2018-06-28T05:25:00Z

What is your primary use case for CyberArk Enterprise Password Vault?

Miriam Tover - PeerSpot reviewer
  • 0
  • 93
PeerSpot user
31

31 Answers

MB
Real User
2023-12-08T15:12:12Z
Dec 8, 2023

We use the solution for password vaulting, password rotation, session management, and secret management.

Search for a product comparison
TM
Real User
2023-08-14T13:03:20Z
Aug 14, 2023

My company uses CyberArk Enterprise Password Vault for our servers and when our IT partners try to access our mission critical systems. We have also integrated the product with software tools used for authentication purposes. Our company's IT uses LDAP credentials to log in to the PVWA application while also being able to use granted privileges on one or more servers.

Anil Kumar 1 - PeerSpot reviewer
Real User
Top 5
2023-06-22T07:30:00Z
Jun 22, 2023

I use the solution for administration. If the customer requires Alero or HTML, we will deploy the solution in that particular environment. Otherwise, if the end users are accessing the solution via VPN or from inside the network, we will not deploy Alero or HTML. We will instead focus on CyberArk's core PAM, which includes the vault password rotation component, the web interface component, the jump server, and PPA. These are CyberArk's four main components which we deploy for every customer.

Joble John - PeerSpot reviewer
Real User
Top 10
2023-06-06T06:29:56Z
Jun 6, 2023

We use the product to store system accounts.

FG
Real User
Top 20
2023-05-04T20:04:53Z
May 4, 2023

CyberArk vouches for access to domain controllers in Unix and Windows Server.

Meo Ist - PeerSpot reviewer
Reseller
Top 5Leaderboard
2023-03-29T13:24:00Z
Mar 29, 2023

We use the solution for cybersecurity and regulation.

Learn what your peers think about CyberArk Enterprise Password Vault. Get advice and tips from experienced pros sharing their opinions. Updated: March 2024.
765,234 professionals have used our research since 2012.
Omar_Jaimes - PeerSpot reviewer
Real User
Top 5Leaderboard
2022-11-24T16:18:16Z
Nov 24, 2022

The most common use case is when you need to hide the management for the servers, switches, routers, et cetera. You can use privileged access for remote use cases.

IkedeEbhole - PeerSpot reviewer
Real User
Top 20
2022-10-12T08:04:04Z
Oct 12, 2022

Our primary use case for his solution is privileged identity and application identity management, and we deploy the solution on-premises.

Aakash Chakraborty - PeerSpot reviewer
MSP
Top 10
2022-07-19T21:14:38Z
Jul 19, 2022

We use the solution as a vault for whatever passwords we use for connecting to an API or job services. The admin passwords we store in Password Vault. Via CyberArk, we have made a use case where we can track the session, keep a record, and log it, to whoever is logging into the servers.

SS
Real User
Top 5
2022-05-26T11:44:00Z
May 26, 2022

We Enterprise Password Vault to manage privileged credentials as well as some server and activity logging.

DK
Real User
2022-03-23T00:30:37Z
Mar 23, 2022

Our use case for CyberArk Enterprise Password Vault is managing privileged accounts. These are local accounts, e.g. local desktops, laptops, or servers. They have a built-in administration account, so part of the solution is to ensure that that account's username and password are stored in the vault and managed by CyberArk Enterprise Password Vault.

CS
Real User
2022-01-04T21:49:00Z
Jan 4, 2022

Our clients primarily use the CyberArk Password Vault for password rotation and password management.

GB
Real User
2021-12-20T21:57:00Z
Dec 20, 2021

My primary use case is the digital identity for access management of users and the configuration of passwords, or MSA, or SSO.

IS
Real User
2021-12-16T04:19:00Z
Dec 16, 2021

I've deployed Password Vault for various use cases across different industries from finance to healthcare and manufacturing.

DW
Real User
2021-12-15T22:09:00Z
Dec 15, 2021

Companies often have an enormous amount of admin credentials out there. They want to find out how many they have, start cleaning them up, and ensure they're all kept in an encrypted vault. Password Vault is probably the top product in that space, and it's a monster to implement, but CyberArk is great at what they do.

MN
Real User
2021-12-07T13:51:40Z
Dec 7, 2021

We use CyberArk Enterprise Password Vault and we provide it to our customers. We use this solution for password vaulting and session management.

MH
Real User
2021-10-06T16:56:00Z
Oct 6, 2021

The primary use case is to monitor the official activity of a privileged user for privilege violations.

FF
Real User
2021-09-29T02:43:42Z
Sep 29, 2021

We implement this solution for our customers. We are system integrators, not end-users. The main use case is for secure access, and monitoring the access by IT administrators.

PR
Real User
2021-02-23T02:28:15Z
Feb 23, 2021

I used CyberArk for vaulting passwords.

PG
Real User
2020-11-23T14:40:53Z
Nov 23, 2020

We use it for storing and rotating passwords. Within our organization, a lot of people are using this solution for a lot of projects. We have already implemented CyberArk as a SaaS solution. We are not using the core parts, but we are using the software as a service for a project. At my previous job, there was a team of seven people who were in charge of maintenance. Mostly analysts, senior analysts, and a technical lead used this solution.

GJ
MSP
Top 10
2020-09-06T08:04:41Z
Sep 6, 2020

I'm an integrator and we identify and provide performance discovery, and we select the best product for our clients. We have users that are administrators in the environment, and we convert them into a shared account model. Many of the organizations have two accounts. One is a regular user account and the other gives them administrative rights. CyberArk allows for a higher degree of segregation of duties, although CyberArk itself doesn't do that. You have to have knowledge of role-based access control and least privilege principles. It supports it, but you have to implement it. There is also service recording, service accounts on Windows Systems, and Linux systems, to rotate their passwords. You will find service accounts with passwords that are 5,000 to 8,000 days old, but not with CyberArk. It creates a very strong service to prevent attacks. When passwords don't change it makes them very vulnerable and allows attackers significant lateral mobility within an organization. It gives them the necessary time to scout the environment and choose what their attack will be, whether it's going to be a ransomware attack or a data exfiltration attack or if it's going to go in to cause defamation to the company like creating a denial of service to clients. Also, hacking their Facebook page or their Twitter page are common attacks.

SS
Real User
Top 5
2020-07-15T07:11:38Z
Jul 15, 2020

Our primary use of this solution is as a password manager.

it_user1333062 - PeerSpot reviewer
Reseller
2020-07-05T10:00:00Z
Jul 5, 2020

There are threats that get opened because of the vulnerability of privileged access that says to directly put it in a vault.

JF
Real User
2020-06-25T10:49:31Z
Jun 25, 2020

This solution is used primarily for privileged segment access and break-glass access. We also use it for log-on session recording and access control, where we can grant access to our key systems for ad-hoc use.

it_user1026123 - PeerSpot reviewer
Real User
2019-11-07T10:35:00Z
Nov 7, 2019

The primary use case is for storing user passwords and administration credentials. I am the engineer for a company that sells this solution mostly to financial institutions. It is also useful for auditing and securing shared accounts or co-shared accounts.

GK
Real User
2019-11-07T10:35:00Z
Nov 7, 2019

The primary use case of this solution is for third-party developers that come into our infrastructure from VPN to connect. They are organizations that are outside of our organization.

OZ
Real User
2019-11-04T06:14:00Z
Nov 4, 2019

The primary use case of the solution is to gather privileged accounts from different systems and to contain privileged accounts in one secure place.

FP
Real User
2019-11-04T06:14:00Z
Nov 4, 2019

I have worked as a CyberArk SME, team leader, project manager in the financial industry. I've managed both the implementation and configuration of enterprise CyberArk infrastructures.

it_user887514 - PeerSpot reviewer
Real User
2019-02-14T07:37:00Z
Feb 14, 2019

Our primary use case of this solution is for elevated access.

DH
Real User
2018-11-13T21:53:00Z
Nov 13, 2018

* This product provides accountability and audit trails for privileged account access. * Automatic password rotation every 24 hours to adhere to our internal compliance guidelines.

KK
Consultant
2018-06-28T05:25:00Z
Jun 28, 2018

This solution is used for managing all unmanaged and forgotten privileged accounts. DNA tool is amazing, far better than imaginable in previous years.

CyberArk Enterprise Password Vault, a vital component of the CyberArk Privileged Access Manager Solution (PAM), is designed to create, secure, rotate, and control access to privileged accounts and credentials used to access systems throughout an enterprise IT ecosystem. CyberArk Enterprise Password Vault enables enterprise organizations to better understand the scope of their privileged account risks and put controls in place to prevent malicious or inappropriate account or credential...
Download CyberArk Enterprise Password Vault ReportRead more

Related articles