CyberArk PAM is used to secure passwords and remediate audit findings. CyberArk PAM is used to manage access to passwords, rotating these after use or on a regular basis, and verifying the passwords on the system match what is in the vault on a regular basis. Passwords are managed in this manner on both Linux and Windows servers.
Good notifications, solid support, and agentless architecture
Pros and Cons
- "I find value in notifications from CyberArk when passwords fail verification and have other issues."
- "The current interface is not very intuitive."
What is our primary use case?
How has it helped my organization?
CyberArk PAM ensures that passwords on Linux servers are highly secure, regularly changed, and completely auditable. This saves enormous amounts of time when responding to audits and security concerns. And the scheduled verification of passwords ensures that passwords remain available when needed and stay secure. CyberArk has become the standard tool for password management.
What is most valuable?
I find value in notifications from CyberArk when passwords fail verification and have other issues. Investigation of these issues often uncovers other issues. The way safe security is handled is outstanding and makes it easy to provide safe access to those who need it and deny safe access to those who should not have it.
Another valuable feature is the agentless architecture of the product. Using native processes to manage passwords and not having to install and update agents is a huge plus.
What needs improvement?
A more friendly and functionally complete user interface would be nice to have. The current interface is not very intuitive. It is somewhat clunky and difficult to navigate, and many times have to toggle between the somewhat underdeveloped new interface and the older classic UI. This state of basically having two interfaces is a prime opportunity for CyberArk to improve its product.
Also, it would be nice if the vaults could run on Linux instead of Windows.
Buyer's Guide
CyberArk Privileged Access Manager
June 2025

Learn what your peers think about CyberArk Privileged Access Manager. Get advice and tips from experienced pros sharing their opinions. Updated: June 2025.
857,028 professionals have used our research since 2012.
For how long have I used the solution?
I have been working with CyberArk for more than ten years in various capacities ranging from end user to safe/vault administrator to application administrator.
What do I think about the stability of the solution?
The solution is incredibly stable.
What do I think about the scalability of the solution?
We have not run into any scaling issues.
How are customer service and support?
CyberArk support is pretty solid.
How would you rate customer service and support?
Positive
Which solution did I use previously and why did I switch?
I did not previously use a different solution.
How was the initial setup?
The initial setup is more complex than simple, however, not daunting.
What about the implementation team?
We worked with the vendor team who were very knowledgeable during the implementation.
What's my experience with pricing, setup cost, and licensing?
The PAM product isn't low-cost, however, it is worth it. Go with a longer-term agreement to realize lower costs.
Which other solutions did I evaluate?
CyberArk PAM was chosen before I got involved so I am not aware of which other products were evaluated. However, we have never had to go back and review the decision to use CyberArk.
What other advice do I have?
Use CyberArk professional services when needed. They are very knowledgeable and experienced which means engagements have a high success rate.
Which deployment model are you using for this solution?
On-premises
Disclosure: My company does not have a business relationship with this vendor other than being a customer.

System Administrator at Porto Editora
Passwords are stored securely within the vault and eliminates the need for users to store passwords in less secure locations
Pros and Cons
- "The password protection itself is the most important feature. It's something we didn't have before."
- "The session monitoring and recording feature is also a good feature feature, but we're currently experiencing an issue with session monitoring not working correctly. We're working with CyberArk to resolve it. We aren't able to view active sessions or historical recordings of sessions."
What is our primary use case?
Primarily, I import accounts from our critical systems.
How has it helped my organization?
Knowing that our passwords are stored securely within the vault has been a big improvement. It eliminates the need for users to store passwords in less secure locations.
We want to integrate it with our IT service management platform and our SOC solution, but that's a future project.
What is most valuable?
The password protection itself is the most important feature. It's something we didn't have before.
Moreover, the interface is intuitive. It is clear and user-friendly.
What needs improvement?
The session monitoring and recording feature is also a good feature feature, but we're currently experiencing an issue with session monitoring not working correctly. We're working with CyberArk to resolve it.
We aren't able to view active sessions or historical recordings of sessions.
It is complex, which is something I know CyberArk is working on. They're trying to simplify certain administration tasks because a common critique is the level of complexity. But overall, we can do everything we need with it.
So, CyberArk could still focus on making it more user-friendly.
For how long have I used the solution?
I have been using it for a year.
What do I think about the scalability of the solution?
So far, we haven't had any scalability problems.
We have around 50 licensed users – primarily administrators. We currently manage about 5,000 accounts with CyberArk.
How are customer service and support?
Sometimes, the initial response time is a bit slow, but once the customer service and support take on a case, they resolve issues quickly.
How would you rate customer service and support?
Positive
What about the implementation team?
CyberArk handled the primary setup tasks. We worked with a partner to implement additional components and now have the knowledge to manage the solution ourselves.
The implementation process took around eight months.
What was our ROI?
There has been an ROI.
We expect to see a full return on investment within the next three years. This was part of our long-term security plan.
What's my experience with pricing, setup cost, and licensing?
It is expensive, but the cost is justified considering the security it provides. Compared to other solutions, it is costly. We have not tried other solutions, but the price is high.
We only license Password Vault.
Which other solutions did I evaluate?
My company evaluated another solution like Delinea but preferred CyberArk due to its robustness and flexibility.
I like its flexibility, while adding some complexity, allows us to fully customize the solution to our needs.
One of the main advantages is the way we can connect from outside. We use a portal that provides secure access to our systems without needing a VPN. We just scan a QR code, and we're connected. We do not need to use a password and we are in through the QR code scan.
What other advice do I have?
I would recommend using it. Overall, I would rate the solution a nine out of ten.
It's a very complete solution for what we need.
Disclosure: My company does not have a business relationship with this vendor other than being a customer.
Buyer's Guide
CyberArk Privileged Access Manager
June 2025

Learn what your peers think about CyberArk Privileged Access Manager. Get advice and tips from experienced pros sharing their opinions. Updated: June 2025.
857,028 professionals have used our research since 2012.
IT Manager at Genpact - Headstrong
Good reporting and MFA with easy integration capabilities
Pros and Cons
- "CyberArk PAM can be easily automated."
- "There should be more models and licensing plans for this software."
What is our primary use case?
In my organization, we are using CyberArk Privileged Access Manager to enhance the security of an organization's critical systems, mainly by securing privileged accounts (e.g. administrator passwords, SSH keys, and API tokens).
We are also using Cyber-Ark for access control by ensuring that only authorized personnel can access privileged accounts and sensitive systems.
very important for us is also Session Recording and Monitoring. We can record and monitor privileged user sessions in real time for auditing purposes.
How has it helped my organization?
CyberArk Privileged Access Manager significantly improved our organization's security. Mainly, it has enhanced our ability to secure privileged accounts. Centralized management of identities ensures that credentials are stored securely. Also, the automated rotation of passwords reduces the risk of leaks.
The session recording feature adds great value and helps with auditing administrative activities.
CyberArk PAM can be easily automated, which saves a lot of time and administrative effort.
What is most valuable?
For our organization, the most valuable features of CyberArk PAM are:
- Credential Management. The automation of the retrieval and injection of credentials into sessions, and automation of password rotation.
- Session Recording. It gives us the possibility to record privileged user sessions for auditing and compliance purposes.
- Ease of integration. CyberArk can by integrated with multiple systems and applications.
- The possibility of using Multi Factor Authentication (MFA) which increases security
- Reporting module. This allows us to generate reports based on session activity
What needs improvement?
Cost management. There should be more models and licensing plans for this software. They should also be flexible, allowing you to purchase selected features at a favorable price.
User Experience. The current interface is OK, however, sometimes it is not very intuitive. There is also no possibility of advanced modification and adaptation to your own needs and requirements.
Performance. The performance of the application could be a bit better, especially in the case of remote sessions - delays in remote sessions can be annoying.
For how long have I used the solution?
I've used the solution for about five years.
Which deployment model are you using for this solution?
On-premises
Disclosure: My company does not have a business relationship with this vendor other than being a customer.
Senior Technology Manager at a outsourcing company with 501-1,000 employees
A scalable and easy-to-deploy solution that provides password rotation and password encryption features
Pros and Cons
- "The most valuable features of CyberArk Enterprise Password Vault are password rotations and password encryptions."
- "We require IAM (identify and access management) capability at the administrator level because we need more identification."
What is most valuable?
The most valuable features of CyberArk Enterprise Password Vault are password rotations and password encryptions.
CyberArk Enterprise Password Vault has a lot of enterprise-level features compared to other PAM products. It's a well-known product, and its implementation is very easy. The solution has good documentation compared to other products. CyberArk Enterprise Password Vault is legitimate software that releases patches as per vulnerability.
What needs improvement?
We require IAM (identify and access management) capability at the administrator level because we need more identification.
For how long have I used the solution?
I have been working with CyberArk Enterprise Password Vault for the past six months.
What do I think about the stability of the solution?
CyberArk Enterprise Password Vault is a stable solution.
What do I think about the scalability of the solution?
CyberArk Enterprise Password Vault is a scalable solution. We have more than 1000 people using the solution.
How are customer service and support?
CyberArk Enterprise Password Vault's technical support team is good. Whenever we require any help, they assist us based on the SLA. The technical support team's response speed and competence are very good.
How would you rate customer service and support?
Positive
How was the initial setup?
The solution was easy to deploy.
What about the implementation team?
We need a basic understanding of the tools needed and customer requirements to deploy the solution. If the customer is looking only for a password deployment, we deploy only the password.
The deployment will require two or three people and a minimum of one week.
What's my experience with pricing, setup cost, and licensing?
CyberArk Enterprise Password Vault's pricing is reasonable. Since CyberArk Enterprise Password Vault is an enterprise-level solution, its cost is higher than other solutions in the market. The solution comes with maintenance for the first year. However, after that, we need to pay for maintenance.
CyberArk Enterprise Password Vault's licensing model is comparatively very easy. It has a single license. We can deploy the solution based on the particular solutions we need.
What other advice do I have?
One or two administrators are more than enough to operate the solution.
A backup strategy and DR setup are more than enough to implement CyberArk Enterprise Password Vault.
Overall, I rate CyberArk Enterprise Password Vault an eight out of ten.
Which deployment model are you using for this solution?
On-premises
Disclosure: My company has a business relationship with this vendor other than being a customer: Partner
Business Development Manager at Softprom by ERC
Ensures the security of privileged accounts and very stable solution
Pros and Cons
- "It is an extremely scalable solution."
- "There is room for improvement in the pricing model."
What is our primary use case?
The main use case is the protection of privileged accounts. We also use it for multi-factor authentication and single sign-on.
How has it helped my organization?
Now we feel assured that all our privileged accounts are well protected. Our admins don't know passwords and don't enter them manually. This eliminates the risk of interception and account hijacking.
What is most valuable?
First of all, CyberArk offers great flexibility. Throughout our years of experience, we haven't found any system that we couldn't connect with CyberArk. We have many web management consoles, and it's no problem to connect to them using custom connectors.
Moreover, it's a highly customizable solution. If you know how to do it, you can customize it as you want.
What needs improvement?
There is room for improvement in the pricing model. From a technical point of view, there are no issues. Support could be faster, though. We have mentioned that better support from CyberArk would be beneficial.
So, support could be faster, and pricing can be improved.
For how long have I used the solution?
We have been using it for our needs and sharing it for over ten years. Currently, we use version 12.
What do I think about the stability of the solution?
It is a very stable solution. I would rate the stability a ten out of ten. If you can read the manual and avoid making mistakes, it's very stable.
What do I think about the scalability of the solution?
It is an extremely scalable solution. I would rate the scalability a ten out of ten. In our organization, there are ten CyberArk users; they all are system administrators.
How are customer service and support?
The customer service and support could be better. The response time could be better.
How would you rate customer service and support?
Neutral
How was the initial setup?
I would rate my experience with the initial setup a four out of ten, one being difficult and ten being easy. It's a modular system. To run CyberArk, you need to deploy several different services, set them up, and configure the interactions. It's not a solution in one box.
The initial setup is not very complex, but I would say it's not very simple, either.
What about the implementation team?
We have deployed CyberArk in both environments. We have several working calls in the cloud and some parts on-premises. The initial deployment takes about two days.
What was our ROI?
Our main technical task was to reduce security risks, which we accomplished with CyberArk.
What's my experience with pricing, setup cost, and licensing?
I would rate CyberArk's pricing a nine out of ten, with one being cheap and ten being expensive. It's one of the most expensive solutions in the market, but it's worth it.
What other advice do I have?
I would suggest finding a qualified partner. Don't try to install and configure it on your own. Instead, seek a certified CyberArk partner. It will save a lot of time and stress.
Overall, I would rate the solution a nine out of ten. It's very good, but there are still areas for improvement, like any other product.
Disclosure: My company does not have a business relationship with this vendor other than being a customer.
Technical Architect at a tech vendor with 10,001+ employees
Great password management and Privileged Threat Analytics with good auditing capabilities
Pros and Cons
- "The product has allowed us to improve both the management and access to privileged credentials, while also creating a full audit trail of all activities happening within isolated sessions of all tasks and activities taking place within the solution."
- "The admin interface of the Password Vault Web Access (PVWA) is moving from an old style (the classic interface) to a new style (the v10 interface) and unfortunately, this process is quite slow."
What is our primary use case?
The solution is used to provide privileged access management to our datacentre environments, for anyone with admin rights with infrastructure or applications within the datacentres. Authentication to the solution in the PVWA (Password Vault Web Access) with onward connectivity via the PSM for Windows (PSM) as well as the PSM for SSH (PSMP). These provide the session isolation, audit, and session recording capabilities that CyberArk offers. The use of Privileged Threat Analytics (PTA) adds more control functionality to the solution.
How has it helped my organization?
The product has allowed us to improve both the management and access to privileged credentials, while also creating a full audit trail of all activities happening within isolated sessions of all tasks and activities taking place within the solution.
This includes sessions via the solution and sessions to administer the solution itself. From a user perspective, we no longer need to try and create or remember complex passwords or have to be concerned about when they will change as the solution takes care of this and can and does populate these credentials for you so mistyping a complex password is a thing of the past.
What is most valuable?
Password management is a great feature, as all passwords are changed more frequently. This can be scheduled in line with a specific policy requirement or each time the credentials are returned to the pool for reuse and are always compliant with the password policy however long or complicated the policy states that they need to be.
Another great feature is the Privileged Threat Analytics (PTA) as this can stop a session based on prescribed risk and bring it to an end or pause it pending approval to proceed.
What needs improvement?
The admin interface of the Password Vault Web Access (PVWA) is moving from an old style (the classic interface) to a new style (the v10 interface) and unfortunately, this process is quite slow. That said, it has been moving in the right direction with features becoming available in the v10 interface and some user features are available in both classic and v10 interfaces. I would love to see all the classic interface features moved into the v10 interface or available in both interfaces within the next version.
For how long have I used the solution?
I've used the solution for about eight years.
What do I think about the stability of the solution?
The solution has been very stable.
What do I think about the scalability of the solution?
The solution performs well, however, based on the user base may require a sizable footprint.
How are customer service and support?
Support does vary depending on how critical your issue is and if it needs to be elevated to dev support.
How would you rate customer service and support?
Positive
Which solution did I use previously and why did I switch?
Our previous solution was not a PAM solution and these days you can't afford to not use one.
How was the initial setup?
The setup is not complicated when trained staff are used.
What about the implementation team?
We handled the initial setup in-house.
What's my experience with pricing, setup cost, and licensing?
Set-up costs can be minimized by controlling the number of applications that are made available within the solution. The newer licenses are per user and open up access to a suite of products, the best value, and security can be achieved by using more of the products.
Which other solutions did I evaluate?
We looked at other products like Delinia and Wallix.
What other advice do I have?
Take advantage of the vendor's training or use a good partner to provide support and administration.
Which deployment model are you using for this solution?
On-premises
Disclosure: My company does not have a business relationship with this vendor other than being a customer.
Last updated: Feb 25, 2025
Flag as inappropriateManager at OIB
A highly scalable solution with good features, like session recording
Pros and Cons
- "The most valuable feature of the solution is session recording."
- "There is a little bit of confusion in the implementation part, especially when one tries to understand the actual working of the product."
What is our primary use case?
My company uses CyberArk Enterprise Password Vault for our servers and when our IT partners try to access our mission critical systems. We have also integrated the product with software tools used for authentication purposes. Our company's IT uses LDAP credentials to log in to the PVWA application while also being able to use granted privileges on one or more servers.
What is most valuable?
The most valuable feature of the solution is session recording.
What needs improvement?
There is a little bit of confusion in the implementation part, especially when one tries to understand the actual working of the product. The ones involved in the implementation of the product did not show the people in our company how they work on the product. The aforementioned area can be considered for improvement.
For how long have I used the solution?
I have been using CyberArk Enterprise Password Vault for a year and six months. The product is used in my company. I use CyberArk Enterprise Password Vault Version 12.0. I am a customer of the product.
What do I think about the scalability of the solution?
It is a scalable solution.
We upgraded the solution even though we had subscribed to the product for ten years in our company. In our company, we wanted around 50 employees to be able to operate the solution.
How are customer service and support?
From my end, I have not used technical support. I don't know if my colleagues have faced any problems because of which they had to contact technical support.
How was the initial setup?
The implementation took place over a period of three months.
The solution is deployed on-premises.
What's my experience with pricing, setup cost, and licensing?
CyberArk Enterprise Password Vault is a very expensive product.
I believe that the charges for maintenance and support are already included in CyberArk Enterprise Password Vault's pricing policy.
What other advice do I have?
I will tell those planning to use the solution that it is a very expensive solution. Due to the cyber security constraints of the product, most of the companies are forced to update by paying money to CyberArk, which I feel is one of the problematic areas in the product. Feature-wise, it is a very good product.
I rate the overall product a nine out of ten.
Which deployment model are you using for this solution?
On-premises
Disclosure: My company does not have a business relationship with this vendor other than being a customer.
Senior IT Systems Administrator at a financial services firm with 10,001+ employees
Good security, seamless integration, and real time monitoring capabilities
Pros and Cons
- "With PAM in place, we've experienced a significant reduction in potential security breaches."
- "CyberArk PAM could greatly benefit from an under-the-hood update; integrating machine learning algorithms could provide predictive insights."
What is our primary use case?
In a large financial institution, CyberArk Privileged Access Management (PAM) plays a pivotal role in ensuring the security and integrity of sensitive financial data. With numerous systems, applications, and databases holding critical client information and transaction data, the institution faced the challenge of managing and protecting privileged accounts effectively.
The PAM solution was seamlessly integrated into the existing IT infrastructure. It introduced granular access controls, requiring all employees to log in with standard user accounts, regardless of their role. When a privileged action is required, the PAM system enables the temporary elevation of privileges through just-in-time (JIT) access, granting access only for the necessary time frame. This reduces the window of opportunity for potential cyber threats.
How has it helped my organization?
CyberArk Privileged Access Management (PAM) has been a game-changer for our organization's security landscape. With PAM in place, we've experienced a significant reduction in potential security breaches. The meticulous control it offers over access rights ensures that only authorized personnel can access critical systems and sensitive information. The implementation of just-in-time access has effectively minimized our attack surface, making it incredibly challenging for unauthorized users to exploit vulnerabilities.
What is most valuable?
The most valuable features of CyberArk Privileged Access Management (PAM) are its granular access controls and just-in-time (JIT) access provisioning. These features ensure that only authorized users have elevated privileges and access to critical systems. JIT access reduces the attack surface by granting privileges only when needed, minimizing exposure to potential threats.
Additionally, robust auditing and real-time monitoring capabilities enhance security by tracking privileged activities, aiding in threat detection and compliance. PAM's ability to seamlessly integrate into existing infrastructures and streamline workflows further adds operational efficiency, making it an indispensable tool for modern cybersecurity.
What needs improvement?
CyberArk PAM could greatly benefit from an under-the-hood update; integrating machine learning algorithms could provide predictive insights.
The user interface lacks intuitiveness; revamping the UX of the web access panel through intuitive navigation, customization, contextual assistance, visual coherence, and accessibility considerations will undoubtedly result in higher user satisfaction, increased engagement, and ultimately, a more competitive offering in the market.
In addition, several tools seem to be outdated, however, you can see that CyberArk is constantly working on them.
For how long have I used the solution?
I've used the solution since 2017.
Which deployment model are you using for this solution?
On-premises
Disclosure: My company does not have a business relationship with this vendor other than being a customer.

Buyer's Guide
Download our free CyberArk Privileged Access Manager Report and get advice and tips from experienced pros
sharing their opinions.
Updated: June 2025
Product Categories
Privileged Access Management (PAM) User Activity Monitoring Enterprise Password Managers Mainframe Security Operational Technology (OT) SecurityPopular Comparisons
Azure Key Vault
AWS Secrets Manager
Okta Workforce Identity
HashiCorp Vault
Delinea Secret Server
CyberArk Endpoint Privilege Manager
BeyondTrust Endpoint Privilege Management
WALLIX Bastion
CyberArk Identity
One Identity Safeguard
BeyondTrust Privileged Remote Access
BeyondTrust Password Safe
Buyer's Guide
Download our free CyberArk Privileged Access Manager Report and get advice and tips from experienced pros
sharing their opinions.
Quick Links
Learn More: Questions:
- CyberArk vs. ManageEngine Password Manager Pro
- How does Sailpoint IdentityIQ compare with CyberArk PAM?
- Which PAM tool do you prefer: CyberArk Privileged Access Manager, One Identity Safeguard, Delinea Secret Server, or BeyondTrust Privileged Remote A
- What is the difference between Privileged Users and Privileged Accounts
- When evaluating Privileged Identity Management, what aspect do you think is the most important to look for?
- How was the 2020 Twitter Hack carried out? How could it have been prevented?
- Which is the best Privileged Account Management solution?
- What are the top 5 PAM solutions that can be implemented which cover both hybrid and cloud?
- What are the top 5 PAM solutions?
- How will AI and ML help or work with PIM/PAM?