No more typing reviews! Try our Samantha, our new voice AI agent.
it_user1694739 - PeerSpot reviewer
IT Manager at a financial services firm with 1,001-5,000 employees
Real User
Oct 31, 2021
Helps us to automate our jobs and administrative tasks
Pros and Cons
  • "It improves security in our company. We have more than 10,000 accounts that we manage in CyberArk. We use these accounts for SQLs, Windows Server, and Unix. Therefore, keeping these passwords up-to-date in another solution or software would be impossible. Now, we have some sort of a platform to manage passwords, distribute the inflow, and manage IT teams as well as making regular changes to it according to the internal security policies in our bank."
  • "CyberArk PAM gives us a single pane of glass to manage and secure identities across multiple environments."
  • "We don't often contact technical support, but when we do it, the response could be faster and better."
  • "We don't often contact technical support, but when we do it, the response could be faster and better."

What is our primary use case?

In our company, CyberArk is used to manage passwords for IP use. We use CyberArk for managing and automatically changing passwords in our managed system and environment.

We use it for coding privileged sessions, but we also use another solution for that, and CyberArk is the backup for this.

We are using the latest version.

How has it helped my organization?

It improves security in our company. We have more than 10,000 accounts that we manage in CyberArk. We use these accounts for SQLs, Windows Server, and Unix. Therefore, keeping these passwords up-to-date in another solution or software would be impossible. Now, we have some sort of a platform to manage passwords, distribute the inflow, and manage IT teams as well as making regular changes according to the internal security policies in our bank.

CyberArk PAM gives us a single pane of glass to manage and secure identities across multiple environments. This is quite important for compliance reasons.

CyberArk PAM provides quantitative risk analysis for every human and machine identity in our environment. This has a big impact on reducing risk. 

What is most valuable?

The PAM feature is the most valuable. It helps us to automate our jobs and administrative tasks. 

It also gives us a lot of features for compliance. Using this type of software is required by Polish law in finance and business in Poland.

We use CyberArk’s Secrets Manager to secure and manage secrets and credentials for mission-critical applications. The newest GUI is much better than the older version. Now, it is quite good.

CyberArk PAM provides an automated and unified approach for securing access to all types of identities that we use. This is very important to us.

What needs improvement?

I would like advanced RPA in the basic license. CyberArk has RPA, but we would need to buy additional licenses. It is not out-of-the-box.

I would like better support.

Buyer's Guide
CyberArk Privileged Access Manager
March 2026
Learn what your peers think about CyberArk Privileged Access Manager. Get advice and tips from experienced pros sharing their opinions. Updated: March 2026.
885,311 professionals have used our research since 2012.

For how long have I used the solution?

I have been using it for five years.

What do I think about the stability of the solution?

So far, we don't have any problems. We have implemented higher availability in CyberArk. So, maintenance or updates don't have an impact on our environment. We don't have performance problems or anything like that. The stability is very high.

I have had no problem with agility in this solution. Everything works fine and gives us an opportunity to act as we want.

What do I think about the scalability of the solution?

According to the information that I have, we simply add more servers if we need it or have additional business requirements. So, scalability is high.

There are about 155 users. Mostly, they are our IT administrators and developers.

This tool is used daily in our bank. We don't have plans to increase usage right now.

How are customer service and support?

We don't often contact technical support, but when we do it, the response could be faster and better.

Which solution did I use previously and why did I switch?

We didn't previously use another solution.

How was the initial setup?

The initial setup was complex. Our deployment took three months.

We needed to scale our environment and implement the correct number of servers to prepare for a working environment.

What about the implementation team?

Implementation of our CyberArk instance was done by an external company. It covered all our needs and requirements.

What was our ROI?

We have not seen ROI directly in money. However, we have seen ROI in quality. It increases security in our IT environment and provides the highest SLA for our systems.

CyberArk PAM helps save us time when it comes to onboarding new employees and providing them secure access to SaaS apps and IT systems. It is saving us about two to three days per new employee.

What's my experience with pricing, setup cost, and licensing?

We use an old model for pricing. The new model is a subscription model on the cloud. 

The price of CyberArk support could be a little bit less. Otherwise, pricing is fine.

Which other solutions did I evaluate?

We did some benchmarking, without the tools, to compare the cost of maintenance and functionality. We compared CyberArk to Password Manager Pro from ManageEngine. CyberArk has more functionality and better stability, in our opinion. The price was very similar between the two solutions. 

What other advice do I have?

CyberArk is a good technology partner. They help us a lot with maintenance and our security process management.

I don't have experience in the cloud using CyberArk. However, for on-premises environments, it works very well. I recommend it. 

I would rate the solution as a nine out of 10. 

Which deployment model are you using for this solution?

On-premises
Disclosure: PeerSpot contacted the reviewer to collect the review and to validate authenticity. The reviewer was referred by the vendor, but the review is not subject to editing or approval by the vendor.
PeerSpot user
Chris V - PeerSpot reviewer
Senior Information Security Engineer at Optum
Real User
Sep 4, 2023
Great password management, API password retrieval functionality and Rest API retrieval
Pros and Cons
  • "The most valuable aspects of the solution include password management and Rest API retrieval of vaulted credentials."
  • "The solution needs better features for end users to manage their own whitelisting for API retrieval."

What is our primary use case?

We primarily use the product as part of the growing security posture of the company.

How has it helped my organization?

The solution provided password management and API password retrieval functionality. 

What is most valuable?

The most valuable aspects of the solution include password management and Rest API retrieval of vaulted credentials. 

What needs improvement?

The solution needs better features for end users to manage their own whitelisting for API retrieval. 

For how long have I used the solution?

I've used the solution for over a decade. 

Disclosure: My company does not have a business relationship with this vendor other than being a customer.
PeerSpot user
Buyer's Guide
CyberArk Privileged Access Manager
March 2026
Learn what your peers think about CyberArk Privileged Access Manager. Get advice and tips from experienced pros sharing their opinions. Updated: March 2026.
885,311 professionals have used our research since 2012.
reviewer2169219 - PeerSpot reviewer
Node.js Backend Developer at a tech services company with 1,001-5,000 employees
Real User
May 5, 2023
It has features to deal with a large company that has a complex structure and many partners
Pros and Cons
  • "CyberArk makes our environment more secure and prevents possible attacks by compromised accounts."
  • "The price is high compared to Azure Key Vault. It's the most expensive solution."

What is our primary use case?

CyberArk vouches for access to domain controllers in Unix and Windows Server. 

How has it helped my organization?

CyberArk makes our environment more secure and prevents possible attacks by compromised accounts.

What needs improvement?

The price is high compared to Azure Key Vault. It's the most expensive solution. 

For how long have I used the solution?

I have used CyberArk for about three months.

What do I think about the stability of the solution?

We have 98 percent uptime. 

What do I think about the scalability of the solution?

CyberArk is scalable. We have around 4,000 users. 

Which solution did I use previously and why did I switch?

We previously used Telos. We switched to CyberArk because it has features to deal with a large company that has a complex structure and many partners. 

How was the initial setup?

Deploying CyberArk was moderately difficult. It isn't too hard, but it isn't easy. One person is enough to install it. It took about one month to select the product and deploy it.

What's my experience with pricing, setup cost, and licensing?

CyberArk is more expensive than other solutions, but it's necessary when the company has contacts with other branches and partners. 

What other advice do I have?

I rate CyberArk Enterprise Password Vault eight out of 10. It's more expensive than Azure Key Vault, but Key Vault doesn't have CyberArk's analytics and user tracking. I recommend CyberArk if you need those features. However, it's costly in the Brazilian market because of the conversion fro reals to dollars. 

Which deployment model are you using for this solution?

Hybrid Cloud
Disclosure: My company has a business relationship with this vendor other than being a customer. Partner
PeerSpot user
Hrushikesh Karambelkar - PeerSpot reviewer
Sri Privileged Access Management Architect at Edgile
Reseller
Feb 21, 2023
Extremely stable, scalable, and has great technical support
Pros and Cons
  • "CyberArk has the ability to change the credentials on every platform."
  • "The initial setup has room for improvement to be more straightforward."

What is our primary use case?

The primary use case of the solution is mining the credentials on our Windows unique network.

What is most valuable?

The solution is able to rotate the credentials and session recording. CyberArk has the ability to change the credentials on every platform.

What needs improvement?

The initial setup has room for improvement to be more straightforward.

For how long have I used the solution?

I have been using the solution for three months.

What do I think about the stability of the solution?

The solution is extremely stable.

What do I think about the scalability of the solution?

The solution is extremely scalable.

How are customer service and support?

The technical support is fantastic and quick to respond. 

How was the initial setup?

I give the initial setup a five out of ten.

The initial deployment requires a couple of weeks and for the on-premises portion an additional two to four weeks. The deployment required one full-time architect and one full-time senior consultant. 

What's my experience with pricing, setup cost, and licensing?

The solution is costly but we get what we pay for.

What other advice do I have?

I give the solution a ten out of ten.

For maintenance, we require one part-time architect and two operations people.

I recommend the solution to others.

Which deployment model are you using for this solution?

Hybrid Cloud
Disclosure: My company has a business relationship with this vendor other than being a customer. Partner
PeerSpot user
IkedeEbhole - PeerSpot reviewer
Pre sales Engineer (West Africa) at StarLink - Trusted Security Advisor
Real User
Oct 20, 2022
A useful solution for privileged identity and application identity management
Pros and Cons
  • "It's a good solution, it works, and the bank is happy with it."
  • "Regardless it's a good solution, it works, and the bank is happy with it."
  • "The architecture needs to be improved."
  • "The architecture needs to be improved."

What is our primary use case?

Our primary use case for his solution is privileged identity and application identity management, and we deploy the solution on-premises.

What is most valuable?

We have found the core features of the product most valuable, such as password management, session recording and vaulting.

What needs improvement?

The architecture needs to be improved. For example, the whole solution can come within a single software bundle instead of the distributed components we have for the on-premise deployments. I think there's room for improvements in that area because the competitors within that space have appliances and software that are just a single software. You don't have to split functionality across several servers like the current deployment.

For how long have I used the solution?

We have been using this solution for approximately five years.

What do I think about the scalability of the solution?

The solution is scalable. At the point of implementation, 300 users in our organization were using it, but that number may have increased.

How was the initial setup?

The initial setup is not very complex because of my experience and skills. Still, the end users are only in charge of the administrative aspects, but I think the set up is a bit complex for those who are not very savvy with the solution. Implementation took approximately two weeks.

What other advice do I have?

I rate the solution nine out of ten. The solution is good, but the main feature to be improved is having the product in a consolidated software bundle. So the moment we have PSM, it's a dedicated server. We can also have a PVWA in another server, so having a singular bundle is just like the cloud offering. The infrastructure is abstracted from the end user. So if we can have something like that for on-premises, that would simplify implementation. Regardless it's a good solution, it works, and the bank is happy with it. My recommendation to people considering implementing this product is to get the scoping appropriately done. It comes down to scoping the initial deployment, so it doesn't take forever. Still, if you're not scoping correctly, you could have a situation where people keep adding new accounts continuously, and your project never ends. Hence, scoping is kind of important.

Disclosure: My company does not have a business relationship with this vendor other than being a customer.
PeerSpot user
reviewer1248522 - PeerSpot reviewer
Team Lead Information Security Control at a financial services firm with 5,001-10,000 employees
Real User
Sep 4, 2022
Good support, reliable, and straightforward implementation
Pros and Cons
  • "CyberArk Privileged Access Manager is stable."
  • "CyberArk Privileged Access Manager has helped our organization by controlling users' access."
  • "CyberArk Privileged Access Manager could improve the integration docking, it should have more layers. For example, integration with OpenShift."
  • "CyberArk Privileged Access Manager could improve the integration docking, it should have more layers, for example, integration with OpenShift."

What is our primary use case?

We are using CyberArk Privileged Access Manager because we have too many accounts and we need to manage them.

How has it helped my organization?

CyberArk Privileged Access Manager has helped our organization by controlling users' access.

What needs improvement?

CyberArk Privileged Access Manager could improve the integration docking, it should have more layers. For example, integration with OpenShift.

For how long have I used the solution?

I have been using CyberArk Privileged Access Manager for approximately two years.

What do I think about the stability of the solution?

CyberArk Privileged Access Manager is stable.

What do I think about the scalability of the solution?

We have thousands of users using CyberArk Privileged Access Manager in my organization.

How are customer service and support?

The support from CyberArk Privileged Access Manager is good.

How was the initial setup?

The initial setup of CyberArk Privileged Access Manager was straightforward.

What about the implementation team?

We had a local third-party company help us with the implementation of CyberArk Privileged Access Manager. The maintenance is sometimes a challenge for our consulting team that does it.

What other advice do I have?

I would recommend this solution to others.

I rate CyberArk Privileged Access Manager a nine out of ten.

Which deployment model are you using for this solution?

On-premises
Disclosure: My company does not have a business relationship with this vendor other than being a customer.
PeerSpot user
reviewer1702128 - PeerSpot reviewer
Senior Leader at a financial services firm with 5,001-10,000 employees
Real User
Jun 21, 2022
Useful password vaulting, reliable, and simple deployment
Pros and Cons
  • "The most valuable features of CyberArk Enterprise Password Vault are password vaulting and automatic rotation of passwords after use."
  • "The most valuable features of CyberArk Enterprise Password Vault are password vaulting and automatic rotation of passwords after use."
  • "CyberArk Enterprise Password Vault can improve the distributive vault feature. Distributing the vault in multiple areas and multiple data centers should improve."
  • "CyberArk Enterprise Password Vault can improve the distributive vault feature. Distributing the vault in multiple areas and multiple data centers should improve."

What is our primary use case?

CyberArk Enterprise Password Vault can be used for password vaulting and purpose session management.

What is most valuable?

The most valuable features of CyberArk Enterprise Password Vault are password vaulting and automatic rotation of passwords after use.

What needs improvement?

CyberArk Enterprise Password Vault can improve the distributive vault feature. Distributing the vault in multiple areas and multiple data centers should improve.

For how long have I used the solution?

I have been using CyberArk Enterprise Password Vault for approximately seven years.

What do I think about the stability of the solution?

The stability of CyberArk Enterprise Password Vault depends on what you use it for. It is very stable when using a single vault. I had the most problems using the distributive vault. They've worked through some of that, so it's more stable now.

What do I think about the scalability of the solution?

The scalability of CyberArk Enterprise Password Vault is okay. The distributive vault is what would affect the scalability and there were some issues with that that I've run into.

We only have a small number of users in the current company I am working at, and the previous company I was working for had hundreds of users using the solution. 

We do not plan to increase the usage of this solution.

How are customer service and support?

The support from CyberArk Enterprise Password Vault is good.

I rate the support from CyberArk Enterprise Password Vault a four out of five.

How would you rate customer service and support?

Positive

Which solution did I use previously and why did I switch?

I did not use a solution similar to CyberArk Enterprise Password Vault.

How was the initial setup?

The initial setup of CyberArk Enterprise Password Vault was straightforward. The time it took to implement was two months.

What about the implementation team?

We did the implementation of CyberArk Enterprise Password Vault in-house.

We have approximately nine people for the deployment and maintenance of CyberArk Enterprise Password Vault.

What was our ROI?

We have seen a return on investment from using CyberArk Enterprise Password Vault.

What's my experience with pricing, setup cost, and licensing?

There are no additional costs other than the standard licensing fees.

Which other solutions did I evaluate?

We evaluated other solutions but we decided to choose CyberArk Enterprise Password Vault because they were a key player in the market who invented the space.

What other advice do I have?

CyberArk Enterprise Password Vault is great. It excels on-premise. If you were looking at the hybrid or other solutions, there are other solutions that were built in that environment. They're probably a little ahead of CyberArk Enterprise Password Vault at this point.

I rate CyberArk Enterprise Password Vault an eight out of ten.

Which deployment model are you using for this solution?

On-premises
Disclosure: My company does not have a business relationship with this vendor other than being a customer.
PeerSpot user
reviewer1797750 - PeerSpot reviewer
Information Security Engineer II at a healthcare company with 1,001-5,000 employees
Real User
Mar 28, 2022
Stable and solid solution for managing passwords, and comes with auto password recycling and PSM features
Pros and Cons
  • "If properly set up, CyberArk Enterprise Password Vault has good stability, and is a very solid tool. It can run by itself. Its most valuable features are auto password recycling and PSM."
  • "CyberArk Enterprise Password Vault stability is good; if it's properly set up, it can just run by itself and is a very solid tool."
  • "What needs to be improved in CyberArk Enterprise Password Vault is their customer support, particularly in terms of responsiveness, willingness to help, and being more understanding. The initial setup and upgrade process for the solution is complex and can only be done by CyberArk, so this is another area for improvement."
  • "The initial setup and upgrade process for CyberArk Enterprise Password Vault is complex and can only be done by CyberArk, so this is another area for improvement."

What is our primary use case?

Our use case for CyberArk Enterprise Password Vault is managing privileged accounts. These are local accounts, e.g. local desktops, laptops, or servers. They have a built-in administration account, so part of the solution is to ensure that that account's username and password are stored in the vault and managed by CyberArk Enterprise Password Vault.

What is most valuable?

The most valuable feature of CyberArk Enterprise Password Vault is the auto password recycling feature, which works this way: previous accounts which are managed by this solution get their password reset every time, based on our given parameters, e.g. every two days, every five days, every week, etc. You give CyberArk Enterprise Password Vault the number of days that you want the passwords to be changed, so users won't need to have their passwords written somewhere. They can just log on to the solution and retrieve the password. They may even be able to remotely connect to the devices that they want to connect to via the PSM function of CyberArk Enterprise Password Vault.

What needs improvement?

What needs to be improved in CyberArk Enterprise Password Vault is their customer support, because as administrative engineers, since we're not experts in the solution, we have to rely on customer support.

Their customer support needs improvement in terms of being responsive and being understanding. They are knowledgeable, but responding and willingness to come and help knowing that it's their tool, rather than relying on the engineers from the customer side, e.g. our side, to do all the technical things.

The initial setup and upgrade process for CyberArk Enterprise Password Vault is complex and can only be done by CyberArk, so this is another area for improvement.

For how long have I used the solution?

My experience with CyberArk Enterprise Password Vault is almost three years.

What do I think about the stability of the solution?

CyberArk Enterprise Password Vault stability is good. If it's properly set up, it can just run by itself. It's a very solid tool, but it has to be properly set up because a simple misconfiguration can create a lot of pain. Once set up, it's really good.

How are customer service and support?

Customer support for this product still needs some improvement.

How was the initial setup?

The initial setup for CyberArk Enterprise Password Vault is another pain point, because the setup, including upgrading the solution, can only be done by CyberArk themselves. They have professional services involved to get an initial setup done, and to even do an upgrade, because of the complexity of the product itself.

What's my experience with pricing, setup cost, and licensing?

The SaaS version of CyberArk Enterprise Password Vault is very expensive, but the on-premises version is relative, e.g. depending on the size of the environment, it can be a bit pricey, but it's relatively okay compared to the others. It's their SaaS solution that's expensive.

What other advice do I have?

We're using version 11.1 of CyberArk Enterprise Password Vault.

It's probably not fair to judge CyberArk Enterprise Password Vault based on my overall experience with it, because the tool itself is brilliant, though it's a little bit complex in terms of how it is set up. The customer service could still be improved to meet the standards, but I'm giving CyberArk Enterprise Password Vault a score of seven out of ten.

Which deployment model are you using for this solution?

On-premises
Disclosure: My company does not have a business relationship with this vendor other than being a customer.
PeerSpot user
Buyer's Guide
Download our free CyberArk Privileged Access Manager Report and get advice and tips from experienced pros sharing their opinions.
Updated: March 2026
Buyer's Guide
Download our free CyberArk Privileged Access Manager Report and get advice and tips from experienced pros sharing their opinions.