Try our new research platform with insights from 80,000+ expert users
reviewer1248522 - PeerSpot reviewer
Team Lead Information Security Control at a financial services firm with 5,001-10,000 employees
Real User
Good support, reliable, and straightforward implementation
Pros and Cons
  • "CyberArk Privileged Access Manager is stable."
  • "CyberArk Privileged Access Manager could improve the integration docking, it should have more layers. For example, integration with OpenShift."

What is our primary use case?

We are using CyberArk Privileged Access Manager because we have too many accounts and we need to manage them.

How has it helped my organization?

CyberArk Privileged Access Manager has helped our organization by controlling users' access.

What needs improvement?

CyberArk Privileged Access Manager could improve the integration docking, it should have more layers. For example, integration with OpenShift.

For how long have I used the solution?

I have been using CyberArk Privileged Access Manager for approximately two years.

Buyer's Guide
CyberArk Privileged Access Manager
June 2025
Learn what your peers think about CyberArk Privileged Access Manager. Get advice and tips from experienced pros sharing their opinions. Updated: June 2025.
857,028 professionals have used our research since 2012.

What do I think about the stability of the solution?

CyberArk Privileged Access Manager is stable.

What do I think about the scalability of the solution?

We have thousands of users using CyberArk Privileged Access Manager in my organization.

How are customer service and support?

The support from CyberArk Privileged Access Manager is good.

How was the initial setup?

The initial setup of CyberArk Privileged Access Manager was straightforward.

What about the implementation team?

We had a local third-party company help us with the implementation of CyberArk Privileged Access Manager. The maintenance is sometimes a challenge for our consulting team that does it.

What other advice do I have?

I would recommend this solution to others.

I rate CyberArk Privileged Access Manager a nine out of ten.

Which deployment model are you using for this solution?

On-premises
Disclosure: My company does not have a business relationship with this vendor other than being a customer.
PeerSpot user
PeerSpot user
Systems Admin Analyst 3 at CPS Energy
Real User
The Privileged Session Manager Proxy makes it extremely convenient for UNIX Administrators to utilize their favorite SSH client software
Pros and Cons
  • "The Password Upload Utility tool makes it easier when setting up a Safe that contains multiple accounts and has cut down the amount of time that it takes to complete the task."
  • "Currently, in Secure Connect, an end user is required to enter account information manually, and cannot save any of this information for future use."

What is our primary use case?

We use this solution for privileged systems access with a high emphasis on security. End users are required to go through a process of being vetted in our NERC environment in order to use the solution. This product has been used by my company for about five years now.

How has it helped my organization?

This product has placed a new culture in my company by making employees more aware of IT compliance and cyber security. It has also placed us in a position to meet NERC CIP v6 requirements.

What is most valuable?

The Password Upload Utility tool makes it easier when setting up a Safe that contains multiple accounts and has cut down the amount of time that it takes to complete the task.

Using the PSMP (Privileged Session Manager Proxy) makes it extremely convenient for UNIX Administrators to utilize their favorite SSH client software (i.e. SecureCRT or Putty) to connect to a privileged target without having to go through the PVWA web login.

What needs improvement?

I would like to see the product enhancement with the Secure Connect feature. Today, there is no functionality to create "Accounts" using Secure Connect to permanently store a user's working tab. It is a tedious manual process of entering host IP information and user credentials into a privileged target system.

Currently, in Secure Connect, an end user is required to enter account information manually, and cannot save any of this information for future use. It’s a manual process of entering information all the time. Unless you are working with accounts already stored in “Safes”.


For how long have I used the solution?

I have been using this solution for seven years.

What do I think about the stability of the solution?

We have noticed some stability issues with the PSM Servers. We've noticed that there may be a limitation on the number of users that a PSM Server can handle. We have two PSM Servers deployed in our Production environment and have come to a conclusion that we may need to add two more to stabilize the environment.

Upgrading to version 9.9 significantly reduced the stability issues with the PSM Servers and the limitation on the number of users that the PSM can handle.

How are customer service and support?

CyberArk could use some improvement in their level of customer service. Sometimes, it can take more than a day before a Case that I have submitted online gets a response from tech support.

The level of technical support has been great. The challenge has been to get an initial response and sometimes follow-up from CyberArk Support.

What about the implementation team?

If you are going to set up CyberArk for the first time, I highly recommend that you utilize their Professional Services. They are extremely knowledgeable and very helpful and will ensure that your implementation is a success.

What's my experience with pricing, setup cost, and licensing?

We use Texas DIR when evaluation and making purchases of products.

What other advice do I have?

We are currently on version 9.10. We would like to upgrade to the latest version some time this year. There is currently a CyberArk Security Bulleting CA19-09 that addresses potential administrative manipulations within the PVWA and the Digital Vault. CyberArk has released patch 9.10.4 to address the PVWA and they are working on releasing a patch for the Vault Server.

Which deployment model are you using for this solution?

On-premises
Disclosure: My company does not have a business relationship with this vendor other than being a customer.
PeerSpot user
Rodney Dapilmoto - PeerSpot reviewer
Rodney DapilmotoSystems Admin Analyst 3 at CPS Energy
Real User

We do not use CyberArk PTA in our environment.

See all 5 comments
Buyer's Guide
CyberArk Privileged Access Manager
June 2025
Learn what your peers think about CyberArk Privileged Access Manager. Get advice and tips from experienced pros sharing their opinions. Updated: June 2025.
857,028 professionals have used our research since 2012.
reviewer1762503 - PeerSpot reviewer
Engineering Lead PAM with 10,001+ employees
MSP
Session management isolates users' machines, maintaining privileged session in the event of an attack
Pros and Cons
  • "The biggest feature is the security of the overall solution. It's very secure. The vaulting technology and the number of security layers involved in the vault, where privileged accounts are actually stored, is the heart of the solution."
  • "More than the product itself, there is room for improvement in the documentation. The documentation should be very detailed and very structured. It has a lot of good information, on one level, but I feel that it could be more elaborate and more structured."

What is our primary use case?

The primary use case of CyberArk is controlling privileged access. It is good at providing various privileged access controls. The CyberArk use case can be implemented on various platforms.

Password rotation is another key use case. There are many integrations available on the CyberArk Marketplace, plugins and connectors with different technologies to be integrated with CyberArk to achieve this use case.

I've had an experience of deploying CyberArk in on-premise and in the cloud.

How has it helped my organization?

For any use case, session management is a key because it isolates users' machines to the target system. That way then, if an attack happens on a user's machine, the privileged session is still an isolated session. The privileged session is not interrupted.

What is most valuable?

In general, all CyberArk's features are very useful from a privileged account control point of view, and for session management and password rotation. 

The biggest feature is the security of the overall solution. It's very secure. The vaulting technology and the number of security layers involved in the vault, where privileged accounts are actually stored, is the heart of the solution.

There are many other important features of CyberArk: 

  • Privileged Session Manager (PSM) connects you to the target platform. 
  • Password management (CPM) provides automatic password rotations, including password verification and reconciliation. 
  • Auditability, which means CyberArk keeps track of logs and audit trails, including session recording, which is another key feature. 

The password management enables the rotation of passwords per an organization's policy. Passwords can be rotated after N number of hours or based on a particular day. It's a very key feature from a security point of view, because passwords are meant to be rotated very frequently. CyberArk does it very well with different plugins.

What needs improvement?

More than the product itself, there is room for improvement in the documentation. The documentation should be very detailed and very structured. It has a lot of good information, on one level, but I feel that it could be more elaborate and more structured. That would make it easier when somebody is implementing it or referencing the documentation.

For how long have I used the solution?

I have used CyberArk Privileged Access Manager for approximately seven years.

What do I think about the stability of the solution?

It is a very stable and reliable product.

What do I think about the scalability of the solution?

It is scalable and scaling it is straightforward. It has been designed and planned well, making it easy to scale the environment.

How are customer service and support?

We have frequently worked with CyberArk technical support. In the last year their support has been changed. I would rate it at about seven out of 10. It depends on the person who picks up the support ticket. If that person is fairly proficient in his experience, the response will be quick. Otherwise, it can take time. But, in general, it's good.

How would you rate customer service and support?

Neutral

How was the initial setup?

The complexity of the initial setup depends on the organization's underlying infrastructure, on the environment in which the development is happening. Sometimes the environment on which the product is being installed is more of a challenge than the product. That plays a key role. And, as I mentioned, it's a bit of a challenge because of the documentation at the moment. It needs to be much more user-friendly

The time for deployment also depends on the environment in which the product is being deployed. The technology landscape is very complex. With an end-to-end implementation, it can vary depending on whether the environment is small or medium or complex, and what types of use cases are involved. If it is just a simple environment and minimal features need to be configured, it can be straightforward and take a few days. But if it's a really large-scale, complex environment, where multiple integrations are required, because the underlying requirement to deploy CyberArk with other applications is complex, it will definitely take longer.

What's my experience with pricing, setup cost, and licensing?

Generally, I don't get involved in the licensing or the purchasing side of it, but I do know that the licenses are expensive.

What other advice do I have?

It's a long journey and it needs to be set out in phases very well, starting with something small and gradually implementing PAM controls across whatever multiple technologies an organization uses. It's a long-term project to fully deploy and benefit from all of CyberArk's features. 

Rather than being about the product, it's more about the overall PAM journey that a company decides to take. It's a very complex world, integrating multiple applications within CyberArk. There are various technical complexities involved, not with CyberArk, but with the other products. 

But it's worthwhile. CyberArk does its job very well. All the components are very useful and the benefits are all evident. CyberArk is the number-one PAM solution.

Disclosure: PeerSpot contacted the reviewer to collect the review and to validate authenticity. The reviewer was referred by the vendor, but the review is not subject to editing or approval by the vendor. The reviewer's company has a business relationship with this vendor other than being a customer: Implementer
PeerSpot user
reviewer1329747 - PeerSpot reviewer
Security at a tech services company with 201-500 employees
Consultant
Its privileged session management is valuable for monitoring your inside threats, but it's a lot of work to set up
Pros and Cons
  • "Password Vault's main advantage is its scalability. We constantly see huge enterprises implementing something like this, and the privileged session management is an excellent piece. You can kind of watch videos of whatever an admin has done."
  • "There are upwards of six components you need to set it up. And you might need anywhere from two to five servers. It takes some work to set that up, especially in a larger environment."

What is our primary use case?

Companies often have an enormous amount of admin credentials out there. They want to find out how many they have, start cleaning them up, and ensure they're all kept in an encrypted vault. Password Vault is probably the top product in that space, and it's a monster to implement, but CyberArk is great at what they do.

What is most valuable?

Password Vault's main advantage is its scalability. We constantly see huge enterprises implementing something like this, and the privileged session management is an excellent piece. You can kind of watch videos of whatever an admin has done. So, for example, if an admin doesn't check out their password and fires up a session on a machine, you can see playback. Scalability and those particular features are pretty valuable for monitoring your insider threat.

What do I think about the stability of the solution?

Our customers haven't complained about any stability issues, and we've set Password Vault up for quite a few customers. However, the stability depends on the equipment unless they do it in the cloud. But if they're setting up on a bunch of VMs, and that VM store goes down, that's not necessarily a CyberArk problem. That's more of a problem with Windows or VMware, etc., or something like that. So I guess the stability's fine.

How was the initial setup?

There are upwards of six components you need to set it up. And you might need anywhere from two to five servers. It takes some work to set that up, especially in a larger environment.

What's my experience with pricing, setup cost, and licensing?

On-prem CyberArk is pretty expensive. It's pricey and you get what you pay for. It's an incredible product for what it does, but it's significantly cheaper to go to the cloud.

What other advice do I have?

I would rate Password Vault seven out of 10. I'd only go that low because of how challenging the installation can be. I advise our customers to consider using CyberArk's cloud option because many people just reflexively lean toward the on-prem solution. The cloud solution is considerably less expensive. It's still complex to set up the different components and make it all work together, so I suggest you make sure you need all those components. Maybe you don't even want to use everything there, but consider the cloud version. It's the same product, but it's more straightforward and cost-effective. You're not losing any functionality.

Which deployment model are you using for this solution?

Hybrid Cloud
Disclosure: My company has a business relationship with this vendor other than being a customer: Partner
PeerSpot user
reviewer1749054 - PeerSpot reviewer
Security Delivery Analyst at a computer software company with 10,001+ employees
Real User
Good policy configuration and tech support
Pros and Cons
  • "Password Vault's policy configuration is very good - when you receive an attack, you can segment the structure of the project in order to isolate parts or users."
  • "Upgrading the product is very difficult, so this could be an area for improvement."

What is our primary use case?

My primary use case is the digital identity for access management of users and the configuration of passwords, or MSA, or SSO.

What is most valuable?

Password Vault's policy configuration is very good - when you receive an attack, you can segment the structure of the project in order to isolate parts or users.

What needs improvement?

Upgrading the product is very difficult, so this could be an area for improvement.

For how long have I used the solution?

I've been using this solution for six months.

What do I think about the stability of the solution?

There have been a few lags when connecting with RDP, but otherwise, the stability is good.

What do I think about the scalability of the solution?

Password Vault's scalability is good.

How are customer service and support?

The technical support is very good in general but could provide more help when upgrading.

What other advice do I have?

I would rate this solution eight out of ten.

Which deployment model are you using for this solution?

Private Cloud
Disclosure: My company has a business relationship with this vendor other than being a customer: Partner
PeerSpot user
reviewer794646 - PeerSpot reviewer
Information Security Analyst at a financial services firm with 1,001-5,000 employees
Real User
User-friendly GUI but more expensive than most competitors
Pros and Cons
  • "CyberArk's GUI is user friendly."
  • "Password Vault is much pricier than other solutions. A vendor team might struggle to explain why that price is justified. There are good alternatives that cost less."

What is our primary use case?

The primary use case is to monitor the official activity of a privileged user for privilege violations.

What is most valuable?

CyberArk's GUI is user friendly.

For how long have I used the solution?

I have been using CyberArk for only six months.

What do I think about the stability of the solution?

Password Vault is a reasonably stable solution.

What do I think about the scalability of the solution?

I've only used it for a few months, so it's hard for me to say how scalable Password Vault is. Those who've used it longer and deployed it on more endpoints could answer that question better.

How are customer service and support?

We're served by CyberArk's regional support based in India and Singapore, but I want country-level support in Bangladesh, so I can get help quickly. Also, online support is annoying. I would like to get face-to-face support from a local CyberArk representative. 

How was the initial setup?

Setting up Password Vault is not easy. We needed an online consultant to help us.

What's my experience with pricing, setup cost, and licensing?

Password Vault is much pricier than other solutions. A vendor team might struggle to explain why that price is justified. There are good alternatives that cost less.

What other advice do I have?

I rate CyberArk Enterprise Password Vault seven out of 10

Which deployment model are you using for this solution?

On-premises
Disclosure: My company does not have a business relationship with this vendor other than being a customer.
PeerSpot user
Senior Security Manager at SMU
Real User
Reliable, scalable, and easy to install but the pricing could be better as it's expensive
Pros and Cons
  • "Its' quite stable."
  • "They need to provide better training for the System Integrator."

What is our primary use case?

We use this solution for ID purposes. When we remove a user from the server, we need a privileged ID password.

We are a University. It's a large organization.

What is most valuable?

It's not very different when compared with other products.

What needs improvement?

From what I can see, the Systems Integrator is useless. When I ask for the information, nothing is given to me. They need to provide better training for the System Integrator.

For how long have I used the solution?

I have been working with this solution for two years.

What do I think about the stability of the solution?

Its' quite stable.

What do I think about the scalability of the solution?

It's a scalable solution but could be improved. On a scale of one to five, I would rate it a four.

How are customer service and technical support?

I have not used technical support.

How was the initial setup?

The initial setup is pretty easy. It is not complex.

What about the implementation team?

We used a reseller, integrators, but they were useless to me.

What's my experience with pricing, setup cost, and licensing?

Pricing is quite high and it could be improved.

What other advice do I have?

I would rate CyberArk Privileged Access Security a six out of ten.

Which deployment model are you using for this solution?

On-premises
Disclosure: My company does not have a business relationship with this vendor other than being a customer.
PeerSpot user
CDO & Co-Founder at ELYTIK
Real User
Complete package, thorough threat detection, but expensive
Pros and Cons
  • "This is a complete solution that can detect cyber attacks well."

    What is most valuable?

    This is a complete solution that can detect cyber attacks well. I have found the proxy features most valuable for fast password web access. 

    For how long have I used the solution?

    I use the solution for security. I make sure the bulk of the password of the certificate for the cloud and on-premise applications are good. I action and administer them when needed.

    What do I think about the stability of the solution?

    The solution is stable, it is very resilient.

    What do I think about the scalability of the solution?

    I have found the solution to be scalable.

    How was the initial setup?

    The installation is not difficult for me because all the information is on the website.

    What's my experience with pricing, setup cost, and licensing?

    The solution is very expensive and requires a license. We pay for an enterprise license.

    What other advice do I have?

    This is a complete package that has a lot of the capabilities you would want in this type of solution but it is very expensive.

    I rate CyberArk PAS a seven out of ten.

    Which deployment model are you using for this solution?

    On-premises
    Disclosure: My company does not have a business relationship with this vendor other than being a customer.
    PeerSpot user
    Buyer's Guide
    Download our free CyberArk Privileged Access Manager Report and get advice and tips from experienced pros sharing their opinions.
    Updated: June 2025
    Buyer's Guide
    Download our free CyberArk Privileged Access Manager Report and get advice and tips from experienced pros sharing their opinions.