager for four years.
What do I think about the stability of the solution?
CyberArk Privileged Access Manager is a stable solution.
What do I think about the scalability of the solution?
CyberArk Privileged Access Manager is easy to scale. You can divide the solution into different parts and connect them, then you can add a new feature, a new appliance, or a new system. The solution works.
How are customer service and support?
In terms of the technical support for CyberArk Privileged Access Manager, I sometimes contact the service engineer in this region. I also have access to the support portal which I use in some issues, but it's not so often. I found the technical support team very professional and I would rate support for CyberArk Privileged Access Manager five out of five.
How was the initial setup?
The initial setup for CyberArk Privileged Access Manager was complex because, in the beginning, you must get the information from the customer such as how he wants to install it, how he wants to protect privileged accounts, how password rotation would work, etc., before you can install the solution.
The time it takes to deploy CyberArk Privileged Access Manager depends on several factors such as how many admins a customer has, how many devices, and the types of devices, for example, does the customer have servers such as Windows or Linux, some other network solution, or some applications, etc.? It could take between ten, fifteen, or one hundred days. My company needs to analyze at the beginning to define how long the process will take.
On a scale of one to five, with one being complex and five being very easy, I would rate the initial setup for CyberArk Privileged Access Manager four out of five.
What's my experience with pricing, setup cost, and licensing?
I'm a technician so I don't handle the licensing for CyberArk Privileged Access Manager, but I know that the price for the core license is about €140 per year. There's another type of license, the external vendor license, and that's about €600 and you can manage twenty devices. From what I know, the price for one device in a subscription is about €65 per year.
You can buy the CyberArk Endpoint Privilege Manager too, or you can buy some other application or application license with CyberArk Privileged Access Manager, but all other features, such as the Analytics Server is included in the basic CyberArk license. With WALLIX, you need to buy separate licenses for the features.
Which other solutions did I evaluate?
I've evaluated WALLIX, apart from CyberArk Privileged Access Manager.
CyberArk Privileged Access Manager is a global solution that applies to all customers, from small scale to enterprise businesses, but the solution has a little bit more servers that you need for the installation. WALLIX, on the other hand, is just one appliance that focuses on small-scale customers. Its deployment is much easier because you just install one appliance with all the features inside. Deployment is easier with WALLIX versus CyberArk Privileged Access Manager which has a complex deployment. In the end, CyberArk Privileged Access Manager has more features that you can define or set up, while WALLIX has some limitations.
What other advice do I have?
I'm working for a company that sells privileged access management solutions, including CyberArk Privileged Access Manager.
The version of the solution which I'm dealing with is an old version. Most of the deployment is on-premises, but my company will start cloud deployment for CyberArk Privileged Access Manager as well.
My company resells, implements, and also provides support for CyberArk Privileged Access Manager for the customers.
The solution requires upgrading regularly, and if there's a new system or application, you need to set it up for privileged access management on CyberArk Privileged Access Manager, so maintenance is important. Currently, in my company, five people work with the solution where there are about two hundred devices with fifty administrators. In the beginning, CyberArk Privileged Access Manager was for large-sized businesses. Nowadays, it's also used by medium-sized businesses.
I would recommend CyberArk Privileged Access Manager to others looking into implementing it because it's very important to protect privileged accounts in the company and do password rotation, so the hackers won't have a chance to detect and find the real passwords in the system. You can also use CyberArk Privileged Access Manager to protect external users and the admins from the direct connection to the server and after that, you can see what the users and admins do because the system makes video recordings and session logs. It's important to see what the admins do from time to time.
For me, CyberArk Privileged Access Manager is the best product, and even Gartner says the same, so I would rate it a ten out of ten.
My company is a partner and reseller of CyberArk Privileged Access Manager.
Which deployment model are you using for this solution?
On-premises
Disclosure: My company has a business relationship with this vendor other than being a customer: Partner
Consultant at a recruiting/HR firm with 10,001+ employees
Reliable and great for securing environments but could be more user-friendly
Pros and Cons
- "The solution is scalable."
- "It can be made user-friendly, in the sense of the console is pretty outdated."
What is our primary use case?
CyberArk is for Privileged Access Management, so we secure our privileged accounts using CyberArk.
What is most valuable?
The main, most valuable aspect is its capability to secure our environment. That's the main reason why we are using it.
What needs improvement?
It can be made user-friendly, in the sense of the console is pretty outdated. They could add more enhancements, et cetera.
They could add more built-in connection components to support various other application platforms. The built-in connection components available are mostly not fit for our purpose. We need to do additional customization to make it work.
For how long have I used the solution?
I’ve used the solution for almost two years.
What do I think about the stability of the solution?
Stability is fine so far, other than a couple of phishes every once in a while.
What do I think about the scalability of the solution?
25 people are using the solution.
The solution is scalable. It’s on the cloud, which makes it simple.
How are customer service and support?
We have enterprise support from the vendors.
The response time could be a bit better. Some people don’t have the access to be able to jump in right away. Sometimes we need someone from the development team who has access to help.
How would you rate customer service and support?
Neutral
Which solution did I use previously and why did I switch?
I’ve never had experience with any other vendors.
How was the initial setup?
The initial setup was not that straightforward. However, we had vendor support, and we were able to fix all the issues.
It took us almost a month to deploy the solution.
I’d rate the solution a three out of five in terms of ease of setup.
In terms of maintenance, some of the components are not in the cloud, so we handle these aspects ourselves. We have a dedicated team for it.
What about the implementation team?
We initiated the setup with the help of the vendor.
What's my experience with pricing, setup cost, and licensing?
I don’t deal with the licensing. That said, my understanding is that it is on the higher side.
When we need enhancements, we do have to pay more.
What other advice do I have?
We are CyberArk partners. I’m a consultant.
We’re always using the most up-to-date solution version, as we are utilizing the cloud.
We use it mostly to secure our privileged accounts. We don't actively use any other products of CyberArk.
I’d recommend the solution. It’s ideal for smaller organizations.
I would rate it seven out of ten.
Which deployment model are you using for this solution?
Public Cloud
Disclosure: My company has a business relationship with this vendor other than being a customer: Partner
Identity and Access Management Engineer at Wiley Global Technology Pvt. Ltd.
Is user-friendly and easy to deploy, and integrates well with other products
Pros and Cons
- "Creating policies and the password rotation feature have been valuable. We don't have to memorize our password for the ADM account."
- "Report creation could be improved. The policies could be more customized."
What is our primary use case?
We use this solution for the user ADM account onboarding process within our company. If they need server access, we create ADM accounts, and we onboard to CyberArk.
We use it also for the password protection process with other products. We can use this as a password wallet, and we create the password rotation in CyberArk.
We can grant access, check the system's health, and create policies for users.
What is most valuable?
Creating policies and the password rotation feature have been valuable. We don't have to memorize our password for the ADM account.
Security wise, it's really safe. The password expires within six to eight hours, so no one can get that password from us. Other users can't log in without our credentials, and also, the ADM account password will automatically rotate.
It's really user-friendly as well.
What needs improvement?
Report creation could be improved.
The policies could be more customized.
For how long have I used the solution?
I've been working with this solution for almost nine months. It's deployed on the cloud.
What do I think about the stability of the solution?
The stability is really good.
What do I think about the scalability of the solution?
We have more than 2000 users, and it's really easy to scale.
Which solution did I use previously and why did I switch?
I have worked with Thycotic before. It is not user-friendly, although it has changed a lot.
Implementation was really hard, and the reporting was not as good as the users expected. In comparison to CyberArk, Thycotic was not better.
How was the initial setup?
The deployment process is really easy, and I would give it a four out of five.
What about the implementation team?
We got support from the CyberArk team but deployed it ourselves. It was easy to follow the documentation and user guide.
What's my experience with pricing, setup cost, and licensing?
CyberArk is an expensive product.
What other advice do I have?
If you can afford CyberArk Privileged Access Manager or you are looking 5 to 10 years in the future, it's a good investment. You will gain experience handling all these pieces using the one product. You can easily integrate with other products also.
You would have maintenance with other PAM products, and you won't with CyberArk. You can save that money by investing in a high quality product from the beginning itself.
Overall, I would rate CyberArk Privileged Access Manager at eight on a scale from one to ten.
Disclosure: My company does not have a business relationship with this vendor other than being a customer.

Buyer's Guide
Download our free CyberArk Privileged Access Manager Report and get advice and tips from experienced pros
sharing their opinions.
Updated: June 2025
Product Categories
Privileged Access Management (PAM) User Activity Monitoring Enterprise Password Managers Mainframe Security Operational Technology (OT) SecurityPopular Comparisons
Azure Key Vault
AWS Secrets Manager
Okta Workforce Identity
HashiCorp Vault
Delinea Secret Server
CyberArk Endpoint Privilege Manager
BeyondTrust Endpoint Privilege Management
WALLIX Bastion
CyberArk Identity
One Identity Safeguard
BeyondTrust Privileged Remote Access
BeyondTrust Password Safe
Buyer's Guide
Download our free CyberArk Privileged Access Manager Report and get advice and tips from experienced pros
sharing their opinions.
Quick Links
Learn More: Questions:
- CyberArk vs. ManageEngine Password Manager Pro
- How does Sailpoint IdentityIQ compare with CyberArk PAM?
- Which PAM tool do you prefer: CyberArk Privileged Access Manager, One Identity Safeguard, Delinea Secret Server, or BeyondTrust Privileged Remote A
- What is the difference between Privileged Users and Privileged Accounts
- When evaluating Privileged Identity Management, what aspect do you think is the most important to look for?
- How was the 2020 Twitter Hack carried out? How could it have been prevented?
- Which is the best Privileged Account Management solution?
- What are the top 5 PAM solutions that can be implemented which cover both hybrid and cloud?
- What are the top 5 PAM solutions?
- How will AI and ML help or work with PIM/PAM?