Try our new research platform with insights from 80,000+ expert users
Ali Hatamleh - PeerSpot reviewer
IT operations manager at a tech services company with 11-50 employees
Real User
Top 5Leaderboard
Implementing robust access security and monitoring for user sessions
Pros and Cons
    • "CyberArk Privileged Access Manager can be improved because I have experienced one issue where a user connected through RDP to a Linux server and the PAM could not fetch any commands or key store logging from the Linux server, which works fine on Windows servers."

    What is our primary use case?

    My main use case for CyberArk Privileged Access Manager is installing it to prevent direct access to the users. For the privileged account, we are using the PAM, and all sessions have been monitored, with all logs shared and logged on the vault.

    I have more to add about my main use case for CyberArk Privileged Access Manager, specifically our Privileged Threat Analysis, which detects any suspicious event and alarms us.

    What is most valuable?

    The best features CyberArk Privileged Access Manager offers are PTA, Privileged Threat Analysis, and Alero, Remote Access Management, and these features are essential for enhancing security.

    PTA and Alero have made a difference for my team by providing a predefined rule assigned and implemented on the PAM; for example, it sends us an email if there is any suspicious activity or threat credential loss, offering feedback related to user behavior. For Alero, Remote Access Management, it is a very wonderful Identity and Access Management with biometric MFA, mobile access, location tracking, and a small RBAC role-based matrix access that defines user roles, serving as a replacement for VPN.

    CyberArk Privileged Access Manager has positively impacted my organization, showing significant improvement since all sessions are monitored and isolated using isolated RDP sessions, which are created temporarily and expire if not used.

    In terms of specific metrics or outcomes, the time savings have been noticeable, and while it is not direct access, the PAM works efficiently between servers and end users, preventing users from running or installing unauthorized applications through the AppLocker application created on the PSM.

    What needs improvement?

    CyberArk Privileged Access Manager can be improved because I have experienced one issue where a user connected through RDP to a Linux server and the PAM could not fetch any commands or key store logging from the Linux server, which works fine on Windows servers. If they could combine both into one keylogger solution, it would be great, and increasing the number of CPM plugins for password retention while providing common web portal applications out-of-the-box would also help.

    For how long have I used the solution?

    I have been using CyberArk Privileged Access Manager for more than five years.

    Buyer's Guide
    CyberArk Privileged Access Manager
    October 2025
    Learn what your peers think about CyberArk Privileged Access Manager. Get advice and tips from experienced pros sharing their opinions. Updated: October 2025.
    871,408 professionals have used our research since 2012.

    What do I think about the stability of the solution?

    CyberArk Privileged Access Manager is stable in my experience, with no issues of downtime or reliability due to our disaster recovery (DR) and high availability (HA) servers in place.

    What do I think about the scalability of the solution?

    CyberArk Privileged Access Manager's scalability is good, as it can handle more users or workloads with our five-year roadmap indicating that the PSM server can manage around 20 sessions per hour, which is sufficient for our organization.

    How are customer service and support?

    I would rate customer support a nine on a scale.

    How would you rate customer service and support?

    Which solution did I use previously and why did I switch?

    I previously used BeyondTrust and Delinea, but I did not switch because I noticed many features in CyberArk that are not available in other solutions.

    Which other solutions did I evaluate?

    I did not evaluate other options before choosing CyberArk Privileged Access Manager, as I had good experience with another live product.

    What other advice do I have?

    My advice for others looking to use CyberArk Privileged Access Manager is to pay attention to the vaulting part, which is essential for every organization, as each server has a secured vault that connects over TLS with a lot of encryption details. The product is consistently enhanced, and the latest release is 14.6. I rate this solution 9 out of 10.

    Which deployment model are you using for this solution?

    On-premises
    Disclosure: My company has a business relationship with this vendor other than being a customer. Partner
    Flag as inappropriate
    PeerSpot user
    Security Consultant at Silver Bullet IS Consulting
    Consultant
    Top 20
    Privileged access management achieves full control with comprehensive features
    Pros and Cons
      • "When they took it to the cloud, they started cutting things out."

      What is our primary use case?

      For CyberArk Privileged Access Manager, use cases are providing just-in-time privileged access. The most simple use case is hosting all privileged credentials in a secure manner and managing and controlling access to those credentials. Therefore, controlling access to privileged endpoints is the usual thing that will be done with PAM.

      What is most valuable?

      CyberArk Privileged Access Manager has several valuable features. The basic feature is privileged access management with all the processes and procedures that are needed. It has all the relevant features required to provide a PAM project or PAM program. It does everything that is needed. A tangible benefit is that we already have full control of privileged access. We have just started and have onboarded all privileged accounts into the system.

      What needs improvement?

      I have noticed areas of CyberArk Privileged Access Manager that could be improved or enhanced in integration with automation tools. It's not quite the same in the cloud, the Privilege Cloud version. The on-premises version allows users to do absolutely everything. When they took it to the cloud, they started cutting things out. The other issue with CyberArk is that they are marketing their new product, SIA, which is based on Privilege Cloud. Users still need to have Privilege Cloud to achieve the same level of functionality as the on-premises version.

      We are still early in the roadmap and haven't progressed far enough to identify additional needs. When organizations reach the end of their maturity roadmap, they can better identify specific tool requirements that aren't currently available.

      For how long have I used the solution?

      We have been deploying CyberArk Privileged Access Manager for two years now and counting.

      How are customer service and support?

      The evaluation of customer service and technical support for CyberArk Privileged Access Manager depends on several factors. When receiving support directly from CyberArk, they are the most knowledgeable, though they don't always have immediate solutions as they might need to create them, which can take considerable time. For instance, the Ansible integration for the cloud version has been requested for years.

      When working with CyberArk partners for support, it's crucial to ensure they have actual knowledge and aren't just acting as middlemen. There have been instances where third parties are hired to provide first and second line support, but they simply forward requests to CyberArk without adding value to the process.

      How would you rate customer service and support?

      What about the implementation team?

      We used a deployment partner recommended by CyberArk for the deployment and maintenance process. One crucial step that should be done first is creating an inventory of how privileged access is currently handled and where it is needed. Without this inventory, you might deploy CyberArk and realize it doesn't work with your existing architecture or infrastructure.

      Our implementation team consisted of approximately 15 people, including architects, engineers, application owners, network specialists, Windows and Linux administrators, database administrators, and cloud specialists. While maintenance requires fewer people, input from all these stakeholders is crucial for successful implementation as they each have different requirements.

      Most importantly, this needs to be a management-driven initiative with a top-down approach. Management must establish new working methods, as the biggest barrier to acceptance is typically resistance to changes in working procedures.

      For ongoing operations, the staffing requirements depend on the company's operations. Typically, 24/7 coverage requires at least three people per shift in a follow-the-sun model. This accounts for first and second line support only, with additional staff needed for server maintenance, totaling around nine people.

      What other advice do I have?

      The primary problem addressed by implementing CyberArk Privileged Access Manager is the lack of control over privileged access - where it happens, how it occurs, and what is done with that access. When attempting to attack an enterprise, attackers target the highest-privilege credentials available. Therefore, protecting the most critical credentials within your organization is essential.

      For those planning to deploy CyberArk Privileged Access Manager, it's crucial to understand that it's a multi-year program. It's not just about deploying the tool; it needs policies and governance around it. Additionally, infrastructure modifications are necessary to ensure PAM is the only way to provide privileged access to endpoints.

      It's a great product that does everything required from a PAM tool. I would rate CyberArk Privileged Access Manager as a nine out of ten.

      Disclosure: My company does not have a business relationship with this vendor other than being a customer.
      Flag as inappropriate
      PeerSpot user
      Buyer's Guide
      CyberArk Privileged Access Manager
      October 2025
      Learn what your peers think about CyberArk Privileged Access Manager. Get advice and tips from experienced pros sharing their opinions. Updated: October 2025.
      871,408 professionals have used our research since 2012.
      Team Lead at Flash.co
      Real User
      Provides centralized management, AI capabilities, and advanced threat detection
      Pros and Cons
      • "The AI capabilities, including advanced threat detection features, are very helpful for us. They reduce human effort and errors, allowing us to quickly identify and respond to threats."
      • "Overall, I would rate it a ten out of ten."
      • "Pricing is a concern for me because it is not very user-friendly for startups, new users, or very small organizations."
      • "Pricing is a concern for me because it is not very user-friendly for startups, new users, or very small organizations."

      What is our primary use case?

      We use CyberArk Privileged Access Manager to manage our privileged accounts because it protects against cyberattacks and prevents unnecessary or illegal access. 

      How has it helped my organization?

      It provides a centralized management system, making it easier for us to enforce policies and monitor access across our organization. Additionally, we can monitor sessions and record and detect suspicious activities that are harmful to our systems and organization.

      What is most valuable?

      The AI capabilities, including advanced threat detection features, are very helpful for us. They reduce human effort and errors, allowing us to quickly identify and respond to threats. This solution scales up our IT environment and resolves almost every issue that poses a threat to our organization.

      What needs improvement?

      Pricing is a concern for me because it is not very user-friendly for startups, new users, or very small organizations. It might be better if the price was reduced. Sometimes, the maintenance cost can also be high.

      For how long have I used the solution?

      I have been using CyberArk Privileged Access Manager for the last one and a half to two years.

      What do I think about the stability of the solution?

      Every application has downtime. However, it remains stable overall. I would rate it a nine out of ten for stability.

      What do I think about the scalability of the solution?

      It is scalable. I would rate it a ten out of ten for scalability.

      How are customer service and support?

      Sometimes, when I face issues or want to understand some features, or it is difficult to identify activities in our system, I contact the support team. They are very helpful, always available, and try to resolve our issues as soon as possible.

      How would you rate customer service and support?

      Positive

      Which solution did I use previously and why did I switch?

      This is the first PAM solution that I implemented in our organization.

      How was the initial setup?

      The initial setup is not very easy, nor very difficult. It is moderate to deploy.

      It does not require any maintenance from our side.

      What about the implementation team?

      We have a team of three to five members, and they deployed it in a minimum of one week.

      What's my experience with pricing, setup cost, and licensing?

      Its price can be reduced.

      Which other solutions did I evaluate?

      I researched some solutions and found CyberArk Privileged Access Manager to be one of the good solutions. I am very happy with the product.

      What other advice do I have?

      I am happy with this product. If someone is looking for a PAM solution, I recommend it because it has a large developer community and good customer support. It is more stable than the others, and I am very happy with it. 

      Overall, I would rate it a ten out of ten.

      Disclosure: PeerSpot contacted the reviewer to collect the review and to validate authenticity. The reviewer was referred by the vendor, but the review is not subject to editing or approval by the vendor.
      Flag as inappropriate
      PeerSpot user
      UmeshKumar4 - PeerSpot reviewer
      Security Consultant at Ernst & Young
      Real User
      Top 20
      Offers password rotation and makes session recordings compulsory for data protection
      Pros and Cons
      • "Password rotation is the most valuable feature"
      • "The solution should be able to mitigate internal threats"

      What is our primary use case?

      I use the solution mainly for credential tasks. For instance, if the company I work for has recent data stored in a privileged report and needs security from cyber attackers, CyberArk Privileged Access Manager is used. The solution helps provide access only to authorized users and rotate passwords every sixty or ninety days. CyberArk Privileged Access Manager also allows the configuration of the password either manually or automatically. 

      In our organization, Privileged Session Managers (PSM) assist in recording sessions of a particular server using the solution. The product allows users to utilize different permissions, such as end-user, auditor, and administrator permissions. For CyberArk Privileged Access Manager, administrators have the major access to implement tasks like creating, changing, rotating the password and adding new users. 

      What is most valuable?

      The most valuable feature of this tool is the password rotation feature. Another vital feature of the solution is the Safe feature, which acts as a container. Only accounts included within the Safe can access a particular server. 

      The solution allows the distinguished use of PSM and PSMP for a Windows and Linux server, respectively. The tool makes all session recordings compulsory and cannot be tampered with. It also eliminates hard-coded credentials and supports demand-based applications.  

      CyberArk is very popular and provides a lot of features compared to competitors' PAM tools, which is why many customers are migrating to CyberArk's Privileged Access Manager. 

      What needs improvement?

      The solution should be able to completely mitigate internal threats. For instance, if an employee of a company saves the CyberArk passwords in a system, then another employee might be able to use it and log in, so there remains an internal threat when using the solution.  

      The feature of giving user access through a Safe should be modified. The solution should allow users access directly through an account, and the Safe concept needs to be improved. 

      For how long have I used the solution?

      I have been using CyberArk Privileged Access Manager for the past two years. 

      What do I think about the scalability of the solution?

      In my organization, about ninety to one hundred people are using CyberArk Privileged Access Manager. 

      How was the initial setup?

      It's easy to setup and install CyberArk Privileged Access Manager. Multiple components need to be installed for the solution. Often, the PVWA, PSM, and CPM need to be installed. If an organization has a Linux account, then PSMP needs to be installed for using the solution. While installing the solution, the Vaults need to be defined, if it's a standalone Vault or a cluster Vault. A cluster Vault is mostly implemented for disaster recovery to replicate data when something happens to the main Vault. 

      What's my experience with pricing, setup cost, and licensing?

      CyberArk Privileged Access Manager comes at a high cost. But the solution is worth its price. 

      What other advice do I have?

      I would recommend the solution to others depending on their goals. If the aim is to protect an organization's data and use PAM, then one should use CyberArk Privileged Access Manager. If the goals include detecting malicious activity, onboarding privileged accounts, and maintaining data accounts, then an organization should adopt the solution.   

      I have used the solution's session monitoring capabilities to monitor user activities. The solution's session monitoring feature can be useful for monitoring a user while the person logs in or performs other molecular activities.  

      CyberArk Privileged Access Manager is difficult and time-consuming to learn in comparison to other IAM tools. There are multiple components, like the vault, that need to be understood before using the solution. But basic administrator tasks like onboarding accounts and rotating passwords will be easy for a beginner user of CyberArk Privileged Access Manager. A beginner-level user of the solution may face challenges with secret rotating, management and AIM handling.  

      I would rate CyberArk Privileged Access Manager an eight out of ten. 

      Which deployment model are you using for this solution?

      On-premises
      Disclosure: My company does not have a business relationship with this vendor other than being a customer.
      PeerSpot user
      Security Engineer at ITAM
      Real User
      Top 10
      Helps to store password and do authentication
      Pros and Cons
      • "We have the identity provider for all the authentication processes. However, sometimes, we need access to different applications for customers or clients that are not integrated into the identity provider. For these, we need to store a password to gain access. For example, we use the CyberArk Password Vault for third-party services. This vault needs to be shared with many people in our company."
      • "The main challenge was integrating with in-house IT and business applications, which are not standard. We needed to create special updates for that kind of integration."

      What is our primary use case?

      We have the identity provider for all the authentication processes. However, sometimes, we need access to different applications for customers or clients that are not integrated into the identity provider. For these, we need to store a password to gain access. For example, we use the CyberArk Password Vault for third-party services. This vault needs to be shared with many people in our company. 

      This allows us to store passwords and create privileged access for some users without them needing to know the password. The system inputs the password into the endpoint URLs they use for authentication, but the users never see the password. This is crucial because people may leave the company, posing a high risk. If we had integrated it into the identity provider, we would have policies for active directory users but not for users outside the company.

      For example, our development teams need to connect to databases, systems, and cloud services during development. The developers don’t get access to third-party services. We use the solution to manage this access. The application being developed and deployed integrates with CyberArk Password Vault services.

      What needs improvement?

      The main challenge was integrating with in-house IT and business applications, which are not standard. We needed to create special updates for that kind of integration.

      For how long have I used the solution?

      I have been working with the product for three to four years. 

      What do I think about the scalability of the solution?

      The solution is 99 percent scalable. 

      How are customer service and support?

      Sometimes, support is not easy because you need to share the company's architecture. Maybe they are on time, but they don't understand the specifics we're talking about. Communication can be an issue, especially when speaking with people whose first language isn't English. There can be difficulties with understanding and making sense of conversations. So, outsourcing support can sometimes be challenging.

      How would you rate customer service and support?

      Neutral

      How was the initial setup?

      CyberArk Enterprise Password Vault's deployment is complex. 

      What other advice do I have?

      I have been working with the new services and don't see any additional issues at this hour. The key requirement is to have people who understand not only the tool but also the concepts and how to view it from an architectural perspective. 

      One problem is that people may not know how to work with the tool, and another is that they don't understand the concepts. So, I think focusing on proof of concepts is good. For example, what I do at first is request information for identity providers and key management services.

      I rate the overall solution a nine out of ten. 

      Which deployment model are you using for this solution?

      Public Cloud
      Disclosure: My company does not have a business relationship with this vendor other than being a customer.
      PeerSpot user
      System Administrator at Porto Editora
      Real User
      Top 5Leaderboard
      Passwords are stored securely within the vault and eliminates the need for users to store passwords in less secure locations
      Pros and Cons
      • "The password protection itself is the most important feature. It's something we didn't have before."
      • "The session monitoring and recording feature is also a good feature feature, but we're currently experiencing an issue with session monitoring not working correctly. We're working with CyberArk to resolve it. We aren't able to view active sessions or historical recordings of sessions."

      What is our primary use case?

      Primarily, I import accounts from our critical systems.  

      How has it helped my organization?

      Knowing that our passwords are stored securely within the vault has been a big improvement. It eliminates the need for users to store passwords in less secure locations.

      We want to integrate it with our IT service management platform and our SOC solution, but that's a future project.

      What is most valuable?

      The password protection itself is the most important feature. It's something we didn't have before.

      Moreover, the interface is intuitive. It is clear and user-friendly. 

      What needs improvement?

      The session monitoring and recording feature is also a good feature feature, but we're currently experiencing an issue with session monitoring not working correctly. We're working with CyberArk to resolve it.

      We aren't able to view active sessions or historical recordings of sessions.

      It is complex, which is something I know CyberArk is working on. They're trying to simplify certain administration tasks because a common critique is the level of complexity. But overall, we can do everything we need with it.

      So, CyberArk could still focus on making it more user-friendly.

      For how long have I used the solution?

      I have been using it for a year. 

      What do I think about the scalability of the solution?

      So far, we haven't had any scalability problems.

      We have around 50 licensed users – primarily administrators. We currently manage about 5,000 accounts with CyberArk.

      How are customer service and support?

      Sometimes, the initial response time is a bit slow, but once the customer service and support take on a case, they resolve issues quickly.

      How would you rate customer service and support?

      Positive

      What about the implementation team?

      CyberArk handled the primary setup tasks. We worked with a partner to implement additional components and now have the knowledge to manage the solution ourselves.

      The implementation process took around eight months. 

      What was our ROI?

      There has been an ROI. 

      We expect to see a full return on investment within the next three years. This was part of our long-term security plan.

      What's my experience with pricing, setup cost, and licensing?

      It is expensive, but the cost is justified considering the security it provides. Compared to other solutions, it is costly. We have not tried other solutions, but the price is high. 

      We only license Password Vault.

      Which other solutions did I evaluate?

      My company evaluated another solution like Delinea but preferred CyberArk due to its robustness and flexibility.

      I like its flexibility, while adding some complexity, allows us to fully customize the solution to our needs.

      One of the main advantages is the way we can connect from outside. We use a portal that provides secure access to our systems without needing a VPN. We just scan a QR code, and we're connected. We do not need to use a password and we are in through the QR code scan. 

      What other advice do I have?

      I would recommend using it. Overall, I would rate the solution a nine out of ten.

      It's a very complete solution for what we need.

      Disclosure: My company does not have a business relationship with this vendor other than being a customer.
      PeerSpot user
      Jonathan Hawes - PeerSpot reviewer
      CyberArk PAS Administrator at L3Harris Technologies
      Real User
      Good automation, reduces human error, and offers helpful support
      Pros and Cons
      • "The implementation of the PSM proxy has reduced the specific risk of "insider attacks" on our domain controllers and SLDAP servers by eliminating direct user login by an open secure connection on the user's behalf without ever revealing the privileged credentials."
      • "We'd like to see the creation of some kind of memo field for each device account, which could be used, in our network at least, to leave a note about the device for either the security or network engineering team members."

      What is our primary use case?

      Our primary use case is the scheduled password change management of Windows, Linux, and Cisco privileged local user passwords, as well as providing internal applications using the REST API credentials to access and maintain network elements.

      Utilizing the CyberArk Password Vault DR implementation, we have a ready resource as a hedge against network issues caused by seasonal hurricanes through having a replicated DR vault in an out-of-state facility.

      How has it helped my organization?

      The implementation of the CyberArk Privileged Access Management has reduced the total labor cost of doing quarterly password change management (PCM) on the thousands of network elements (routers & switches), servers, and workstations throughout our nationwide network.

      In addition to reducing the direct labor cost of the PCM procedures, the automation aspect has reduced risk that has previously resulted in many lost man-days resolving issues which previously was attributed to human-factor error during PCM procedures.

      What is most valuable?

      Utilizing the Central Policy Manager to provide policy programmable password change management automation, which can be configured either globally, or by using the individual PlatformIDs which limits the effect of human error on a nationwide implementation of network devices that are remotely co-located and not readily accessible. 

      The implementation of the PSM proxy has reduced the specific risk of "insider attacks" on our domain controllers and SLDAP servers by eliminating direct user login by an open secure connection on the user's behalf without ever revealing the privileged credentials.

      What needs improvement?

      My personal wishlist of features has been fulfilled with versions 12.6 and 13.2, which provide a host of improvements that the administrator community has been asking for.  

      With these version releases, that leaves my only "unfulfilled" product improvement request to be the creation of some kind of memo field for each device account, which could be used, in our network at least, to leave a note about the device for either the security or network engineering team members.

      For how long have I used the solution?

      We originally implemented the product in 2014 as a compliance mandate and fully integrated the application and functionality in 2017. We have just finished our fourth product upgrade and expanded our enterprise vault space to meet growing demand.

      What do I think about the stability of the solution?

      My implementation has been very stable over the past seven years, only having minor hiccups caused by "human error" during the "accidental" editing of a configuration file.

      What do I think about the scalability of the solution?

      We currently store over 50,000 privileged passwords, and I know if our network doubled tomorrow, the product would scale to meet the increased demand.

      How are customer service and support?

      There are two specific organizations within CyberArk that can provide customer assistance.

      The customer success team is there with serious advanced knowledge to assist when things are not flowing. In my specific case, while I was learning to be a PAM administrator, I routinely contacted our customer success team with questions related to "Where can I find this documentation?", "How does this work?" and my favorite, "How can I put my permission back onto a safe?"

      The other team is the professional services team, whose job is to be able to come in, analyze an issue, and correct it with the utmost speed. These are also highly experienced individuals that can be brought in the expand your implementation as needed.

      How would you rate customer service and support?

      Positive

      Which solution did I use previously and why did I switch?

      Prior to the implementation of the CyberArk Privileged Access Manager, the security operations utilized unencrypted spreadsheets to store privileged passwords, which became a POAM when discovered during a routine security audit.

      How was the initial setup?

      Our organization utilized the CyberArk professional support team to come in and provide a local, hands-on planning and implementation approach. This implementation methodology actually reduced long-term costs by making sure the implementation was done according to CyberArk's Best Practices.

      What about the implementation team?

      Our organization utilized CyberArk's professional support team to come in and provide a local, hands-on planning and implementation approach. This implementation methodology actually reduced long-term costs by making sure the implementation was done according to CyberArk's Best Practices.

      What was our ROI?

      Our annual support costs are offset by the reduced labor costs within the SOCC environment, as the product has automated most of the password change management procedures, allowing labor to be focused on other topics.

      What's my experience with pricing, setup cost, and licensing?

      While the IAM space is heating up with new vendors, both CyberArk development and the product team seem to be ahead of the curve, with features and products to enable enterprise customers the ability to secure their networks and break the intrusion cycle.

      Which other solutions did I evaluate?

      CyberArk was our first venture into a secure password vault and was implemented at the recommendation of our federal customer.

      What other advice do I have?

      The product takes some time to learn. That said, CyberArk Software offers both a customer success team as well as paid professional support to assist.  

      The customer success team has always seemed to be in my corner when needed, bringing insight and assistance when I was unable to resolve some of my "self-created issues".

      Which deployment model are you using for this solution?

      On-premises
      Disclosure: My company does not have a business relationship with this vendor other than being a customer.
      PeerSpot user
      Jonathan Hawes - PeerSpot reviewer
      CyberArk PAS Administrator at L3Harris Technologies
      Real User
      Easy to secure, control, and monitor privileged access on highly critical networks
      Pros and Cons
      • "The established sessions on the target systems are fully isolated and the privileged account credentials are never exposed to the end-users or their client applications and devices."
      • "CyberArk PAM is a very broad product as everyone's requirements for implementation are different. In our particular case, the initial implementation was planned and developed by people who didn't know our specific network requirements, so the initial implementation needed to be tweaked over time. While this is normal, at the time all these "major" changes required CyberArk professional services to come in-plant and "assist" with the changes."

      What is our primary use case?

      Within our organization, our security requirements, which are set by our customers, require CIS compliance. Those requirements mandated securing privileged passwords with encryption, both in transit and at rest. CyberArk PAM was selected as our solution, and CyberArk's Professional Services team conducted the initial installation and implementation. 

      Three years later, I was tasked with implementing the product more fully, integrating more of the out-of-the-box privileged password change management automation features of the product within our environment.  

      How has it helped my organization?

      The out-of-the-box functionality, Windows OS Privileged local account password change management, was the first automation feature implemented, and by itself, the automation reduced the man-hour requirement for quarterly local privileged password change management enough to provide a complete ROI on the initial licensing investment.

      Continued implementation of more of the out-of-the-box PAM functionality continues to produce man-hour savings, which frees up our security operations group to have more time to monitor, investigate, and resolve potential security issues on the network.

      What is most valuable?

      Our implementation is air-gapped from the outside world, and as such, we utilize a completely on-prem solution. Our highest risk is from privileged insiders, and CyberArk's answer to this challenge was the implementation of a Privileged Session Manager (PSM). With PSM, we were able to secure, control, and more importantly, monitor privileged access to highly critical network servers by using PSM to manage accounts and create detailed session audits and video recordings of all IT administrator privileged sessions on our most critical servers. The established sessions on the target systems are fully isolated and the privileged account credentials are never exposed to the end-users or their client applications and devices.

      What needs improvement?

      CyberArk PAM is a very broad product as everyone's requirements for implementation are different. In our particular case, the initial implementation was planned and developed by people who didn't know our specific network requirements, so the initial implementation needed to be tweaked over time. While this is normal, at the time all these "major" changes required CyberArk professional services to come in-plant and "assist" with the changes.  

      Over time, the CyberArk product team has made this process simpler and has enabled more local administrator configuration and update functionality, which doesn't require sub-contracts.

      For how long have I used the solution?

      Our program has been using CyberArk since 2014, although it was not fully implementated until I took it over in 2017.  

      What do I think about the stability of the solution?

      The product is very stable, limited only by the Windows Operating System is it built upon.

      What do I think about the scalability of the solution?

      This product seems to be scalable to any size. Providing vault cluster services, distributed vaults, and DR vault implementations, the product is truly ready for global implementation.

      How are customer service and support?

      Tier One customer service is not as responsive or as knowledgeable as I would like, however, once your service request is sent to a Tier Two support engineer, the knowledge and experience level increases dramatically.

      In addition, within the CyberArk support environment, Technical forums are available in which other customers are very willing to share their experience, and offer possible solutions to non-critical issues.

      How would you rate customer service and support?

      Positive

      Which solution did I use previously and why did I switch?

      This was an initial implementation to meet the regulatory requirements of a federal customer.

      How was the initial setup?

      In our specific case, the initial setup and configuration were very complex, which was a result of the initial design being developed by our internal engineers and CyberArk professional services, neither of which had the "tribal knowledge" of how the network functioned, or how the processes of network engineering and security had been implemented.

      What about the implementation team?

      The initial implementation was a joint project with CyberArk Professional Services and our internal Systems Engineers. The Professional Services engineers were very knowledgeable regarding the implementation of their products.

      What was our ROI?

      Our program realized the total ROI after the implementation of policy-based automated password change management, which resulted in a significant reduction in man-hours required to conduct password change management (PCM) on a multitude of network elements. 

      What's my experience with pricing, setup cost, and licensing?

      For licensing on a localized on-prem installation, the CorePAS licensing model enables the most critical component products within the PAM stack, enabling multiple layers of security which can take a while to implement.

      Which other solutions did I evaluate?

      At the time of the initial implementation (2013-2014), after looking at the field of available products, CyberArk PAM was significantly more mature than the other available products. For that reason, CyberArk PAM was selected.

      What other advice do I have?

      The greatest issue that I experienced with the implementation of the CyberArk PAM solution was inter-departmental politics regarding change. To resolve this, I relied on the CyberArk Customer Success team to assist with developing a strategy to get all of the stakeholders to accept the changes. Every CyberArk administrator needs to spend time learning about their customer success team since their purpose is to assist with making sure you have the knowledge you need to make sure your implementation is successful.

      Which deployment model are you using for this solution?

      On-premises
      Disclosure: My company does not have a business relationship with this vendor other than being a customer.
      PeerSpot user
      Buyer's Guide
      Download our free CyberArk Privileged Access Manager Report and get advice and tips from experienced pros sharing their opinions.
      Updated: October 2025
      Buyer's Guide
      Download our free CyberArk Privileged Access Manager Report and get advice and tips from experienced pros sharing their opinions.