Try our new research platform with insights from 80,000+ expert users
PeerSpot user
Technical Director at Unique Performance Techsoft Pvt Ltd
Real User
Anomaly detection and prevention for all privilege accounts
Pros and Cons
  • "Automatic password management, which will automatically change passwords based on compliance requirements."
  • "DVR like video recording and text-based recording for easier audits."
  • "This product needs professional consulting services to onboard accounts effectively based user profiles."

What is our primary use case?

We provide privilege account security and consulting to our customers. Organisations that we work with use CyberArk Privileged Account Security to secure their privilege accounts, which are shared between users in the organisation. It provides automatic password management and provides the single sign-on experience to users for all privilege accounts (Windows - administrator, Linux - root, MS SQL - SA, Oracle - SYS, SSH keys, etc.).

It also provides DVR like recording for all privilege access and text-based recording to easily audit all privilege activities.

The new Privilege Threat Analytics platform provides proactive protection by suspending the user session when it detects an anomaly based on past user login and session activity details. In addition, we can configure the solution to detect scoring on all privilege sessions for easier audits.

The Application Identity Manager module helps to eliminate hard-coded passwords in the application and enables us to easily change database passwords.

How has it helped my organization?

  1. Automatic password management, which will automatically change passwords based on compliance requirements.
  2. DVR like video recording and text-based recording for easier audits.
  3. Easily scan the network for all privilege accounts and has an easier onboarding process.
  4. SSH key management
  5. Command level restriction for all SSH-based devices.
  6. Anomaly detection and prevention for all privilege accounts.
  7. Integration with ticketing tools and SIEM solutions.

What is most valuable?

  1. Ability to provide native experience for users to login to privilege accounts. They do not need to go through a portal to access servers and accounts.
  2. Agentless solution which is easy to customise to any platform having network connectivity.
  3. Wide range of devices supported out-of-the-box.
  4. Easy to configure HA and DR options.
  5. Online training enables cost effective valuable training.

What needs improvement?

This product needs professional consulting services to onboard accounts effectively based user profiles.

Buyer's Guide
CyberArk Privileged Access Manager
September 2025
Learn what your peers think about CyberArk Privileged Access Manager. Get advice and tips from experienced pros sharing their opinions. Updated: September 2025.
866,755 professionals have used our research since 2012.

For how long have I used the solution?

One to three years.

What do I think about the stability of the solution?

No issues.

What do I think about the scalability of the solution?

No issues.

How are customer service and support?

Excellent customer support.

Which solution did I use previously and why did I switch?

We did not previously use another solution.

How was the initial setup?

The setup is very straightforward.

What's my experience with pricing, setup cost, and licensing?

The cost is high compared to other products, but CyberArk provides all the features bundled. This is compared to other vendors who provide them as a different license for each functionality.

Which other solutions did I evaluate?

At present, we are only focusing on CyberArk for privilege account security. Comparing it to other providers, Cyberark provides a more user-friendly environment with many more features and benefits.

What other advice do I have?

I have used and deployed it in various environments so far. It really covers all the use cases provided by the customer.

Disclosure: My company has a business relationship with this vendor other than being a customer. We are certified Gold partners for CyberArk and implemented this solution for a customer from various industry verticals.
PeerSpot user
PeerSpot user
CyberArk Consultant at a hospitality company with 10,001+ employees
Real User
Helped us to identify, store, protect, and monitor usage of privileged accounts
Pros and Cons
  • "CyberArk has helped us to identify, store, protect, and monitor the usage of privileged accounts."
  • "The Vault offers great capabilities for structuring and accessing data."
  • "Central Password Manager is useful for agentless automated password management through AD integration as well as endpoints for different devices."
  • "Online help needs to be looked into with live agent support."
  • "The product documentation has to be more precise in certain aspects with explanations for functionality limitations along with reference material or screenshots."
  • "New functionalities and discovered bugs take longer to patch. We would greatly appreciate quicker development of security patches and bug corrections."

What is our primary use case?

Managing and securing the access to the environment.

I have worked with CyberArk solutions/applications for more than three years.

I have completed several implementations, proofs of concept, operational, and development activities. I have also worked with or checked most CyberArk releases since version 8.7.

How has it helped my organization?

Much stricter rotation of credentials.

Unmanaged and highly privileged accounts increase risks that can be exploited. The security controls defined by the organization require protection of the privileged account passwords. CyberArk has helped us to identify, store, protect, and monitor the usage of privileged accounts.

What is most valuable?

  • Controlled access and rotation of credentials.
  • The Vault offers great capabilities for structuring and accessing data. 
  • Central Password Manager is useful for agentless automated password management through AD integration as well as endpoints for different devices.
  • Privileged Session Manager is for provisioning, securing, and recording sessions.

What needs improvement?

  • The product documentation has to be more precise in certain aspects with explanations for functionality limitations along with reference material or screenshots. 
  • New functionalities and discovered bugs take longer to patch. We would greatly appreciate quicker development of security patches and bug corrections.
  • Online help also needs to be looked into with live agent support.

For how long have I used the solution?

One to three years.
Disclosure: My company does not have a business relationship with this vendor other than being a customer.
PeerSpot user
Buyer's Guide
CyberArk Privileged Access Manager
September 2025
Learn what your peers think about CyberArk Privileged Access Manager. Get advice and tips from experienced pros sharing their opinions. Updated: September 2025.
866,755 professionals have used our research since 2012.
it_user585702 - PeerSpot reviewer
Senior Consultant at a tech services company with 5,001-10,000 employees
Consultant
Allows secure, logged access to highly sensitive servers and services
Pros and Cons
  • "Allows secure, logged access to highly sensitive servers and services."
  • "​It's hard to find competent resellers/support."
  • "Initial setup is complex. Lots of architecture, lots of planning, and lots of education and training are needed."
  • "it manages creds based on Organizational Units. That is, a "safe" is limited to specific OUs. That makes for very elaborate OU structure, or you risk exposing too many devices by putting most of them in fewer OUs."

How has it helped my organization?

It has made things more complex, but has eliminated the possibility of Pass The Hash.

What is most valuable?

Allows secure, logged access to highly sensitive servers and services.

What needs improvement?

Perhaps by design, but it manages creds based on Organizational Units. That is, a "safe" is limited to specific OUs. That makes for very elaborate OU structure, or you risk exposing too many devices by putting most of them in fewer OUs.

For how long have I used the solution?

Three to five years.

What do I think about the stability of the solution?

No scalability issues.

What do I think about the scalability of the solution?

Yes. The OU limitations, noted above.

How is customer service and technical support?

It's hard to find competent resellers/support.

How was the initial setup?

Complex. Lots of architecture, lots of planning, and lots of education and training are needed. Technically, roll-out isn’t bad. It’s the support, training, education, philosophy, and integration within existing ways of doing things that are challenging.

What other advice do I have?

I’m a consultant. I help implement and train others on how to use it in a highly secure environment.

I’d give it a nine out of 10. It is very, very secure.

Plan for major culture change, especially in non-progressive shops. This is a necessary evil to endure for the sake of real security.

Disclosure: My company does not have a business relationship with this vendor other than being a customer.
PeerSpot user
it_user796542 - PeerSpot reviewer
Works at a financial services firm with 10,001+ employees
Real User
Securely protects our TAP/NUID and privileged access accounts within the company
Pros and Cons
  • "The regulation of accounts is by far the most needed and valuable part of the application."
  • "Helped us meet our standards and requirements to help us comply with industry standards and banking regulations."
  • "Securely protects our TAP/NUID and privileged access accounts within the company."

    What is our primary use case?

    Our main use is for CyberArk to hold, maintain, and securely protect our TAP/NUID and "privileged access" accounts within the company.

    How has it helped my organization?

    For audit and risk purposes, CyberArk EPV has helped us meet our standards and requirements to help us comply with industry standards and banking regulations. Reports and other quick audit checks make this possible.

    What is most valuable?

    EPV, as a whole, is very valuable to the company. However, the regulation of accounts is by far the most needed and valuable part of the application.

    What needs improvement?

    Cost efficiency is the number one thing that can be improved in my mind. This would change lots of companies minds on purchasing the product.

    For how long have I used the solution?

    Less than one year.
    Disclosure: My company does not have a business relationship with this vendor other than being a customer.
    PeerSpot user
    PeerSpot user
    Senior Consultant - Information Security Engineering at a financial services firm with 10,001+ employees
    Real User
    Can provide transparent connection to targeted systems and record activities
    Pros and Cons
    • "Rather than multiple tools for maintaining regulatory compliance around passwords and privileged accounts, we have centralized as much as possible with CyberArk. This is now a one stop shop for end users to access their elevated credentials."
    • "You can gradually implement CyberArk, starting with more easily attainable goals."

      What is our primary use case?

      We proactively vault and manage all elevated accounts across multiple platforms. 

      For especially sensitive business units, we additionally leverage Privilege Session Manager to provide transparent connection to targeted systems and record activities.

      How has it helped my organization?

      Rather than multiple tools for maintaining regulatory compliance around passwords and privileged accounts, we have centralized as much as possible with CyberArk. This is now a one stop shop for end users to access their elevated credentials.

      What is most valuable?

      You can gradually implement CyberArk, starting with more easily attainable goals, such as basic vaulting and password rotation and build on that with additional modules, such as Privileged Session Manager and Application Identity Manager.

      What needs improvement?

      While in the past, administration required several tools and multiple screens/options in those products, v10 is moving towards a single pane of glass with common functions easily found and information regarding privileged accounts given to users in plain, easy to understand terms, now enhanced with graphics.

      For how long have I used the solution?

      Three to five years.
      Disclosure: My company does not have a business relationship with this vendor other than being a customer.
      PeerSpot user
      PeerSpot user
      Princ. Info Security Analyst at a insurance company with 10,001+ employees
      Real User
      Ensures accounts are managed according to corporate policies
      Pros and Cons
      • "Ensures accounts are managed according to corporate policies."
      • "It takes people out of the machine work of ensuring credentials remain up-to-date, and handles connection brokering such that human usage and credential management remain independent."
      • "It is easily customized, and that customization makes it very easy to start trying to shoehorn the solution into roles it was never intended to fill."

      What is our primary use case?

      We use it all.

      • Privileged account access and management
      • Credential rotation
      • Access control
      • Privileged session recording

      How has it helped my organization?

      CyberArk PAS helps ensure accounts are managed according to corporate policies. In short, it takes people out of the machine work of ensuring credentials remain up-to-date, and handles connection brokering such that human usage and credential management remain independent.

      What is most valuable?

      All of the features we use have helped our security posture in some way. All of these have their place in defining and supporting the security posture:

      • Password management
      • Session management
      • Recording
      • Access control.

      What needs improvement?

      Overall, I think it is a fantastic product, when used as designed and intended.

      One of its biggest downfalls is also one of its biggest strengths. It is easily customized, and that customization makes it very easy to start trying to shoehorn the solution into roles it was never intended to fill.

      For how long have I used the solution?

      More than five years.
      Disclosure: My company does not have a business relationship with this vendor other than being a customer.
      PeerSpot user
      PeerSpot user
      Identity and Access Management System Administrator Sr. at a financial services firm with 1,001-5,000 employees
      Real User
      Increased our insight into how privileged accounts are being used and distributed within our footprint
      Pros and Cons
      • "Our go-to solution for securing against the pass the hash attack vector and auditing privileged account usage."
      • "Increased our insight into how privileged accounts are being used and distributed within our footprint."
      • "Areas the product could be improved are in some of the reporting capabilities and how the reports are configured."

      What is our primary use case?

      CyberArk PAS is our go-to solution for securing against the pass the hash attack vector and auditing privileged account usage.

      How has it helped my organization?

      The CyberArk PAS has greatly increased our insight into how privileged accounts are being used and distributed within our footprint.

      What is most valuable?

      • Ease of use
      • The auditing capabilities
      • The great support of their customer success teams

      What needs improvement?

      Areas the product could be improved are in some of the reporting capabilities and how the reports are configured.

      For how long have I used the solution?

      One to three years.
      Disclosure: My company does not have a business relationship with this vendor other than being a customer.
      PeerSpot user
      it_user789450 - PeerSpot reviewer
      Works at a energy/utilities company with 1,001-5,000 employees
      User
      The ability to write your own connectors and plugins is invaluable as far as flexibility goes
      Pros and Cons
      • "Our privileged accounts are now stored in a more secure location and lateral movement within the network have been lessened."
      • "The PSM is excellent and the ability to write your own connectors and plugins is invaluable as far as flexibility goes."
      • "Enhanced PSM support for Java based applications."

      What is our primary use case?

      • Vaulting of privileged credentials. 
      • Used as a jump host solution. 
      • We wanted to keep passwords from being exposed to end users and connect them seamlessly to their target devices.

      How has it helped my organization?

      Our privileged accounts are now stored in a more secure location and lateral movement within the network have been lessened.

      What is most valuable?

      The PSM is excellent and the ability to write your own connectors and plugins is invaluable as far as flexibility goes.

      What needs improvement?

      • Enhanced PSM support for Java based applications.
      • Easier to use bulk uploader tools (which are already being worked on).

      For how long have I used the solution?

      One to three years.
      Disclosure: My company does not have a business relationship with this vendor other than being a customer.
      PeerSpot user
      Buyer's Guide
      Download our free CyberArk Privileged Access Manager Report and get advice and tips from experienced pros sharing their opinions.
      Updated: September 2025
      Buyer's Guide
      Download our free CyberArk Privileged Access Manager Report and get advice and tips from experienced pros sharing their opinions.