Its features like detailed audit and reporting, automated workflows, granulated privileged access controls, automated password rotation, and centralized and secure storage have helped us in developing a secure environment for customers, along with audit and compliance coverage.
Technical Lead at a tech services company with 10,001+ employees
Enterprise Password Vault, Privilege Session Manager & Application Identity Management have been very useful for our client environment.
Pros and Cons
- "Enterprise Password Vault, Privilege Session Manager, and Application Identity Management have been very useful for our client environment."
- "Performance of PIM could be better and intended for usability as well as security."
How has it helped my organization?
What is most valuable?
Enterprise Password Vault, Privilege Session Manager, and Application Identity Management have been very useful for our client environment.
What needs improvement?
Performance of PIM could be better and intended for usability as well as security. Another point is that the free trials should be in place for all components so that PoC could be made easy.
What do I think about the stability of the solution?
No.
Buyer's Guide
CyberArk Privileged Access Manager
June 2025

Learn what your peers think about CyberArk Privileged Access Manager. Get advice and tips from experienced pros sharing their opinions. Updated: June 2025.
857,028 professionals have used our research since 2012.
What do I think about the scalability of the solution?
No.
How are customer service and support?
Technical support is quite efficient and they always provide a timely response.
Which solution did I use previously and why did I switch?
Haven’t use any solution prior to CyberArk.
How was the initial setup?
As this was new product, there were some small challenges in understanding but the setup was straightforward.
What's my experience with pricing, setup cost, and licensing?
As our deployment was not so large, our client was happy with the pricing and licensing.
Which other solutions did I evaluate?
Yes, we did a research and chose CyberArk above all due to its components that were suitable to our environment.
What other advice do I have?
Proper implementation and prior study of product will give you efficient results. Organizations looking for a product that can provide proper paper trail for risk and compliance audits should certainly give it a try because the product's auditing and reporting capabilities are really bliss.
Disclosure: My company does not have a business relationship with this vendor other than being a customer.
CyberArk Consultant at a comms service provider with 10,001+ employees
The password management component (CPM) is the most valuable. The installation manual is quite straightforward and extensive.
Pros and Cons
- "It enables companies to automate password management on target systems gaining a more secure access management approach."
- "The current interface doesn't scale that well, and has some screens still in the old layout."
How has it helped my organization?
Implementing CyberArk is not only "rolling out" a tool. It also will force the company to have a good look at the access management strategy, improve security processes and clean data. Implementation of CyberArk will increase the insight the company has in their access management implementation.
What is most valuable?
The password management component (CPM) is the most valuable. This enables companies to automate password management on target systems gaining a more secure access management approach.
Another major component is the PSM, which enables session recording and provides additional possibilities to securely connect to target devices.
What needs improvement?
Allthough it's highly configurable, the user interface could use a do-over. The current interface doesn't scale that well, has some screens still in the old layout, while others are in the new ones and consistency in layout between pages sometimes is an issue. As I understand, this is scheduled for version 10.
What do I think about the stability of the solution?
If there are stability issues, most of the time this relates to the companies infrastructure.
What do I think about the scalability of the solution?
CyberArk is highly scalable. Depending on the companies infrastructure, the size of the CyberArk implementation can become quite large.
How are customer service and technical support?
I rate support 7/10. Technical knowledge of the support staff is good. Sometimes it is a lengthy process to get to the actual answer you require. One the one hand, that is because lots of information is required (logs, settings, reports, etc.). On the other hand, the support crew sometimes answers on questions that we did not ask.
Which solution did I use previously and why did I switch?
We did not have a previous solution.
How was the initial setup?
The installation manual is quite straightforward and extensive. There also is an implementation manual to support the function implementation. The installation requires specific hardware which sometimes might not fit the standards within an organisation. Over the last few years the documentation has improved hugely. Of course, there is always room for improvement, but I guess this is one of the better ones in the IT field.
What's my experience with pricing, setup cost, and licensing?
I do not have anything to do with pricing.
Which other solutions did I evaluate?
I was not involved in the acquisition process, but I know that sometimes a Hitachi solution is considered.
What other advice do I have?
Do a detailed assessment of your requirements before you invest. Map the requirements to the functionality and go just that step deeper in the assessment of whether the tool fits your needs. Keep in mind that, although CyberArk is highly configurable and provides lots of functionality, it still is an out-of-the-box solution and customization is limited in some ways.
Disclosure: My company does not have a business relationship with this vendor other than being a customer.
Buyer's Guide
CyberArk Privileged Access Manager
June 2025

Learn what your peers think about CyberArk Privileged Access Manager. Get advice and tips from experienced pros sharing their opinions. Updated: June 2025.
857,028 professionals have used our research since 2012.
Senior Technical Trainer at a tech services company with 501-1,000 employees
Improves the privilege account security in the organization. I would like to see improvement in the custom connector.
Pros and Cons
- "PSM (Privilege Session Manager."
- "I would like to see improvement in the custom connector for integration with different devices."
How has it helped my organization?
This product helps to improve the privilege account security in the organization. Privilege accounts were involved in all the breaches.
What is most valuable?
PSM (Privilege Session Manager)
What needs improvement?
I would like to see improvement in the custom connector for integration with different devices. Currently, it needs professional services and lots of time for out-of-the-box custom connectors.
What do I think about the stability of the solution?
There were no issues with stability. However, there were a few times when there were stability issues because the solution was deployed on a Windows platform.
What do I think about the scalability of the solution?
There were no issues with scalability.
How are customer service and technical support?
Technical support is average. They are not so great, because the first level support partner or distributor has to provide the support and customers cannot contact CyberArk support directly.
Which solution did I use previously and why did I switch?
We moved from version 8 to Version 9.
How was the initial setup?
The initial setup is a bit complex because it has lots of prerequisites and dependencies on Windows' features.
What's my experience with pricing, setup cost, and licensing?
It is not a cheap solution. It is expensive as compared with other solutions. However, it is one of the best solutions in their domain.
Which other solutions did I evaluate?
I worked in the CyberArk distribution company. However, I have seen that other products do not provide all the features that CyberArk can provide.
What other advice do I have?
For implementation, you will need professional services or other experts.
Disclosure: My company has a business relationship with this vendor other than being a customer: My ex-company is the distributor of CyberArk.
Head of Technical Services at a tech services company with 51-200 employees
Gives us the ability to isolate sessions to protect the target system.
Pros and Cons
- "Automates password management to remove the human chain weakness."
- "The web interface has come a long way, but the PrivateArk client seems clunky and not intuitive. It could use an update to be brought up to speed with the usability of PVWA."
How has it helped my organization?
With the ability to better control access to systems and privileged accounts, we no longer need to manage privilege accounts per user. We are able to manage privilege accounts for the service, which is automatically managed by the CPM as part of the solution. Allowing access to systems by group membership, via safe access, makes controlling actual access much simpler than traditional mapping via the Active Directory.
What is most valuable?
-
The ability to isolate sessions to protect the target system. - Automates password management to remove the human chain weakness.
- Creates a full audit chain to ensure privilege management is responsibly done
- Creates an environment in which privilege accounts are used, without exposing the password, on target systems.
- Performs privilege functions, without undue exposure, whilst maintaining the ability to audit, where anything suspicious, or unfortunate, may have occurred.
What needs improvement?
The web interface has come a long way, but the PrivateArk client seems clunky and not intuitive. It could use an update to be brought up to speed with the usability of PVWA.
Whilst the client is completely functional, it's been around for a long time and is reminiscent of XP, or even Windows 95. It could use an aesthetic update, with some of the wording and functions needing to be updated to be more representative of what is found in similar configuration from within the PVWA.
To go into more detail- The old PrivateArk client is simply that, old. Looking at the recently released Cluster Manager quickly reminds us of that. Also, the way in which objects are handled within the old client is similar to how objects were handled in older versions of Windows. The PrivateArk client could do with easier to follow links to configuration items and the ability to perform searches and data relevant tasks in an easier to follow process, there may even be room for inclusion of the server management component (lightweight even) and cluster manager components to be made available via the same client, should permissions permit such. As much as the client remains stable and functional, I believe it is time for an update, even if only aesthetically.
What do I think about the stability of the solution?
Some improvements could be made to the PSM service. However, this could also be a problem with how Microsoft RDS functions, rather than the PSM services.
What do I think about the scalability of the solution?
This product scales amazingly well.
How are customer service and technical support?
Technical support works with customers and partners to resolve issues in a timely way.
Which solution did I use previously and why did I switch?
No previous solutions were used.
How was the initial setup?
The manual reads like a step-by-step guide. The installation, although complex, can be achieved by following the installation guide.
What's my experience with pricing, setup cost, and licensing?
I don’t work with pricing, but licensing is dependent on the needs and requirements of each customer.
Which other solutions did I evaluate?
We evaluated alternatives, but nothing compares.
What other advice do I have?
Make sure you understand your business objects and your technical objects. Plan to scale out to the entire organization, but start small, and grow organically.
Disclosure: My company has a business relationship with this vendor other than being a customer: We are a Platinum Partner.Performanta, the global purple tribe, delivering the bedrock of quality managed cyber security services and consulting to our customers, enabling them to do business safely.
With a consultative approach to people, process and technology, Performanta focuses on cyber security projects in line with adversarial, accidental and environmental business risk.
We measure Governance, Risk and Compliance with a kill chain resilience and technology mapping service, Cyber Security Operations Centre (CSOC) technical support and products to deliver intelligence and customer value to ensure control over the threat landscape.
Securing Your World, Together.
16 May, 2017:
At the CyberArk Impact EMEA 2017 conference, Performanta received the winning award for ‘Best Solution Partner of the Year’ for UK/Ireland, which they describe as:
“The Solution Partner of the Year award recognises Performanta, in region, as having made a significant contribution to the CyberArk business; they understand our offering, can articulate that well into the prospect and customer community and have proven themselves technically capable on a regular basis during the last 12 months.”
SD/Infr Coordinator at a computer software company with 201-500 employees
We helped a telecom to migrate from a standard .XLS with accounts.
Pros and Cons
- "You can easily manage more than 4000 accounts with one PSM."
- "I would like to see better usability for non-technical people."
How has it helped my organization?
The fact that there are more and more plugins developed make it easier for implementation.
What is most valuable?
It is difficult to say what the valuable features are. I use all the different parts together to get the full power of CyberArk.
What needs improvement?
I would like to see better usability for non-technical people. If you use the PVWA interface, I noticed that the end user would need some extra training. The portal doesn't navigate so easily, if you don't know it.
With Facebook, for example, people find their way around easily. In PVWA, it takes some time to know how it works from an end-user point of view.
What do I think about the stability of the solution?
I did not encounter any issues with stability.
What do I think about the scalability of the solution?
There have been no issues with scalability. You can easily manage more than 4000 accounts with one PSM.
How are customer service and technical support?
I haven't needed any support yet, as it is well documented.
Which solution did I use previously and why did I switch?
We did not use a previous solution. Basically, we helped a telecom to migrate from a standard .XLS with accounts to CyberArk.
How was the initial setup?
The most difficult part was convincing the technical teams to use it.
What's my experience with pricing, setup cost, and licensing?
Pricing and licensing depend on the environment. First, make a good plan.
What other advice do I have?
Basically, build it up step-by-step, starting with the EPV of course :-).
Disclosure: My company has a business relationship with this vendor other than being a customer: There is no business relationship in my current company. But my previous company, Devoteam, is officially the point of contact for Belgium.
Senior Consultant at a consultancy with 10,001+ employees
The combination of CPM and PSM resolves a lot of use cases.
Pros and Cons
- "The combination of CPM and PSM resolves a lot of use cases."
- "They can do a better job in the PSM space."
How has it helped my organization?
All the high privileged accounts are managed by CyberArk at a regular frequency. This mitigates the big risk that we had for passwords not changing forever.
What is most valuable?
The combination of CPM and PSM resolves a lot of use cases.
What needs improvement?
They can do a better job in the PSM space.
What do I think about the stability of the solution?
It has been pretty stable. No ongoing issues; only one-off, and CyberArk support has been pretty good for support.
What do I think about the scalability of the solution?
I can foresee some issues if we suddenly have to put thousands of passwords into CyberArk Vault. I know they have the password upload utility, but it has its limitations.
How are customer service and technical support?
Customer Service:
Their support is pretty good and responsive.
Technical Support:
Their support is pretty good and responsive. Their L3 is in Israel, so sometimes it takes more time getting responses for complicated use cases.
Which solution did I use previously and why did I switch?
I did not previously use a different solution. I have always used CyberArk.
How was the initial setup?
I would rate initial setup as a medium complexity. They have good documentation, as well.
What about the implementation team?
I am from a vendor team that does the implementation.
What's my experience with pricing, setup cost, and licensing?
I was not involved in the pricing and licensing. I have an idea that it's on the higher side of the price scale.
Which other solutions did I evaluate?
Before choosing this product, we also evaluated Dell and NetIQ.
Disclosure: My company does not have a business relationship with this vendor other than being a customer.
Security Engineer at a tech services company with 51-200 employees
Provides a full audit trail and approval workflow functionality.
What is most valuable?
- Ability to manage passwords for highly privileged, service accounts, which are not tied to a person
- The inclusion of a full audit trail
- Approval workflow functionality
How has it helped my organization?
Management of these accounts is typically required to prevent abuse and prove compliance.
What needs improvement?
Perhaps improve the user registry integration. User registry integration is atypical in the sense that the product creates a copy of the user inside the product itself. This is done to accommodate for license seat counting.
Depending upon the size of the user base and license model, it may not allow new users to log in to the platform. I doubt that the vendor considers this an issue.
For how long have I used the solution?
I have used CyberArk for three years, including the implementation of the product.
What do I think about the stability of the solution?
I did not have stability issues.
What do I think about the scalability of the solution?
I did not have scalability issues.
How is customer service and technical support?
The product is not very difficult to install. However, there are some considerations that need to be taken into account. Technical support is very well aware of this.
How was the initial setup?
The setup was simple. It is Windows based and leverages installation wizards to perform the installation. Also, sufficient documentation exists to guide you through the setup procedure.
What's my experience with pricing, setup cost, and licensing?
Examine the user base and frequency of use. A lot of licensing models exist. However, having this clear will immediately indicate what fits best. As for pricing, I cannot comment.
Which other solutions did I evaluate?
We didn’t look at alternatives.
What other advice do I have?
Assure that the organization is ready and willing to adopt this. The typical business cases cannot be addressed by the product alone.
Disclosure: My company has a business relationship with this vendor other than being a customer: We are a CyberArk business partner implementing for customers.
Advanced CyberArk Specialist at a tech services company with 1,001-5,000 employees
Secured vault storage provides the capabilities for structuring and accessing data.
What is most valuable?
The secured vault storage offers great capabilities for structuring and accessing data.
Central Password Manager is useful for agentless automated password management on endpoints.
Privileged Session Manager is good for provisioning, securing, and recording sessions to the endpoints.
How has it helped my organization?
CyberArk provided an audit trail for all account operations, including session recordings for all activities performed with high privilege accounts. It also gave us the ability to define various access controls per group, enabling us to differentiate between internal and external IT staff accessing the accounts.
What needs improvement?
The product documentation could be a little more precise in certain aspects with clearer explanations for functionality limitations. New functionalities or discovered bugs take a little longer to patch. We would greatly appreciate quicker development of security patches and bug corrections.
For how long have I used the solution?
I have been working with CyberArk solutions for 7 years already.
I was involved in many implementations, proofs of concept, operational and development activities. I have worked with or test all CyberArk releases since version 5.5.
What do I think about the stability of the solution?
Unfortunately, I did have some problems with stability caused by not following the recommended configurations. But the recommended configurations are very strict, and it is not always possible to implement in a corporate infrastructure. Interference with other applications can also cause problems with CyberArk components.
What do I think about the scalability of the solution?
We did not have any problems with scalability. Each component of the solution is highly scalable and enables us to quickly increase capacity.
How are customer service and technical support?
Customer Service:
Customer service is very responsive and they are willing to help you with any deployment decisions, production issues or just various questions you might have.
Technical Support:The technical support was great. They were very responsive and eager to help. We were able to have professional communication and the involvement of all levels of technical personnel as needed.
Which solution did I use previously and why did I switch?
I used another solution before CyberArk and its limited functionalities were the main reason for switching. We chose CyberArk because of its great functionalities, the ability to be deployed granularly at a different scale for each function, and the ability to be deployed in a distributed infrastructure.
How was the initial setup?
The initial setup is straightforward if you prepare for it properly and test the major functionalities using the configurations that you’ll actually require before you use it in a production deployment.
CyberArk documentation contains a lot of information, so the hardest part is to choose the right setup and deployment strategy.
What's my experience with pricing, setup cost, and licensing?
Plan ahead regarding the licensing costs. You can get a better prices per license as the number of licenses increases. CyberArk is open to providing a test license so you can test any particular functionalities prior to buying the real license.
Which other solutions did I evaluate?
We evaluated ObserveIT and IBM’s Privileged Identity Manager solution, which was still under development back in the times. We chose CyberArk because of its flexible installations, so that it was able to cover most of the deployment scenarios we required.
What other advice do I have?
Study and test it first, before going wild in the production.
It is very easy to create a disaster in production with even the smallest changes.
CyberArk has great resiliency capabilities; use them wherever you can.
Disclosure: My company has a business relationship with this vendor other than being a customer: My current company is a partner with CyberArk for selling the product as a service.

Buyer's Guide
Download our free CyberArk Privileged Access Manager Report and get advice and tips from experienced pros
sharing their opinions.
Updated: June 2025
Product Categories
Privileged Access Management (PAM) User Activity Monitoring Enterprise Password Managers Mainframe Security Operational Technology (OT) SecurityPopular Comparisons
Azure Key Vault
AWS Secrets Manager
Okta Workforce Identity
HashiCorp Vault
Delinea Secret Server
CyberArk Endpoint Privilege Manager
BeyondTrust Endpoint Privilege Management
WALLIX Bastion
CyberArk Identity
One Identity Safeguard
BeyondTrust Privileged Remote Access
BeyondTrust Password Safe
Buyer's Guide
Download our free CyberArk Privileged Access Manager Report and get advice and tips from experienced pros
sharing their opinions.
Quick Links
Learn More: Questions:
- CyberArk vs. ManageEngine Password Manager Pro
- How does Sailpoint IdentityIQ compare with CyberArk PAM?
- Which PAM tool do you prefer: CyberArk Privileged Access Manager, One Identity Safeguard, Delinea Secret Server, or BeyondTrust Privileged Remote A
- What is the difference between Privileged Users and Privileged Accounts
- When evaluating Privileged Identity Management, what aspect do you think is the most important to look for?
- How was the 2020 Twitter Hack carried out? How could it have been prevented?
- Which is the best Privileged Account Management solution?
- What are the top 5 PAM solutions that can be implemented which cover both hybrid and cloud?
- What are the top 5 PAM solutions?
- How will AI and ML help or work with PIM/PAM?
Cool review