I use CyberArk Privileged Access Manager to prevent exposing credentials for super-critical accounts, such as admin accounts and root accounts. I use it to protect these credentials and to avoid exposing them.
Presales Engineer at a computer software company with 201-500 employees
Continuously monitors the access and detects any unusual behavior
Pros and Cons
- "The module called PTA, Privileged Threat Analytics, is very useful. When you give access to a user, it monitors and detects if the user's behavior is unusual. After giving access, it continually checks if the user is the same user."
- "I would rate this solution a nine out of ten."
- "The solution's architecture could be improved. It requires installation on four to five different servers. Each server has a purpose, but when you need to troubleshoot, it can be difficult because you need to access each of them. Reducing the number of servers would be helpful."
- "The solution's architecture could be improved. It requires installation on four to five different servers."
What is our primary use case?
What is most valuable?
The module called PTA, Privileged Threat Analytics, is very useful. When you give access to a user, it monitors and detects if the user's behavior is unusual. After giving access, it continually checks if the user is the same user. It detects unusual behavior if someone else accesses the application.
What needs improvement?
The solution's architecture could be improved. It requires installation on four to five different servers. Each server has a purpose, but when you need to troubleshoot, it can be difficult because you need to access each of them. Reducing the number of servers would be helpful.
In the SaaS version, the number of required servers is reduced from five to three, but it is not completely cloud-based because servers still need to be deployed on-premises. Some clients are migrating from on-premises to the cloud. They do not want to use more servers or increase their on-premises data centers. They want everything to be on the cloud, but even in the SaaS version of CyberArk Privileged Access Manager, they need to deploy some servers on-premises. That is not very helpful.
For how long have I used the solution?
I started using CyberArk Privileged Access Manager in 2022, which was two years ago.
Buyer's Guide
CyberArk Privileged Access Manager
June 2025

Learn what your peers think about CyberArk Privileged Access Manager. Get advice and tips from experienced pros sharing their opinions. Updated: June 2025.
857,028 professionals have used our research since 2012.
What do I think about the stability of the solution?
I have not experienced much instability. Sometimes, the issue lies with the server I deployed, but this is not very often.
What do I think about the scalability of the solution?
In the on-premises version, scalability is difficult because server limitations can require buying new hardware. The SaaS version is more flexible, allowing easier scaling with increased users.
How are customer service and support?
I contacted them more when I started to work with this solution. I still contact them but not so much.
I would rate their technical support a six out of ten. They are helpful, but complex issues can take a long time to resolve, which can delay solutions for urgent customer issues.
How would you rate customer service and support?
Neutral
Which solution did I use previously and why did I switch?
I have used other solutions like Password Manager, but they were not very helpful because you use and store the same credentials, so there is a risk of exposing real credentials. CyberArk Privileged Access Manager allows me to create a random password and share it with a person, preventing the exposure of real credentials.
While some of the Password Manager solutions are free, they are too dangerous because they expose credentials.
How was the initial setup?
I have worked with both on-premises and cloud versions. I prefer the cloud version because with on-prem, I need to install my own servers and maintain those servers. I do not have to do that with the cloud model. The responsibility belongs to CyberArk. I have fewer responsibilities as an administrator.
Initially, the setup was difficult to understand, but after three to four deployments, it became easier. It also depends on the kind of applications or servers needing integration.
In terms of maintenance, when the customer starts to use a new application, it needs to be integrated with CyberArk Privileged Access Manager. Sometimes the new application is not 100% compatible. In such a case, the developer needs to create the integration.
What about the implementation team?
In the first deployment, there was a team of two people.
What's my experience with pricing, setup cost, and licensing?
Its price is high. I have also worked with Delinea. CyberArk is comparatively expensive compared to other PAM solutions, such as Delinea, especially during renewal.
What other advice do I have?
It takes some time to realize the benefits of this solution. Customers take time to understand this solution. It also happened to me when I first started to learn how this solution works. I was looking for a solution to protect identities, and when I came across this solution, I found it hard to deploy as the architecture is complex. Still, in one month, I was able to understand the purpose of this solution.
Before deployment, I advise being clear about the applications to integrate and the users who will use them. Mapping this information beforehand will save time during production. You will not have to add them one by one.
I would rate this solution a nine out of ten.
Disclosure: PeerSpot contacted the reviewer to collect the review and to validate authenticity. The reviewer was referred by the vendor, but the review is not subject to editing or approval by the vendor. The reviewer's company has a business relationship with this vendor other than being a customer: Reseller
Last updated: Dec 17, 2024
Flag as inappropriate
IT Security Architect at a comms service provider with 201-500 employees
Facilitates secure password rotation and out-of-band session management but the process for accessing RDP could be improved
Pros and Cons
- "CyberArk Privileged Access Management's most valuable features are primarily its password vault functionality, specifically CyberArk's Core Privileged Manager and Privileged Session Manager."
- "Customer support has been very helpful and responsive."
- "The product is complex and requires extensive configuration."
- "The current process for accessing RDP through the CyberArk or administrative portal involves downloading an RDP file. This is inconvenient for users and problematic due to security restrictions that prevent accessing servers via downloaded RDP files."
What is our primary use case?
We currently use CyberArk Privileged Access Manager for password vaulting. Our roadmap includes managing service accounts, rotating passwords, and expanding to SSH keys, AWS keys, and other login credentials. We've already implemented local administrative accounts and rotated elevated domain administrative accounts. Additionally, we've integrated Okta for multi-factor authentication, using Okta Verify, and plan to expand this to workforce identity for broader end-user security and credential management.
What is most valuable?
CyberArk Privileged Access Management's most valuable features are primarily its password vault functionality, specifically CyberArk's Core Privileged Manager and Privileged Session Manager. These components facilitate secure password rotation and out-of-band session management, addressing our organization's critical security needs.
What needs improvement?
The current process for accessing RDP through the CyberArk or administrative portal involves downloading an RDP file. This is inconvenient for users and problematic due to security restrictions that prevent accessing servers via downloaded RDP files. Ideally, the process should allow for a direct RDP connection upon providing server details, eliminating the download step and streamlining access. This issue represents a significant challenge and source of frustration for users.
The product is complex and requires extensive configuration. More tutorials and detailed use cases with troubleshooting steps would be beneficial, particularly for first-time implementers. Despite the excellent customer service, resolving issues can be time-consuming due to the product's complexity. Compared to lightweight solutions like Okta, CyberArk requires more background experience and is not as straightforward to learn and implement.
For how long have I used the solution?
I have been using CyberArk Privileged Access Manager for almost five years.
What do I think about the stability of the solution?
The performance of CyberArk Privileged Access Management sometimes lags or crashes, but this is not a significant concern.
What do I think about the scalability of the solution?
We have not reached platform limitations yet, as CyberArk supports up to eight hundred platforms per tenant, and documentation is clear about scalability limits.
How are customer service and support?
Customer support has been very helpful and responsive. My customer success manager facilitated many calls with technical experts, efficiently resolving critical issues.
How would you rate customer service and support?
Positive
Which solution did I use previously and why did I switch?
How was the initial setup?
CyberArk's environment setup was straightforward, but we encountered issues during the Proof of Concept stage, specifically with PAM account discovery. While the CyberArk Manager displayed discovered accounts, we couldn't download the data into a usable format like an Excel sheet. This hindered our ability to identify efficiently and inventory discovered accounts, particularly from Windows systems, for phased onboarding. Although we eventually received instructions from CyberArk support on downloading the data, the process was complex and time-consuming. Simplified data export features would greatly benefit administrators.
What about the implementation team?
I received excellent support from CyberArk's technical team and customer success manager, who arranged calls and helped resolve implementation issues.
What's my experience with pricing, setup cost, and licensing?
Although CyberArk Privileged Access Management is expensive, its protection capabilities outweigh the cost.
Which other solutions did I evaluate?
I also evaluated CyberArk, along with Okta PAM and BeyondTrust, because it encompasses all the features we require, and Gartner recognizes it as an industry leader.
What other advice do I have?
I rate CyberArk Privileged Access Management seven out of ten.
To streamline project setup, new users should receive guidance on planning and implementation scopes. Scheduling a jump start without such direction can complicate learning.
Which deployment model are you using for this solution?
Hybrid Cloud
If public cloud, private cloud, or hybrid cloud, which cloud provider do you use?
Other
Disclosure: PeerSpot contacted the reviewer to collect the review and to validate authenticity. The reviewer was referred by the vendor, but the review is not subject to editing or approval by the vendor.
Last updated: Dec 22, 2024
Flag as inappropriateBuyer's Guide
CyberArk Privileged Access Manager
June 2025

Learn what your peers think about CyberArk Privileged Access Manager. Get advice and tips from experienced pros sharing their opinions. Updated: June 2025.
857,028 professionals have used our research since 2012.
Senior Information Technology Security Specialist at a financial services firm with 5,001-10,000 employees
Improves compliance and operational efficiency
Pros and Cons
- "CyberArk Privileged Access Manager makes it easy for users to retrieve and manage their passwords."
- "CyberArk Privileged Access Manager has helped our organization remain compliant in the privileged access management space."
- "In CyberArk Privileged Access Manager, the UI has room for improvement, as does the dashboard reporting, which could be made better or easier to use."
- "In CyberArk Privileged Access Manager, the UI has room for improvement, as does the dashboard reporting, which could be made better or easier to use."
What is our primary use case?
We're using CyberArk Privileged Access Manager to manage our service accounts, privileged service accounts, and password rotation. We also use Conjur.
How has it helped my organization?
CyberArk Privileged Access Manager has helped our organization remain compliant in the privileged access management space. It is very helpful for meeting compliance and regulatory requirements such as SOCS, SWIFT, and PCI DSS.
CyberArk Privileged Access Manager has helped us become more efficient in managing these service accounts.
CyberArk Privileged Access Manager feels quite secure in ensuring data privacy.
CyberArk Privileged Access Manager has a very strong potential for preventing attacks and lateral movements, but it has not had an impact one way or the other on the number of privileged accounts in our organization. They are just managed differently.
What is most valuable?
CyberArk Privileged Access Manager makes it easy for users to retrieve and manage their passwords.
I have been using CyberArk Privileged Access Manager for a few months. I am still learning, and I appreciate all the networking and education at the CyberArk Impact in Boston, which is going to set me up for success as I take on my role.
What needs improvement?
In CyberArk Privileged Access Manager, the UI has room for improvement, as does the dashboard reporting, which could be made better or easier to use. The interface needs to be more intuitive in CyberArk Privileged Access Manager. There should be dashboards in CyberArk Privileged Access Manager with more data and reporting capability for the non-compliant scenarios.
For how long have I used the solution?
My company has been using it for a long time; I have been using it only for a few months.
How are customer service and support?
I have not had any support experience with CyberArk at this point in my journey.
I found the CyberArk Impact event to be much more effective as an educational experience.
How would you rate customer service and support?
Positive
What was our ROI?
The time-to-value for CyberArk Privileged Access Manager was recognized pretty quickly after implementing it.
What's my experience with pricing, setup cost, and licensing?
I hope to learn how the pricing works so that I can understand it better, but I am certain it is not inexpensive.
What other advice do I have?
It is absolutely necessary to have a PAM tool like CyberArk Privileged Access Manager, even if someone is using other security tools.
Based on my experience thus far, I would recommend CyberArk Privileged Access Manager to other users.
I would rate CyberArk Privileged Access Manager as an eight out of ten. It is early in my journey with this solution.
Disclosure: PeerSpot contacted the reviewer to collect the review and to validate authenticity. The reviewer was referred by the vendor, but the review is not subject to editing or approval by the vendor.
Last updated: Apr 17, 2025
Flag as inappropriateInfrastructure Architect, Senior Engineer at a tech vendor with 5,001-10,000 employees
Helps secure our accounts and has good stability and support
Pros and Cons
- "By implementing CyberArk Privileged Access Manager, we wanted to secure the password data and password accounts. We could see the benefits of CyberArk Privileged Access Manager immediately after we deployed it and started using it."
- "We could see the benefits of CyberArk Privileged Access Manager immediately after we deployed it and started using it."
- "They could improve CyberArk Privileged Access Manager by providing more reports. If I need to know the 10 most-used accounts for this week, that functionality can be made available in the reports."
- "My company always complains about the cost of CyberArk Privileged Access Manager because it's too high."
What is our primary use case?
My use cases as of right now include configuration, implementation, and developing a PowerShell report.
What is most valuable?
By implementing CyberArk Privileged Access Manager, we wanted to secure the password data and password accounts. We could see the benefits of CyberArk Privileged Access Manager immediately after we deployed it and started using it.
What needs improvement?
They could improve CyberArk Privileged Access Manager by providing more reports. If I need to know the 10 most-used accounts for this week, that functionality can be made available in the reports.
For how long have I used the solution?
I have been using CyberArk Privileged Access Manager for seven years.
What do I think about the stability of the solution?
It is stable. The environment is stable, with no lagging, crashing, or downtime.
What do I think about the scalability of the solution?
I cannot say much about scalability because we did not have any need for it.
How are customer service and support?
I have contacted their technical support plenty of times. I would rate CyberArk's support a seven out of ten. They are always good.
How would you rate customer service and support?
Neutral
Which solution did I use previously and why did I switch?
I have not used any alternatives to CyberArk Privileged Access Manager in my career.
How was the initial setup?
The initial deployment was easy because I went to training first. The training was set up by CyberArk. From design to implementation, it took close to six months.
In terms of maintenance, it requires OS upgrades and patches. It doesn't take a long time.
What about the implementation team?
We did not use any help from a third party, such as an integrator or consultant. The number of people required depends on the environment. I don't see how one person can manage it because there is a lot of information to collect before even doing a design.
What's my experience with pricing, setup cost, and licensing?
My company always complains about the cost of CyberArk Privileged Access Manager because it's too high.
What other advice do I have?
For a new user, I would advise them to try to configure CyberArk Privileged Access Manager a couple of times before starting to use it in a production environment.
I would rate CyberArk Privileged Access Manager a nine out of ten.
Which deployment model are you using for this solution?
On-premises
Disclosure: My company does not have a business relationship with this vendor other than being a customer.
Last updated: Apr 29, 2025
Flag as inappropriateCEO at CareerCraftly
Privileged access management escalates efficiently with robust access control and remote connectivity
Pros and Cons
- "The access control feature and privilege and role-based assignment are outstanding."
What is our primary use case?
We use CyberArk Privileged Access Manager for privileged access management (PAM) escalation, securing our website, and applications. Our cybersecurity team actively utilizes its features.
What is most valuable?
The PAM escalation is valued. The access control feature and privilege and role-based assignment are outstanding. Dividing the user admin for security protection is the best feature. Additionally, its remote access allows easy connection for my team, and it efficiently manages identity.
What needs improvement?
Initially, it was challenging to understand and use all the features incrementally. Having a better user journey with a support team to connect would improve the product and services.
For how long have I used the solution?
I have been using CyberArk Privileged Access Manager for about eight months in our company.
What do I think about the stability of the solution?
The solution is quite stable. We have not faced any issues related to stability since using CyberArk Privileged Access Manager for eight months.
What do I think about the scalability of the solution?
CyberArk Privileged Access Manager is scalable. As a startup, it initially handled fewer users, but it scaled well as we grew.
How are customer service and support?
Technical support was fast in its replies and always supportive, helping to resolve any issues efficiently.
How would you rate customer service and support?
Neutral
Which solution did I use previously and why did I switch?
We used miniOrange, an Indian-based cybersecurity product for access management and PAM escalation. We also used one more product, which I don't remember the name of.
How was the initial setup?
The initial setup was straightforward due to well-documented resources and tutorials.
What about the implementation team?
Our cybersecurity team, comprising two to three people, worked on the deployment and feature implementation.
What's my experience with pricing, setup cost, and licensing?
The pricing is quite well-structured with monthly and weekly plans.
Which other solutions did I evaluate?
I evaluated miniOrange and one other product.
What other advice do I have?
New users should watch the YouTube channel, read the documentation, check the resource section including CyberArk University, and see if it works well with their product. I rate the overall solution a nine. My overall product rating is 9 out of 10.
Disclosure: PeerSpot contacted the reviewer to collect the review and to validate authenticity. The reviewer was referred by the vendor, but the review is not subject to editing or approval by the vendor.
Last updated: Mar 24, 2025
Flag as inappropriateCyberSecurity Analyst at a energy/utilities company with 501-1,000 employees
Session recordings and timestamps make activity monitoring easy
Pros and Cons
- "Session recordings and timestamps are valuable features. They allow me to specifically select the time a particular command was executed, so I do not have to review the entire recording. I can click on events to determine where and when they happened."
- "I would recommend implementing CyberArk Privileged Access Manager as it is the best so far."
- "Updates have been somewhat difficult, resulting in challenges when moving from one version to another. The current version includes automatic updates."
- "Its implementation was very complex. It needs different servers."
What is our primary use case?
I work in the cybersecurity team. We typically provide access to other end users or IT administrators through this solution. We monitor their activity on servers, provision access, and review all logs.
By implementing this solution, we wanted identity management and access management.
How has it helped my organization?
Over these three years, there have been a lot of improvements. User management is more efficient. The interface is user-friendly, and I can create comprehensive reports.
What is most valuable?
Session recordings and timestamps are valuable features. They allow me to specifically select the time a particular command was executed, so I do not have to review the entire recording. I can click on events to determine where and when they happened.
What needs improvement?
We are looking for improvements in user provisioning, such as access provisioning and revoking access. We still have to test these improvements in the latest version.
Updates have been somewhat difficult, resulting in challenges when moving from one version to another. The current version includes automatic updates for minor patches, which should be easy.
For how long have I used the solution?
I have been using the solution for more than three years.
What do I think about the stability of the solution?
It has been stable so far, so I would rate it a nine out of ten.
What do I think about the scalability of the solution?
Its scalability is very good. It is in the cloud, so we can just expand it. I would rate it a nine out of ten for scalability.
How are customer service and support?
We haven't used customer support so far apart from implementation.
How would you rate customer service and support?
Neutral
Which solution did I use previously and why did I switch?
I have not used any PAM solutions apart from this one.
How was the initial setup?
Its implementation was very complex. It needs different servers and setup parameters involving load balancers, certification, encryption keys. The implementation took more than a month.
It requires maintenance once in six months and has been hard previously.
What about the implementation team?
It was implemented by inhouse staff with oversight from vendor.
What was our ROI?
When it comes to compliance and audits the ROI on this is very good.
What's my experience with pricing, setup cost, and licensing?
Licensing is little hard as they are perpetual and can't be used from a pool of resources.
What other advice do I have?
I would recommend implementing CyberArk Privileged Access Manager as it is the best so far.
I would rate CyberArk Privileged Access Manager an eight out of ten.
Which deployment model are you using for this solution?
Hybrid Cloud
If public cloud, private cloud, or hybrid cloud, which cloud provider do you use?
Disclosure: PeerSpot contacted the reviewer to collect the review and to validate authenticity. The reviewer was referred by the vendor, but the review is not subject to editing or approval by the vendor.
Last updated: Jan 24, 2025
Flag as inappropriateCyberArk PAS Administrator at L3Harris Technologies
Good automation, reduces human error, and offers helpful support
Pros and Cons
- "The implementation of the PSM proxy has reduced the specific risk of "insider attacks" on our domain controllers and SLDAP servers by eliminating direct user login by an open secure connection on the user's behalf without ever revealing the privileged credentials."
- "We'd like to see the creation of some kind of memo field for each device account, which could be used, in our network at least, to leave a note about the device for either the security or network engineering team members."
What is our primary use case?
Our primary use case is the scheduled password change management of Windows, Linux, and Cisco privileged local user passwords, as well as providing internal applications using the REST API credentials to access and maintain network elements.
Utilizing the CyberArk Password Vault DR implementation, we have a ready resource as a hedge against network issues caused by seasonal hurricanes through having a replicated DR vault in an out-of-state facility.
How has it helped my organization?
The implementation of the CyberArk Privileged Access Management has reduced the total labor cost of doing quarterly password change management (PCM) on the thousands of network elements (routers & switches), servers, and workstations throughout our nationwide network.
In addition to reducing the direct labor cost of the PCM procedures, the automation aspect has reduced risk that has previously resulted in many lost man-days resolving issues which previously was attributed to human-factor error during PCM procedures.
What is most valuable?
Utilizing the Central Policy Manager to provide policy programmable password change management automation, which can be configured either globally, or by using the individual PlatformIDs which limits the effect of human error on a nationwide implementation of network devices that are remotely co-located and not readily accessible.
The implementation of the PSM proxy has reduced the specific risk of "insider attacks" on our domain controllers and SLDAP servers by eliminating direct user login by an open secure connection on the user's behalf without ever revealing the privileged credentials.
What needs improvement?
My personal wishlist of features has been fulfilled with versions 12.6 and 13.2, which provide a host of improvements that the administrator community has been asking for.
With these version releases, that leaves my only "unfulfilled" product improvement request to be the creation of some kind of memo field for each device account, which could be used, in our network at least, to leave a note about the device for either the security or network engineering team members.
For how long have I used the solution?
We originally implemented the product in 2014 as a compliance mandate and fully integrated the application and functionality in 2017. We have just finished our fourth product upgrade and expanded our enterprise vault space to meet growing demand.
What do I think about the stability of the solution?
My implementation has been very stable over the past seven years, only having minor hiccups caused by "human error" during the "accidental" editing of a configuration file.
What do I think about the scalability of the solution?
We currently store over 50,000 privileged passwords, and I know if our network doubled tomorrow, the product would scale to meet the increased demand.
How are customer service and support?
There are two specific organizations within CyberArk that can provide customer assistance.
The customer success team is there with serious advanced knowledge to assist when things are not flowing. In my specific case, while I was learning to be a PAM administrator, I routinely contacted our customer success team with questions related to "Where can I find this documentation?", "How does this work?" and my favorite, "How can I put my permission back onto a safe?"
The other team is the professional services team, whose job is to be able to come in, analyze an issue, and correct it with the utmost speed. These are also highly experienced individuals that can be brought in the expand your implementation as needed.
How would you rate customer service and support?
Positive
Which solution did I use previously and why did I switch?
Prior to the implementation of the CyberArk Privileged Access Manager, the security operations utilized unencrypted spreadsheets to store privileged passwords, which became a POAM when discovered during a routine security audit.
How was the initial setup?
Our organization utilized the CyberArk professional support team to come in and provide a local, hands-on planning and implementation approach. This implementation methodology actually reduced long-term costs by making sure the implementation was done according to CyberArk's Best Practices.
What about the implementation team?
Our organization utilized CyberArk's professional support team to come in and provide a local, hands-on planning and implementation approach. This implementation methodology actually reduced long-term costs by making sure the implementation was done according to CyberArk's Best Practices.
What was our ROI?
Our annual support costs are offset by the reduced labor costs within the SOCC environment, as the product has automated most of the password change management procedures, allowing labor to be focused on other topics.
What's my experience with pricing, setup cost, and licensing?
While the IAM space is heating up with new vendors, both CyberArk development and the product team seem to be ahead of the curve, with features and products to enable enterprise customers the ability to secure their networks and break the intrusion cycle.
Which other solutions did I evaluate?
CyberArk was our first venture into a secure password vault and was implemented at the recommendation of our federal customer.
What other advice do I have?
The product takes some time to learn. That said, CyberArk Software offers both a customer success team as well as paid professional support to assist.
The customer success team has always seemed to be in my corner when needed, bringing insight and assistance when I was unable to resolve some of my "self-created issues".
Which deployment model are you using for this solution?
On-premises
Disclosure: My company does not have a business relationship with this vendor other than being a customer.
Team Lead at Flash.co
Provides centralized management, AI capabilities, and advanced threat detection
Pros and Cons
- "The AI capabilities, including advanced threat detection features, are very helpful for us. They reduce human effort and errors, allowing us to quickly identify and respond to threats."
- "Overall, I would rate it a ten out of ten."
- "Pricing is a concern for me because it is not very user-friendly for startups, new users, or very small organizations."
- "Pricing is a concern for me because it is not very user-friendly for startups, new users, or very small organizations."
What is our primary use case?
We use CyberArk Privileged Access Manager to manage our privileged accounts because it protects against cyberattacks and prevents unnecessary or illegal access.
How has it helped my organization?
It provides a centralized management system, making it easier for us to enforce policies and monitor access across our organization. Additionally, we can monitor sessions and record and detect suspicious activities that are harmful to our systems and organization.
What is most valuable?
The AI capabilities, including advanced threat detection features, are very helpful for us. They reduce human effort and errors, allowing us to quickly identify and respond to threats. This solution scales up our IT environment and resolves almost every issue that poses a threat to our organization.
What needs improvement?
Pricing is a concern for me because it is not very user-friendly for startups, new users, or very small organizations. It might be better if the price was reduced. Sometimes, the maintenance cost can also be high.
For how long have I used the solution?
I have been using CyberArk Privileged Access Manager for the last one and a half to two years.
What do I think about the stability of the solution?
Every application has downtime. However, it remains stable overall. I would rate it a nine out of ten for stability.
What do I think about the scalability of the solution?
It is scalable. I would rate it a ten out of ten for scalability.
How are customer service and support?
Sometimes, when I face issues or want to understand some features, or it is difficult to identify activities in our system, I contact the support team. They are very helpful, always available, and try to resolve our issues as soon as possible.
How would you rate customer service and support?
Positive
Which solution did I use previously and why did I switch?
This is the first PAM solution that I implemented in our organization.
How was the initial setup?
The initial setup is not very easy, nor very difficult. It is moderate to deploy.
It does not require any maintenance from our side.
What about the implementation team?
We have a team of three to five members, and they deployed it in a minimum of one week.
What's my experience with pricing, setup cost, and licensing?
Its price can be reduced.
Which other solutions did I evaluate?
I researched some solutions and found CyberArk Privileged Access Manager to be one of the good solutions. I am very happy with the product.
What other advice do I have?
I am happy with this product. If someone is looking for a PAM solution, I recommend it because it has a large developer community and good customer support. It is more stable than the others, and I am very happy with it.
Overall, I would rate it a ten out of ten.
Disclosure: PeerSpot contacted the reviewer to collect the review and to validate authenticity. The reviewer was referred by the vendor, but the review is not subject to editing or approval by the vendor.
Last updated: Mar 13, 2025
Flag as inappropriate
Buyer's Guide
Download our free CyberArk Privileged Access Manager Report and get advice and tips from experienced pros
sharing their opinions.
Updated: June 2025
Product Categories
Privileged Access Management (PAM) User Activity Monitoring Enterprise Password Managers Mainframe Security Operational Technology (OT) SecurityPopular Comparisons
Azure Key Vault
AWS Secrets Manager
Okta Workforce Identity
HashiCorp Vault
Delinea Secret Server
CyberArk Endpoint Privilege Manager
BeyondTrust Endpoint Privilege Management
WALLIX Bastion
CyberArk Identity
One Identity Safeguard
BeyondTrust Privileged Remote Access
BeyondTrust Password Safe
Buyer's Guide
Download our free CyberArk Privileged Access Manager Report and get advice and tips from experienced pros
sharing their opinions.
Quick Links
Learn More: Questions:
- CyberArk vs. ManageEngine Password Manager Pro
- How does Sailpoint IdentityIQ compare with CyberArk PAM?
- Which PAM tool do you prefer: CyberArk Privileged Access Manager, One Identity Safeguard, Delinea Secret Server, or BeyondTrust Privileged Remote A
- What is the difference between Privileged Users and Privileged Accounts
- When evaluating Privileged Identity Management, what aspect do you think is the most important to look for?
- How was the 2020 Twitter Hack carried out? How could it have been prevented?
- Which is the best Privileged Account Management solution?
- What are the top 5 PAM solutions that can be implemented which cover both hybrid and cloud?
- What are the top 5 PAM solutions?
- How will AI and ML help or work with PIM/PAM?