Leaderboard for CyberArk Privileged Access Manager
Check out the members with the highest scores who have reviewed CyberArk Privileged Access Manager.
#1. reviewer1247523
510
Points
Head of Sales Services Department at a comms service provider
Reviewed CyberArk Privileged Access Manager:
Role management and session recording increase operational efficiency375
Points
Security Engineer at Suraksha
Reviewed CyberArk Privileged Access Manager:
A highly scalable PAM solution that needs to improve its GUI#3. Américo Silva
300
Points
System Administrator at Porto Editora
Reviewed CyberArk Privileged Access Manager:
Passwords are stored securely within the vault and eliminates the need for users to store passwords…#4. DerrickAkankwasa
265
Points
Cyber Security Engineer at Isolutions Associates Ltd (ISOLS)
Reviewed CyberArk Privileged Access Manager:
Improved security infrastructure and reduced risks through comprehensive credential management#5. AnantUpadhyay
260
Points
CEO at CareerCraftly
Reviewed CyberArk Privileged Access Manager:
Privileged access management escalates efficiently with robust access control and remote…#6. Shad Smith
210
Points
Technical Architect at a tech vendor
Reviewed CyberArk Privileged Access Manager:
Simplified access to credentials with continuous updates for better security#7. Ali Hatamleh
205
Points
IT operations manager at a tech services company
Reviewed CyberArk Privileged Access Manager:
Implementing robust access security and monitoring for user sessions#8. Nawaz Sarwar
190
Points
Consultant at a tech vendor
Reviewed CyberArk Privileged Access Manager:
Helps monitor activities and rotate passwords, also it's very customizable#9. Deepak Sahani
190
Points
Senior Manager, Cyber Security at OPTIV
Reviewed CyberArk Privileged Access Manager:
Comes with automatic password rotation feature but UI and pricing needs improvement #10. Jonathan Hawes
135
Points
CyberArk PAS Administrator at L3Harris Technologies
Reviewed CyberArk Privileged Access Manager:
Easy to secure, control, and monitor privileged access on highly critical networks