We Enterprise Password Vault to manage privileged credentials as well as some server and activity logging.
Manager Engineering at a comms service provider with 1,001-5,000 employees
Once you complete the setup, you have everything at the click of a button.
Pros and Cons
- "The logs and reporting features are impressive."
- "CyberArk's license is too expensive. I rate it seven out of 10 for affordability."
What is our primary use case?
How has it helped my organization?
Before we implemented CyberArk, we had no password vault, so it was challenging to keep a record of who made changes and had access. With CyberArk, everything is a click away for us. We don't need to worry about reporting and other things. We can on our server to check who had access and the changes they made.
What is most valuable?
The logs and reporting features are impressive.
For how long have I used the solution?
We've been using CyberArk for about five years now.
Buyer's Guide
CyberArk Privileged Access Manager
June 2025

Learn what your peers think about CyberArk Privileged Access Manager. Get advice and tips from experienced pros sharing their opinions. Updated: June 2025.
860,592 professionals have used our research since 2012.
What do I think about the stability of the solution?
CyberArk is stable, and the performance is awesome.
What do I think about the scalability of the solution?
CyberArk is highly scalable. You don't need to worry about being dependent on only one server because you can deploy to multiple ones and manage it with all of them. If one fails, you can still use your access, so I think it's scalable.
We aren't using the solution extensively, but we plan to expand, and we'll definitely we'll continue with the same solution.
How are customer service and support?
I rate CyberArk support 10 out of 10. We have contacted tech support a few times for help with some of the cases, and the support was perfect.
How would you rate customer service and support?
Positive
Which solution did I use previously and why did I switch?
We didn't have a password vault solution before CyberArk.
How was the initial setup?
The initial setup was straightforward for us, but it depends on how you want to use it. It will become a little complex, and you need to gain some knowledge to customize it how you want. That applies to any product. I'll rate CyberArk 10 out of 10 for ease of setup.
It took us around five or six months to deploy because we were also testing out some other products at the same time. And after testing for a few months, we decided to go with CyberArk for the final production rollout. Once you complete the setup, you don't need much maintenance, but we have around 40 system administrators managing the CyberArk server.
What about the implementation team?
We did the deployment with our in-house team.
What's my experience with pricing, setup cost, and licensing?
CyberArk's license is too expensive. I rate it seven out of 10 for affordability.
Which other solutions did I evaluate?
We tried a couple of solutions before selecting CyberArk. Some of them are highly secure, but the reporting functions were tricky. A few were highly scalable, but they required a lot of resources to manage. We preferred CybeArk because it's easy to use and set up. Once you complete the setup, you have everything at the click of a button.
What other advice do I have?
I rate CyberArk Enterprise Password Vault nine out of 10. If you're worried about privileged ID management, security, and scalability, you should go with CyberArk.
Which deployment model are you using for this solution?
Private Cloud
Disclosure: My company does not have a business relationship with this vendor other than being a customer.

Cybersecurity Engineer at a healthcare company with 10,001+ employees
Provides better security and control over our accounts and saves time in onboarding new employees
Pros and Cons
- "The automatic rotation of credentials is probably the most useful feature."
- "It should be easy to use for non-technical people. Its interface can be a bit difficult. Some parts of its interface are not very intuitive. Some of the controls are hidden, and instead of having a screen with all the controls for that account on it, you have to use menus and other similar things."
What is our primary use case?
We are mostly rotating passwords and using PSM for remote connections.
How has it helped my organization?
It provides us with better security and control over our accounts.
It provides an automated and unified approach for securing access for all types of identities. This approach is important for us. The more things we have that can be automated, the easier it is to get things done.
It gives a single pane of glass to manage and secure human and machine identities across environments, which is important for us.
It saves time when it comes to onboarding new employees and providing them secure access to SaaS apps and IT systems. It probably saves a couple of hours.
What is most valuable?
The automatic rotation of credentials is probably the most useful feature.
What needs improvement?
It should be easy to use for non-technical people. Its interface can be a bit difficult. Some parts of its interface are not very intuitive. Some of the controls are hidden, and instead of having a screen with all the controls for that account on it, you have to use menus and other similar things.
Its documentation could be better. Some of the documentation lacks details for people who aren't super technical.
For how long have I used the solution?
I have been using this solution for about six years.
What do I think about the stability of the solution?
It is stable. We never had any hiccups that were caused by CyberArk.
What do I think about the scalability of the solution?
It is easily scalable. In terms of usage, it is being used by all of IT. We have over 500 users utilizing the solution. We're always adding new people and features, so its usage is increasing every day. We plan to implement more types of accounts.
How are customer service and support?
Their technical support is good, but some of their documentation lacks details for people who aren't super technical. I would rate them an eight out of 10.
Which solution did I use previously and why did I switch?
Other than the regular Password Manager, they didn't have any real solution. They chose to look into CyberArk because it is a good security practice to have accounts automatically rotate and secure remote connections.
How was the initial setup?
It is pretty complex, but they have professional services to help with that. It is complex because of all the security around it, all the hardening, and getting everything set up to communicate with each other. I am not sure about the duration of the initial deployment because I wasn't on the team then.
In terms of maintenance, it doesn't require a lot of people. Maintenance is just keeping up with patches. It is pretty stable and doesn't require a lot.
What about the implementation team?
We used CyberArk's professional services. They were good, and they helped get everything set up. They also helped do upgrades.
What's my experience with pricing, setup cost, and licensing?
It is in line with its competitors, but all such solutions cost too much money.
What other advice do I have?
It is a good choice. I'm not sure if they're the market leader or not, but they seem to have the biggest footprint. I know there are a couple of competitors, but I've never used them. The other two that I know about are not as widely used, so there is a bigger community for support for CyberArk, and there is also CyberArk's support.
CyberArk is good as a technology partner for ensuring that we maintain a strong security posture throughout our digital transformation. It is a needed platform to have.
Given my experience with CyberArk PAM, to a colleague at another company who says, “We want to solve cloud security challenges with born-in-the-cloud security solutions as opposed to legacy solutions that have been adapted to the cloud," I would say that CyberArk is a good option for the cloud. That's because you don't have to worry about maintenance, and all the integrations are already in place. The different accounts that CyberArk can integrate with are already in place.
It doesn't really give a single pane of glass to manage and secure identities across multiple environments. It only gives visibility into CyberArk and how the accounts are working there. If something is wrong with an account, sometimes, you have to check other tools, such as Active Directory, or permissions.
We don't use CyberArk’s Cloud Entitlements Manager and Secrets Manager. We use CyberArk PAM to implement least privilege entitlements, and it is neither easy nor difficult to implement them. It is somewhere in the middle. The adoption of least privilege entitlements by using CyberArk PAM is also somewhere in the middle. If users aren't really technical, they would have problems with it.
It provides consistent controls to enable secure access, manage secrets, and implement least privilege at scale across our environment. It is somewhat user-friendly for people to just rotate passwords. Its interface can be a bit difficult.
I would rate it an eight out of 10.
Which deployment model are you using for this solution?
On-premises
Disclosure: PeerSpot contacted the reviewer to collect the review and to validate authenticity. The reviewer was referred by the vendor, but the review is not subject to editing or approval by the vendor.
Buyer's Guide
CyberArk Privileged Access Manager
June 2025

Learn what your peers think about CyberArk Privileged Access Manager. Get advice and tips from experienced pros sharing their opinions. Updated: June 2025.
860,592 professionals have used our research since 2012.
IT Manager at a financial services firm with 1,001-5,000 employees
Helps us to automate our jobs and administrative tasks
Pros and Cons
- "It improves security in our company. We have more than 10,000 accounts that we manage in CyberArk. We use these accounts for SQLs, Windows Server, and Unix. Therefore, keeping these passwords up-to-date in another solution or software would be impossible. Now, we have some sort of a platform to manage passwords, distribute the inflow, and manage IT teams as well as making regular changes to it according to the internal security policies in our bank."
- "We don't often contact technical support, but when we do it, the response could be faster and better."
What is our primary use case?
In our company, CyberArk is used to manage passwords for IP use. We use CyberArk for managing and automatically changing passwords in our managed system and environment.
We use it for coding privileged sessions, but we also use another solution for that, and CyberArk is the backup for this.
We are using the latest version.
How has it helped my organization?
It improves security in our company. We have more than 10,000 accounts that we manage in CyberArk. We use these accounts for SQLs, Windows Server, and Unix. Therefore, keeping these passwords up-to-date in another solution or software would be impossible. Now, we have some sort of a platform to manage passwords, distribute the inflow, and manage IT teams as well as making regular changes according to the internal security policies in our bank.
CyberArk PAM gives us a single pane of glass to manage and secure identities across multiple environments. This is quite important for compliance reasons.
CyberArk PAM provides quantitative risk analysis for every human and machine identity in our environment. This has a big impact on reducing risk.
What is most valuable?
The PAM feature is the most valuable. It helps us to automate our jobs and administrative tasks.
It also gives us a lot of features for compliance. Using this type of software is required by Polish law in finance and business in Poland.
We use CyberArk’s Secrets Manager to secure and manage secrets and credentials for mission-critical applications. The newest GUI is much better than the older version. Now, it is quite good.
CyberArk PAM provides an automated and unified approach for securing access to all types of identities that we use. This is very important to us.
What needs improvement?
I would like advanced RPA in the basic license. CyberArk has RPA, but we would need to buy additional licenses. It is not out-of-the-box.
I would like better support.
For how long have I used the solution?
I have been using it for five years.
What do I think about the stability of the solution?
So far, we don't have any problems. We have implemented higher availability in CyberArk. So, maintenance or updates don't have an impact on our environment. We don't have performance problems or anything like that. The stability is very high.
I have had no problem with agility in this solution. Everything works fine and gives us an opportunity to act as we want.
What do I think about the scalability of the solution?
According to the information that I have, we simply add more servers if we need it or have additional business requirements. So, scalability is high.
There are about 155 users. Mostly, they are our IT administrators and developers.
This tool is used daily in our bank. We don't have plans to increase usage right now.
How are customer service and support?
We don't often contact technical support, but when we do it, the response could be faster and better.
How would you rate customer service and support?
Neutral
Which solution did I use previously and why did I switch?
We didn't previously use another solution.
How was the initial setup?
The initial setup was complex. Our deployment took three months.
We needed to scale our environment and implement the correct number of servers to prepare for a working environment.
What about the implementation team?
Implementation of our CyberArk instance was done by an external company. It covered all our needs and requirements.
What was our ROI?
We have not seen ROI directly in money. However, we have seen ROI in quality. It increases security in our IT environment and provides the highest SLA for our systems.
CyberArk PAM helps save us time when it comes to onboarding new employees and providing them secure access to SaaS apps and IT systems. It is saving us about two to three days per new employee.
What's my experience with pricing, setup cost, and licensing?
We use an old model for pricing. The new model is a subscription model on the cloud.
The price of CyberArk support could be a little bit less. Otherwise, pricing is fine.
Which other solutions did I evaluate?
We did some benchmarking, without the tools, to compare the cost of maintenance and functionality. We compared CyberArk to Password Manager Pro from ManageEngine. CyberArk has more functionality and better stability, in our opinion. The price was very similar between the two solutions.
What other advice do I have?
CyberArk is a good technology partner. They help us a lot with maintenance and our security process management.
I don't have experience in the cloud using CyberArk. However, for on-premises environments, it works very well. I recommend it.
I would rate the solution as a nine out of 10.
Which deployment model are you using for this solution?
On-premises
Disclosure: PeerSpot contacted the reviewer to collect the review and to validate authenticity. The reviewer was referred by the vendor, but the review is not subject to editing or approval by the vendor.
Sales Engineer at Softprom by ERC
Scalable solution with an efficient exclusive access feature
Pros and Cons
- "The solution is highly stable."
- "It is complicated to deploy for Windows servers compared to other vendors."
What is most valuable?
The solution's most valuable features are one-time password and exclusive access.
What needs improvement?
CyberArk is complicated and costly to deploy for Windows servers compared to a few other vendors. It would be helpful if they combined all the components on a single server. Also, they should release a version specific to small businesses with two servers installation architecture.
For how long have I used the solution?
We have been using the solution for three years.
What do I think about the stability of the solution?
The solution is highly stable. I rate its stability a ten out of ten.
What do I think about the scalability of the solution?
I rate the solution's scalability a ten. It is the best in the market. It can scale to any infrastructure. We had implemented around 1000 target servers for our previous customers.
How are customer service and support?
The solution's training documentation compensates for efforts to raise the tickets. We can resolve the issues ourselves based on the documents provided by the vendor. If you contact them for any problems, they solve them within a few hours.
How was the initial setup?
I have implemented the solution for small and large enterprises. I haven't come across any bugs or issues. I use the 12.2 version as it is more stable, and I have more experience working with it than the newer version. It is easier to deploy if you know how to use it.
The time taken for deployment depends on specific project requirements. In the case of lesser servers and target machines, it takes about a few weeks. Whereas for a larger number of servers, it takes around two to three months to complete. The process involves setting up servers to host password vault, API access, central policy manager, and SM server. Additionally, for customer-specific requirements, we can set up Distributed Trusted Host (DTH) server for privileged analytics and Privileged Session Manager (PSM) for session management.
Apart from the deployment, it involves configuring policies, setting up additional connection components, etc.
What's my experience with pricing, setup cost, and licensing?
The solution is cost-effective for the features. In comparison, other vendors would charge extra for the same features. Also, its pricing model is based on the number of users rather than the number of servers. Thus, there are no additional costs. I rate its pricing a six or seven.
What other advice do I have?
I recommend the solution to others and rate it a ten out of ten. It is user-friendly once you understand its functionality.
Which deployment model are you using for this solution?
On-premises
Disclosure: My company has a business relationship with this vendor other than being a customer. reseller
Procurement Manager at OTE Group
A robust solution that provides good security support
Pros and Cons
- "The solution helps our developers access internal systems. It also helps us in Privilege Access Management."
- "The tool’s pricing and scalability can be better."
What is our primary use case?
The solution helps our developers access internal systems. It also helps us in Privilege Access Management.
What needs improvement?
The tool’s pricing and scalability can be better.
For how long have I used the solution?
I have been using the solution for five years.
What do I think about the stability of the solution?
I would rate the tool’s stability a ten out of ten. It is stable.
What do I think about the scalability of the solution?
I would rate the tool’s scalability an eight out of ten. The tool is scalable.
How was the initial setup?
I would rate the tool’s setup a nine out of ten. The solution’s setup is easy. We have a good internal implementation team who completed the deployment in a few days. About five to six engineers worked on the tool’s deployment.
What about the implementation team?
We have an internal integrator for the tool.
What was our ROI?
We have seen ROI with the tool’s use.
What's my experience with pricing, setup cost, and licensing?
I would rate the tool’s pricing a six out of ten.
What other advice do I have?
The tool is robust and our IT team is happy with it. It provides you with strong security.
Which deployment model are you using for this solution?
On-premises
Disclosure: My company has a business relationship with this vendor other than being a customer. Reseller
Senior Manager Cybersecurity at LTI - Larsen & Toubro Infotech
Beneficial secure server assess, useful user log access, and good support
Pros and Cons
- "CyberArk Privileged Access Manager's main benefit is it provides secure access to our servers. There are features to capture the user activity, it provides video recording processing. If the users are logged in to the server, we can see what activities they are performing. It's a very nice tool for Privileged Access Management. They have plenty of useful services and the solution has fulfilled our needs."
- "The solution could improve by adding more connectors."
What is our primary use case?
I am using CyberArk Privileged Access Manager to protect our servers. It can be either a Windows or Linux Server. Additionally, we have some network devices, and databases, such as Oracle and MySQL Server being protected.
How has it helped my organization?
It's improved our organization a lot. It has fulfilled some guidelines from the Indian government. There is some Indian government guideline for anonymity and access management. Similarly, there are guidelines for GDPR, and where we have vendor's control. CyberArk Privileged Access Manager has helped us to meet all the requirements.
What is most valuable?
CyberArk Privileged Access Manager's main benefit is it provides secure access to our servers. There are features to capture the user activity, it provides video recording processing. If the users are logged in to the server, we can see what activities they are performing. It's a very nice tool for Privileged Access Management. They have plenty of useful services and the solution has fulfilled our needs.
What needs improvement?
The solution could improve by adding more connectors.
For how long have I used the solution?
I have been using CyberArk Privileged Access Manager for two and a half years.
What do I think about the stability of the solution?
CyberArk Privileged Access Manager is a stable and reliable solution.
What do I think about the scalability of the solution?
We have approximately 200 people using this solution.
How are customer service and support?
The support team from CyberArk Privileged Access Manager is very good.
Which solution did I use previously and why did I switch?
I have not used other solutions.
How was the initial setup?
CyberArk Privileged Access Manager's initial setup is straightforward. However, it can depend on many factors, such as architecture.
What about the implementation team?
I used a partner for the implementation of the CyberArk Privileged Access Manager.
The number of people required for the implementation of CyberArk Privileged Access Manager depends on the number of applications. However, for my team, we have two to four people who were involved in the development of our architecture.
What was our ROI?
From a technology perspective, CyberArk Privileged Access Manager has helped us to improve our services. It helped us to meet our requirements or guidelines. Whether it's audit perspective, internal, or external, whatever the guideline is, it meets our needs. If there are any independent agencies that need to be involved we meet those requirements.
What's my experience with pricing, setup cost, and licensing?
The price of CyberArk Privileged Access Manager is expensive. There are no other fees other than the standard licensing fees.
Which other solutions did I evaluate?
As part of our company's policies, we have to evaluate other solutions.
What other advice do I have?
I would advise others that requirements should be discussed properly with all the stakeholders to understand their expectations. Additionally, it is important to explore our tool limitations. We should more focus on solution designing.
I rate CyberArk Privileged Access Manager a nine out of ten.
Which deployment model are you using for this solution?
On-premises
Disclosure: My company does not have a business relationship with this vendor other than being a customer.
Associate Manager at Wipro
Good support, stable, and helpful in securing access to our lab
Pros and Cons
- "It is one of the best solutions in the market. Ever since I started using this solution, there has not been any compromise when it comes to our lab."
- "There is a lot of room for improvement in the report section. I also work on other tools, such as Thycotic, which allows you to create customized reports for your organization's needs. In CyberArk, there are limited reports, whereas in Thycotic or some of the other PAM tools, because the database is different, you can customize the report based on your needs through SQL queries."
What is our primary use case?
It is for the lab. We just onboard all the privileged accounts and then try to make them compliant and provide access to end-users. We are CyberArk administrators, and our responsibility is to onboard the accounts and provide access to end-users so that there is no business impact and the users are able to connect to their target services.
I started with version 10.6, and now, the current version of CyberArk is 12.1. It is deployed on-prem, but in my lab, it is my virtual setup.
What is most valuable?
It is one of the best solutions in the market. Ever since I started using this solution, there has not been any compromise when it comes to our lab.
What needs improvement?
There is a lot of room for improvement in the report section. I also work on other tools, such as Thycotic, which allows you to create customized reports for your organization's needs. In CyberArk, there are limited reports, whereas in Thycotic or some of the other PAM tools, because the database is different, you can customize the report based on your needs through SQL queries.
The GUI part can be better. Previously, they had a classic one, and then they upgraded to the new one, but it is less user-friendly than other PAM solutions. Its GUI is a little bit complex.
For how long have I used the solution?
I have been using this solution for almost five years.
What do I think about the stability of the solution?
It is a stable solution. It is a top PAM solution as per Gartner.
What do I think about the scalability of the solution?
Its scalability is good.
How are customer service and support?
I have contacted them multiple times. They helped me in a good way. Whenever I raised a ticket, depending on the ticket priority, they provided good support. Sometimes, I got a response within two hours.
How was the initial setup?
CyberArk has a distributed architecture. Therefore, as compared to other PAM solutions, it is a little bit complex. You first need to understand the environment and then install the individual components, whereas, in other PAM solutions, you have to build the database and then simply run the application and directly connect to the application. You can then start using the application.
What other advice do I have?
If you are using this solution for the first time, you need to be a little bit aware of Windows, Linux, and AD. Otherwise, it might be complex for you.
I would rate it a nine out of ten.
Which deployment model are you using for this solution?
On-premises
Disclosure: My company does not have a business relationship with this vendor other than being a customer.
Information Security Engineer II at a healthcare company with 1,001-5,000 employees
Stable and solid solution for managing passwords, and comes with auto password recycling and PSM features
Pros and Cons
- "If properly set up, CyberArk Enterprise Password Vault has good stability, and is a very solid tool. It can run by itself. Its most valuable features are auto password recycling and PSM."
- "What needs to be improved in CyberArk Enterprise Password Vault is their customer support, particularly in terms of responsiveness, willingness to help, and being more understanding. The initial setup and upgrade process for the solution is complex and can only be done by CyberArk, so this is another area for improvement."
What is our primary use case?
Our use case for CyberArk Enterprise Password Vault is managing privileged accounts. These are local accounts, e.g. local desktops, laptops, or servers. They have a built-in administration account, so part of the solution is to ensure that that account's username and password are stored in the vault and managed by CyberArk Enterprise Password Vault.
What is most valuable?
The most valuable feature of CyberArk Enterprise Password Vault is the auto password recycling feature, which works this way: previous accounts which are managed by this solution get their password reset every time, based on our given parameters, e.g. every two days, every five days, every week, etc. You give CyberArk Enterprise Password Vault the number of days that you want the passwords to be changed, so users won't need to have their passwords written somewhere. They can just log on to the solution and retrieve the password. They may even be able to remotely connect to the devices that they want to connect to via the PSM function of CyberArk Enterprise Password Vault.
What needs improvement?
What needs to be improved in CyberArk Enterprise Password Vault is their customer support, because as administrative engineers, since we're not experts in the solution, we have to rely on customer support.
Their customer support needs improvement in terms of being responsive and being understanding. They are knowledgeable, but responding and willingness to come and help knowing that it's their tool, rather than relying on the engineers from the customer side, e.g. our side, to do all the technical things.
The initial setup and upgrade process for CyberArk Enterprise Password Vault is complex and can only be done by CyberArk, so this is another area for improvement.
For how long have I used the solution?
My experience with CyberArk Enterprise Password Vault is almost three years.
What do I think about the stability of the solution?
CyberArk Enterprise Password Vault stability is good. If it's properly set up, it can just run by itself. It's a very solid tool, but it has to be properly set up because a simple misconfiguration can create a lot of pain. Once set up, it's really good.
How are customer service and support?
Customer support for this product still needs some improvement.
How was the initial setup?
The initial setup for CyberArk Enterprise Password Vault is another pain point, because the setup, including upgrading the solution, can only be done by CyberArk themselves. They have professional services involved to get an initial setup done, and to even do an upgrade, because of the complexity of the product itself.
What's my experience with pricing, setup cost, and licensing?
The SaaS version of CyberArk Enterprise Password Vault is very expensive, but the on-premises version is relative, e.g. depending on the size of the environment, it can be a bit pricey, but it's relatively okay compared to the others. It's their SaaS solution that's expensive.
What other advice do I have?
We're using version 11.1 of CyberArk Enterprise Password Vault.
It's probably not fair to judge CyberArk Enterprise Password Vault based on my overall experience with it, because the tool itself is brilliant, though it's a little bit complex in terms of how it is set up. The customer service could still be improved to meet the standards, but I'm giving CyberArk Enterprise Password Vault a score of seven out of ten.
Which deployment model are you using for this solution?
On-premises
Disclosure: My company does not have a business relationship with this vendor other than being a customer.

Buyer's Guide
Download our free CyberArk Privileged Access Manager Report and get advice and tips from experienced pros
sharing their opinions.
Updated: June 2025
Product Categories
Privileged Access Management (PAM) User Activity Monitoring Enterprise Password Managers Mainframe Security Operational Technology (OT) SecurityPopular Comparisons
Azure Key Vault
AWS Secrets Manager
Okta Workforce Identity
HashiCorp Vault
Delinea Secret Server
CyberArk Endpoint Privilege Manager
BeyondTrust Endpoint Privilege Management
WALLIX Bastion
CyberArk Identity
One Identity Safeguard
BeyondTrust Privileged Remote Access
BeyondTrust Password Safe
Buyer's Guide
Download our free CyberArk Privileged Access Manager Report and get advice and tips from experienced pros
sharing their opinions.
Quick Links
Learn More: Questions:
- CyberArk vs. ManageEngine Password Manager Pro
- How does Sailpoint IdentityIQ compare with CyberArk PAM?
- Which PAM tool do you prefer: CyberArk Privileged Access Manager, One Identity Safeguard, Delinea Secret Server, or BeyondTrust Privileged Remote A
- What is the difference between Privileged Users and Privileged Accounts
- When evaluating Privileged Identity Management, what aspect do you think is the most important to look for?
- How was the 2020 Twitter Hack carried out? Could it have been prevented?
- Which is the best Privileged Account Management solution?
- What are the top 5 PAM solutions that can be implemented which cover both hybrid and cloud?
- What are the top 5 PAM solutions?
- How will AI and ML help or work with PIM/PAM?