Try our new research platform with insights from 80,000+ expert users
reviewer2699367 - PeerSpot reviewer
Sr IT Security Spec at a financial services firm with 5,001-10,000 employees
Real User
Provides good control over privileged access but users sometimes experience lagging
Pros and Cons
  • "CyberArk Privileged Access Manager has made our operations more streamlined. There is an approval process, so it helps us keep tabs on who's working on what and for how long."
  • "CyberArk Privileged Access Manager has made our operations more streamlined."
  • "Occasionally, there are lagging issues. Sometimes users have to re-login. When users copy passwords, there is sometimes a lag, so they have to log out and log in, but these are very rare cases."
  • "The solution that they proposed was not straightforward because of the backend processes of CyberArk."

What is our primary use case?

We use CyberArk Privileged Access Manager to manage privileged access, so all the privileged accounts are vaulted in CyberArk, and that's our control method to manage privileged access. We also manage access for developers, so we have dual control to give approval to developers.

How has it helped my organization?

CyberArk Privileged Access Manager has made our operations more streamlined. There is an approval process, so it helps us keep tabs on who's working on what and for how long. We also have to give a reason when we're using privileged accounts, which helps keep track of whether they're being used correctly. 

It's been good so far in safeguarding the infrastructure, but we've not used additional features of CyberArk Privileged Access Manager. Modern PAM with secure web sessions or secure infrastructure access is something that I learned about at the conference. I am curious about how we can use it.

It has not helped to reduce the number of privileged accounts. Whatever we find privileged in the environment, we want to control that by using CyberArk Privileged Access Manager. That's how we're able to control it. It has helped us identify privileged access better because we discovered users who didn't need privileged access. There have been cases where users with privileged access don't want their accounts in PAM because they need to pick up the password on a daily basis to perform their actions. There have been cases where they've gotten their privileged access off the account because it's not needed.

The user interface needs some training, but with a guide telling the user how to go about it, we have received positive feedback from whoever has used it.

It took us some time to realize its benefits because any new tool needs a proper understanding of how it can be used. A lot of testing was done on the engineering side, and demos were given. It took some time, but it is going smoothly.

What is most valuable?

Given that this is the only tool that I've worked with for the control process of privileged access, I don't have anything to compare it with. However, it's helped us keep our privileged access in check. We're able to get logs as to when the user checks out an ID and for how long, so it's a good monitoring tool.

What needs improvement?

They covered a lot at the conference. I don't have visibility into what product we've bought. It would be nice for them to approach us with what we have bought versus the new features being added. We need clarity on whether new features come included in the package that we already have, or if it's something that we need to have over and above.

Occasionally, there are lagging issues. Sometimes users have to re-login. When users copy passwords, there is sometimes a lag, so they have to log out and log in, but these are very rare cases.

Buyer's Guide
CyberArk Privileged Access Manager
September 2025
Learn what your peers think about CyberArk Privileged Access Manager. Get advice and tips from experienced pros sharing their opinions. Updated: September 2025.
867,497 professionals have used our research since 2012.

For how long have I used the solution?

I've been using it for about 5 years.

What do I think about the stability of the solution?

Occasionally lagging occurs. I've not heard about crashing, but there is a lag. Sometimes users will have to re-login and get it right.

How are customer service and support?

The team that I work with is our in-house engineering team. I've had a conversation with CyberArk once last year revolving around efficiently generating the inventory reports. I contacted the technical support, but I didn't get a very straightforward solution that I was expecting.

We were developing a dashboard to find all the privileged accounts that weren't vaulted in CyberArk. We wanted the inventory report to be generated on a daily basis, but were having some trouble. We reached out to their technical support. The solution that they proposed was not straightforward because of the backend processes of CyberArk. We had to approach it in a different way.

How would you rate customer service and support?

Neutral

What other advice do I have?

I would rate CyberArk Privileged Access Manager a seven out of ten.

Disclosure: PeerSpot contacted the reviewer to collect the review and to validate authenticity. The reviewer was referred by the vendor, but the review is not subject to editing or approval by the vendor.
Flag as inappropriate
PeerSpot user
reviewer2694921 - PeerSpot reviewer
Works at a consumer goods company with 501-1,000 employees
Real User
Top 20
Improves risk management with recorded sessions and flexible workflows
Pros and Cons
  • "The most valuable feature I find in CyberArk Privileged Access Manager is that we can record the sessions. It provides flexible workflows. I can change the workflow to specify if it needs one approval or two approvals, and I can approve my peer."
  • "You can see the benefits of CyberArk Privileged Access Manager immediately."
  • "I find it hard to mention a point of improvement because I'm happy with the platform. The only thing I would say is that they can improve their price."
  • "It's expensive and you're not getting anything new. It's just a control, but in terms of risk, you are covering a big impact on the company."

What is our primary use case?

My use cases for CyberArk Privileged Access Manager are specifically for privileged access management. We are using it along with other products. They have access management, their own certificate manager, and other managers. CyberArk Privileged Access Manager is for privileged access for users who require more than normal access, such as administrators and engineers. We can rely on this tool to manage that access.

How has it helped my organization?

You can see the benefits of CyberArk Privileged Access Manager immediately. This is risk management. You are not getting any features from the tool. It's not something that you are installing because you want it, for example, ChatGPT. With CyberArk Privileged Access Manager, you're getting control. You're not getting any additional features for your platform or systems. You are just controlling the risk. Users can't do what you aren’t allowing them. They can't make any change without approval, so it controls risks. Once you see that value, you're controlling what the privileged users in your system are doing.

What is most valuable?

The most valuable feature I find in CyberArk Privileged Access Manager is that we can record the sessions. It provides flexible workflows. I can change the workflow to specify if it needs one approval or two approvals, and I can approve my peer. We can record sessions for external people who want or require privileged access to our systems. That is very flexible. We can record what people are doing in the platform.

What needs improvement?

I find it hard to mention a point of improvement because I'm happy with the platform. The only thing I would say is that they can improve their price. 

For how long have I used the solution?

I have been using CyberArk Privileged Access Manager for three years.

What do I think about the stability of the solution?

Regarding the stability of CyberArk Privileged Access Manager, I have seen a couple of times that the server was not available. In three years, it has only been a couple of times. It has high availability and low impact. In terms of the platform, it is stable.

What do I think about the scalability of the solution?

The scalability of CyberArk Privileged Access Manager has been good; the only thing is the license. The platform is very scalable, but you need to get more licenses in terms of users.

How are customer service and support?

I don't handle that kind of interaction, but my engineer does. Sometimes it requires escalation, but I have not heard of any complaints from him in terms of the support received. It is good.

How would you rate customer service and support?

Positive

Which solution did I use previously and why did I switch?

I have used Delinea but not in this company. I prefer CyberArk over Delinea.

How was the initial setup?

It is not that easy. You need to load the users and platforms that you will be using. You need to teach the users how to do it. It requires some change management. It is a bit complicated, but it is expected. It is not just plug-and-play.

Its maintenance depends. You can have an on-premise solution or you can have a cloud solution. We have an on-premise solution, so it requires some maintenance on the infrastructure.

What about the implementation team?

Its implementation requires a team effort

What's my experience with pricing, setup cost, and licensing?

With the current model of licensing, for my use cases, sometimes it's hard to convince the management and get budget approvals for it. It's expensive and you're not getting anything new. It's just a control, but in terms of risk, you are covering a big impact on the company. Improvement in the licensing prices is something I would want to have.

What other advice do I have?

I would rate CyberArk Privileged Access Manager as an eight out of ten.

Which deployment model are you using for this solution?

On-premises
Disclosure: PeerSpot contacted the reviewer to collect the review and to validate authenticity. The reviewer was referred by the vendor, but the review is not subject to editing or approval by the vendor.
Flag as inappropriate
PeerSpot user
Buyer's Guide
CyberArk Privileged Access Manager
September 2025
Learn what your peers think about CyberArk Privileged Access Manager. Get advice and tips from experienced pros sharing their opinions. Updated: September 2025.
867,497 professionals have used our research since 2012.
reviewer2618997 - PeerSpot reviewer
Presales Engineer at a computer software company with 201-500 employees
Reseller
Top 20
Continuously monitors the access and detects any unusual behavior
Pros and Cons
  • "The module called PTA, Privileged Threat Analytics, is very useful. When you give access to a user, it monitors and detects if the user's behavior is unusual. After giving access, it continually checks if the user is the same user."
  • "I would rate this solution a nine out of ten."
  • "The solution's architecture could be improved. It requires installation on four to five different servers. Each server has a purpose, but when you need to troubleshoot, it can be difficult because you need to access each of them. Reducing the number of servers would be helpful."
  • "The solution's architecture could be improved. It requires installation on four to five different servers."

What is our primary use case?

I use CyberArk Privileged Access Manager to prevent exposing credentials for super-critical accounts, such as admin accounts and root accounts. I use it to protect these credentials and to avoid exposing them.

What is most valuable?

The module called PTA, Privileged Threat Analytics, is very useful. When you give access to a user, it monitors and detects if the user's behavior is unusual. After giving access, it continually checks if the user is the same user. It detects unusual behavior if someone else accesses the application.

What needs improvement?

The solution's architecture could be improved. It requires installation on four to five different servers. Each server has a purpose, but when you need to troubleshoot, it can be difficult because you need to access each of them. Reducing the number of servers would be helpful.

In the SaaS version, the number of required servers is reduced from five to three, but it is not completely cloud-based because servers still need to be deployed on-premises. Some clients are migrating from on-premises to the cloud. They do not want to use more servers or increase their on-premises data centers. They want everything to be on the cloud, but even in the SaaS version of CyberArk Privileged Access Manager, they need to deploy some servers on-premises. That is not very helpful.

For how long have I used the solution?

I started using CyberArk Privileged Access Manager in 2022, which was two years ago.

What do I think about the stability of the solution?

I have not experienced much instability. Sometimes, the issue lies with the server I deployed, but this is not very often.

What do I think about the scalability of the solution?

In the on-premises version, scalability is difficult because server limitations can require buying new hardware. The SaaS version is more flexible, allowing easier scaling with increased users.

How are customer service and support?

I contacted them more when I started to work with this solution. I still contact them but not so much.

I would rate their technical support a six out of ten. They are helpful, but complex issues can take a long time to resolve, which can delay solutions for urgent customer issues.

How would you rate customer service and support?

Neutral

Which solution did I use previously and why did I switch?

I have used other solutions like Password Manager, but they were not very helpful because you use and store the same credentials, so there is a risk of exposing real credentials. CyberArk Privileged Access Manager allows me to create a random password and share it with a person, preventing the exposure of real credentials.

While some of the Password Manager solutions are free, they are too dangerous because they expose credentials.

How was the initial setup?

I have worked with both on-premises and cloud versions. I prefer the cloud version because with on-prem, I need to install my own servers and maintain those servers. I do not have to do that with the cloud model. The responsibility belongs to CyberArk. I have fewer responsibilities as an administrator.

Initially, the setup was difficult to understand, but after three to four deployments, it became easier. It also depends on the kind of applications or servers needing integration.

In terms of maintenance, when the customer starts to use a new application, it needs to be integrated with CyberArk Privileged Access Manager. Sometimes the new application is not 100% compatible. In such a case, the developer needs to create the integration.

What about the implementation team?

In the first deployment, there was a team of two people.

What's my experience with pricing, setup cost, and licensing?

Its price is high. I have also worked with Delinea. CyberArk is comparatively expensive compared to other PAM solutions, such as Delinea, especially during renewal.

What other advice do I have?

It takes some time to realize the benefits of this solution. Customers take time to understand this solution. It also happened to me when I first started to learn how this solution works. I was looking for a solution to protect identities, and when I came across this solution, I found it hard to deploy as the architecture is complex. Still, in one month, I was able to understand the purpose of this solution.

Before deployment, I advise being clear about the applications to integrate and the users who will use them. Mapping this information beforehand will save time during production. You will not have to add them one by one.

I would rate this solution a nine out of ten.

Disclosure: PeerSpot contacted the reviewer to collect the review and to validate authenticity. The reviewer was referred by the vendor, but the review is not subject to editing or approval by the vendor. The reviewer's company has a business relationship with this vendor other than being a customer: Reseller
PeerSpot user
reviewer2620077 - PeerSpot reviewer
IT Security Architect at a comms service provider with 201-500 employees
Real User
Top 5Leaderboard
Facilitates secure password rotation and out-of-band session management but the process for accessing RDP could be improved
Pros and Cons
  • "CyberArk Privileged Access Management's most valuable features are primarily its password vault functionality, specifically CyberArk's Core Privileged Manager and Privileged Session Manager."
  • "Customer support has been very helpful and responsive."
  • "The product is complex and requires extensive configuration."
  • "The current process for accessing RDP through the CyberArk or administrative portal involves downloading an RDP file. This is inconvenient for users and problematic due to security restrictions that prevent accessing servers via downloaded RDP files."

What is our primary use case?

We currently use CyberArk Privileged Access Manager for password vaulting. Our roadmap includes managing service accounts, rotating passwords, and expanding to SSH keys, AWS keys, and other login credentials. We've already implemented local administrative accounts and rotated elevated domain administrative accounts. Additionally, we've integrated Okta for multi-factor authentication, using Okta Verify, and plan to expand this to workforce identity for broader end-user security and credential management.

What is most valuable?

CyberArk Privileged Access Management's most valuable features are primarily its password vault functionality, specifically CyberArk's Core Privileged Manager and Privileged Session Manager. These components facilitate secure password rotation and out-of-band session management, addressing our organization's critical security needs.

What needs improvement?

The current process for accessing RDP through the CyberArk or administrative portal involves downloading an RDP file. This is inconvenient for users and problematic due to security restrictions that prevent accessing servers via downloaded RDP files. Ideally, the process should allow for a direct RDP connection upon providing server details, eliminating the download step and streamlining access. This issue represents a significant challenge and source of frustration for users.

The product is complex and requires extensive configuration. More tutorials and detailed use cases with troubleshooting steps would be beneficial, particularly for first-time implementers. Despite the excellent customer service, resolving issues can be time-consuming due to the product's complexity. Compared to lightweight solutions like Okta, CyberArk requires more background experience and is not as straightforward to learn and implement.

For how long have I used the solution?

I have been using CyberArk Privileged Access Manager for almost five years.

What do I think about the stability of the solution?

The performance of CyberArk Privileged Access Management sometimes lags or crashes, but this is not a significant concern.

What do I think about the scalability of the solution?

We have not reached platform limitations yet, as CyberArk supports up to eight hundred platforms per tenant, and documentation is clear about scalability limits.

How are customer service and support?

Customer support has been very helpful and responsive. My customer success manager facilitated many calls with technical experts, efficiently resolving critical issues.

How would you rate customer service and support?

Positive

Which solution did I use previously and why did I switch?


How was the initial setup?

CyberArk's environment setup was straightforward, but we encountered issues during the Proof of Concept stage, specifically with PAM account discovery. While the CyberArk Manager displayed discovered accounts, we couldn't download the data into a usable format like an Excel sheet. This hindered our ability to identify efficiently and inventory discovered accounts, particularly from Windows systems, for phased onboarding. Although we eventually received instructions from CyberArk support on downloading the data, the process was complex and time-consuming. Simplified data export features would greatly benefit administrators.

What about the implementation team?

I received excellent support from CyberArk's technical team and customer success manager, who arranged calls and helped resolve implementation issues.

What's my experience with pricing, setup cost, and licensing?

Although CyberArk Privileged Access Management is expensive, its protection capabilities outweigh the cost.

Which other solutions did I evaluate?

I also evaluated CyberArk, along with Okta PAM and BeyondTrust, because it encompasses all the features we require, and Gartner recognizes it as an industry leader.

What other advice do I have?

I rate CyberArk Privileged Access Management seven out of ten. 

To streamline project setup, new users should receive guidance on planning and implementation scopes. Scheduling a jump start without such direction can complicate learning.

Which deployment model are you using for this solution?

Hybrid Cloud

If public cloud, private cloud, or hybrid cloud, which cloud provider do you use?

Other
Disclosure: PeerSpot contacted the reviewer to collect the review and to validate authenticity. The reviewer was referred by the vendor, but the review is not subject to editing or approval by the vendor.
Flag as inappropriate
PeerSpot user
reviewer2695500 - PeerSpot reviewer
Senior Information Technology Security Specialist at a financial services firm with 5,001-10,000 employees
Real User
Improves compliance and operational efficiency
Pros and Cons
  • "CyberArk Privileged Access Manager makes it easy for users to retrieve and manage their passwords."
  • "CyberArk Privileged Access Manager has helped our organization remain compliant in the privileged access management space."
  • "In CyberArk Privileged Access Manager, the UI has room for improvement, as does the dashboard reporting, which could be made better or easier to use."
  • "In CyberArk Privileged Access Manager, the UI has room for improvement, as does the dashboard reporting, which could be made better or easier to use."

What is our primary use case?

We're using CyberArk Privileged Access Manager to manage our service accounts, privileged service accounts, and password rotation. We also use Conjur.

How has it helped my organization?

CyberArk Privileged Access Manager has helped our organization remain compliant in the privileged access management space. It is very helpful for meeting compliance and regulatory requirements such as SOC, SWIFT, and PCI DSS.

CyberArk Privileged Access Manager has helped us become more efficient in managing these service accounts.

CyberArk Privileged Access Manager feels quite secure in ensuring data privacy.

CyberArk Privileged Access Manager has a very strong potential for preventing attacks and lateral movements, but it has not had an impact one way or the other on the number of privileged accounts in our organization. They are just managed differently.

What is most valuable?

CyberArk Privileged Access Manager makes it easy for users to retrieve and manage their passwords.

I have been using CyberArk Privileged Access Manager for a few months. I am still learning, and I appreciate all the networking and education at the CyberArk Impact in Boston, which is going to set me up for success as I take on my role.

What needs improvement?

In CyberArk Privileged Access Manager, the UI has room for improvement, as does the dashboard reporting, which could be made better or easier to use. The interface needs to be more intuitive in CyberArk Privileged Access Manager. There should be dashboards in CyberArk Privileged Access Manager with more data and reporting capability for the non-compliant scenarios.

For how long have I used the solution?

My company has been using it for a long time; I have been using it only for a few months.

How are customer service and support?

I have not had any support experience with CyberArk at this point in my journey. 

I found the CyberArk Impact event to be much more effective as an educational experience.

How would you rate customer service and support?

Positive

What was our ROI?

The time-to-value for CyberArk Privileged Access Manager was recognized pretty quickly after implementing it.

What's my experience with pricing, setup cost, and licensing?

I hope to learn how the pricing works so that I can understand it better, but I am certain it is not inexpensive.

What other advice do I have?

It is absolutely necessary to have a PAM tool like CyberArk Privileged Access Manager, even if someone is using other security tools.

Based on my experience thus far, I would recommend CyberArk Privileged Access Manager to other users.

I would rate CyberArk Privileged Access Manager as an eight out of ten. It is early in my journey with this solution.

Disclosure: PeerSpot contacted the reviewer to collect the review and to validate authenticity. The reviewer was referred by the vendor, but the review is not subject to editing or approval by the vendor.
Flag as inappropriate
PeerSpot user
Sourabh Patidar - PeerSpot reviewer
IT Business Manager at a computer software company with 1-10 employees
Real User
Top 5
Granular control provides compliance and automates credential security
Pros and Cons
  • "The granularity of the controls in the CyberArk Privileged Access Manager is good; they have provided compliance which is required, helping us in auditing and reducing the risk of insider misuse of credential theft while also saving time for the IT guys with automating password rotations."
  • "The interface of the CyberArk Privileged Access Manager could be smoother, and the GUI could be more user-friendly and modern."

What is our primary use case?

Mainly, I use the CyberArk Privileged Access Manager for securely storing and managing the credentials, and its main features include the Password Vault and automatic password rotation.

What is most valuable?

The granularity of the controls in the CyberArk Privileged Access Manager is good; they have provided compliance which is required, helping us in auditing and reducing the risk of insider misuse of credential theft while also saving time for the IT guys with automating password rotations.


It's a valuable tool. The main function is securing data from theft and saving all the passwords in the same place, as the whole organization's main API endpoints are stored here.

The feature I appreciate the most about the CyberArk Privileged Access Manager is the secure data, which acts as a centralized store where credentials are securely stored.

What needs improvement?

The interface of the CyberArk Privileged Access Manager could be smoother, and the GUI could be more user-friendly and modern.

For how long have I used the solution?

I have been using the CyberArk Privileged Access Manager for one year.

What do I think about the stability of the solution?

I have not really seen any lagging, crashing, or downtime with the stability of the CyberArk Privileged Access Manager.

How are customer service and support?

I have contacted their technical support and customer support a couple of times, and the quality and speed are good. The service is great.

How would you rate customer service and support?

How was the initial setup?

When I first started using the CyberArk Privileged Access Manager, it was easy to learn how to use it. It's a simple and straightforward tool. It took me approximately three days to fully learn how to use the CyberArk Privileged Access Manager, which is less than a week.

Which other solutions did I evaluate?

I have not tried using any alternatives to the CyberArk Privileged Access Manager.

What other advice do I have?

On a scale from 1 to 10, I would rate the CyberArk Privileged Access Manager overall as 9.5.

Disclosure: PeerSpot contacted the reviewer to collect the review and to validate authenticity. The reviewer was referred by the vendor, but the review is not subject to editing or approval by the vendor.
Flag as inappropriate
PeerSpot user
Infrastructure Architect, Senior Engineer at a tech vendor with 5,001-10,000 employees
Real User
Helps secure our accounts and has good stability and support
Pros and Cons
  • "By implementing CyberArk Privileged Access Manager, we wanted to secure the password data and password accounts. We could see the benefits of CyberArk Privileged Access Manager immediately after we deployed it and started using it."
  • "We could see the benefits of CyberArk Privileged Access Manager immediately after we deployed it and started using it."
  • "They could improve CyberArk Privileged Access Manager by providing more reports. If I need to know the 10 most-used accounts for this week, that functionality can be made available in the reports."
  • "My company always complains about the cost of CyberArk Privileged Access Manager because it's too high."

What is our primary use case?

My use cases as of right now include configuration, implementation, and developing a PowerShell report.

What is most valuable?

By implementing CyberArk Privileged Access Manager, we wanted to secure the password data and password accounts. We could see the benefits of CyberArk Privileged Access Manager immediately after we deployed it and started using it.

What needs improvement?

They could improve CyberArk Privileged Access Manager by providing more reports. If I need to know the 10 most-used accounts for this week, that functionality can be made available in the reports.

For how long have I used the solution?

I have been using CyberArk Privileged Access Manager for seven years.

What do I think about the stability of the solution?

It is stable. The environment is stable, with no lagging, crashing, or downtime.

What do I think about the scalability of the solution?

I cannot say much about scalability because we did not have any need for it.

How are customer service and support?

I have contacted their technical support plenty of times. I would rate CyberArk's support a seven out of ten. They are always good.

How would you rate customer service and support?

Neutral

Which solution did I use previously and why did I switch?

I have not used any alternatives to CyberArk Privileged Access Manager in my career.

How was the initial setup?

The initial deployment was easy because I went to training first. The training was set up by CyberArk. From design to implementation, it took close to six months.

In terms of maintenance, it requires OS upgrades and patches. It doesn't take a long time.

What about the implementation team?

We did not use any help from a third party, such as an integrator or consultant. The number of people required depends on the environment. I don't see how one person can manage it because there is a lot of information to collect before even doing a design.

What's my experience with pricing, setup cost, and licensing?

My company always complains about the cost of CyberArk Privileged Access Manager because it's too high.

What other advice do I have?

For a new user, I would advise them to try to configure CyberArk Privileged Access Manager a couple of times before starting to use it in a production environment.

I would rate CyberArk Privileged Access Manager a nine out of ten.

Which deployment model are you using for this solution?

On-premises
Disclosure: My company does not have a business relationship with this vendor other than being a customer.
Flag as inappropriate
PeerSpot user
CEO at CareerCraftly
Real User
Top 5Leaderboard
Privileged access management escalates efficiently with robust access control and remote connectivity
Pros and Cons
  • "The access control feature and privilege and role-based assignment are outstanding."

    What is our primary use case?

    We use CyberArk Privileged Access Manager for privileged access management (PAM) escalation, securing our website, and applications. Our cybersecurity team actively utilizes its features.

    What is most valuable?

    The PAM escalation is valued. The access control feature and privilege and role-based assignment are outstanding. Dividing the user admin for security protection is the best feature. Additionally, its remote access allows easy connection for my team, and it efficiently manages identity.

    What needs improvement?

    Initially, it was challenging to understand and use all the features incrementally. Having a better user journey with a support team to connect would improve the product and services.

    For how long have I used the solution?

    I have been using CyberArk Privileged Access Manager for about eight months in our company.

    What do I think about the stability of the solution?

    The solution is quite stable. We have not faced any issues related to stability since using CyberArk Privileged Access Manager for eight months.

    What do I think about the scalability of the solution?

    CyberArk Privileged Access Manager is scalable. As a startup, it initially handled fewer users, but it scaled well as we grew.

    How are customer service and support?

    Technical support was fast in its replies and always supportive, helping to resolve any issues efficiently.

    How would you rate customer service and support?

    Neutral

    Which solution did I use previously and why did I switch?

    We used miniOrange, an Indian-based cybersecurity product for access management and PAM escalation. We also used one more product, which I don't remember the name of.

    How was the initial setup?

    The initial setup was straightforward due to well-documented resources and tutorials.

    What about the implementation team?

    Our cybersecurity team, comprising two to three people, worked on the deployment and feature implementation.

    What's my experience with pricing, setup cost, and licensing?

    The pricing is quite well-structured with monthly and weekly plans.

    Which other solutions did I evaluate?

    I evaluated miniOrange and one other product.

    What other advice do I have?

    New users should watch the YouTube channel, read the documentation, check the resource section including CyberArk University, and see if it works well with their product. I rate the overall solution a nine. My overall product rating is 9 out of 10.

    Disclosure: PeerSpot contacted the reviewer to collect the review and to validate authenticity. The reviewer was referred by the vendor, but the review is not subject to editing or approval by the vendor.
    Flag as inappropriate
    PeerSpot user
    Buyer's Guide
    Download our free CyberArk Privileged Access Manager Report and get advice and tips from experienced pros sharing their opinions.
    Updated: September 2025
    Buyer's Guide
    Download our free CyberArk Privileged Access Manager Report and get advice and tips from experienced pros sharing their opinions.