This product helps to improve the privilege account security in the organization. Privilege accounts were involved in all the breaches.
Senior Technical Trainer at a tech services company with 501-1,000 employees
Improves the privilege account security in the organization. I would like to see improvement in the custom connector.
Pros and Cons
- "PSM (Privilege Session Manager."
- "I would like to see improvement in the custom connector for integration with different devices."
How has it helped my organization?
What is most valuable?
PSM (Privilege Session Manager)
What needs improvement?
I would like to see improvement in the custom connector for integration with different devices. Currently, it needs professional services and lots of time for out-of-the-box custom connectors.
What do I think about the stability of the solution?
There were no issues with stability. However, there were a few times when there were stability issues because the solution was deployed on a Windows platform.
Buyer's Guide
CyberArk Privileged Access Manager
April 2025

Learn what your peers think about CyberArk Privileged Access Manager. Get advice and tips from experienced pros sharing their opinions. Updated: April 2025.
849,686 professionals have used our research since 2012.
What do I think about the scalability of the solution?
There were no issues with scalability.
How are customer service and support?
Technical support is average. They are not so great, because the first level support partner or distributor has to provide the support and customers cannot contact CyberArk support directly.
Which solution did I use previously and why did I switch?
We moved from version 8 to Version 9.
How was the initial setup?
The initial setup is a bit complex because it has lots of prerequisites and dependencies on Windows' features.
What's my experience with pricing, setup cost, and licensing?
It is not a cheap solution. It is expensive as compared with other solutions. However, it is one of the best solutions in their domain.
Which other solutions did I evaluate?
I worked in the CyberArk distribution company. However, I have seen that other products do not provide all the features that CyberArk can provide.
What other advice do I have?
For implementation, you will need professional services or other experts.
Disclosure: My company has a business relationship with this vendor other than being a customer: My ex-company is the distributor of CyberArk.
Network Security Consultant at a comms service provider with 501-1,000 employees
Session recording is a valuable feature. Better documentation of error codes would be helpful.
What is most valuable?
- Session recording
- Password and access management
How has it helped my organization?
- Increased security and visibility
What needs improvement?
Error messages are useless; better documentation of error codes would be helpful.
For how long have I used the solution?
I have used it for two years.
What do I think about the stability of the solution?
I encountered stability issues.
What do I think about the scalability of the solution?
I have not encountered any scalability issues.
How are customer service and technical support?
Due to meaningless error messages, it is not possible to repair non-trivial errors without support. However, with support, we solved every problem.
Which solution did I use previously and why did I switch?
I did not previously use a different solution.
How was the initial setup?
You have to exactly follow the installation manual; otherwise, installation can crash with a non-solvable error.
Which other solutions did I evaluate?
What other advice do I have?
You have to exactly follow the installation manual.
Disclosure: I am a real user, and this review is based on my own experience and opinions.
Buyer's Guide
CyberArk Privileged Access Manager
April 2025

Learn what your peers think about CyberArk Privileged Access Manager. Get advice and tips from experienced pros sharing their opinions. Updated: April 2025.
849,686 professionals have used our research since 2012.
Auditor de Sistemas y Procesos at a tech services company with 11-50 employees
A full life-cycle solution for managing the most privileged accounts
Pros and Cons
- "Within the solution, I love the fact that everything is recorded. The configuration capabilities are great, too."
What is our primary use case?
We sell this solution to our partners. We are not currently using the application for our own use — we're consultants.
What is most valuable?
Within the solution, I love the fact that everything is recorded. The configuration capabilities are great, too.
What needs improvement?
There are always improvements that can be made, but nothing really stands out. It's hard for me to say as I am not a direct user.
What do I think about the stability of the solution?
CyberArk PAS is very stable.
How are customer service and technical support?
The technical support is excellent. On a scale from one to ten, I would give the support a rating of ten.
What's my experience with pricing, setup cost, and licensing?
The price of this solution is quite reasonable.
What other advice do I have?
Overall, on a scale from one to ten, I would give CyberArk PAS a rating of ten.
Disclosure: I am a real user, and this review is based on my own experience and opinions.
Infrastructure Architect, Senior Engineer at a tech vendor with 5,001-10,000 employees
Helps secure our accounts and has good stability and support
Pros and Cons
- "By implementing CyberArk Privileged Access Manager, we wanted to secure the password data and password accounts. We could see the benefits of CyberArk Privileged Access Manager immediately after we deployed it and started using it."
- "We could see the benefits of CyberArk Privileged Access Manager immediately after we deployed it and started using it."
- "They could improve CyberArk Privileged Access Manager by providing more reports. If I need to know the 10 most-used accounts for this week, that functionality can be made available in the reports."
- "My company always complains about the cost of CyberArk Privileged Access Manager because it's too high."
What is our primary use case?
My use cases as of right now include configuration, implementation, and developing a PowerShell report.
What is most valuable?
By implementing CyberArk Privileged Access Manager, we wanted to secure the password data and password accounts. We could see the benefits of CyberArk Privileged Access Manager immediately after we deployed it and started using it.
What needs improvement?
They could improve CyberArk Privileged Access Manager by providing more reports. If I need to know the 10 most-used accounts for this week, that functionality can be made available in the reports.
For how long have I used the solution?
I have been using CyberArk Privileged Access Manager for seven years.
What do I think about the stability of the solution?
It is stable. The environment is stable, with no lagging, crashing, or downtime.
What do I think about the scalability of the solution?
I cannot say much about scalability because we did not have any need for it.
How are customer service and support?
I have contacted their technical support plenty of times. I would rate CyberArk's support a seven out of ten. They are always good.
How would you rate customer service and support?
Neutral
Which solution did I use previously and why did I switch?
I have not used any alternatives to CyberArk Privileged Access Manager in my career.
How was the initial setup?
The initial deployment was easy because I went to training first. The training was set up by CyberArk. From design to implementation, it took close to six months.
In terms of maintenance, it requires OS upgrades and patches. It doesn't take a long time.
What about the implementation team?
We did not use any help from a third party, such as an integrator or consultant. The number of people required depends on the environment. I don't see how one person can manage it because there is a lot of information to collect before even doing a design.
What's my experience with pricing, setup cost, and licensing?
My company always complains about the cost of CyberArk Privileged Access Manager because it's too high.
What other advice do I have?
For a new user, I would advise them to try to configure CyberArk Privileged Access Manager a couple of times before starting to use it in a production environment.
I would rate CyberArk Privileged Access Manager a nine out of ten.
Which deployment model are you using for this solution?
On-premises
Disclosure: I am a real user, and this review is based on my own experience and opinions.
Last updated: Apr 29, 2025
Flag as inappropriateSr IT Security Spec at a financial services firm with 5,001-10,000 employees
Provides good control over privileged access but users sometimes experience lagging
Pros and Cons
- "CyberArk Privileged Access Manager has made our operations more streamlined. There is an approval process, so it helps us keep tabs on who's working on what and for how long."
- "CyberArk Privileged Access Manager has made our operations more streamlined."
- "Occasionally, there are lagging issues. Sometimes users have to re-login. When users copy passwords, there is sometimes a lag, so they have to log out and log in, but these are very rare cases."
- "The solution that they proposed was not straightforward because of the backend processes of CyberArk."
What is our primary use case?
We use CyberArk Privileged Access Manager to manage privileged access, so all the privileged accounts are vaulted in CyberArk, and that's our control method to manage privileged access. We also manage access for developers, so we have dual control to give approval to developers.
How has it helped my organization?
CyberArk Privileged Access Manager has made our operations more streamlined. There is an approval process, so it helps us keep tabs on who's working on what and for how long. We also have to give a reason when we're using privileged accounts, which helps keep track of whether they're being used correctly.
It's been good so far in safeguarding the infrastructure, but we've not used additional features of CyberArk Privileged Access Manager. Modern PAM with secure web sessions or secure infrastructure access is something that I learned about at the conference. I am curious about how we can use it.
It has not helped to reduce the number of privileged accounts. Whatever we find privileged in the environment, we want to control that by using CyberArk Privileged Access Manager. That's how we're able to control it. It has helped us identify privileged access better because we discovered users who didn't need privileged access. There have been cases where users with privileged access don't want their accounts in PAM because they need to pick up the password on a daily basis to perform their actions. There have been cases where they've gotten their privileged access off the account because it's not needed.
The user interface needs some training, but with a guide telling the user how to go about it, we have received positive feedback from whoever has used it.
It took us some time to realize its benefits because any new tool needs a proper understanding of how it can be used. A lot of testing was done on the engineering side, and demos were given. It took some time, but it is going smoothly.
What is most valuable?
Given that this is the only tool that I've worked with for the control process of privileged access, I don't have anything to compare it with. However, it's helped us keep our privileged access in check. We're able to get logs as to when the user checks out an ID and for how long, so it's a good monitoring tool.
What needs improvement?
They covered a lot at the conference. I don't have visibility into what product we've bought. It would be nice for them to approach us with what we have bought versus the new features being added. We need clarity on whether new features come included in the package that we already have, or if it's something that we need to have over and above.
Occasionally, there are lagging issues. Sometimes users have to re-login. When users copy passwords, there is sometimes a lag, so they have to log out and log in, but these are very rare cases.
For how long have I used the solution?
I've been using it for about 5 years.
What do I think about the stability of the solution?
Occasionally lagging occurs. I've not heard about crashing, but there is a lag. Sometimes users will have to re-login and get it right.
How are customer service and support?
The team that I work with is our in-house engineering team. I've had a conversation with CyberArk once last year revolving around efficiently generating the inventory reports. I contacted the technical support, but I didn't get a very straightforward solution that I was expecting.
We were developing a dashboard to find all the privileged accounts that weren't vaulted in CyberArk. We wanted the inventory report to be generated on a daily basis, but were having some trouble. We reached out to their technical support. The solution that they proposed was not straightforward because of the backend processes of CyberArk. We had to approach it in a different way.
How would you rate customer service and support?
Neutral
What other advice do I have?
I would rate CyberArk Privileged Access Manager a seven out of ten.
Disclosure: PeerSpot contacted the reviewer to collect the review and to validate authenticity. The reviewer was referred by the vendor, but the review is not subject to editing or approval by the vendor.
Last updated: Apr 28, 2025
Flag as inappropriate
Buyer's Guide
Download our free CyberArk Privileged Access Manager Report and get advice and tips from experienced pros
sharing their opinions.
Updated: April 2025
Product Categories
Privileged Access Management (PAM) User Activity Monitoring Enterprise Password Managers Mainframe Security Operational Technology (OT) SecurityPopular Comparisons
Okta Workforce Identity
Delinea Secret Server
CyberArk Endpoint Privilege Manager
BeyondTrust Endpoint Privilege Management
WALLIX Bastion
One Identity Safeguard
BeyondTrust Privileged Remote Access
BeyondTrust Password Safe
ARCON Privileged Access Management
ManageEngine PAM360
Delinea Privileged Access Service
Buyer's Guide
Download our free CyberArk Privileged Access Manager Report and get advice and tips from experienced pros
sharing their opinions.
Quick Links
Learn More: Questions:
- CyberArk vs. ManageEngine Password Manager Pro
- How does Sailpoint IdentityIQ compare with CyberArk PAM?
- Which PAM tool do you prefer: CyberArk Privileged Access Manager, One Identity Safeguard, Delinea Secret Server, or BeyondTrust Privileged Remote A
- What is the difference between Privileged Users and Privileged Accounts
- When evaluating Privileged Identity Management, what aspect do you think is the most important to look for?
- How was the 2020 Twitter Hack carried out? How could it have been prevented?
- Which is the best Privileged Account Management solution?
- What are the top 5 PAM solutions that can be implemented which cover both hybrid and cloud?
- What are the top 5 PAM solutions?
- How will AI and ML help or work with PIM/PAM?
How would documenting error codes help you in the short term and/or long term?