Try our new research platform with insights from 80,000+ expert users
CyberArk Secrets Management Logo

CyberArk Secrets Management Reviews

Vendor: CyberArk
3.6 out of 5

What is CyberArk Secrets Management?

Featured CyberArk Secrets Management reviews

PeerResearch reports based on CyberArk Secrets Management reviews

TypeTitleDate
CategoryAccess ManagementAug 29, 2025Download
ProductReviews, tips, and advice from real usersAug 29, 2025Download
ComparisonCyberArk Secrets Management vs Microsoft Entra IDAug 29, 2025Download
ComparisonCyberArk Secrets Management vs Auth0Aug 29, 2025Download
ComparisonCyberArk Secrets Management vs Ping Identity PlatformAug 29, 2025Download
Suggested products
TitleRatingMindshareRecommending
HashiCorp Vault4.1N/A89%18 interviewsAdd to research
 
 
Key learnings from peers

Valuable Features

Room for Improvement

Pricing

Popular Use Cases

Service and Support

Scalability

Stability

Compare CyberArk Secrets Management with alternative products

Learn more about CyberArk Secrets Management

Related questions

Product Categories

Popular Comparisons

 
CyberArk Secrets Management Reviews Summary
Author infoRatingReview Summary
Solution Architect at a insurance company with 10,001+ employees3.5We use CyberArk Secrets Management primarily with GitLab, CI/CD pipelines, and Kubernetes to ensure smooth application access to passwords during secret rotation. However, we face challenges with password injection delays and seek enhanced documentation and feature support.
Senior Member Of Technical Staff at a energy/utilities company with 10,001+ employees4.0We use CyberArk Secrets Management for integrating credential management into our UiPath robotic process automation. Its automatic password rotation and compliance benefits during audits are valuable, though improvements are needed in the user interface and cross-vault integration.
Head of Data at a comms service provider with 1,001-5,000 employees3.5I value CyberArk Secrets Management for its flexibility and integration capabilities, enhancing security by reducing human error and ensuring compliance. Improvements are needed in documentation, and CyberArk's assistance is often required. I considered Akeyless before choosing it.
IT Security Architect at a comms service provider with 201-500 employees3.5I use CyberArk Secrets Management primarily for rotating credentials, particularly for service accounts managed by Puppet and CI/CD tools like Bamboo. It's scalable and effective, though improvement is needed in documentation and integration guides for better administrator education.
Delivery Manager at Tech Mahindra Limited0.5I've used CyberArk Secrets Management for 2.5 years across user- and machine-access cases; it's secure, scalable, and effective, though expensive. Training access could improve, but overall, it's a strong choice for compliance and threat protection.