CyberArk Secrets Management offers comprehensive security for managing sensitive information, addressing crucial needs in secure storage, access, and control of credentials across IT environments.
Type | Title | Date | |
---|---|---|---|
Category | Access Management | Aug 29, 2025 | Download |
Product | Reviews, tips, and advice from real users | Aug 29, 2025 | Download |
Comparison | CyberArk Secrets Management vs Microsoft Entra ID | Aug 29, 2025 | Download |
Comparison | CyberArk Secrets Management vs Auth0 | Aug 29, 2025 | Download |
Comparison | CyberArk Secrets Management vs Ping Identity Platform | Aug 29, 2025 | Download |
Title | Rating | Mindshare | Recommending | |
---|---|---|---|---|
HashiCorp Vault | 4.1 | N/A | 89% | 18 interviewsAdd to research |
CyberArk Secrets Management focuses on ensuring the secure handling of sensitive enterprise data, offering a robust infrastructure for credentials and secrets management. Designed for organizations that need high levels of security, it provides efficiency in automating access controls and compliance. Its features are tailored to integrate seamlessly with existing IT frameworks, facilitating a secure and scalable approach to managing critical information across complex infrastructures. CyberArk's approach addresses both security and operational efficiency.
What features make CyberArk Secrets Management essential?CyberArk Secrets Management is widely implemented across sectors like finance, healthcare, and government, focusing on industries where data sensitivity and compliance are critical. Its application helps organizations mitigate risks and enhance data governance, proving invaluable in environments where trust and security are paramount.
Author info | Rating | Review Summary |
---|---|---|
Solution Architect at a insurance company with 10,001+ employees | 3.5 | We use CyberArk Secrets Management primarily with GitLab, CI/CD pipelines, and Kubernetes to ensure smooth application access to passwords during secret rotation. However, we face challenges with password injection delays and seek enhanced documentation and feature support. |
Senior Member Of Technical Staff at a energy/utilities company with 10,001+ employees | 4.0 | We use CyberArk Secrets Management for integrating credential management into our UiPath robotic process automation. Its automatic password rotation and compliance benefits during audits are valuable, though improvements are needed in the user interface and cross-vault integration. |
Head of Data at a comms service provider with 1,001-5,000 employees | 3.5 | I value CyberArk Secrets Management for its flexibility and integration capabilities, enhancing security by reducing human error and ensuring compliance. Improvements are needed in documentation, and CyberArk's assistance is often required. I considered Akeyless before choosing it. |
IT Security Architect at a comms service provider with 201-500 employees | 3.5 | I use CyberArk Secrets Management primarily for rotating credentials, particularly for service accounts managed by Puppet and CI/CD tools like Bamboo. It's scalable and effective, though improvement is needed in documentation and integration guides for better administrator education. |
Delivery Manager at Tech Mahindra Limited | 0.5 | I've used CyberArk Secrets Management for 2.5 years across user- and machine-access cases; it's secure, scalable, and effective, though expensive. Training access could improve, but overall, it's a strong choice for compliance and threat protection. |