Leaderboard for CyberArk Privileged Access Manager
Check out the members with the highest scores who have reviewed CyberArk Privileged Access Manager.
#1. S Azeem
475
Points
Senior Technology Manager at a outsourcing company
Reviewed CyberArk Privileged Access Manager:
A scalable and easy-to-deploy solution that provides password rotation and password encryption…375
Points
Security Engineer at Suraksha
Reviewed CyberArk Privileged Access Manager:
A highly scalable PAM solution that needs to improve its GUI#3. AnantUpadhyay
320
Points
CEO at CareerCraftly
Reviewed CyberArk Privileged Access Manager:
Privileged access management escalates efficiently with robust access control and remote…#4. Américo Silva
300
Points
System Administrator at Porto Editora
Reviewed CyberArk Privileged Access Manager:
Passwords are stored securely within the vault and eliminates the need for users to store passwords…#5. DerrickAkankwasa
265
Points
Cyber Security Engineer at Isolutions Associates Ltd (ISOLS)
Reviewed CyberArk Privileged Access Manager:
Improved security infrastructure and reduced risks through comprehensive credential management#6. Anil Kumar 1
215
Points
PAM Security Consultant at Cybersec Consulting
Reviewed CyberArk Privileged Access Manager:
A versatile product that can be configured with a number of different components#7. Shad Smith
210
Points
Technical Architect at a tech vendor
Reviewed CyberArk Privileged Access Manager:
Simplified access to credentials with continuous updates for better security#8. Nawaz Sarwar
190
Points
Consultant at a tech vendor
Reviewed CyberArk Privileged Access Manager:
Helps monitor activities and rotate passwords, also it's very customizable#9. Deepak Sahani
190
Points
Senior Manager, Cyber Security at OPTIV
Reviewed CyberArk Privileged Access Manager:
Comes with automatic password rotation feature but UI and pricing needs improvement #10. Jonathan Hawes
185
Points
CyberArk PAS Administrator at L3Harris Technologies
Reviewed CyberArk Privileged Access Manager:
Easy to secure, control, and monitor privileged access on highly critical networks