The solution is very complete. It has the most features on the market.
Session monitoring is excellent. It may be the solution's most valuable aspect.
The solution offers very good password protection.
It offers great integration with many products.
The solution is very complete. It has the most features on the market.
Session monitoring is excellent. It may be the solution's most valuable aspect.
The solution offers very good password protection.
It offers great integration with many products.
The initial setup could be simplified. Right now, in comparison to its nearest competitors, it's quite complex.
The solution is very stable.
The solution is easy to scale.
I've never had to reach out to technical support.
The initial setup is complex. You need to install many virtual machines. You must do many configurations. It's not just one machine to another; you'll also have to handle the configuration of independent machines as well.
The price is higher than the competition, but if the customer wants the best product for their company, they won't mind the price.
We have a permanent license. Licensing is based on how man users you have, so the pricing varies according to the size of the company.
We're a partner of CyberArk.
I'd rate the solution nine out of ten.
I have worked as a CyberArk SME, team leader, project manager in the financial industry. I've managed both the implementation and configuration of enterprise CyberArk infrastructures.
As an end-user within the organization, I can't and I don't need to know the passwords of privileged accounts as CyberArk is taking care of the password/SSH Keys management on the target machines. The solution provides this security without changing the end-user experience because they are able to use the end-user tool like putty or remote desktop connection even without passing through the CyberArk interface
Our most valuable features would probably be password/key rotation, the SSH key manager, account discovery and quality of video recordings.
I think they can add a new feature for the account onboarding like I've seen for another PAM tool: for instance they should give to the CyberArk administrator the chance to upload the accounts via the PVWA using a txt or an xls file.
If you don't know the product well, it might not be easy to set up, because CyberArk has several modules. You need to study it before to start to implement this solution. It's not like other PAM tools e.g.Thycotic, which is easy to set up, as it's just a web server with a database.
The deployment itself can take between one and two work weeks. The project, or configuration documents, however, must take more time. You cannot think about the infrastructure in one week. You have to prepare all the documents, understand the infrastructure you want, etc. It's the project management that takes more time.
You have to analyze the target hosts that you have in your organization and understand what is the scope of your project. You have to make a very clear plan for the project and CyberArk infrastructure sizing. Then you have to do a very good job with the project management and collaborate with the privileged accounts stakeholders. With all that in mind, you can go ahead with CyberArk.
Be careful with the configuration. When you make changes and so on, be very careful to understand what you are doing. Plan and test what you are doing in a test environment before switching to production.
I would rate CyberArk as nine out of ten. Ten means that it's the best solution on the market and no one else compares to it. However, before giving them a ten, they should do something related to the Password Vault utility. Maybe they should add some other features too. For me, it is one of the best tools on the market, so nine is enough for now.
The primary use case of the solution is to gather privileged accounts from different systems and to contain privileged accounts in one secure place.
Security is the solution's most valuable feature. As far as I know, this solution is the most secure system of this class on the market today, even considering another management system like Fudo Security, which we also use. The integration capabilities are very good; it helps strengthen our overall security.
The interface and user experience could be improved. In comparison, in Fudo Security, items are very searchable and it's very comfortable to work with. CyberArk is not very good at that. It could be improved and it wouldn't be too complicated to do so. The solution is too big and complex for any business that is small or medium-sized. They should offer a more compact version or make a solution better suited to smaller businesses.
I've been using the solution for five to ten years.
It's an enterprise-level solution. So long as you can afford it, you can scale.
I've never had to reach out to technical support.
We didn't really use a different solution. We use Fudo Security, but it's not for password management alone. It's more of an all-in-one solution. We still use it; it's cheap and it's a very simple solution in comparison to CyberArk.
The initial setup is okay; I'd rate it seven out of ten in terms of ease of use compared to other solutions.
Many different things during installation are not straightforward. For example, it would be better to make some kind of pre-installed machine or virtual machine or to make it easy to deploy various ISO files. There are competitors that have just one machine and no infrastructure involved. It would also be better if they embedded the license or offered some free options.
Deployment took about a month.
As far as I know, CyberArk changed its pricing policy for our region. Overall it was very expensive a few years ago, but now, just around a year ago, it became less expensive and it's easier for us to sell it.
We use the on-premises deployment model.
In terms of advice, I'd suggest others follow the implementation carefully.
I'd rate the solution eight out of ten. It's not easy to install and it's got too many components which means it's not really suitable for small or medium-sized businesses.
Our primary use of CyberArk Privileged Access Manager is to bring control on to the privileged access. For a while, there were individual IDs having privileged access. We wanted to restrict that. We implemented the solution so that it can be more of internal control. We can have session recordings happening and reduce our attacks.
There are two main ways CyberArk Privileged Access Manager Server Control has been helpful to us.
The features that we find most valuable are:
These modules help us in locking down the credentials, rotating passwords automatically without us having to worry about it, isolation of servers from the user machine and availability of privileged session recordings for us to check on demand.
I think that the connectors, the integration pieces, the integration to ticketing system. This is something which is not meeting our requirements via out-of-the-box solutions, so we have to look for a customized solution, that could be improved.
Integration with the ticketing system should allow any number of fields to be used for validation before allowing a user to be evaluated and able to access a server.
Additional features: We are looking at the connectors. The connectors to be more robust and provide more flexibility for out-of-the-box implication.
It's quite stable so we've not faced any problems so far and it's been working smoothly for us. Initially, there were some technical issues, disconnections happening, and the slowness was there, but we've been able to overcome those challenges. Now for the past 15, 20 days, it's been running smoothly.
The software is scalable enough, so if we want to add more domains, we can just go ahead and do it. I don't see a challenge with that. There are a couple of other parts of the solution that we are not rolling out, but we'll be doing that.
The support has been good. Turnaround times have been okay. They have not been immediate, but they do respond in a few hours, or in a day.
We didn't have a previous solution at the time.
AIM was a complex piece, but the install was straightforward. It took us around five months.
We went with an implementation partner for the deployment which included a number of admins. Currently, there are around 60 users but they are going to be 150 plus in a month or so.
We want the implementation partner for supporting it for the next three months, and then we will make the call whether we want to continue with them or maybe our resources should be good enough internally to support it.
The cost and licensing fees of the software are fairly reasonable.
There were a few competitors we evaluated like CA Technologies, Arcos, Oracle, and Microsoft.
My advice would be to plan ahead of time. Put up the plan for all the modules that you are going to implement. Look at what the dependencies of those are and plan for those dependencies in advance, then start the project.
Especially where it is the application identity manager, the AIM part, which is not only dependent upon the implementation partner but also the customer dev team to make the changes.
That's what makes it critical to plan ahead, ensure all stakeholders' commitment of their time and support, then start the implementation.
I would rate it nine out of ten.
It provides a tamper-proof solution for privileged accounts and third-party access to corporate assets.
We have different teams that hire out consultants from various vendors. For those consultants, there was a challenge in providing access to our critical infrastructure. CyberArk PAS provides isolated and recorded sessions for third-party/outsourced admin access.
Automatic password management based on a strong password policy. Because still, many people choose not strong enough passwords for administrative accounts.
The product should be improved in order to support more platforms. It will be awesome if google cloud API keys are being supported like AWS and Azure.
Pretty scalable in the sense of PSM and storage.
No, we didn't use any.
Yes, there was a POC which took place among BeyondTrust, Thycotic and CyberArk.
Our primary use case of this solution is for elevated access.
The primary improvement to my organization is the fact that now the users are aware that: one, the work that they do will be recorded and so there will be an audit trail of what has happened; and then, two, we don't have to worry about people sharing passwords because they are given out on a case by case basis.
Some folks would like to have keystroke tracking and some would not. I guess if they could make that an option that might be interesting for certain organizations.
Scalability and stability are both excellent. We have around 250 users. All individuals with privilege to elevated access will be required to use this after a certain amount of time.
Thus far technical support is excellent. We haven't had any issues or difficulties.
The initial setup was pretty straightforward. Deployment took approximately six months. For the deployment, there was a group of about five to six individuals. For sustainment, we just have gotten into a training mode and we will have our support team giving them assistance.
I would rate this solution a 9.5 out of ten. To get it to a ten it should give other possibilities to select if you could follow the keystrokes. It should have a flexibility with things in which people can use it a lot faster.
The main usage of our implementation is to limit the credentials exposure to our third-party teams. They are able to connect to the end-points in a secure and isolated manner without needing to know any end-point credentials.
Our third-party teams are able to connect to the end-points in a secure and isolated manner without needing to know any end-point credentials. Besides this, end-points themselves are back in control when the passwords are managed by the CPM.
The two main features are the CPM and the PSM. This is to make sure that the credentials are managed in a controlled manner and the sessions that are launched are set up in an isolated way.
We are aware that in 10.6, the "just in time" access has been created. I would like to see this developed further.
The vault is almost a set-and-forget solution. Once the vault has been installed and configured, not much needs to be done in there apart from the occasional upgrade.
The environment is very easy to scale out. Especially running the CPM and PSM components in a load balanced virtual environment gives you the flexibility to quickly expand the environment.
This has been excellent for me. They always replied quickly, and most of the time the issue was resolved. The only downside — as soon as a ticket goes to the R&D engineers, you will have to wait a bit.
We did not use a PAM product before this.
The initial setup (for a UAT environment) was straightforward. During the planning of the PROD environment, it became a little more tricky with different network segments and method for accessing the environment itself.
We had a combination of in-house (with training), vendor (CyberArk) and third-party vendor. The third-party vendor Computacenter helped us with creating some design and documentation. I would not recommend this third-party to other people as they did not fully work with us and listen to our requirements.
We are still rolling out in our environment which makes the ROI difficult to calculate.
Make sure to use the latest licensing model as that will give you most of the "cool" features to work with.
One of the most important aspects is to ensure that the business is behind the solution. CyberArk suite will only work well if all users adopt the system.
Privileged account access into customer environments.
A higher level of password rotation and usage auditing.
The native PSM components are really good, however, if you have to apply environmental tweaks to an application launch, custom AutoIt scripts are needed.
Options for specifying drive mappings or script execution without the need for AutoIt based scripting in the native components would be good.
