Privileged Access Management is basically used to just keep track and log. We have to provision those accesses. If a newcomer comes, they have to be identified to ensure they are the correct users. So for those, there is a web implementation where there are some products that you can order, then they're approved. Depending on that mechanism, it's been decided, oh, this is a valid user. That's how it's been managed.
IEM Consultant at iC Consult GmbH
Bug-free, reliable, and pretty straightforward
Pros and Cons
- "It is a scalable product."
- "I would love them to improve their UI customizing features."
What is our primary use case?
How has it helped my organization?
Privileged Access Management in CyberArk is one of the very first features that was implemented as part of Privileged Access Management. Then came Endpoint Manage and finally the Password Vault. From the very beginning, once Identity Access Management as a service started, with Dell One Identity Manager as the first service. Then came CyberArk. I don't think there is an additional benefit that it has brought. It's sort of an essential commodity in the entire Identity Access Management infrastructure.
What is most valuable?
For me, Privileged Access Manager and One Identity sort of merge together. For me, the best part of CyberArk is Password Vault and Endpoint, basically. If you ask me what's there that, it's that everything is pretty straightforward. There is no confusion. It's a pretty straightforward application to work on.
It is a scalable product.
The solution is stable.
What needs improvement?
They should allow further customization as it's really hard to do any further customizations over CyberArk. We do have a wrapper of customization. However, it's very difficult, especially their web implementation. That's one thing I would say they can improve. With Angular and everything on the market, they still have their in-house web implementation tool, which is sort of a headache.
I would love them to improve their UI customizing features.
You simply cannot install the demo UI in every customer, basically. They would always ask for something to make their UI look a little different - simple things like their logo or some sort of additional information pertaining to their particular customer. Even doing the smallest of changes takes a lot to do.
Buyer's Guide
CyberArk Privileged Access Manager
May 2025

Learn what your peers think about CyberArk Privileged Access Manager. Get advice and tips from experienced pros sharing their opinions. Updated: May 2025.
851,823 professionals have used our research since 2012.
What do I think about the stability of the solution?
The solution is stable and reliable.
I haven't been faced with intermittent bugs like I do on One Identity.
With CyberArk, we rarely get those situations. It's a very, very stable software. You rarely need to raise any bug or service request with them.
What do I think about the scalability of the solution?
It's pretty scalable. Although we haven't increased our infrastructure once, we have installed the latest version. Even then, adding other infrastructure items into the portfolio is not a big deal once you have done the initial installation.
Our organization is more than 30,000 to 35,000 people. However, only a handful of them are entitled to Privileged Access Management. There might be only 5,000 users. It is used quite extensively.
Which solution did I use previously and why did I switch?
It sort of was implemented with One Identity Manager when Identity Access Management came into the picture. In early times when there was simply Excel as an identity access manager, and then there was nothing basically. Once there was the onset of proper identity access management without in-house custom tools or proper streamlining process, this solution was added. Initially, One Identity was sort of used as a Privileged Access Management also. However, soon they realized that it lacked in a lot of places for Privileged Access Management. That's when we went to CyberArk. That was way before my time.
How was the initial setup?
I have been part of the initial implementation. However, the day-to-day operational tasks are being handled by a different team.
I was part of a migrational project. When I joined this organization, they were just migrating from the last stable version to the present stable version. It was pretty straightforward. There was, in my organization at least, documentation that was a bit more thorough to follow. That helped me a lot.
The implementation takes quite some time. Even in production, we have to instantiate the service. We had to take a special weekend, which means downtime since this is a critical application. Therefore, moving this takes some time. It's not that there are glitches and all. It's such a heavy application that requires moving so many things. For us, it took around nine to nine and a half hours roughly to deploy. This is considering if I take off all the in-between stoppages and breaks.
Privileged Access Management is a complex topic. I won't say that any of the tools are straightforward. That said, if you are thorough, then it's pretty straightforward for people who are in this industry.
I'd rate the setup process a four out of five in terms of ease of implementation.
What other advice do I have?
With every security tool, new users learning by themselves is a bit difficult since the material isn't openly released. It's released if you have a partnership or if you pay for the software. That makes learning the tool a bit difficult. If you are interested in learning, the only thing is to get a job in that field. If your company is using it, it's like learning by doing. That's the only way you can learn about this product.
I'd rate the solution eight out of ten.
Disclosure: My company has a business relationship with this vendor other than being a customer: Partner
We are able to know who is accessing what and when; having accountability
Pros and Cons
- "We are maintaining compliance in PCI, SOX and HIPPA, which is a big thing. Auditors really like it, and it has made us stay compliant."
- "We are able to know who is accessing what and when; having accountability."
- "Make it easier to deploy."
What is our primary use case?
Primary use case is for compliance, SOX, PCI, HIPAA, and securing privileged access accounts. It seems to be performing well. We have had pretty good success with it.
We plan to utilize CyberArk to secure infrastructure and applications running in the cloud with AWS Management Console. We are testing it right now, so we hopefully it will be ready in about two months.
How has it helped my organization?
We are maintaining compliance in PCI, SOX and HIPPA, which is a big thing. Auditors really like it, and it has made us stay compliant.
There is at least one place to go to for getting privileged accounts. Now, users have to go through the portal or go through CyberArk front-end, the PVWA, or we could use the OPM or PSMP. It has helped out quite a bit.
What is most valuable?
We are able to know who is accessing what and when; having accountability. That is the big thing.
What needs improvement?
Make it easier to deploy. In 10.4, we did it with the cloud and could actually script the installs.
For how long have I used the solution?
Three to five years.
What do I think about the stability of the solution?
It has been pretty stable. We had some issues before, but customer support has been helping us out quite a bit.
We think we had some PSM issues, and that was the big problem we had. Basically, it had to be rebuilt.
What do I think about the scalability of the solution?
Scalability is impressive because you can set up clusters, so you can grow as your needs grow.
How is customer service and technical support?
Technical support has been excellent. They have been really good and knowledgeable. They come out and help us out. They have also helped us do our roadmapping.
We feel like we get the right person the right time that we call.
How was the initial setup?
The upgrading process was pretty straightforward. We had some issues with the platforms when we upgraded. That was probably on our part, maybe we missed something.
What about the implementation team?
The vendor was retained to implement our Cyberark rollout initially.
What was our ROI?
It keeps us from getting dinged by the compliance officers. Keeps us in compliance.
What's my experience with pricing, setup cost, and licensing?
Understand your needs prior to purchasing. Cyberark team will advise as well which is a plus.
What other advice do I have?
It does what it promised. It secures our platforms, haves the scalability, and it is just a solid product.
Know what you are getting into upfront. Work with IT to ensure you have buy-in from upper management, and work with them to get a roadmap to deploy.
Most important criteria when selecting a vendor:
- Reliability
- Having good customer support.
Disclosure: PeerSpot contacted the reviewer to collect the review and to validate authenticity. The reviewer was referred by the vendor, but the review is not subject to editing or approval by the vendor.
Buyer's Guide
CyberArk Privileged Access Manager
May 2025

Learn what your peers think about CyberArk Privileged Access Manager. Get advice and tips from experienced pros sharing their opinions. Updated: May 2025.
851,823 professionals have used our research since 2012.
Senior Security Engineer at a financial services firm with 1,001-5,000 employees
Allows users to self-provision access to the accounts that they need
Pros and Cons
- "It allows users to self-provision access to the accounts that they need."
- "There is some stuff that we still have not fully integrated, which is our AIM solution. We are having all types of issues with it. I have been working with Level 3 support on it, but otherwise, from a functionality perspective, everything has been working except for the AIM solution."
What is our primary use case?
The main focus of using CyberArk was to replace our previous Excel spreadsheets, which contained all of our passwords. The reason that we brought it in was to replace them and meet certain audit requirements.
We are using CyberArk to secure applications for credentials and endpoints.
We are planning on utilizing CyberArk to secure infrastructure and applications running in the cloud. It is on our roadmap for next year.
How has it helped my organization?
It allows me to create my custom CPMs more easily and quickly without having to code everything. It helps me build a lot of these codes, so it makes it easier for me to create custom CPMs and PSMs.
It allows us to be able to manage a third-party which is not natively supported by CyberArk. If there are certain legacy applications which are so old that CyberArk does not support them out-of-the-box, it allows me to be able to create custom connections and be able to manage those accounts.
What is most valuable?
- Ability to do workflow.
- Allows users to self-provision access to the accounts that they need.
What needs improvement?
There is some stuff that we still have not fully integrated, which is our AIM solution. We are having all types of issues with it. I have been working with Level 3 support on it, but otherwise, from a functionality perspective, everything has been working except for the AIM solution.
The new PVWA is great. I actually saw some of the newer functionalities, and the look and feel looks great so far. It is just a matter of getting us there. We need to be able to upgrade the environment. They have been able to get the functionalities I was looking for on some of the latest releases.
For how long have I used the solution?
One to three years.
What do I think about the stability of the solution?
Stability is pretty good. I have not had any issues with it.
What do I think about the scalability of the solution?
Scalability is pretty good. I have not had any issues with it. It should meet my company's needs in the future.
How are customer service and technical support?
For what I was using technical support for, they were really knowledgeable. They were able to resolve the issues that we had. I have not had any problems with them, though it took them a bit of time. A lot of times, they did not escalate it right away, not until three or four tries, then they did escalate it to Level 2, possibly even Level 3 support.
Which solution did I use previously and why did I switch?
We were previously using Excel spreadsheets. We changed because of audit requirements, but a lot of times it will due to usability. We understand that having our password in a spreadsheet is a huge vulnerability, so it is one of the things that made us look for a solution to manage those credentials, and create automated workflows around it for audit requirements.
How was the initial setup?
The initial setup was pretty straightforward. I think the implementation only took a couple of days.
What about the implementation team?
We had someone from the CyberArk team helping us with the implementation.
What was our ROI?
One of the processes that we have defined is called a Fire ID process, where to be able to get a Fire ID. It requires a user to call the help desk. The help desk will create a ticket, then contact the employee's managers to get approval, and then provide them with an account. That process, in some cases, can take hours.
With CyberArk, it allows us to streamline and create a workflow which allows them to automatically log into CyberArk, grab the credentials that they want, and it automatically sends their approval to their manager, who can click a couple buttons, approve, and the user is able to get their credentials. That process went from hours to now just minutes.
Which other solutions did I evaluate?
We looked at Leiberman, and also at Thycotic Secret Server.
One main things that stood out about CyberArk would be the actual user interface. CyberArk's interface was better than the other two, and their price points were fairly similar. The usability and functionality were similar, so we looked at it from a user standpoint (the front-end of the tool), and CyberArk came out on top.
What other advice do I have?
My advice is to have the necessary resources to fully implement this. Don't just bring it in and let it sit. It needs to have the resources with a fully dedicated team to be able to get this functional. Otherwise, it will be sitting there not being fully utilized. There are a lot of functionalities that require a lot of resources to get it up and running.
I have been using the new plugin generator utility for about a year. I took a PSM Connection course this past summer. I have been using it ever since.
Most important criteria when selecting a vendor:
- It will be usability of the product. I want to make sure that when we have the product, we can quickly use it and have a full understanding of it without all the hoops that we need to jump through just to be able to understand what that system looks like or how it works.
- The next thing will be support. How will they be able to support the system? Do they have a good support staff who will be able to help us get through an implementation?
Those are the two main things I look for: the usability and supportability of the tools.
Disclosure: PeerSpot contacted the reviewer to collect the review and to validate authenticity. The reviewer was referred by the vendor, but the review is not subject to editing or approval by the vendor.
Identity and Access Management Engineer at a energy/utilities company with 10,001+ employees
Ability to manage application credentials whether they come as a custom plugin or straight out-of-the-box
Pros and Cons
- "The key aspects of privileged access management are being able rotate passwords, make sure someone is accountable, and tie it back to a user (when the system is being used)."
- "We have been able to manage application credentials in CyberArk, whether they come as a custom plugin or straight out-of-the-box."
- "Some of the additional features that we are looking at are in the Conjur product. I am specifically discussing key management, API Keys, and things for connecting applications in the CI/CD pipelines."
What is our primary use case?
The primary use case is for password credential management of privileged accounts. The product has performed very well, and we will continue to invest in this space because the CyberArk tools are working well for us.
We are using it to manage infrastructure and applications in the cloud, rotating credentials which are used for operating system logins and cloud console credentials.
How has it helped my organization?
We have a lot of privileged accounts with a lot of administrators. The only way to have a good handle on the inventory of accounts, and have some type of controls around who has access to the accounts, is to have a tool like CyberArk.
The key aspects of privileged access management are being able rotate passwords, make sure someone is accountable, and tie it back to a user (when the system is being used). This helps our security posture. We also look at other privileged accounts, which are used by overlooked applications, and this provides a benefit to the company.
What is most valuable?
The most valuable features would be:
- Ease of installation
- Support for every use case that we have come across.
- Application credentials: We have been able to manage them in CyberArk, whether they come as a custom plugin or straight out-of-the-box.
What needs improvement?
Some of the additional features that we are looking at are in the Conjur product. So, CyberArk has some of the features we want covered either by utilizing Conjur's features or by integrating Conjur directing into the CyberArk tool. I am specifically discussing key management, API Keys, and things for connecting applications in the CI/CD pipelines.
For how long have I used the solution?
More than five years.
What do I think about the stability of the solution?
Stability is great, especially as the product matures. I have been using CyberArk since version 4. We currently are using version 9 in our production environment, and are looking to deploy version 10. Version 9 is very stable compared to the previous versions.
What do I think about the scalability of the solution?
Scalability is great. We have no problems.
We have a very large, diverse, global environment, and we have not run into any scalability issues.
How is customer service and technical support?
Technical support is very good. We have had a technical account manager (TAM) in the past, and have worked directly with her as our primary source. However, we also contact other people in the support environment, and they know the product well and are always willing to help out.
How was the initial setup?
I did an initial installation at another company. It was pretty straightforward.
What about the implementation team?
CyberArk offered to help with designing the architecture. Once we got all those pieces sorted out, the implementation was easy.
What was our ROI?
I don't know if anyone has done a true number analysis, but we do see the following:
- The amount of time that people used to spend maintaining credentials;
- The amount of time that used to be utilized for audit purposes and who had which accounts at any point in time.
There is ROI on the actions above because the amount of time that it took to do these tasks has been significantly cut.
What other advice do I have?
If you are starting from scratch with the product, you should take a good inventory of your accounts to know what is in the scope. Start off with the password management aspect of it, but also look into things that provide session management, SSH key, and rotation. These are some of the basic things a new company using privileged access should look for.
CyberArk is always willing to take feedback from the customer and are looking for ways to improve. There are all types of programs within CyberArk to take that feedback and incorporate it into their product.
I have experience using quite a few of the plugins, but I am not familiar with the new generator utility plugin.
The most important criteria when selecting a vendor: They need to understand our environment. We have a very complex environment at a very large scale. They need to show that they have a product which can meet the needs of a large organization like ours, and find solutions from old legacy environments to everything through the cloud.
Disclosure: PeerSpot contacted the reviewer to collect the review and to validate authenticity. The reviewer was referred by the vendor, but the review is not subject to editing or approval by the vendor.
Information Security Advisor at a insurance company with 1,001-5,000 employees
It verifies accounts on a regular basis. It reconciles the account if it has been checked out and used.
What is most valuable?
Account discovery, account rotation, and account management features make it a well-rounded application.
Account discovery allows for auto-detection to search for new accounts in a specific environment such as an LDAP domain. This allows CyberArk to automatically vault workstations, heightened IDs, servers, and other accounts. Once the account is automatically vaulted, the system then manages the account by verifying the account on a regular basis or reconciling the account if it has been checked out and used. The settings for the window that account is using is configurable to the type of account being used.
CyberArk is constantly coming up with new ways to perform auditing, bulk loading accounts, quicker access between accounts and live connections, as well as different ways to monitor account usage and look for outliers.
As companies move further toward a “least privilege” account structure, CyberArk sets the bar for heightened account management.
How has it helped my organization?
In the past, standard practice was to assign role-based rights to standard accounts. Moving away from this structure allows us to require that all heightened access accounts be “checked out” and only operate within a set window. CyberArk analytics provide real-time monitoring to ensure accounts are only used by the correct people at the correct time.
What needs improvement?
Like any software, improvements and upgrades are a necessity. As CyberArk is used by many Fortune 100 and Global 2000 companies, they offer custom solutions that need to be continuously improved as the company changes. I am looking forward to new ways to utilize accounts within the current CyberArk system allowing a more seamless flow for technicians.
For how long have I used the solution?
I have used it for 19 months.
What do I think about the stability of the solution?
Beyond the servers and security devices necessary to run CyberArk, it maintains surprisingly few dependencies. It is capable of secure hardening with the capacity for multiple failovers that can exist and work without the use of LDAPs or external databases. CyberArk has been the most stable platform I have ever worked on and our redundancies allow for 100% uptime.
What do I think about the scalability of the solution?
Scalability has not been a problem. I have worked on multiple improvements and increases, as we continuously increase the number of domains and types of accounts CyberArk manages. There is not currently an end in sight for the number and types of accounts we are adding.
How are customer service and technical support?
CyberArk technical support is top notch. They provide ticketing and immediate escalation of issues, as well as direct resources for more immediate problems. CyberArk R&D has also provided valued updates to custom applications we use internally.
Which solution did I use previously and why did I switch?
With data breaches and ransomware becoming the standard that companies now face, a more elegant solution was desired from standard network and physical security. Accounts that can be found or socially engineered out of people has been a long-standing tradition for criminals and bored teenagers. Reducing the window any account can be used provides a more secure network.
How was the initial setup?
Setting up and learning a new platform is always a complex undertaking. This is why CyberArk provides local hands-on support to get the system set up and the company’s techs trained. The base setup will differ from company to company, based on their immediate needs and what they wish to accomplish immediately. Heightened IDs, local workstation IDs, off-network server accounts, service IDs… the list goes on and on.
What's my experience with pricing, setup cost, and licensing?
There are a handful of options out there providing similar services. However, none of them are as far along or provide as much stability and innovation as CyberArk. Pricing and licensing are going to depend on a great many factors and can be split up from when the system is originally implemented, and upgrades and new software down the line. All that being said, the money in question was not a deterrent in picking CyberArk for our solution.
Which other solutions did I evaluate?
We have tested a great deal of products, many of which are being used in the company for various other purposes; Avecto, Dell, Thycotic, to name a few. Centrify was the other primary system that we really carefully reviewed. In the end, the features and interface of CyberArk won out.
What other advice do I have?
CyberArk is an innovative set of tools that are easily learned. Getting deeper into the product allows for a great deal of complex settings that can be learned via high level implementation guides as well as a CyberArk certification.
Disclosure: I am a real user, and this review is based on my own experience and opinions.
Helps to keep password safe and is good for cybersecurity
Pros and Cons
- "The tool has safe vaults. We keep our passwords in the Vault. The tool’s recording feature is also valuable for us."
- "The tool needs to improve its usage and interface. They need to have a modern and useful interface. I want the product to improve its integration capabilities as well since some of the integration features do not work always."
What is our primary use case?
We use the solution for cybersecurity and regulation.
What is most valuable?
The tool has safe vaults. We keep our passwords in the Vault. The tool’s recording feature is also valuable for us.
What needs improvement?
The tool needs to improve its usage and interface. They need to have a modern and useful interface. I want the product to improve its integration capabilities as well since some of the integration features do not work always.
For how long have I used the solution?
I have been using the solution for five years.
What do I think about the stability of the solution?
The solution is a stable product.
What do I think about the scalability of the solution?
The product is scalable. You can manage 100,000 scripts or 1000 secrets with the solution.
How are customer service and support?
I would rate the tool’s support an eight out of ten. The tech support is good and not complex. You can escalate the problems easily.
How was the initial setup?
If you do not have prior experience, then the tool’s setup is complex. It has a complex installation process. You need to do pre-configuration correctly. The deployment takes around two to three days to complete. One experienced person is enough for the deployment.
What's my experience with pricing, setup cost, and licensing?
The product’s pricing is feasible for enterprise customers. The pricing is expensive for smaller businesses. You need to pay additional costs for service implementation and local support.
What other advice do I have?
I would rate the product a ten out of ten. We recommend this product for enterprise customers. The tool’s pricing and operation are a problem for small customers. They need to opt for Software as a Service. Companies need to install this product since they have a lot of accounts and passwords.
Which deployment model are you using for this solution?
Hybrid Cloud
Disclosure: My company has a business relationship with this vendor other than being a customer: Reseller
Assistant Vice President for Cyber Security Project at a financial services firm with 1,001-5,000 employees
Plenty of features, scalable, and responsive support
Pros and Cons
- "All of the features of CyberArk Privileged Access Manager are valuable."
- "The initial setup of CyberArk Privileged Access Manager difficulty depends on the environment that you are implementing it into. However, it typically is simple."
What is our primary use case?
We are using CyberArk Privileged Access Manager for securing access to the host or the server. The solution has the capability to record activity on the server, rotate the passwords, kick out an active user, and complete an action if suspicious activity is triggered on the server. We typically only use the solution for accessing the target server and for password rotations.
How has it helped my organization?
One of the benefits of using CyberArk Privileged Access Manager is we have an audit trail that fits the requirements of our organization and we are more secure using the features of the solution, such as investigating and tracking.
What is most valuable?
All of the features of CyberArk Privileged Access Manager are valuable.
For how long have I used the solution?
I have been using CyberArk Privileged Access Manager for approximately six months.
What do I think about the stability of the solution?
CyberArk Privileged Access Manager is stable.
What do I think about the scalability of the solution?
The scalability of CyberArk Privileged Access Manager is very good.
We have approximately 300 users using the solution.
How are customer service and support?
The partner support we have in Indonesia is fast and responsive to our needs. They are available if we are facing a problem. However, there is still room for improvement.
I rate the support from CyberArk Privileged Access Manager an eight out of ten.
How would you rate customer service and support?
Positive
Which solution did I use previously and why did I switch?
I was previously using MEGA HOPEX.
How was the initial setup?
The initial setup of CyberArk Privileged Access Manager difficulty depends on the environment that you are implementing it into. However, it typically is simple.
I rate the initial setup of CyberArk Privileged Access Manager a five out of ten.
What about the implementation team?
We use a third party to do the implementation of the solution. We purchased preventive and corrective maintenance from our partner.
What's my experience with pricing, setup cost, and licensing?
There are additional features added to our CyberArk Privileged Access Manager license. For example, features that allow us to integrate into various kinds of platforms.
What other advice do I have?
I would recommend this solution to others. It has great value and it ensures your environment is secure and it is most important in production. If your company is a financial institution it is a lot of times mandatory to have a solution similar to this in operation because of cyber security concerns. We need to have preventive or professional action and one of those elements is to have a secure platform.
I rate CyberArk Privileged Access Manager an eight out of ten.
Which deployment model are you using for this solution?
On-premises
Disclosure: I am a real user, and this review is based on my own experience and opinions.
Identity and Access Management Engineer at Wiley Global Technology Pvt. Ltd.
Is user-friendly and easy to deploy, and integrates well with other products
Pros and Cons
- "Creating policies and the password rotation feature have been valuable. We don't have to memorize our password for the ADM account."
- "Report creation could be improved. The policies could be more customized."
What is our primary use case?
We use this solution for the user ADM account onboarding process within our company. If they need server access, we create ADM accounts, and we onboard to CyberArk.
We use it also for the password protection process with other products. We can use this as a password wallet, and we create the password rotation in CyberArk.
We can grant access, check the system's health, and create policies for users.
What is most valuable?
Creating policies and the password rotation feature have been valuable. We don't have to memorize our password for the ADM account.
Security wise, it's really safe. The password expires within six to eight hours, so no one can get that password from us. Other users can't log in without our credentials, and also, the ADM account password will automatically rotate.
It's really user-friendly as well.
What needs improvement?
Report creation could be improved.
The policies could be more customized.
For how long have I used the solution?
I've been working with this solution for almost nine months. It's deployed on the cloud.
What do I think about the stability of the solution?
The stability is really good.
What do I think about the scalability of the solution?
We have more than 2000 users, and it's really easy to scale.
Which solution did I use previously and why did I switch?
I have worked with Thycotic before. It is not user-friendly, although it has changed a lot.
Implementation was really hard, and the reporting was not as good as the users expected. In comparison to CyberArk, Thycotic was not better.
How was the initial setup?
The deployment process is really easy, and I would give it a four out of five.
What about the implementation team?
We got support from the CyberArk team but deployed it ourselves. It was easy to follow the documentation and user guide.
What's my experience with pricing, setup cost, and licensing?
CyberArk is an expensive product.
What other advice do I have?
If you can afford CyberArk Privileged Access Manager or you are looking 5 to 10 years in the future, it's a good investment. You will gain experience handling all these pieces using the one product. You can easily integrate with other products also.
You would have maintenance with other PAM products, and you won't with CyberArk. You can save that money by investing in a high quality product from the beginning itself.
Overall, I would rate CyberArk Privileged Access Manager at eight on a scale from one to ten.
Disclosure: I am a real user, and this review is based on my own experience and opinions.

Buyer's Guide
Download our free CyberArk Privileged Access Manager Report and get advice and tips from experienced pros
sharing their opinions.
Updated: May 2025
Product Categories
Privileged Access Management (PAM) User Activity Monitoring Enterprise Password Managers Mainframe Security Operational Technology (OT) SecurityPopular Comparisons
Azure Key Vault
AWS Secrets Manager
Okta Workforce Identity
HashiCorp Vault
Delinea Secret Server
CyberArk Endpoint Privilege Manager
BeyondTrust Endpoint Privilege Management
WALLIX Bastion
CyberArk Identity
One Identity Safeguard
BeyondTrust Privileged Remote Access
BeyondTrust Password Safe
Buyer's Guide
Download our free CyberArk Privileged Access Manager Report and get advice and tips from experienced pros
sharing their opinions.
Quick Links
Learn More: Questions:
- CyberArk vs. ManageEngine Password Manager Pro
- How does Sailpoint IdentityIQ compare with CyberArk PAM?
- Which PAM tool do you prefer: CyberArk Privileged Access Manager, One Identity Safeguard, Delinea Secret Server, or BeyondTrust Privileged Remote A
- What is the difference between Privileged Users and Privileged Accounts
- When evaluating Privileged Identity Management, what aspect do you think is the most important to look for?
- How was the 2020 Twitter Hack carried out? How could it have been prevented?
- Which is the best Privileged Account Management solution?
- What are the top 5 PAM solutions that can be implemented which cover both hybrid and cloud?
- What are the top 5 PAM solutions?
- How will AI and ML help or work with PIM/PAM?
Account discovery as opposed to system (servers, workstations) discovery is a little more complex. This functionality comes down to scripting. Set up scripts that search your chosen domains looking for heightened accounts. To automatically add new accounts, your script will need to match the heightened account to the bind account used in the login domain. Then search for current safes, and either update them or create them. System Discovery is a simple setting in CyberArk that can be configured as you go.