Try our new research platform with insights from 80,000+ expert users
PeerSpot user
Princ. Info Security Analyst at a insurance company with 10,001+ employees
Real User
Jan 16, 2018
Ensures accounts are managed according to corporate policies
Pros and Cons
  • "Ensures accounts are managed according to corporate policies."
  • "It takes people out of the machine work of ensuring credentials remain up-to-date, and handles connection brokering such that human usage and credential management remain independent."
  • "It is easily customized, and that customization makes it very easy to start trying to shoehorn the solution into roles it was never intended to fill."

What is our primary use case?

We use it all.

  • Privileged account access and management
  • Credential rotation
  • Access control
  • Privileged session recording

How has it helped my organization?

CyberArk PAS helps ensure accounts are managed according to corporate policies. In short, it takes people out of the machine work of ensuring credentials remain up-to-date, and handles connection brokering such that human usage and credential management remain independent.

What is most valuable?

All of the features we use have helped our security posture in some way. All of these have their place in defining and supporting the security posture:

  • Password management
  • Session management
  • Recording
  • Access control.

What needs improvement?

Overall, I think it is a fantastic product, when used as designed and intended.

One of its biggest downfalls is also one of its biggest strengths. It is easily customized, and that customization makes it very easy to start trying to shoehorn the solution into roles it was never intended to fill.

Buyer's Guide
CyberArk Privileged Access Manager
January 2026
Learn what your peers think about CyberArk Privileged Access Manager. Get advice and tips from experienced pros sharing their opinions. Updated: January 2026.
879,672 professionals have used our research since 2012.

For how long have I used the solution?

More than five years.
Disclosure: My company does not have a business relationship with this vendor other than being a customer.
PeerSpot user
PeerSpot user
Identity and Access Management System Administrator Sr. at a financial services firm with 1,001-5,000 employees
Real User
Jan 16, 2018
Increased our insight into how privileged accounts are being used and distributed within our footprint
Pros and Cons
  • "Our go-to solution for securing against the pass the hash attack vector and auditing privileged account usage."
  • "Increased our insight into how privileged accounts are being used and distributed within our footprint."
  • "Areas the product could be improved are in some of the reporting capabilities and how the reports are configured."

What is our primary use case?

CyberArk PAS is our go-to solution for securing against the pass the hash attack vector and auditing privileged account usage.

How has it helped my organization?

The CyberArk PAS has greatly increased our insight into how privileged accounts are being used and distributed within our footprint.

What is most valuable?

  • Ease of use
  • The auditing capabilities
  • The great support of their customer success teams

What needs improvement?

Areas the product could be improved are in some of the reporting capabilities and how the reports are configured.

For how long have I used the solution?

One to three years.
Disclosure: My company does not have a business relationship with this vendor other than being a customer.
PeerSpot user
Buyer's Guide
CyberArk Privileged Access Manager
January 2026
Learn what your peers think about CyberArk Privileged Access Manager. Get advice and tips from experienced pros sharing their opinions. Updated: January 2026.
879,672 professionals have used our research since 2012.
it_user789450 - PeerSpot reviewer
Works at a energy/utilities company with 1,001-5,000 employees
User
Jan 14, 2018
The ability to write your own connectors and plugins is invaluable as far as flexibility goes
Pros and Cons
  • "Our privileged accounts are now stored in a more secure location and lateral movement within the network have been lessened."
  • "The PSM is excellent and the ability to write your own connectors and plugins is invaluable as far as flexibility goes."
  • "Enhanced PSM support for Java based applications."

What is our primary use case?

  • Vaulting of privileged credentials. 
  • Used as a jump host solution. 
  • We wanted to keep passwords from being exposed to end users and connect them seamlessly to their target devices.

How has it helped my organization?

Our privileged accounts are now stored in a more secure location and lateral movement within the network have been lessened.

What is most valuable?

The PSM is excellent and the ability to write your own connectors and plugins is invaluable as far as flexibility goes.

What needs improvement?

  • Enhanced PSM support for Java based applications.
  • Easier to use bulk uploader tools (which are already being worked on).

For how long have I used the solution?

One to three years.
Disclosure: My company does not have a business relationship with this vendor other than being a customer.
PeerSpot user
PeerSpot user
Global Privilege Access Management Technical Architect at a consultancy with 10,001+ employees
Real User
Jan 11, 2018
All access to our servers, by both staff and vendors, is monitored and recorded
Pros and Cons
  • "CyberArk has resulted in a massive increase in our security footprint."
  • "All access to our servers by both staff and vendors is monitored and recorded."
  • "The current user interface is a little dated. However, I hear there are changes coming in the next version."
  • "There is a learning curve when it comes to planning out the deployment strategy, but once it is defined, it runs itself."

What is our primary use case?

We are leveraging CyberArk to provide Windows server access management across our enterprise. All our staff is looking for access to a server and needs to use CyberArk.

How has it helped my organization?

CyberArk has resulted in a massive increase in our security footprint. All access to our servers, by both staff and vendors, is monitored and recorded.

What is most valuable?

Session recording and key logging. We can track down not only who made a change, but exactly what they changed or did.

What needs improvement?

The current user interface is a little dated. However, I hear there are changes coming in the next version. 

There is a learning curve when it comes to planning out the deployment strategy, but once it is defined, it runs itself.

For how long have I used the solution?

More than five years.
Disclosure: My company does not have a business relationship with this vendor other than being a customer.
PeerSpot user
Rodney Dapilmoto - PeerSpot reviewer
Rodney DapilmotoSystems Admin Analyst 3 at a energy/utilities company with 1,001-5,000 employees
Real User

The UI has been completely revamped in Version 10. It has a differently look and feel. We will be looking to test it in our Development landscape and possibly go to Production towards the end of the year.

it_user620580 - PeerSpot reviewer
Security Engineer at a tech services company with 51-200 employees
Consultant
Jul 26, 2017
Enables us to manage passwords of highly privileged accounts.

What is most valuable?

The product enables us manage passwords of highly privileged (service) accounts. These are not tied to a person, and they include a full audit trail and approval workflow functionality.

How has it helped my organization?

Management of these accounts is typically required to prevent abuse and gain control of this.

What needs improvement?

Perhaps improve the user registry integration. It is already fine, but a bit atypical.

My experience with the product was with older versions, so this may not represent the actual case anymore. In essence, user registry integration is atypical in the sense that the product creates a copy of the user inside the product itself (to accommodate for license seat counting, I guess).

Depending upon the size of the user base and license model, it may not allow new users to log in to the platform. I doubt the vendor considers this an issue, though.

For how long have I used the solution?

I have used this for three years, including the implementation of the product

What do I think about the stability of the solution?

There were no issues with stability.

What do I think about the scalability of the solution?

There were no issues with scalability.

How is customer service and technical support?

Technical support is OK. The product is not very difficult to install, but there are some considerations that need to be taken into account. Tech support is very well aware of this.

How was the initial setup?

The initial setup was simple. It is windows based and leverages installation wizards to perform installation. Also, sufficient documentation exists to guide the setup procedure.

What's my experience with pricing, setup cost, and licensing?

Look well at the user base and frequency of use. A lot of licensing models exist, but having this clear will immediately indicate what fits best.

As for pricing, I cannot comment.

Which other solutions did I evaluate?

We did not evaluate other solutions.

What other advice do I have?

Make sure that the organization is ready and willing to adopt this, as the typical business cases cannot be addressed by the product alone.

Disclosure: My company has a business relationship with this vendor other than being a customer. We are a CyberArk business partner.
PeerSpot user
PeerSpot user
CyberArk PAS Solution Professional | Project Manager at a tech services company with 10,001+ employees
Real User
Top 20
Jul 12, 2017
Provides automatic password management. We can monitor, record, and control sessions.

What is most valuable?

All features of the CyberArk PAS solution are valuable.

The Digital Vault is one of the key components of the solution along with many other great benefits. The highly secured vault stores the privileged account passwords and data files using encryption. In version v9.7, CyberArk has introduced the Cluster Vault feature, which enhances high availability of the Vault server.

Other important features:

  • Automatic password management
  • Monitor, record, and control privileged sessions
  • Flexible architecture
  • Clientless product
  • Custom plug-ins for managing privileged accounts and sessions

How has it helped my organization?

Unmanaged, highly privileged accounts increase risks that can be exploited by attackers. The security controls defined by the organization require protection of the privileged account passwords. CyberArk helps organizations to identify, store, protect, and monitor the usage of privileged accounts.

What needs improvement?

An immediate improvement was the implementation of security controls to protect, control and monitor privileged accounts through CyberArk solution.

For how long have I used the solution?

I have used CyberArk for over two and a half years.

What do I think about the stability of the solution?

It’s a very stable product. I haven’t encountered any stability issues.

What do I think about the scalability of the solution?

I haven’t encountered any scalability issues. All the components are scalable.

How are customer service and technical support?

I would give technical support a rating of 4.5/5.

Which solution did I use previously and why did I switch?

This is the first PAM product that I have used.

How was the initial setup?

The initial installation was straightforward. The configuration or integration can be complex depending on the requirements, design, and infrastructure of the organization.

What's my experience with pricing, setup cost, and licensing?

The pricing and licensing depend on many factors and on the components considered for implementation.

What other advice do I have?

The PAM solution brings cultural change and adds a layer to the way IT administrators access the privileged accounts before implementing the PAM tool. A great, valuable product like CyberArk requires good planning and time to implement all the features.

Disclosure: My company does not have a business relationship with this vendor other than being a customer.
PeerSpot user
it_user685299 - PeerSpot reviewer
IT Security Specialist at a tech services company with 11-50 employees
Consultant
Jun 29, 2017
Password rotation, session recording & isolation and on-demand privileges.
Pros and Cons
  • "Password rotation, session recording & isolation and on-demand privileges."
  • "For users to access a system via CyberArk Privileged Session Manager, a universal connector needs to be coded in a language called AutoIT and its support for web browsers is so-so. Other products like Centrify have browser plugins that can help automate the process when using their products."

What is most valuable?

Password rotation, session recording & isolation and on-demand privileges.

What needs improvement?

For users to access a system via CyberArk Privileged Session Manager, a universal connector needs to be coded in a language called AutoIT and its support for web browsers is so-so. Other products like Centrify have browser plugins that can help automate the process when using their products.

What do I think about the stability of the solution?

No

What do I think about the scalability of the solution?

No

How is customer service and technical support?

Very good.

How was the initial setup?

Basic setup is pretty straightforward, but to fully utilise the product it can get complicated as it ties in with a lot of other products. Suggest a phased installation so staff can adjust to new processes.

What's my experience with pricing, setup cost, and licensing?

It can be an expensive product. I Suggest only licensing basics to begin with and as need arises, start to license extensions (AIM, etc.) during next phase of implementation.

Which other solutions did I evaluate?

Centrify and Lieberman ERPM.

What other advice do I have?

CyberArk offers extensive training, utilise it. Also their support staff are very good and can assist with everything.

Disclosure: My company does not have a business relationship with this vendor other than being a customer.
PeerSpot user
SecArch3081 - PeerSpot reviewer
SecArch3081IT Security Consultant and Platform Architect at a pharma/biotech company with 10,001+ employees
Real User

Have you assessed TPAM/Safeguard? (was a Dell product, now One Identity)

it_user685302 - PeerSpot reviewer
Technical Lead at a tech services company with 10,001+ employees
Real User
Jun 29, 2017
​Enterprise Password Vault, Privilege Session Manager & Application Identity Management have been very useful for our client environment.​
Pros and Cons
  • "Enterprise Password Vault, Privilege Session Manager, and Application Identity Management have been very useful for our client environment."
  • "Performance of PIM could be better and intended for usability as well as security."

How has it helped my organization?

Its features like detailed audit and reporting, automated workflows, granulated privileged access controls, automated password rotation, and centralized and secure storage have helped us in developing a secure environment for customers, along with audit and compliance coverage.

What is most valuable?

Enterprise Password Vault, Privilege Session Manager, and Application Identity Management have been very useful for our client environment.

What needs improvement?

Performance of PIM could be better and intended for usability as well as security. Another point is that the free trials should be in place for all components so that PoC could be made easy.

What do I think about the stability of the solution?

No.

What do I think about the scalability of the solution?

No.

How are customer service and technical support?

Technical support is quite efficient and they always provide a timely response.

Which solution did I use previously and why did I switch?

Haven’t use any solution prior to CyberArk.

How was the initial setup?

As this was new product, there were some small challenges in understanding but the setup was straightforward.

What's my experience with pricing, setup cost, and licensing?

As our deployment was not so large, our client was happy with the pricing and licensing.

Which other solutions did I evaluate?

Yes, we did a research and chose CyberArk above all due to its components that were suitable to our environment.

What other advice do I have?

Proper implementation and prior study of product will give you efficient results. Organizations looking for a product that can provide proper paper trail for risk and compliance audits should certainly give it a try because the product's auditing and reporting capabilities are really bliss.

Disclosure: My company does not have a business relationship with this vendor other than being a customer.
PeerSpot user
it_user3396 - PeerSpot reviewer
it_user3396Team Lead at a healthcare company with 10,001+ employees
Top 5Real User

Cool review

Buyer's Guide
Download our free CyberArk Privileged Access Manager Report and get advice and tips from experienced pros sharing their opinions.
Updated: January 2026
Buyer's Guide
Download our free CyberArk Privileged Access Manager Report and get advice and tips from experienced pros sharing their opinions.