PeerSpot user
Technical Manager, System Division at a tech services company with 501-1,000 employees
Consultant
We can monitor sessions in real time. If there's any unnecessary activity, we can terminate the session.

What is most valuable?

With the Privileged Session Manager, we can monitor sessions in real time and terminate the session if there's any unnecessary activity found. For example: We give access to user to access the server only to update patches, but if we find any activity not related to patch updates, we can terminate the session.

How has it helped my organization?

Actually my company/previous company does not use this product, but we sold it to our customer. This product helped our customer manage their privileged accounts. It’s easier to them to manage and control the privileged accounts.

What needs improvement?

It needs more plugin connectors for all devices. CyberArk currently can manage or make it easier to manage about 80% of our total devices. The rest still need R&D to develop the plugin. If CyberArk had more plugin connectors, the customer would not need to raise plugin development requests for several devices and CyberArk could easily connect to these devices.

What I mean with CyberArk needing to improve plugin connector is that currently CyberArk is able to manage almost all devices (server, network devices, security devices etc.) which are more than 80% of all devices. In my experience device such as IBM OS/390 and Cisco TACACS still need custom plugin connectors developed by CyberArk R&D.

If CyberArk IS able manage more than 95% from total devices it would help the customer to using it without raising a support ticket to create a plugin connector. CyberArk will more easier to manage all devices with no compromise

For how long have I used the solution?

I used this solution from mid-2013 until mid-2015.

Buyer's Guide
CyberArk Privileged Access Manager
May 2024
Learn what your peers think about CyberArk Privileged Access Manager. Get advice and tips from experienced pros sharing their opinions. Updated: May 2024.
770,458 professionals have used our research since 2012.

What do I think about the stability of the solution?

So far, it is stable.

What do I think about the scalability of the solution?

This product is scales easily.

How are customer service and support?

Technical support is good. They have good technical teams around the world including southeast Asia.

Which solution did I use previously and why did I switch?

Most customers using a different solution switch to CyberArk because CyberArk is more user-friendly than its competitors and have more plugins compared to the others.

How was the initial setup?

Initial setup was actually easier.

What's my experience with pricing, setup cost, and licensing?

Start small.

Which other solutions did I evaluate?

Yes, we evaluate other options. The issue was about price, stability, scalability and the development of this product to ensure support.

What other advice do I have?

Contact the local distributor for help.

Disclosure: I am a real user, and this review is based on my own experience and opinions.
PeerSpot user
reviewer991878 - PeerSpot reviewer
Senior IT Security Engineer at a insurance company with 5,001-10,000 employees
User
Having the vaulting tech ensures that the credentials are secure

What is our primary use case?

We are using the solution for privileged account management. (Rotation, session isolation, checkout, etc.)

How has it helped my organization?

Accounts are managed, passwords change frequently, and we have better audit logs! When something happens, there is a better chance you can determine the who/what/where/when/why of the situation.

What is most valuable?

The vaulting technology as well as the privileged session management: Having the vaulting tech ensures that the credentials are secure, and PSM ensures that the end user can perform needed tasks without knowing or needing the credentials.

What needs improvement?

A greater number of out-of-the-box integrations with other vendors: They are working on it, but more is better!

For how long have I used the solution?

One to three years.

What do I think about the stability of the solution?

Rock solid! I would say it is, set it and forget it, but the vendor keeps on top of upgrades and enhancements.

What do I think about the scalability of the solution?

It seems to work well for any size of organization, or any size of deployment in my experience.  

How was the initial setup?

Pretty straightforward, a lot of time will be spent on the initial engineering phase where you determine how you want to use the solution, naming requirements, admin accounts, etc.

What's my experience with pricing, setup cost, and licensing?

As with everything, try before you buy. Get a trial licence, set up a demo environment and see if it meets the use case for your enterprise.  

Disclosure: I am a real user, and this review is based on my own experience and opinions.
PeerSpot user
Buyer's Guide
CyberArk Privileged Access Manager
May 2024
Learn what your peers think about CyberArk Privileged Access Manager. Get advice and tips from experienced pros sharing their opinions. Updated: May 2024.
770,458 professionals have used our research since 2012.
it_user574734 - PeerSpot reviewer
Technology Architect at a renewables & environment company with 51-200 employees
Vendor
Reduced the overhead to protect enterprise data from delays.

What is most valuable?

  • EPV: Enterprise Password Vault
  • PSM: Privileged Session Manager
  • AIM: Application Identity Manager
  • The latest version of the product is mature and there is more functionality than we need.

How has it helped my organization?

  • Improved security
  • Reduced the overhead to protect enterprise data from delays
  • Receives logs about all activities
  • Compliance with several standards

For how long have I used the solution?

I’m not the end-user. As a solutions architect (consultant), I designed and planned the solution in a very complex network environment.

What do I think about the stability of the solution?

We have not encountered any stability issues. After more than six years with my first CyberArk client, everything works great.

What do I think about the scalability of the solution?

We have not encountered any scalability issues. The solution was scaled right at the beginning of the project.

How are customer service and technical support?

We called technical support a few times and they came back to us very quickly. They fixed our problems very quickly. The problems were caused mainly by changes in the network.

Which solution did I use previously and why did I switch?

We did not use any previous solution.

How was the initial setup?

We were assisted for the initial setup by a CyberArk consultant for one week.

What's my experience with pricing, setup cost, and licensing?

A good architecture will help to gather the business requirements. You can then come up with the right sizing and licenses. If it is a large installation, implement in phases to become familiar with the products, and then purchase the licenses at the right time.

Which other solutions did I evaluate?

All other top solutions in the Gartner Magic Quadrant were evaluated and CyberArk came up as the best and most mature choice. I compared all solutions using my client business requirements and what the solutions offered to them on the top of the business requirements. The scope of the project became wider.

What other advice do I have?

I would recommend being well prepared. Do not improvise. Understand what you are doing. Take the time to read the technical documentation, and not just the marketing material, to understand CyberArk. It will not be a waste of time.

Take the time to prepare, clean, and document all your privileged, services, and application accounts. Use the product for its intended design.

Disclosure: I am a real user, and this review is based on my own experience and opinions.
PeerSpot user
reviewer988578 - PeerSpot reviewer
Snr Technical Consultant at a tech services company with 10,001+ employees
Consultant
Top 20
Reduces the number of “admin” accounts by utilizing accounts that can be used by individuals with the same role

What is our primary use case?

Managing passwords to infrastructure and applications, keeping those accounts “safe,” and being able to audit their use.

How has it helped my organization?

The audit capabilities include video so that not only keystrokes but also mouse clicks are captured. This provides safety and reassurance for anyone working in our infrastructure. 

What is most valuable?

Reducing the number of “admin” accounts by utilizing accounts that can be used by individuals with the same role, but only one at a time. When the accounts have been used, its password is changed (to something a user would have had to write down) before being made available for reuse. The passwords which are hidden from the users are not known, and thus can be long and complex, while only being used for a session before being changed.

What needs improvement?

Privileged Threat Analytics (PTA) that can function in more that one AD domain at a time. The recent enhancement that allows resilience in PTA is great, but operation in more than one domain is required as many organizations have multiple AD domains. Even if it’s just prod and test or PPE split, you still want to know what’s going on in it.

For how long have I used the solution?

Three to five years.

Which solution did I use previously and why did I switch?

No Previous PAM solution used.

Which other solutions did I evaluate?

Yes, based on Gartner

Which deployment model are you using for this solution?

On-premises
Disclosure: I am a real user, and this review is based on my own experience and opinions.
PeerSpot user
reviewer988578 - PeerSpot reviewer
reviewer988578Snr Technical Consultant at a tech services company with 10,001+ employees
Top 20Consultant

With the accounts being used in CyberArk being made available for “exclusive use” it can only be used by one person at a time. When the account is checked back in at the end of a session, the password is then changed before being made available for use by another person.

it_user871449 - PeerSpot reviewer
IT Analyst at a tech services company with 10,001+ employees
Real User
Enables us to connect to the target system component and helps us with recordings
Pros and Cons
  • "There are no issues with scalability. Our clients are very happy to use the product."
  • "The initial setup of CyberArk is a challenge if you do not have prior experience with it."

What is our primary use case?

We have different privileged accounts in our enterprise. All of the application owners and the stakeholders want to store those accounts CyberArk privileged security, so they can connect to the target systems. It also allows for session recordings at the time of auditing.

What is most valuable?

We can be connected to the target system and the PSM component comes into play. In addition, a true asset is the recordings the solution keeps.

What needs improvement?

We have found with the recent upgrade a lot of issues we had with the connection have been resolved.

For how long have I used the solution?

One to three years.

What do I think about the stability of the solution?

It is stable.

What do I think about the scalability of the solution?

There are no issues with scalability. Our clients are very happy to use the product.

How is customer service and technical support?

Tech support is very quick to answer our request tickets. 

How was the initial setup?

It is necessary to use professional service for the setup of the solution. It is a challenge if you are not well-versed in CyberArk.

What's my experience with pricing, setup cost, and licensing?

In comparison to other products on the market, CyberArk is a more costly product.

Disclosure: I am a real user, and this review is based on my own experience and opinions.
PeerSpot user
Master software engineer at a financial services firm with 10,001+ employees
Real User
Improves security by having credentials locked down and rotated regularly
Pros and Cons
  • "Provides improved security around having your credentials locked down and rotated regularly."
  • "I'd like to see a more expansive SSH tunneling situation through PSMP. Right now you have an account that exists in the vault and you say, "I want to create a tunnel using this account." I'd like to see something that is not account-based where I could say, "I want to create a tunnel to this machine over here," and then authenticate through the PSMP and then your tunnel is set up. You wouldn't need to then authenticate to a machine."
  • "When something comes out, it's generally airtight and works as advertised. However, sometimes they are a little bit slow to keep up with what's coming out. In 2017, for example, they released support for Windows Server 2016, which had been out for a year or so."
  • "The scalability, sometimes, is lacking. It works really well for more static environments... But for an environment where you're constantly spinning up new infrastructure or new endpoints, sometimes it has a hard time keeping up."

What is our primary use case?

Primary use case is storing and rotating local domain admin credentials for Windows and Unix network devices.

We're using CyberArk secure application credentials and endpoints on a small scale and we're planning, for the future, to use CyberArk to secure infrastructure applications running in the cloud. We don't have experience using the Plugin Generator Utility.

It is performing pretty well for the most part. We have some issues with RADIUS authentication, some bugs with that. But, generally speaking, it works really well.

How has it helped my organization?

The benefit is knowing where your accesses are, who has access to what. Additionally, obviously, it provides improved security around having your credentials locked down and rotated regularly.

What is most valuable?

Credential rotation. It's tops.

What needs improvement?

I'd like to see a more expansive SSH tunneling situation through PSMP. Right now you have an account that exists in the vault and you say, "I want to create a tunnel using this account." I'd like to see something that is not account-based where I could say, "I want to create a tunnel to this machine over here," and then authenticate through the PSMP and then your tunnel is set up. You wouldn't need to then authenticate to a machine. Then you could go back in through your native clients and connect to that machine. Also, to have that built out to include not just Unix targets but anything you'd want to connect to.

What do I think about the stability of the solution?

The stability, overall, is really good, outside of some of the RADIUS problems that we're having. Generally, it is very good.

What do I think about the scalability of the solution?

The scalability, sometimes, is lacking. It works really well for more static environments. I've been at places that had a really static environment and it works really well. You've got X number of CPMs and X number of PVWAs in your vault and everything gets up and going and it's smooth sailing. But for an environment where you're constantly spinning up new infrastructure or new endpoints, sometimes it has a hard time keeping up.

How is customer service and technical support?

Technical support actually works really well. From time to time there can be some issues as far as SLAs go. Sometimes results will be on the back end of an SLA, which is still fair. It seems like you're complaining that it's "one to three days" and it's three as opposed to one, which is an unfair criticism. 

Generally, everybody is pretty knowledgeable. They're pretty upfront when it needs to be passed off to somebody else. That usually happens in a pretty timely manner.

How was the initial setup?

I have been involved in the initial setup elsewhere. It's actually really straightforward, depending on what you're trying to do. If you have a simpler environment, to set up a PVWA and to set up a vault, is straightforward. It's all pretty much there in the guide. Sometimes the documentation gets a little bit out of sync, where things aren't exactly as they should be but it's always really close. Generally, the documentation is good and straightforward.

What was our ROI?

I'm not the right person to answer questions about ROI for our organization.

What other advice do I have?

Engage with Professional Services, not just for help with, "Here are the buttons to click," because they've been really helpful as far as how we would want to implement things.

Our most important criteria when selecting or working with a vendor, outside of the product being good, are reliability and timeliness of response. Those are the two big things. I think CyberArk does a pretty good job on these.

I rate CyberArk at eight out of 10. I think the solution, as released, is usually very good. When something comes out, it's generally airtight and works as advertised. However, sometimes they are a little bit slow to keep up with what's coming out. In 2017, for example, they released support for Windows Server 2016, which had been out for a year or so. There is probably some tradeoff that is required to keep things so airtight, by holding back a little bit. But that would be my one criticism: It's slow to keep up, sometimes, with updates.

Disclosure: PeerSpot contacted the reviewer to collect the review and to validate authenticity. The reviewer was referred by the vendor, but the review is not subject to editing or approval by the vendor.
PeerSpot user
it_user455391 - PeerSpot reviewer
IT Admin at a tech company with 10,001+ employees
Real User
The proxy solution using PSM and PSMP gives leverage to reach out to servers which are NATed.

What is most valuable?

The proxy solution using PSM and PSMP is valuable. It gives leverage to reach out to servers which are NATed in separate networks and can be reached only by using a jump server.

How has it helped my organization?

Security has been improved. It has improved compliance and there is more control over the privileged users.

What needs improvement?

The performance of this product needs to be improved. When the number of privileged accounts increases, i.e., exceeds 2000, then the performance of the system reduces. The login slows down drastically and also the connection to the target system slows down. This is my observation and thus, the server sizing needs to be increased.

For how long have I used the solution?

I have used this solution for three years.

What do I think about the stability of the solution?

We have not encountered any stability issues so far.

What do I think about the scalability of the solution?

We have experienced some scalability issues, in terms of the performance.

How are customer service and technical support?

The technical support is good.

Which solution did I use previously and why did I switch?

Initially, we were using the CA ControlMinder. There were many issues with this solution, mainly in regards to no proxy solution and poor performance.

How was the initial setup?

The setup has a medium level of complexity.

What's my experience with pricing, setup cost, and licensing?

One should negotiate well.

Which other solutions did I evaluate?

We looked at other solutions such as CA PAM, Lieberman Software, Thycotic and ARCOS.

What other advice do I have?

This is the best product from its breed.

Disclosure: I am a real user, and this review is based on my own experience and opinions.
PeerSpot user
Rodney Dapilmoto - PeerSpot reviewer
Rodney DapilmotoSystems Admin Analyst 3 at CPS Energy
Top 20Real User

The beauty of using the PSMP is that an end user can bypass logging through the PVWA and go directly to using their choice of terminal emulation for SSH (i.e. Putty or SecureCRT, etc.).

See all 2 comments
PeerSpot user
ITSM & AntiFraud Consultant with 51-200 employees
Consultant
The ability to start the project, install and add the passwords in just a few days is valuable.

What is most valuable?

The most valuable feature is the password Vault which gives the administrator control over privileged accounts. The other components that are valuable are Private Session Manager, OPM, Viewfinity, and AIM, which came as an add-on to the organisation's needs. The ability to start the project, install and add the passwords in just a few days brings a big advantage for CyberArk.

How has it helped my organization?

The client can see all the users sessions through PSM, and can protect the applications on servers using AIM. Also, the Privileged Threat Assessment helps the organisation to see all the account risks, including accounts not managed by CyberArk, and accounts/machines with unusual behavior, etc.

What needs improvement?

The DNA scan should be able to scan Unix machines for privileged accounts.

For how long have I used the solution?

PIM tested in the last 2 years.

What was my experience with deployment of the solution?

We didn't have any issues with the deployment.

What do I think about the stability of the solution?

The product is very stable.

What do I think about the scalability of the solution?

I didn't have any issues with the stability. I usually recommend the client to increase the system requirements with 10%.

How are customer service and technical support?

Customer Service:

Customer service is OK in Romania.

Technical Support:

I had direct contact with the local team and they are OK.

Which solution did I use previously and why did I switch?

No.

How was the initial setup?

Straightforward when you have the use cases and a SoW. Usually you follow the Installation Manual, and perform the after-installation tests, and you are sure that everything is OK. The only issue I had was with the anti-virus that was left on the server and that deleted some PSM files. You must always double-check the prerequisites, as you can have some surprises with the GPO that overrides your settings.

What about the implementation team?

I was part of the implementation team with support from the vendor.

Which other solutions did I evaluate?

We also looked at BalaBit Shell Control Box.

Disclosure: My company has a business relationship with this vendor other than being a customer: Implementation partner with CyberArk.
PeerSpot user
it_user326337 - PeerSpot reviewer
it_user326337Customer Success Manager at PeerSpot
Consultant

Tanmay, have you been able to make progress in your investigations of how to solve the difficulties you've been having with MS Clustering?

See all 4 comments
Buyer's Guide
Download our free CyberArk Privileged Access Manager Report and get advice and tips from experienced pros sharing their opinions.
Updated: May 2024
Buyer's Guide
Download our free CyberArk Privileged Access Manager Report and get advice and tips from experienced pros sharing their opinions.