Try our new research platform with insights from 80,000+ expert users
it_user497118 - PeerSpot reviewer
Senior Executive Information Security at a manufacturing company with 10,001+ employees
Vendor
It helps us proactively protect, detect and respond to in-progress cyberattacks before they strike vital systems and compromise sensitive data.

What is most valuable?

  • Password management and accountability for Privileged accounts
  • Identify, protect and monitor the usage of Privileged accounts
  • Record and control privileged sessions on critical systems i.e. Windows, Unix, DBs
  • Application credentials including SSH keys and hard-coded embedded passwords can be managed
  • Control and monitor the commands super-users can run based on their role
  • PTA is a security intelligence system that allows organizations to detect, alert, and respond to cyberattacks on privileged accounts.

How has it helped my organization?

Privileged accounts represent the largest security vulnerability an organization faces today. Most organisations are not aware of the total number of privilege accounts.

Compromising privilege accounts leads to various breaches. With this growing threat, organisations need controls put in place to proactively protect, detect and respond to in-progress cyberattacks before they strike vital systems and compromise sensitive data.

On implementing the CyberArk PIM solution, we are able to achieve this goal. Now, we are aware of the total privileged accounts in our enterprise. These are securely stored and managed by the Vault. The end users need not remember passwords for these accounts to use them.

E.g.: A Unix Admin who has to login to a Unix server using the "root" account needs to log in to CyberArk and search for the root account, click Connect and he can perform all of his activities. We can enforce a command list on this account, monitor his activities and also get to know who has used this root account. The access to this account can also be restricted. The user does not have to remember any credentials.

What needs improvement?

Integration of this tool with SAML is a problem, as there is a bug. We’d like to be able to integrate AWS accounts in CyberArk.

For how long have I used the solution?

I have been using this solution for the past three years. I have implemented this solution for various clients from banking and pharmaceutical companies.

Buyer's Guide
CyberArk Privileged Access Manager
June 2025
Learn what your peers think about CyberArk Privileged Access Manager. Get advice and tips from experienced pros sharing their opinions. Updated: June 2025.
857,028 professionals have used our research since 2012.

What do I think about the stability of the solution?

I have not really encountered any issues with stability.

What do I think about the scalability of the solution?

I have not encountered any scalability issues.

How are customer service and support?

I rate technical support 9/10, very good.

How was the initial setup?

Straightforward, easy-to-install setup.

What's my experience with pricing, setup cost, and licensing?

It is expensive.

Which other solutions did I evaluate?

Before we chose CyberArk, we evaluated ARCOS.

What other advice do I have?

Go ahead and use CyberArk. Request a demo.

Disclosure: My company does not have a business relationship with this vendor other than being a customer.
PeerSpot user
PeerSpot user
ITSM & AntiFraud Consultant at a tech company with 51-200 employees
Real User
The ability to start the project, install and add the passwords in just a few days is valuable.

What is most valuable?

The most valuable feature is the password Vault which gives the administrator control over privileged accounts. The other components that are valuable are Private Session Manager, OPM, Viewfinity, and AIM, which came as an add-on to the organisation's needs. The ability to start the project, install and add the passwords in just a few days brings a big advantage for CyberArk.

How has it helped my organization?

The client can see all the users sessions through PSM, and can protect the applications on servers using AIM. Also, the Privileged Threat Assessment helps the organisation to see all the account risks, including accounts not managed by CyberArk, and accounts/machines with unusual behavior, etc.

What needs improvement?

The DNA scan should be able to scan Unix machines for privileged accounts.

For how long have I used the solution?

PIM tested in the last 2 years.

What was my experience with deployment of the solution?

We didn't have any issues with the deployment.

What do I think about the stability of the solution?

The product is very stable.

What do I think about the scalability of the solution?

I didn't have any issues with the stability. I usually recommend the client to increase the system requirements with 10%.

How are customer service and technical support?

Customer Service:

Customer service is OK in Romania.

Technical Support:

I had direct contact with the local team and they are OK.

Which solution did I use previously and why did I switch?

No.

How was the initial setup?

Straightforward when you have the use cases and a SoW. Usually you follow the Installation Manual, and perform the after-installation tests, and you are sure that everything is OK. The only issue I had was with the anti-virus that was left on the server and that deleted some PSM files. You must always double-check the prerequisites, as you can have some surprises with the GPO that overrides your settings.

What about the implementation team?

I was part of the implementation team with support from the vendor.

Which other solutions did I evaluate?

We also looked at BalaBit Shell Control Box.

Disclosure: My company has a business relationship with this vendor other than being a customer: Implementation partner with CyberArk.
PeerSpot user
it_user326337 - PeerSpot reviewer
it_user326337Customer Success Manager at PeerSpot
Real User

Tanmay, have you been able to make progress in your investigations of how to solve the difficulties you've been having with MS Clustering?

See all 4 comments
Buyer's Guide
CyberArk Privileged Access Manager
June 2025
Learn what your peers think about CyberArk Privileged Access Manager. Get advice and tips from experienced pros sharing their opinions. Updated: June 2025.
857,028 professionals have used our research since 2012.
it_user225765 - PeerSpot reviewer
IT Security Engineer at a tech services company with 51-200 employees
Consultant
The user interface needs some work, however, our security has improved.

What is most valuable?

It has the ability to monitor privileged sessions.

How has it helped my organization?

Our security has improved since implementing CyberArk.

What needs improvement?

The user interface needs to be improved. It could be done by getting the GUI to work with other programs from within internet browsers out of box.

For how long have I used the solution?

I've used it for one year.

What was my experience with deployment of the solution?

No issues encountered.

What do I think about the stability of the solution?

No issues encountered.

What do I think about the scalability of the solution?

No issues encountered.

How are customer service and technical support?

Customer Service:

It's good.

Technical Support:

It's good.

Which solution did I use previously and why did I switch?

I didn't use a previous solution.

How was the initial setup?

It was straightforward as the documentation was rather clear. This made the implementation simple.

What about the implementation team?

I implemented myself.

Which other solutions did I evaluate?

I didn't evaluate any other options.

Disclosure: My company does not have a business relationship with this vendor other than being a customer.
PeerSpot user
Rodney Dapilmoto - PeerSpot reviewer
Rodney DapilmotoSystems Admin Analyst 3 at CPS Energy
Real User

Being the primary administrator of CyberArk at my company, one of the biggest complaints I hear from end users is the user interface through the web browser. It has been recommended to use Internet Explorer for the PVWA, but we have found that Chrome and FireFox will also work for some end users. The ability to change the timeout value for the PVWA to remain in session also helps with customer experience and satisfaction. However, security requirements within your company will need to be taken into account when deciding how much time to allow the PVWA to remain in session.

PeerSpot user
Senior Manager of System Security at a tech services company with 51-200 employees
Consultant
​The most valuable feature of this product is the Central Policy Manager but CyberArk can be improved in all areas

What is most valuable?

The most valuable feature of this product is the Central Policy Manager. From the Operation and Security point of view a robot that can connect to destination machines, change passwords at fixed times, and put them in the vault, like a person, and therefore, is the best that you can ask for.

It combines more functionality in a single product and solve a lot of problem, from security to compliance.

How has it helped my organization?

It has improved many parts of the organization. From the security and audit perspective, we're now fully aware of who accessed data and from where they accessed it. This helped us with regulatory compliance. We've improved our level of security in many typically-unsafe environments, such as domains.

What needs improvement?

I think that this product can be improved in all the areas. The details usually are important as the funcionallity. So I think that understanding the request from the customer CyberArk, as is already doing, can improve day by day his product.

For how long have I used the solution?

I have used Cyber-Ark PAS since 2008, so thid is the seventh year that I will be working with it.

What was my experience with deployment of the solution?

Usually not. The biggest problem was the incompatibility or non-default installation of an OS to be managed by the Central Policy Manager.

What do I think about the stability of the solution?

Never encountered any problems with stability.

What do I think about the scalability of the solution?

Never encountered any problems with scalability. The Vault, Central Policy Manager, Password Vault Web Access, Privileged Session Manager and Application Identity Management architecture are designed to support scalability.

How are customer service and technical support?

Customer Service:

It's improved over the years and now is very fast and efficient. We've got a very good Italian customer service.

Technical Support:

Very high level of technical support. Fast and organized.

Which solution did I use previously and why did I switch?

Never used a different solution.

How was the initial setup?

The initial setup is really fast, simple and straightforward. It consist of a simple Windows installation (next-next type) for any component. The only requirement is to do the installation step by step following a list of components to do beforehand.

What about the implementation team?

I work in a vendor team, and we installed the product in a large company.

Disclosure: My company does not have a business relationship with this vendor other than being a customer.
PeerSpot user
reviewer1523790 - PeerSpot reviewer
Auditor de Sistemas y Procesos at a tech services company with 11-50 employees
Reseller
A full life-cycle solution for managing the most privileged accounts
Pros and Cons
  • "Within the solution, I love the fact that everything is recorded. The configuration capabilities are great, too."

    What is our primary use case?

    We sell this solution to our partners. We are not currently using the application for our own use — we're consultants.

    What is most valuable?

    Within the solution, I love the fact that everything is recorded. The configuration capabilities are great, too.

    What needs improvement?

    There are always improvements that can be made, but nothing really stands out. It's hard for me to say as I am not a direct user.

    What do I think about the stability of the solution?

    CyberArk PAS is very stable.

    How are customer service and technical support?

    The technical support is excellent. On a scale from one to ten, I would give the support a rating of ten.

    What's my experience with pricing, setup cost, and licensing?

    The price of this solution is quite reasonable. 

    What other advice do I have?

    Overall, on a scale from one to ten, I would give CyberArk PAS a rating of ten.

    Disclosure: My company does not have a business relationship with this vendor other than being a customer.
    PeerSpot user
    reviewer1513359 - PeerSpot reviewer
    Technical Consultant at a outsourcing company with 51-200 employees
    Consultant
    Top 20
    Resource and administration costs are less but support needs to improve knowledge and quality
    Pros and Cons
    • "The accounts are maintained automatically. Hence, resource and administration costs are less."
    • "CyberArk Enterprise Password Vault's deployment is complex for resources with little experience. Tech support needs to be improved as well based on quality and knowledge."

    What is most valuable?

    The accounts are maintained automatically. Hence, resource and administration costs are less. 

    What needs improvement?

    CyberArk Enterprise Password Vault's deployment is complex for resources with little experience. Tech support needs to be improved as well based on quality and knowledge. 

    For how long have I used the solution?

    I have been working with the product for more than five years. 

    What do I think about the stability of the solution?

    The product is very stable. 

    What do I think about the scalability of the solution?

    CyberArk Enterprise Password Vault is scalable. 

    How was the initial setup?

    CyberArk Enterprise Password Vault's deployment can be done with two to three resources. 

    What other advice do I have?

    I rate the solution a nine out of ten. 

    Disclosure: My company has a business relationship with this vendor other than being a customer: Partner
    PeerSpot user
    Volodymir Kolisnyk - PeerSpot reviewer
    Security specialist at Kavitech
    Real User
    Top 10
    A stable and profitable solution for privileged access

    What is our primary use case?

    CyberArk is a good, profitable, and most valuable solution.

    What is most valuable?

    While testing the functionality of PAM, we weren't merely conducting a standard PAM evaluation. We aimed to establish a connection and successfully received a response from the target PAM component.

    What needs improvement?

    The product’s pricing could be improved.

    For how long have I used the solution?

    I have been using CyberArk Privileged Access Manager as a partner and implementor.

    What do I think about the stability of the solution?

    The product is stable. If you make some changes or something, it's stable.

    What do I think about the scalability of the solution?

    The solution is scalable. We cater it to enterprise businesses.

    How are customer service and support?

    Customer support takes too much time to provide some response. When you open some cases, sometimes it takes one or two weeks to get some people to know the problem and how they will help us.

    How would you rate customer service and support?

    Neutral

    How was the initial setup?

    The initial setup takes a few days to complete.

    I rate the initial setup a six out of ten, where one is difficult and ten is easy.

    What's my experience with pricing, setup cost, and licensing?

    The product is expensive.

    I rate the product’s pricing a seven out of ten, where one is cheap and ten is expensive.

    What other advice do I have?

    Overall, I rate the solution a nine out of ten.

    Which deployment model are you using for this solution?

    On-premises
    Disclosure: My company has a business relationship with this vendor other than being a customer: Partner
    PeerSpot user
    Buyer's Guide
    Download our free CyberArk Privileged Access Manager Report and get advice and tips from experienced pros sharing their opinions.
    Updated: June 2025
    Buyer's Guide
    Download our free CyberArk Privileged Access Manager Report and get advice and tips from experienced pros sharing their opinions.