Try our new research platform with insights from 80,000+ expert users
PeerSpot user
IT Security Consultant at a tech services company with 10,001+ employees
Real User
It is clientless, and does not require any third-party product for any of its operations.

What is most valuable?

Every feature of this product - Password Management, Session Management and so on has its own value depending on different use cases, but I like:

  • It's a clientless product and does not require any third-party product for any of its operations (Password Management, Privileged Session Management).
  • For password and session management, it can integrate with any device/script with a password OOB or via a custom plugin.
  • Compared to other products, CyberArk is extremely easy to install and configure.

How has it helped my organization?

Due to regular growth of an organization infrastructure, managing passwords within the organization becomes extremely difficult.

In larger organizations with a large user and infrastructure base, it can be very difficult to ensure that the passwords for privileged accounts are changed according to the organization security policy. This can be especially true in case of local admins for Windows and Unix boxes. Unmanaged/neglected local admins accounts lead to a major security threat.

Another major risk is to monitor activities and usages associated with privileged accounts to hold people accountable for their actions.

CyberArk helps organizations to manage all the privileged account passwords (server or workstation) in a centralization location as per organizational security policies. It also helps to hold people accountable by controlling and managing password usage using privileged session management.

Accountability is set up using CyberArk OOB temper-proof reports.

What needs improvement?

CyberArk has evolved a lot in the last 16 years and has nearly all the features required for effective operation. The only area for improvement is using a native client while connecting to the target device instead of the current method of using a web portal (PVWA). CyberArk seems to be working on this area and we expect these features in coming versions.

It would be great if in the future CyberArk considers launching an installer for Unix-based OSs.

For how long have I used the solution?

I have been using this product since 2010.

Buyer's Guide
CyberArk Privileged Access Manager
August 2025
Learn what your peers think about CyberArk Privileged Access Manager. Get advice and tips from experienced pros sharing their opinions. Updated: August 2025.
866,685 professionals have used our research since 2012.

What do I think about the stability of the solution?

In my seven years of experience with CyberArk products, I have never seen an unstable environment due to product functionality. It's always lack of proper planning, inexperience and faulty configuration that leads to an unstable environment.

What do I think about the scalability of the solution?

CyberArk can be horizontally and vertically scaled, if it is well thought out during panning phase. As an example, if an organization feels that they may need high availability of Vault servers (CyberArk’s centralized storage for passwords and audit data) in the foreseeable future, they should consider installing CyberArk Vault in cluster mode instead of standalone mode. One can't use a standalone vault as a cluster vault or convert a standalone vault to a cluster vault, but in terms of increasing the number of passwords and session recording, underlying hardware can be scale to achieve desired size.

How are customer service and support?

Three-year support (unlimited case and call support) is free with license purchase but I would say sometimes it's not sufficient to resolve the issues with this model.

Nonetheless, CyberArk Profession Services is quite impressive, even though it's a costly affair.

Which solution did I use previously and why did I switch?

I was part of the PIM product evaluation team at my previous organization. I stayed with CyberArk because is it's extremely easy to implement, and very stable when implemented with well-thought-out planning and experience. It has all of the required features for a PIM product, it does not have dependencies on third-party products for it to function and it is clientless.

How was the initial setup?

Initial set up is super simple and if planned properly, can be installed within a couple of hours.

What's my experience with pricing, setup cost, and licensing?

I cannot comment much on this because CyberArk has different pricing for its partners or resellers, and might also vary according to size of procurement.

Which other solutions did I evaluate?

Before choosing this product, I also I evaluated NetIQ PIM, Dell TPAM, CA PIM and ARCOS.

What other advice do I have?

Invest as much as possible in the planning and design phase. Consider at least future three-year growth in password and user base such as growth in virtual environments, and size accordingly. Also consider requirements like high availability of vaults, PSM and other components.

Disclosure: My company does not have a business relationship with this vendor other than being a customer.
PeerSpot user
Riyas Abdulkhader - PeerSpot reviewer
Riyas AbdulkhaderSecurity Architect, InfoSec Consultant at Confidential ( Sensitive Industry)
Top 20Real User

New version 10.x had made the PAS Solution more graphical for the end users.
Its uses the new gen CPMs and so can overcome the reconcile delays.
Dashboard views also make it a bit enhanced.

it_user445038 - PeerSpot reviewer
Cyber Security Supervisor at a tech company with 1,001-5,000 employees
Vendor
Sys/DB admins and third parties no longer need to have system credentials.

What is most valuable?

  • Password vaulting
  • Granular commands profiling with OPM

How has it helped my organization?

  • Sys/DB admins no longer need to have system credentials (and the same for third parties)
  • Access profiling
  • Request demands from domain groups

What needs improvement?

The management console has a lot of functionalities, but is a little bit complex to use.

Customer support and technical support can be better, compared with the level of products.

For how long have I used the solution?

I have used it for one year.

What do I think about the stability of the solution?

I have not encountered any stability issues.

What do I think about the scalability of the solution?

I have not encountered any scalability issues, technically speaking. Issues with the licenses can occur; the pricing model is not easy to understand.

How are customer service and technical support?

Technical support is 7/10.

Which solution did I use previously and why did I switch?

I did not previously use a different solution.

How was the initial setup?

Initial setup was very easy. We started integrating systems and providing access to systems within few days.

What's my experience with pricing, setup cost, and licensing?

From my experience, for small environments, the subscription licensing model is very cheap.

Which other solutions did I evaluate?

We also evaluate other solutions in the Magic Quadrant for PAM solutions.

What other advice do I have?

Before defining the solution’s architecture, clearly define your requirements and the kind of systems in scope. Some systems/device can be integrated out-of-the-box, others need customization.

Plus: easy to deploy, highly customizable
Minus: a little bit complex to integrate in large environment, complex rules/customization takes time

Disclosure: My company does not have a business relationship with this vendor other than being a customer.
PeerSpot user
Buyer's Guide
CyberArk Privileged Access Manager
August 2025
Learn what your peers think about CyberArk Privileged Access Manager. Get advice and tips from experienced pros sharing their opinions. Updated: August 2025.
866,685 professionals have used our research since 2012.
it_user506925 - PeerSpot reviewer
Senior Consultant (CyberArk) at a financial services firm with 10,001+ employees
Real User
The Enterprise Password Vault protects privileged IDs within a secure digital vault.

What is most valuable?

EPV (Enterprise Password Vault) is the most valuable feature of the product to me. It is the core of the product, where it stores the passwords it needs to protect. It protects privileged IDs within a secure digital vault.

What needs improvement?

User friendliness and reporting: While the PVWA (Password Vault Web Access) provides a web console for the end user and administrator to access the solution, there is room for improvement. (E.g.: show tips when the mouse hovers over.) Reportingprovides very detailed information; however, it requires customization before it is presentable.

For how long have I used the solution?

I first got introduced to CyberArk around 2012.

What do I think about the stability of the solution?

No issue with stability. The solution provides an HA option.

What do I think about the scalability of the solution?

I would say there are scalability issues. After the solution is deployed, resizing it is difficult. Therefore, proper sizing at the planning stage is important.

How are customer service and technical support?

Technical support is excellent; one of the most knowledgeable and well-trained support staff.

Which solution did I use previously and why did I switch?

I did not previously use a different solution.

How was the initial setup?

Initial setup was complex. A typical deployment will require at least two months of full-time planning. In a large deployment, it can be over six months.

Which other solutions did I evaluate?

Before choosing this product, I did not evaluate other options.

What other advice do I have?

A well-trained and experienced deployment team is critical. Sizing, safe design, and access management need to be discussed beforehand.

reason for not being a 10 is, there is always rooms for improvements.

Disclosure: My company does not have a business relationship with this vendor other than being a customer.
PeerSpot user
PeerSpot user
Technical Manager, System Division at a tech services company with 501-1,000 employees
Consultant
We can monitor sessions in real time. If there's any unnecessary activity, we can terminate the session.

What is most valuable?

With the Privileged Session Manager, we can monitor sessions in real time and terminate the session if there's any unnecessary activity found. For example: We give access to user to access the server only to update patches, but if we find any activity not related to patch updates, we can terminate the session.

How has it helped my organization?

Actually my company/previous company does not use this product, but we sold it to our customer. This product helped our customer manage their privileged accounts. It’s easier to them to manage and control the privileged accounts.

What needs improvement?

It needs more plugin connectors for all devices. CyberArk currently can manage or make it easier to manage about 80% of our total devices. The rest still need R&D to develop the plugin. If CyberArk had more plugin connectors, the customer would not need to raise plugin development requests for several devices and CyberArk could easily connect to these devices.

What I mean with CyberArk needing to improve plugin connector is that currently CyberArk is able to manage almost all devices (server, network devices, security devices etc.) which are more than 80% of all devices. In my experience device such as IBM OS/390 and Cisco TACACS still need custom plugin connectors developed by CyberArk R&D.

If CyberArk IS able manage more than 95% from total devices it would help the customer to using it without raising a support ticket to create a plugin connector. CyberArk will more easier to manage all devices with no compromise

For how long have I used the solution?

I used this solution from mid-2013 until mid-2015.

What do I think about the stability of the solution?

So far, it is stable.

What do I think about the scalability of the solution?

This product is scales easily.

How are customer service and technical support?

Technical support is good. They have good technical teams around the world including southeast Asia.

Which solution did I use previously and why did I switch?

Most customers using a different solution switch to CyberArk because CyberArk is more user-friendly than its competitors and have more plugins compared to the others.

How was the initial setup?

Initial setup was actually easier.

What's my experience with pricing, setup cost, and licensing?

Start small.

Which other solutions did I evaluate?

Yes, we evaluate other options. The issue was about price, stability, scalability and the development of this product to ensure support.

What other advice do I have?

Contact the local distributor for help.

Disclosure: My company does not have a business relationship with this vendor other than being a customer.
PeerSpot user
it_user497118 - PeerSpot reviewer
Senior Executive Information Security at a manufacturing company with 10,001+ employees
Vendor
It helps us proactively protect, detect and respond to in-progress cyberattacks before they strike vital systems and compromise sensitive data.

Valuable Features

  • Password management and accountability for Privileged accounts
  • Identify, protect and monitor the usage of Privileged accounts
  • Record and control privileged sessions on critical systems i.e. Windows, Unix, DBs
  • Application credentials including SSH keys and hard-coded embedded passwords can be managed
  • Control and monitor the commands super-users can run based on their role
  • PTA is a security intelligence system that allows organizations to detect, alert, and respond to cyberattacks on privileged accounts.

Improvements to My Organization

Privileged accounts represent the largest security vulnerability an organization faces today. Most organisations are not aware of the total number of privilege accounts.

Compromising privilege accounts leads to various breaches. With this growing threat, organisations need controls put in place to proactively protect, detect and respond to in-progress cyberattacks before they strike vital systems and compromise sensitive data.

On implementing the CyberArk PIM solution, we are able to achieve this goal. Now, we are aware of the total privileged accounts in our enterprise. These are securely stored and managed by the Vault. The end users need not remember passwords for these accounts to use them.

E.g.: A Unix Admin who has to login to a Unix server using the "root" account needs to log in to CyberArk and search for the root account, click Connect and he can perform all of his activities. We can enforce a command list on this account, monitor his activities and also get to know who has used this root account. The access to this account can also be restricted. The user does not have to remember any credentials.

Room for Improvement

Integration of this tool with SAML is a problem, as there is a bug. We’d like to be able to integrate AWS accounts in CyberArk.

Use of Solution

I have been using this solution for the past three years. I have implemented this solution for various clients from banking and pharmaceutical companies.

Stability Issues

I have not really encountered any issues with stability.

Scalability Issues

I have not encountered any scalability issues.

Customer Service and Technical Support

I rate technical support 9/10, very good.

Initial Setup

Straightforward, easy-to-install setup.

Pricing, Setup Cost and Licensing

It is expensive.

Other Solutions Considered

Before we chose CyberArk, we evaluated ARCOS.

Other Advice

Go ahead and use CyberArk. Request a demo.

Disclosure: My company does not have a business relationship with this vendor other than being a customer.
PeerSpot user
PeerSpot user
ITSM & AntiFraud Consultant at a tech company with 51-200 employees
Real User
The ability to start the project, install and add the passwords in just a few days is valuable.

What is most valuable?

The most valuable feature is the password Vault which gives the administrator control over privileged accounts. The other components that are valuable are Private Session Manager, OPM, Viewfinity, and AIM, which came as an add-on to the organisation's needs. The ability to start the project, install and add the passwords in just a few days brings a big advantage for CyberArk.

How has it helped my organization?

The client can see all the users sessions through PSM, and can protect the applications on servers using AIM. Also, the Privileged Threat Assessment helps the organisation to see all the account risks, including accounts not managed by CyberArk, and accounts/machines with unusual behavior, etc.

What needs improvement?

The DNA scan should be able to scan Unix machines for privileged accounts.

For how long have I used the solution?

PIM tested in the last 2 years.

What was my experience with deployment of the solution?

We didn't have any issues with the deployment.

What do I think about the stability of the solution?

The product is very stable.

What do I think about the scalability of the solution?

I didn't have any issues with the stability. I usually recommend the client to increase the system requirements with 10%.

How are customer service and technical support?

Customer Service:

Customer service is OK in Romania.

Technical Support:

I had direct contact with the local team and they are OK.

Which solution did I use previously and why did I switch?

No.

How was the initial setup?

Straightforward when you have the use cases and a SoW. Usually you follow the Installation Manual, and perform the after-installation tests, and you are sure that everything is OK. The only issue I had was with the anti-virus that was left on the server and that deleted some PSM files. You must always double-check the prerequisites, as you can have some surprises with the GPO that overrides your settings.

What about the implementation team?

I was part of the implementation team with support from the vendor.

Which other solutions did I evaluate?

We also looked at BalaBit Shell Control Box.

Disclosure: My company has a business relationship with this vendor other than being a customer. Implementation partner with CyberArk.
PeerSpot user
it_user326337 - PeerSpot reviewer
it_user326337Customer Success Manager at PeerSpot
Real User

Tanmay, have you been able to make progress in your investigations of how to solve the difficulties you've been having with MS Clustering?

See all 4 comments
it_user225765 - PeerSpot reviewer
IT Security Engineer at a tech services company with 51-200 employees
Consultant
The user interface needs some work, however, our security has improved.

What is most valuable?

It has the ability to monitor privileged sessions.

How has it helped my organization?

Our security has improved since implementing CyberArk.

What needs improvement?

The user interface needs to be improved. It could be done by getting the GUI to work with other programs from within internet browsers out of box.

For how long have I used the solution?

I've used it for one year.

What was my experience with deployment of the solution?

No issues encountered.

What do I think about the stability of the solution?

No issues encountered.

What do I think about the scalability of the solution?

No issues encountered.

How are customer service and technical support?

Customer Service:

It's good.

Technical Support:

It's good.

Which solution did I use previously and why did I switch?

I didn't use a previous solution.

How was the initial setup?

It was straightforward as the documentation was rather clear. This made the implementation simple.

What about the implementation team?

I implemented myself.

Which other solutions did I evaluate?

I didn't evaluate any other options.

Disclosure: My company does not have a business relationship with this vendor other than being a customer.
PeerSpot user
Rodney Dapilmoto - PeerSpot reviewer
Rodney DapilmotoSystems Admin Analyst 3 at CPS Energy
Real User

Being the primary administrator of CyberArk at my company, one of the biggest complaints I hear from end users is the user interface through the web browser. It has been recommended to use Internet Explorer for the PVWA, but we have found that Chrome and FireFox will also work for some end users. The ability to change the timeout value for the PVWA to remain in session also helps with customer experience and satisfaction. However, security requirements within your company will need to be taken into account when deciding how much time to allow the PVWA to remain in session.

PeerSpot user
Senior Manager of System Security at a tech services company with 51-200 employees
Consultant
​The most valuable feature of this product is the Central Policy Manager but CyberArk can be improved in all areas

What is most valuable?

The most valuable feature of this product is the Central Policy Manager. From the Operation and Security point of view a robot that can connect to destination machines, change passwords at fixed times, and put them in the vault, like a person, and therefore, is the best that you can ask for.

It combines more functionality in a single product and solve a lot of problem, from security to compliance.

How has it helped my organization?

It has improved many parts of the organization. From the security and audit perspective, we're now fully aware of who accessed data and from where they accessed it. This helped us with regulatory compliance. We've improved our level of security in many typically-unsafe environments, such as domains.

What needs improvement?

I think that this product can be improved in all the areas. The details usually are important as the funcionallity. So I think that understanding the request from the customer CyberArk, as is already doing, can improve day by day his product.

For how long have I used the solution?

I have used Cyber-Ark PAS since 2008, so thid is the seventh year that I will be working with it.

What was my experience with deployment of the solution?

Usually not. The biggest problem was the incompatibility or non-default installation of an OS to be managed by the Central Policy Manager.

What do I think about the stability of the solution?

Never encountered any problems with stability.

What do I think about the scalability of the solution?

Never encountered any problems with scalability. The Vault, Central Policy Manager, Password Vault Web Access, Privileged Session Manager and Application Identity Management architecture are designed to support scalability.

How are customer service and technical support?

Customer Service:

It's improved over the years and now is very fast and efficient. We've got a very good Italian customer service.

Technical Support:

Very high level of technical support. Fast and organized.

Which solution did I use previously and why did I switch?

Never used a different solution.

How was the initial setup?

The initial setup is really fast, simple and straightforward. It consist of a simple Windows installation (next-next type) for any component. The only requirement is to do the installation step by step following a list of components to do beforehand.

What about the implementation team?

I work in a vendor team, and we installed the product in a large company.

Disclosure: My company does not have a business relationship with this vendor other than being a customer.
PeerSpot user
Buyer's Guide
Download our free CyberArk Privileged Access Manager Report and get advice and tips from experienced pros sharing their opinions.
Updated: August 2025
Buyer's Guide
Download our free CyberArk Privileged Access Manager Report and get advice and tips from experienced pros sharing their opinions.