We use it for other use cases, such as automating application authorization, managing files, and securing monetary accounts. We use it for managing privileged accounts.
Cyber Security Engineer at eprocessconsulting
Highly stable and efficiently automates application authorization
Pros and Cons
- "It's secure and reliable. I especially appreciate that it's locked down and only allows access to authorized components."
- "One thing that could be improved is to create of a better alternative for fixing group policy fees. We currently use Microsoft, but they have introduced new policies that may not be compatible."
What is our primary use case?
What is most valuable?
I like everything about it. It's secure and reliable. I especially appreciate that it's locked down and only allows access to authorized components.
What needs improvement?
The issue is that in many environments, what I purchase via text is different. We have some policies that are specific to Microsoft environments. For example, my actual manager may not be able to connect to a Microsoft product due to a policy on it. The issue that comes to mind now is how six credentials are managed.
Currently, if you try to log in to any server within the environment, you would need to log in every time, regardless of whether you have already received the credential or if the connecting device is present or not. It is a problem with CyberArk. If CyberArk could find a way to solve this, it would greatly improve the experience.
I'm not sure if it is possible to fix this. It's not a point of entry, but it may require a longer string than the user might want to know, or maybe cheaper right now. If CyberArk can find a solution that improves the experience, it would be beneficial to customers.
Another thing is that there are some time needs that could be improved in the future. One thing that could be improved is to create of a better alternative for fixing group policy fees. We currently use Microsoft, but they have introduced new policies that may not be compatible.
For how long have I used the solution?
I've been working with it for three years. I'm currently working with version 12 of the solution, and I've also worked with version 10 and partition 11.
Buyer's Guide
CyberArk Privileged Access Manager
September 2025

Learn what your peers think about CyberArk Privileged Access Manager. Get advice and tips from experienced pros sharing their opinions. Updated: September 2025.
866,755 professionals have used our research since 2012.
What do I think about the stability of the solution?
The number of users is about 3,305, and it is stable. We don't have any small clients, mainly medium and enterprise businesses.
I would rate stability a ten out of ten, and it's very stable.
What do I think about the scalability of the solution?
I would rate scalability an eight out of ten. It's not perfect, but it's fairly scalable.
How are customer service and support?
Some things need improvement. The solution doesn't provide sufficient support. I contacted them at one point, but it took several months to get a response. Additionally, we had an issue with account balances that took a while to resolve. That was four or five years ago, though. Other than that, it's a decent solution.
How would you rate customer service and support?
Positive
How was the initial setup?
Regarding the initial setup, I would say it's pretty straightforward on a scale from one to ten, where one is difficult and ten is easy. I'd give it a nine. Deployment took less than a week.
What about the implementation team?
I deployed the solution.
What's my experience with pricing, setup cost, and licensing?
It is pretty pricey. I would rate it a seven on a scale of one to ten, where one is cheap, and ten is very expensive.
What other advice do I have?
Overall, I would rate the solution a ten out of ten.
Which deployment model are you using for this solution?
On-premises
Disclosure: My company has a business relationship with this vendor other than being a customer. Partner

Sri Privileged Access Management Architect at Edgile
Extremely stable, scalable, and has great technical support
Pros and Cons
- "CyberArk has the ability to change the credentials on every platform."
- "The initial setup has room for improvement to be more straightforward."
What is our primary use case?
The primary use case of the solution is mining the credentials on our Windows unique network.
What is most valuable?
The solution is able to rotate the credentials and session recording. CyberArk has the ability to change the credentials on every platform.
What needs improvement?
The initial setup has room for improvement to be more straightforward.
For how long have I used the solution?
I have been using the solution for three months.
What do I think about the stability of the solution?
The solution is extremely stable.
What do I think about the scalability of the solution?
The solution is extremely scalable.
How are customer service and support?
The technical support is fantastic and quick to respond.
How was the initial setup?
I give the initial setup a five out of ten.
The initial deployment requires a couple of weeks and for the on-premises portion an additional two to four weeks. The deployment required one full-time architect and one full-time senior consultant.
What's my experience with pricing, setup cost, and licensing?
The solution is costly but we get what we pay for.
What other advice do I have?
I give the solution a ten out of ten.
For maintenance, we require one part-time architect and two operations people.
I recommend the solution to others.
Which deployment model are you using for this solution?
Hybrid Cloud
Disclosure: My company has a business relationship with this vendor other than being a customer. Partner
Buyer's Guide
CyberArk Privileged Access Manager
September 2025

Learn what your peers think about CyberArk Privileged Access Manager. Get advice and tips from experienced pros sharing their opinions. Updated: September 2025.
866,755 professionals have used our research since 2012.
Network Engineer at Pronet
Works well and is easy to set up but support needs a faster response time
Pros and Cons
- "The solution is stable."
- "The support services could act faster when people reach out to resolve issues."
What is our primary use case?
It is a PAM solution, in which we provide privileged access to CyberArk and the users who are using to try to access their devices. They onboard on the CyberArk and then, whenever they need to access the devices, they get access to CyberArk which means they have to log in on CyberArk.
What is most valuable?
The models as a whole are great. I'm not sure if I can pull out specific features. I like that if we execute the user can't access their devices. If you remove the session manager, the user can't access their devices. It helps ensure we can protect our organization and data. The session manager is the most critical part of CyberArk's PAM solution.
It works perfectly well.
The solution is pretty easy to set up.
The solution is stable.
It's scalable.
What needs improvement?
The support services could act faster when people reach out to resolve issues.
For how long have I used the solution?
I've been using the solution for the last two years.
What do I think about the stability of the solution?
It's a stable product.
We have deployed CyberArk for two years, and so far, we haven't received any issues regarding any bugs or anything like that. We haven't faced any issues. There are some challenges regarding user access. We have to explain to users who are not familiar with the PAM solution what to do, however, regarding stability, or regarding bugs we haven't faced any issues.
What do I think about the scalability of the solution?
It's a scalable product. For example, in my scenario, the deployment that I have done, if I want to scale it up or if I want to extend it, I can easily add the next module in that. There are no challenges regarding scalability.
I have only one deployment in Pakistan. It is at one of the largest banks in Pakistan here which has thousands of users on CyberArk.
How are customer service and support?
Technical support is good. I haven't faced any issues. If you're looking at the response time, I will say that it's quite a long wait.
How was the initial setup?
The setup process of CyberArk is quite typical. Once you understand the process, it is very easy for you. That said, for a newbie, it may be a bit difficult. For example, for the PSM module, we have to make changes in the registry of the devices. You have to collaborate with your system team to make a configuration. I can get complex. That said, once you know, it's very easy.
What about the implementation team?
I have been through the process of implementing the solution for clients.
What's my experience with pricing, setup cost, and licensing?
The licensing can be yearly or over a couple of years. Support needs to be renewed every year.
What other advice do I have?
We have four models which we are using.
The first one has a wall that which we have deployed on the particular server. The next one is the CPM which is the Central Policy Manager through which we enforce the password policy and password rotation policies.
I'd recommend the solution to others.
We have conducted a POC in Pakistan on multiple sites with different customers. CyberArk is a quite typical product and can be a bit expensive, so it's a good idea to try it out first and make sure it is what you need.
I'd rate the solution seven out of ten.
Which deployment model are you using for this solution?
On-premises
Disclosure: My company has a business relationship with this vendor other than being a customer. Partner
Senior Product Manager and Technology Consultant at Barikat
Greta digital vault, very robust, and offers great integration capabilities
Pros and Cons
- "It is a robust product."
- "It is very complex and difficult to set up the solution."
What is our primary use case?
I use CyberArk as a password vault and session recordings and to connect the server sites. I use some critical systems if I can access them, including workflows and mechanisms.
What is most valuable?
It's really good.
The digital vault is great. It protects our passwords and manages those passwords and changing periods.
There is some third-party access to our system's recording process. It's very, very important for us and we're glad they allow it.
It is a robust product. It's very stable and reliable.
The solution can scale well.
What needs improvement?
The interface could be updated a bit. Right now, it's not very good.
It is very complex and difficult to set up the solution.
Maybe some customers have a lot of systems. For example, we have 1000 Windows systems and 500 Linux systems. I need a remote desktop management solution for the CyberArk. I'd like to be able to change desktops with one click. We'd like the next release to have remote desktop management tools.
For how long have I used the solution?
I've been using the solution for the last five years.
What do I think about the stability of the solution?
The solution is very stable.
We no have had no performance issues; it's a really robust product. If I need more performance, I use another server, install another server, and improve our performance.
What do I think about the scalability of the solution?
It is very easily scalable.
We have 50 admins on this solution.
We are using the solution to 70% capacity. We do plan to increase usage.
Which solution did I use previously and why did I switch?
We did use Delinea, formally Thycotic. That solution is really good, however, not fully secure. CyberArk is a more secure product - much better than Thycotic. Thycotic may be better in terms of its admin-friendly interface and integration, however, CyberArk offers more than vendor integration. It has massive integration capabilities.
How was the initial setup?
The implementation and integration process is very, very complex. It is a robust product, however. I don't have to do a lot of setups, luckily. However, when you first set it up, it's very difficult as you don't really know what you're doing.
The first 27% of the implementation took us maybe three months, however, for more than 95% of installation, it took us over one year. We had all the features up and running, however.
We started with connection and session recording features, however, items such as password changing and other integrations, for example, firewall connection and switch interface connection were rolled out over the year.
You only need one person to maintain the solution.
What about the implementation team?
We had a third party help us with the implementation process.
What's my experience with pricing, setup cost, and licensing?
It's a yearly license that we pay. It is more expensive than other options. There are competitive products that are cheaper.
I can't speak to the exact price. On a scale of one to five, with one being the most expensive, I would rate it a one. The license covers five servers. If you need more servers, you pay more. The same is true with disaster sites. If you need a disaster site, you are fine. It is included. If you need more, you need to pay for it.
Which other solutions did I evaluate?
We did look at multi-factor authentification options and zero-trust network access.
What other advice do I have?
I'm not sure which version of the solution we're using. It's likely the latest version.
This is a fully secure product and integrates with a lot of different systems. I'd recommend the product to others.
I'd rate the solution eight out of ten.
Which deployment model are you using for this solution?
On-premises
Disclosure: My company has a business relationship with this vendor other than being a customer. ex-partner, changed companies a month ago
IEM tower manager at Capgemini
Useful session monitoring and password vault features
Pros and Cons
- "The password vault and session monitoring are useful."
- "The turnaround time for technical support is lengthy."
What is most valuable?
The password vault and session monitoring are useful.
For how long have I used the solution?
We have been using this solution since 2016.
What do I think about the stability of the solution?
The solution is stable, but some features in BeyondTrust are unavailable in CyberArk Privileged Access Manager. For example, there is a PMUL feature in BeyondTrust where you can do a deeper dive with the keys for login, but it is not available in CyberArk Privileged Access Manager.
How are customer service and support?
The technical support is good, and they fix any issues we have. However, the turnaround time for technical support is lengthy.
How was the initial setup?
We set up huge environments.
What's my experience with pricing, setup cost, and licensing?
Regarding pricing, we have an APAC sheet and a contact person from CyberArk Singapore that provides a pricing sheet when we need one.
What other advice do I have?
I rate this solution an eight out of ten. I would recommend having a proper plan before implementing this solution. It will be a smoother process if you jot down the granular execution level and get senior resources with hands-on experience.
Disclosure: My company has a business relationship with this vendor other than being a customer. Partner
Consultant at a recruiting/HR firm with 10,001+ employees
Reliable and great for securing environments but could be more user-friendly
Pros and Cons
- "The solution is scalable."
- "It can be made user-friendly, in the sense of the console is pretty outdated."
What is our primary use case?
CyberArk is for Privileged Access Management, so we secure our privileged accounts using CyberArk.
What is most valuable?
The main, most valuable aspect is its capability to secure our environment. That's the main reason why we are using it.
What needs improvement?
It can be made user-friendly, in the sense of the console is pretty outdated. They could add more enhancements, et cetera.
They could add more built-in connection components to support various other application platforms. The built-in connection components available are mostly not fit for our purpose. We need to do additional customization to make it work.
For how long have I used the solution?
I’ve used the solution for almost two years.
What do I think about the stability of the solution?
Stability is fine so far, other than a couple of phishes every once in a while.
What do I think about the scalability of the solution?
25 people are using the solution.
The solution is scalable. It’s on the cloud, which makes it simple.
How are customer service and support?
We have enterprise support from the vendors.
The response time could be a bit better. Some people don’t have the access to be able to jump in right away. Sometimes we need someone from the development team who has access to help.
How would you rate customer service and support?
Neutral
Which solution did I use previously and why did I switch?
I’ve never had experience with any other vendors.
How was the initial setup?
The initial setup was not that straightforward. However, we had vendor support, and we were able to fix all the issues.
It took us almost a month to deploy the solution.
I’d rate the solution a three out of five in terms of ease of setup.
In terms of maintenance, some of the components are not in the cloud, so we handle these aspects ourselves. We have a dedicated team for it.
What about the implementation team?
We initiated the setup with the help of the vendor.
What's my experience with pricing, setup cost, and licensing?
I don’t deal with the licensing. That said, my understanding is that it is on the higher side.
When we need enhancements, we do have to pay more.
What other advice do I have?
We are CyberArk partners. I’m a consultant.
We’re always using the most up-to-date solution version, as we are utilizing the cloud.
We use it mostly to secure our privileged accounts. We don't actively use any other products of CyberArk.
I’d recommend the solution. It’s ideal for smaller organizations.
I would rate it seven out of ten.
Which deployment model are you using for this solution?
Public Cloud
Disclosure: My company has a business relationship with this vendor other than being a customer. Partner
Cybersecurity Engineer at a healthcare company with 10,001+ employees
Provides better security and control over our accounts and saves time in onboarding new employees
Pros and Cons
- "The automatic rotation of credentials is probably the most useful feature."
- "It should be easy to use for non-technical people. Its interface can be a bit difficult. Some parts of its interface are not very intuitive. Some of the controls are hidden, and instead of having a screen with all the controls for that account on it, you have to use menus and other similar things."
What is our primary use case?
We are mostly rotating passwords and using PSM for remote connections.
How has it helped my organization?
It provides us with better security and control over our accounts.
It provides an automated and unified approach for securing access for all types of identities. This approach is important for us. The more things we have that can be automated, the easier it is to get things done.
It gives a single pane of glass to manage and secure human and machine identities across environments, which is important for us.
It saves time when it comes to onboarding new employees and providing them secure access to SaaS apps and IT systems. It probably saves a couple of hours.
What is most valuable?
The automatic rotation of credentials is probably the most useful feature.
What needs improvement?
It should be easy to use for non-technical people. Its interface can be a bit difficult. Some parts of its interface are not very intuitive. Some of the controls are hidden, and instead of having a screen with all the controls for that account on it, you have to use menus and other similar things.
Its documentation could be better. Some of the documentation lacks details for people who aren't super technical.
For how long have I used the solution?
I have been using this solution for about six years.
What do I think about the stability of the solution?
It is stable. We never had any hiccups that were caused by CyberArk.
What do I think about the scalability of the solution?
It is easily scalable. In terms of usage, it is being used by all of IT. We have over 500 users utilizing the solution. We're always adding new people and features, so its usage is increasing every day. We plan to implement more types of accounts.
How are customer service and support?
Their technical support is good, but some of their documentation lacks details for people who aren't super technical. I would rate them an eight out of 10.
Which solution did I use previously and why did I switch?
Other than the regular Password Manager, they didn't have any real solution. They chose to look into CyberArk because it is a good security practice to have accounts automatically rotate and secure remote connections.
How was the initial setup?
It is pretty complex, but they have professional services to help with that. It is complex because of all the security around it, all the hardening, and getting everything set up to communicate with each other. I am not sure about the duration of the initial deployment because I wasn't on the team then.
In terms of maintenance, it doesn't require a lot of people. Maintenance is just keeping up with patches. It is pretty stable and doesn't require a lot.
What about the implementation team?
We used CyberArk's professional services. They were good, and they helped get everything set up. They also helped do upgrades.
What's my experience with pricing, setup cost, and licensing?
It is in line with its competitors, but all such solutions cost too much money.
What other advice do I have?
It is a good choice. I'm not sure if they're the market leader or not, but they seem to have the biggest footprint. I know there are a couple of competitors, but I've never used them. The other two that I know about are not as widely used, so there is a bigger community for support for CyberArk, and there is also CyberArk's support.
CyberArk is good as a technology partner for ensuring that we maintain a strong security posture throughout our digital transformation. It is a needed platform to have.
Given my experience with CyberArk PAM, to a colleague at another company who says, “We want to solve cloud security challenges with born-in-the-cloud security solutions as opposed to legacy solutions that have been adapted to the cloud," I would say that CyberArk is a good option for the cloud. That's because you don't have to worry about maintenance, and all the integrations are already in place. The different accounts that CyberArk can integrate with are already in place.
It doesn't really give a single pane of glass to manage and secure identities across multiple environments. It only gives visibility into CyberArk and how the accounts are working there. If something is wrong with an account, sometimes, you have to check other tools, such as Active Directory, or permissions.
We don't use CyberArk’s Cloud Entitlements Manager and Secrets Manager. We use CyberArk PAM to implement least privilege entitlements, and it is neither easy nor difficult to implement them. It is somewhere in the middle. The adoption of least privilege entitlements by using CyberArk PAM is also somewhere in the middle. If users aren't really technical, they would have problems with it.
It provides consistent controls to enable secure access, manage secrets, and implement least privilege at scale across our environment. It is somewhat user-friendly for people to just rotate passwords. Its interface can be a bit difficult.
I would rate it an eight out of 10.
Which deployment model are you using for this solution?
On-premises
Disclosure: PeerSpot contacted the reviewer to collect the review and to validate authenticity. The reviewer was referred by the vendor, but the review is not subject to editing or approval by the vendor.
IT Manager at a financial services firm with 1,001-5,000 employees
Helps us to automate our jobs and administrative tasks
Pros and Cons
- "It improves security in our company. We have more than 10,000 accounts that we manage in CyberArk. We use these accounts for SQLs, Windows Server, and Unix. Therefore, keeping these passwords up-to-date in another solution or software would be impossible. Now, we have some sort of a platform to manage passwords, distribute the inflow, and manage IT teams as well as making regular changes to it according to the internal security policies in our bank."
- "We don't often contact technical support, but when we do it, the response could be faster and better."
What is our primary use case?
In our company, CyberArk is used to manage passwords for IP use. We use CyberArk for managing and automatically changing passwords in our managed system and environment.
We use it for coding privileged sessions, but we also use another solution for that, and CyberArk is the backup for this.
We are using the latest version.
How has it helped my organization?
It improves security in our company. We have more than 10,000 accounts that we manage in CyberArk. We use these accounts for SQLs, Windows Server, and Unix. Therefore, keeping these passwords up-to-date in another solution or software would be impossible. Now, we have some sort of a platform to manage passwords, distribute the inflow, and manage IT teams as well as making regular changes according to the internal security policies in our bank.
CyberArk PAM gives us a single pane of glass to manage and secure identities across multiple environments. This is quite important for compliance reasons.
CyberArk PAM provides quantitative risk analysis for every human and machine identity in our environment. This has a big impact on reducing risk.
What is most valuable?
The PAM feature is the most valuable. It helps us to automate our jobs and administrative tasks.
It also gives us a lot of features for compliance. Using this type of software is required by Polish law in finance and business in Poland.
We use CyberArk’s Secrets Manager to secure and manage secrets and credentials for mission-critical applications. The newest GUI is much better than the older version. Now, it is quite good.
CyberArk PAM provides an automated and unified approach for securing access to all types of identities that we use. This is very important to us.
What needs improvement?
I would like advanced RPA in the basic license. CyberArk has RPA, but we would need to buy additional licenses. It is not out-of-the-box.
I would like better support.
For how long have I used the solution?
I have been using it for five years.
What do I think about the stability of the solution?
So far, we don't have any problems. We have implemented higher availability in CyberArk. So, maintenance or updates don't have an impact on our environment. We don't have performance problems or anything like that. The stability is very high.
I have had no problem with agility in this solution. Everything works fine and gives us an opportunity to act as we want.
What do I think about the scalability of the solution?
According to the information that I have, we simply add more servers if we need it or have additional business requirements. So, scalability is high.
There are about 155 users. Mostly, they are our IT administrators and developers.
This tool is used daily in our bank. We don't have plans to increase usage right now.
How are customer service and support?
We don't often contact technical support, but when we do it, the response could be faster and better.
How would you rate customer service and support?
Neutral
Which solution did I use previously and why did I switch?
We didn't previously use another solution.
How was the initial setup?
The initial setup was complex. Our deployment took three months.
We needed to scale our environment and implement the correct number of servers to prepare for a working environment.
What about the implementation team?
Implementation of our CyberArk instance was done by an external company. It covered all our needs and requirements.
What was our ROI?
We have not seen ROI directly in money. However, we have seen ROI in quality. It increases security in our IT environment and provides the highest SLA for our systems.
CyberArk PAM helps save us time when it comes to onboarding new employees and providing them secure access to SaaS apps and IT systems. It is saving us about two to three days per new employee.
What's my experience with pricing, setup cost, and licensing?
We use an old model for pricing. The new model is a subscription model on the cloud.
The price of CyberArk support could be a little bit less. Otherwise, pricing is fine.
Which other solutions did I evaluate?
We did some benchmarking, without the tools, to compare the cost of maintenance and functionality. We compared CyberArk to Password Manager Pro from ManageEngine. CyberArk has more functionality and better stability, in our opinion. The price was very similar between the two solutions.
What other advice do I have?
CyberArk is a good technology partner. They help us a lot with maintenance and our security process management.
I don't have experience in the cloud using CyberArk. However, for on-premises environments, it works very well. I recommend it.
I would rate the solution as a nine out of 10.
Which deployment model are you using for this solution?
On-premises
Disclosure: PeerSpot contacted the reviewer to collect the review and to validate authenticity. The reviewer was referred by the vendor, but the review is not subject to editing or approval by the vendor.

Buyer's Guide
Download our free CyberArk Privileged Access Manager Report and get advice and tips from experienced pros
sharing their opinions.
Updated: September 2025
Product Categories
Privileged Access Management (PAM) User Activity Monitoring Enterprise Password Managers Mainframe Security Operational Technology (OT) SecurityPopular Comparisons
Azure Key Vault
AWS Secrets Manager
Okta Workforce Identity
HashiCorp Vault
Delinea Secret Server
CyberArk Endpoint Privilege Manager
CyberArk Identity
BeyondTrust Endpoint Privilege Management
WALLIX Bastion
One Identity Safeguard
Keeper Enterprise Password Manager
BeyondTrust Privileged Remote Access
Buyer's Guide
Download our free CyberArk Privileged Access Manager Report and get advice and tips from experienced pros
sharing their opinions.
Quick Links
Learn More: Questions:
- CyberArk vs. ManageEngine Password Manager Pro
- How does Sailpoint IdentityIQ compare with CyberArk PAM?
- Which PAM tool do you prefer: CyberArk Privileged Access Manager, One Identity Safeguard, Delinea Secret Server, or BeyondTrust Privileged Remote A
- What is the difference between Privileged Users and Privileged Accounts
- When evaluating Privileged Identity Management, what aspect do you think is the most important to look for?
- How was the 2020 Twitter Hack carried out? Could it have been prevented?
- Which is the best Privileged Account Management solution?
- What are the top 5 PAM solutions that can be implemented which cover both hybrid and cloud?
- What are the top 5 PAM solutions?
- How will AI and ML help or work with PIM/PAM?