Try our new research platform with insights from 80,000+ expert users
PeerSpot user
Senior Consultant - Information Security Engineering at a financial services firm with 10,001+ employees
Real User
Can provide transparent connection to targeted systems and record activities
Pros and Cons
  • "Rather than multiple tools for maintaining regulatory compliance around passwords and privileged accounts, we have centralized as much as possible with CyberArk. This is now a one stop shop for end users to access their elevated credentials."
  • "You can gradually implement CyberArk, starting with more easily attainable goals."

    What is our primary use case?

    We proactively vault and manage all elevated accounts across multiple platforms. 

    For especially sensitive business units, we additionally leverage Privilege Session Manager to provide transparent connection to targeted systems and record activities.

    How has it helped my organization?

    Rather than multiple tools for maintaining regulatory compliance around passwords and privileged accounts, we have centralized as much as possible with CyberArk. This is now a one stop shop for end users to access their elevated credentials.

    What is most valuable?

    You can gradually implement CyberArk, starting with more easily attainable goals, such as basic vaulting and password rotation and build on that with additional modules, such as Privileged Session Manager and Application Identity Manager.

    What needs improvement?

    While in the past, administration required several tools and multiple screens/options in those products, v10 is moving towards a single pane of glass with common functions easily found and information regarding privileged accounts given to users in plain, easy to understand terms, now enhanced with graphics.

    Buyer's Guide
    CyberArk Privileged Access Manager
    June 2025
    Learn what your peers think about CyberArk Privileged Access Manager. Get advice and tips from experienced pros sharing their opinions. Updated: June 2025.
    857,028 professionals have used our research since 2012.

    For how long have I used the solution?

    Three to five years.
    Disclosure: My company does not have a business relationship with this vendor other than being a customer.
    PeerSpot user
    PeerSpot user
    Princ. Info Security Analyst at a insurance company with 10,001+ employees
    Real User
    Ensures accounts are managed according to corporate policies
    Pros and Cons
    • "Ensures accounts are managed according to corporate policies."
    • "It takes people out of the machine work of ensuring credentials remain up-to-date, and handles connection brokering such that human usage and credential management remain independent."
    • "It is easily customized, and that customization makes it very easy to start trying to shoehorn the solution into roles it was never intended to fill."

    What is our primary use case?

    We use it all.

    • Privileged account access and management
    • Credential rotation
    • Access control
    • Privileged session recording

    How has it helped my organization?

    CyberArk PAS helps ensure accounts are managed according to corporate policies. In short, it takes people out of the machine work of ensuring credentials remain up-to-date, and handles connection brokering such that human usage and credential management remain independent.

    What is most valuable?

    All of the features we use have helped our security posture in some way. All of these have their place in defining and supporting the security posture:

    • Password management
    • Session management
    • Recording
    • Access control.

    What needs improvement?

    Overall, I think it is a fantastic product, when used as designed and intended.

    One of its biggest downfalls is also one of its biggest strengths. It is easily customized, and that customization makes it very easy to start trying to shoehorn the solution into roles it was never intended to fill.

    For how long have I used the solution?

    More than five years.
    Disclosure: My company does not have a business relationship with this vendor other than being a customer.
    PeerSpot user
    Buyer's Guide
    CyberArk Privileged Access Manager
    June 2025
    Learn what your peers think about CyberArk Privileged Access Manager. Get advice and tips from experienced pros sharing their opinions. Updated: June 2025.
    857,028 professionals have used our research since 2012.
    PeerSpot user
    Identity and Access Management System Administrator Sr. at a financial services firm with 1,001-5,000 employees
    Real User
    Increased our insight into how privileged accounts are being used and distributed within our footprint
    Pros and Cons
    • "Our go-to solution for securing against the pass the hash attack vector and auditing privileged account usage."
    • "Increased our insight into how privileged accounts are being used and distributed within our footprint."
    • "Areas the product could be improved are in some of the reporting capabilities and how the reports are configured."

    What is our primary use case?

    CyberArk PAS is our go-to solution for securing against the pass the hash attack vector and auditing privileged account usage.

    How has it helped my organization?

    The CyberArk PAS has greatly increased our insight into how privileged accounts are being used and distributed within our footprint.

    What is most valuable?

    • Ease of use
    • The auditing capabilities
    • The great support of their customer success teams

    What needs improvement?

    Areas the product could be improved are in some of the reporting capabilities and how the reports are configured.

    For how long have I used the solution?

    One to three years.
    Disclosure: My company does not have a business relationship with this vendor other than being a customer.
    PeerSpot user
    it_user789450 - PeerSpot reviewer
    Works at a energy/utilities company with 1,001-5,000 employees
    User
    The ability to write your own connectors and plugins is invaluable as far as flexibility goes
    Pros and Cons
    • "Our privileged accounts are now stored in a more secure location and lateral movement within the network have been lessened."
    • "The PSM is excellent and the ability to write your own connectors and plugins is invaluable as far as flexibility goes."
    • "Enhanced PSM support for Java based applications."

    What is our primary use case?

    • Vaulting of privileged credentials. 
    • Used as a jump host solution. 
    • We wanted to keep passwords from being exposed to end users and connect them seamlessly to their target devices.

    How has it helped my organization?

    Our privileged accounts are now stored in a more secure location and lateral movement within the network have been lessened.

    What is most valuable?

    The PSM is excellent and the ability to write your own connectors and plugins is invaluable as far as flexibility goes.

    What needs improvement?

    • Enhanced PSM support for Java based applications.
    • Easier to use bulk uploader tools (which are already being worked on).

    For how long have I used the solution?

    One to three years.
    Disclosure: My company does not have a business relationship with this vendor other than being a customer.
    PeerSpot user
    PeerSpot user
    Global Privilege Access Management Technical Architect at a consultancy with 10,001+ employees
    Real User
    All access to our servers, by both staff and vendors, is monitored and recorded
    Pros and Cons
    • "CyberArk has resulted in a massive increase in our security footprint."
    • "All access to our servers by both staff and vendors is monitored and recorded."
    • "The current user interface is a little dated. However, I hear there are changes coming in the next version."
    • "There is a learning curve when it comes to planning out the deployment strategy, but once it is defined, it runs itself."

    What is our primary use case?

    We are leveraging CyberArk to provide Windows server access management across our enterprise. All our staff is looking for access to a server and needs to use CyberArk.

    How has it helped my organization?

    CyberArk has resulted in a massive increase in our security footprint. All access to our servers, by both staff and vendors, is monitored and recorded.

    What is most valuable?

    Session recording and key logging. We can track down not only who made a change, but exactly what they changed or did.

    What needs improvement?

    The current user interface is a little dated. However, I hear there are changes coming in the next version. 

    There is a learning curve when it comes to planning out the deployment strategy, but once it is defined, it runs itself.

    For how long have I used the solution?

    More than five years.
    Disclosure: My company does not have a business relationship with this vendor other than being a customer.
    PeerSpot user
    Rodney Dapilmoto - PeerSpot reviewer
    Rodney DapilmotoSystems Admin Analyst 3 at CPS Energy
    Real User

    The UI has been completely revamped in Version 10. It has a differently look and feel. We will be looking to test it in our Development landscape and possibly go to Production towards the end of the year.

    it_user620580 - PeerSpot reviewer
    Security Engineer at a tech services company with 51-200 employees
    Consultant
    Enables us to manage passwords of highly privileged accounts.

    What is most valuable?

    The product enables us manage passwords of highly privileged (service) accounts. These are not tied to a person, and they include a full audit trail and approval workflow functionality.

    How has it helped my organization?

    Management of these accounts is typically required to prevent abuse and gain control of this.

    What needs improvement?

    Perhaps improve the user registry integration. It is already fine, but a bit atypical.

    My experience with the product was with older versions, so this may not represent the actual case anymore. In essence, user registry integration is atypical in the sense that the product creates a copy of the user inside the product itself (to accommodate for license seat counting, I guess).

    Depending upon the size of the user base and license model, it may not allow new users to log in to the platform. I doubt the vendor considers this an issue, though.

    For how long have I used the solution?

    I have used this for three years, including the implementation of the product

    What do I think about the stability of the solution?

    There were no issues with stability.

    What do I think about the scalability of the solution?

    There were no issues with scalability.

    How is customer service and technical support?

    Technical support is OK. The product is not very difficult to install, but there are some considerations that need to be taken into account. Tech support is very well aware of this.

    How was the initial setup?

    The initial setup was simple. It is windows based and leverages installation wizards to perform installation. Also, sufficient documentation exists to guide the setup procedure.

    What's my experience with pricing, setup cost, and licensing?

    Look well at the user base and frequency of use. A lot of licensing models exist, but having this clear will immediately indicate what fits best.

    As for pricing, I cannot comment.

    Which other solutions did I evaluate?

    We did not evaluate other solutions.

    What other advice do I have?

    Make sure that the organization is ready and willing to adopt this, as the typical business cases cannot be addressed by the product alone.

    Disclosure: My company has a business relationship with this vendor other than being a customer: We are a CyberArk business partner.
    PeerSpot user
    PeerSpot user
    CyberArk PAS Solution Professional | Project Manager at a tech services company with 10,001+ employees
    Real User
    Top 20
    Provides automatic password management. We can monitor, record, and control sessions.

    What is most valuable?

    All features of the CyberArk PAS solution are valuable.

    The Digital Vault is one of the key components of the solution along with many other great benefits. The highly secured vault stores the privileged account passwords and data files using encryption. In version v9.7, CyberArk has introduced the Cluster Vault feature, which enhances high availability of the Vault server.

    Other important features:

    • Automatic password management
    • Monitor, record, and control privileged sessions
    • Flexible architecture
    • Clientless product
    • Custom plug-ins for managing privileged accounts and sessions

    How has it helped my organization?

    Unmanaged, highly privileged accounts increase risks that can be exploited by attackers. The security controls defined by the organization require protection of the privileged account passwords. CyberArk helps organizations to identify, store, protect, and monitor the usage of privileged accounts.

    What needs improvement?

    An immediate improvement was the implementation of security controls to protect, control and monitor privileged accounts through CyberArk solution.

    For how long have I used the solution?

    I have used CyberArk for over two and a half years.

    What do I think about the stability of the solution?

    It’s a very stable product. I haven’t encountered any stability issues.

    What do I think about the scalability of the solution?

    I haven’t encountered any scalability issues. All the components are scalable.

    How are customer service and technical support?

    I would give technical support a rating of 4.5/5.

    Which solution did I use previously and why did I switch?

    This is the first PAM product that I have used.

    How was the initial setup?

    The initial installation was straightforward. The configuration or integration can be complex depending on the requirements, design, and infrastructure of the organization.

    What's my experience with pricing, setup cost, and licensing?

    The pricing and licensing depend on many factors and on the components considered for implementation.

    What other advice do I have?

    The PAM solution brings cultural change and adds a layer to the way IT administrators access the privileged accounts before implementing the PAM tool. A great, valuable product like CyberArk requires good planning and time to implement all the features.

    Disclosure: My company does not have a business relationship with this vendor other than being a customer.
    PeerSpot user
    it_user685299 - PeerSpot reviewer
    IT Security Specialist at a tech services company with 11-50 employees
    Consultant
    Password rotation, session recording & isolation and on-demand privileges.
    Pros and Cons
    • "Password rotation, session recording & isolation and on-demand privileges."
    • "For users to access a system via CyberArk Privileged Session Manager, a universal connector needs to be coded in a language called AutoIT and its support for web browsers is so-so. Other products like Centrify have browser plugins that can help automate the process when using their products."

    What is most valuable?

    Password rotation, session recording & isolation and on-demand privileges.

    What needs improvement?

    For users to access a system via CyberArk Privileged Session Manager, a universal connector needs to be coded in a language called AutoIT and its support for web browsers is so-so. Other products like Centrify have browser plugins that can help automate the process when using their products.

    What do I think about the stability of the solution?

    No

    What do I think about the scalability of the solution?

    No

    How is customer service and technical support?

    Very good.

    How was the initial setup?

    Basic setup is pretty straightforward, but to fully utilise the product it can get complicated as it ties in with a lot of other products. Suggest a phased installation so staff can adjust to new processes.

    What's my experience with pricing, setup cost, and licensing?

    It can be an expensive product. I Suggest only licensing basics to begin with and as need arises, start to license extensions (AIM, etc.) during next phase of implementation.

    Which other solutions did I evaluate?

    Centrify and Lieberman ERPM.

    What other advice do I have?

    CyberArk offers extensive training, utilise it. Also their support staff are very good and can assist with everything.

    Disclosure: My company does not have a business relationship with this vendor other than being a customer.
    PeerSpot user
    SecArch3081 - PeerSpot reviewer
    SecArch3081IT Security Consultant and Platform Architect at a pharma/biotech company with 10,001+ employees
    Real User

    Have you assessed TPAM/Safeguard? (was a Dell product, now One Identity)

    Buyer's Guide
    Download our free CyberArk Privileged Access Manager Report and get advice and tips from experienced pros sharing their opinions.
    Updated: June 2025
    Buyer's Guide
    Download our free CyberArk Privileged Access Manager Report and get advice and tips from experienced pros sharing their opinions.