We use it for other use cases, such as automating application authorization, managing files, and securing monetary accounts. We use it for managing privileged accounts.
Cyber Security Engineer at eprocessconsulting
Highly stable and efficiently automates application authorization
Pros and Cons
- "It's secure and reliable. I especially appreciate that it's locked down and only allows access to authorized components."
- "One thing that could be improved is to create of a better alternative for fixing group policy fees. We currently use Microsoft, but they have introduced new policies that may not be compatible."
What is our primary use case?
What is most valuable?
I like everything about it. It's secure and reliable. I especially appreciate that it's locked down and only allows access to authorized components.
What needs improvement?
The issue is that in many environments, what I purchase via text is different. We have some policies that are specific to Microsoft environments. For example, my actual manager may not be able to connect to a Microsoft product due to a policy on it. The issue that comes to mind now is how six credentials are managed.
Currently, if you try to log in to any server within the environment, you would need to log in every time, regardless of whether you have already received the credential or if the connecting device is present or not. It is a problem with CyberArk. If CyberArk could find a way to solve this, it would greatly improve the experience.
I'm not sure if it is possible to fix this. It's not a point of entry, but it may require a longer string than the user might want to know, or maybe cheaper right now. If CyberArk can find a solution that improves the experience, it would be beneficial to customers.
Another thing is that there are some time needs that could be improved in the future. One thing that could be improved is to create of a better alternative for fixing group policy fees. We currently use Microsoft, but they have introduced new policies that may not be compatible.
For how long have I used the solution?
I've been working with it for three years. I'm currently working with version 12 of the solution, and I've also worked with version 10 and partition 11.
Buyer's Guide
CyberArk Privileged Access Manager
May 2026
Learn what your peers think about CyberArk Privileged Access Manager. Get advice and tips from experienced pros sharing their opinions. Updated: May 2026.
893,311 professionals have used our research since 2012.
What do I think about the stability of the solution?
The number of users is about 3,305, and it is stable. We don't have any small clients, mainly medium and enterprise businesses.
I would rate stability a ten out of ten, and it's very stable.
What do I think about the scalability of the solution?
I would rate scalability an eight out of ten. It's not perfect, but it's fairly scalable.
How are customer service and support?
Some things need improvement. The solution doesn't provide sufficient support. I contacted them at one point, but it took several months to get a response. Additionally, we had an issue with account balances that took a while to resolve. That was four or five years ago, though. Other than that, it's a decent solution.
How was the initial setup?
Regarding the initial setup, I would say it's pretty straightforward on a scale from one to ten, where one is difficult and ten is easy. I'd give it a nine. Deployment took less than a week.
What about the implementation team?
I deployed the solution.
What's my experience with pricing, setup cost, and licensing?
It is pretty pricey. I would rate it a seven on a scale of one to ten, where one is cheap, and ten is very expensive.
What other advice do I have?
Overall, I would rate the solution a ten out of ten.
Which deployment model are you using for this solution?
On-premises
Disclosure: My company has a business relationship with this vendor other than being a customer. Partner
Procurement Manager at OTE Group
A robust solution that provides good security support
Pros and Cons
- "The solution helps our developers access internal systems. It also helps us in Privilege Access Management."
- "The tool’s pricing and scalability can be better."
What is our primary use case?
The solution helps our developers access internal systems. It also helps us in Privilege Access Management.
What needs improvement?
The tool’s pricing and scalability can be better.
For how long have I used the solution?
I have been using the solution for five years.
What do I think about the stability of the solution?
I would rate the tool’s stability a ten out of ten. It is stable.
What do I think about the scalability of the solution?
I would rate the tool’s scalability an eight out of ten. The tool is scalable.
How was the initial setup?
I would rate the tool’s setup a nine out of ten. The solution’s setup is easy. We have a good internal implementation team who completed the deployment in a few days. About five to six engineers worked on the tool’s deployment.
What about the implementation team?
We have an internal integrator for the tool.
What was our ROI?
We have seen ROI with the tool’s use.
What's my experience with pricing, setup cost, and licensing?
I would rate the tool’s pricing a six out of ten.
What other advice do I have?
The tool is robust and our IT team is happy with it. It provides you with strong security.
Which deployment model are you using for this solution?
On-premises
Disclosure: My company has a business relationship with this vendor other than being a customer. Reseller
Buyer's Guide
CyberArk Privileged Access Manager
May 2026
Learn what your peers think about CyberArk Privileged Access Manager. Get advice and tips from experienced pros sharing their opinions. Updated: May 2026.
893,311 professionals have used our research since 2012.
Sri Privileged Access Management Architect at Edgile
Extremely stable, scalable, and has great technical support
Pros and Cons
- "CyberArk has the ability to change the credentials on every platform."
- "The initial setup has room for improvement to be more straightforward."
What is our primary use case?
The primary use case of the solution is mining the credentials on our Windows unique network.
What is most valuable?
The solution is able to rotate the credentials and session recording. CyberArk has the ability to change the credentials on every platform.
What needs improvement?
The initial setup has room for improvement to be more straightforward.
For how long have I used the solution?
I have been using the solution for three months.
What do I think about the stability of the solution?
The solution is extremely stable.
What do I think about the scalability of the solution?
The solution is extremely scalable.
How are customer service and support?
The technical support is fantastic and quick to respond.
How was the initial setup?
I give the initial setup a five out of ten.
The initial deployment requires a couple of weeks and for the on-premises portion an additional two to four weeks. The deployment required one full-time architect and one full-time senior consultant.
What's my experience with pricing, setup cost, and licensing?
The solution is costly but we get what we pay for.
What other advice do I have?
I give the solution a ten out of ten.
For maintenance, we require one part-time architect and two operations people.
I recommend the solution to others.
Which deployment model are you using for this solution?
Hybrid Cloud
Disclosure: My company has a business relationship with this vendor other than being a customer. Partner
Pre sales Engineer (West Africa) at StarLink - Trusted Security Advisor
A useful solution for privileged identity and application identity management
Pros and Cons
- "It's a good solution, it works, and the bank is happy with it."
- "Regardless it's a good solution, it works, and the bank is happy with it."
- "The architecture needs to be improved."
- "The architecture needs to be improved."
What is our primary use case?
Our primary use case for his solution is privileged identity and application identity management, and we deploy the solution on-premises.
What is most valuable?
We have found the core features of the product most valuable, such as password management, session recording and vaulting.
What needs improvement?
The architecture needs to be improved. For example, the whole solution can come within a single software bundle instead of the distributed components we have for the on-premise deployments. I think there's room for improvements in that area because the competitors within that space have appliances and software that are just a single software. You don't have to split functionality across several servers like the current deployment.
For how long have I used the solution?
We have been using this solution for approximately five years.
What do I think about the scalability of the solution?
The solution is scalable. At the point of implementation, 300 users in our organization were using it, but that number may have increased.
How was the initial setup?
The initial setup is not very complex because of my experience and skills. Still, the end users are only in charge of the administrative aspects, but I think the set up is a bit complex for those who are not very savvy with the solution. Implementation took approximately two weeks.
What other advice do I have?
I rate the solution nine out of ten. The solution is good, but the main feature to be improved is having the product in a consolidated software bundle. So the moment we have PSM, it's a dedicated server. We can also have a PVWA in another server, so having a singular bundle is just like the cloud offering. The infrastructure is abstracted from the end user. So if we can have something like that for on-premises, that would simplify implementation. Regardless it's a good solution, it works, and the bank is happy with it. My recommendation to people considering implementing this product is to get the scoping appropriately done. It comes down to scoping the initial deployment, so it doesn't take forever. Still, if you're not scoping correctly, you could have a situation where people keep adding new accounts continuously, and your project never ends. Hence, scoping is kind of important.
Disclosure: My company does not have a business relationship with this vendor other than being a customer.
Team Lead Information Security Control at a financial services firm with 5,001-10,000 employees
Good support, reliable, and straightforward implementation
Pros and Cons
- "CyberArk Privileged Access Manager is stable."
- "CyberArk Privileged Access Manager has helped our organization by controlling users' access."
- "CyberArk Privileged Access Manager could improve the integration docking, it should have more layers. For example, integration with OpenShift."
- "CyberArk Privileged Access Manager could improve the integration docking, it should have more layers, for example, integration with OpenShift."
What is our primary use case?
We are using CyberArk Privileged Access Manager because we have too many accounts and we need to manage them.
How has it helped my organization?
CyberArk Privileged Access Manager has helped our organization by controlling users' access.
What needs improvement?
CyberArk Privileged Access Manager could improve the integration docking, it should have more layers. For example, integration with OpenShift.
For how long have I used the solution?
I have been using CyberArk Privileged Access Manager for approximately two years.
What do I think about the stability of the solution?
CyberArk Privileged Access Manager is stable.
What do I think about the scalability of the solution?
We have thousands of users using CyberArk Privileged Access Manager in my organization.
How are customer service and support?
The support from CyberArk Privileged Access Manager is good.
How was the initial setup?
The initial setup of CyberArk Privileged Access Manager was straightforward.
What about the implementation team?
We had a local third-party company help us with the implementation of CyberArk Privileged Access Manager. The maintenance is sometimes a challenge for our consulting team that does it.
What other advice do I have?
I would recommend this solution to others.
I rate CyberArk Privileged Access Manager a nine out of ten.
Which deployment model are you using for this solution?
On-premises
Disclosure: My company does not have a business relationship with this vendor other than being a customer.
Senior Leader at a financial services firm with 5,001-10,000 employees
Useful password vaulting, reliable, and simple deployment
Pros and Cons
- "The most valuable features of CyberArk Enterprise Password Vault are password vaulting and automatic rotation of passwords after use."
- "The most valuable features of CyberArk Enterprise Password Vault are password vaulting and automatic rotation of passwords after use."
- "CyberArk Enterprise Password Vault can improve the distributive vault feature. Distributing the vault in multiple areas and multiple data centers should improve."
- "CyberArk Enterprise Password Vault can improve the distributive vault feature. Distributing the vault in multiple areas and multiple data centers should improve."
What is our primary use case?
CyberArk Enterprise Password Vault can be used for password vaulting and purpose session management.
What is most valuable?
The most valuable features of CyberArk Enterprise Password Vault are password vaulting and automatic rotation of passwords after use.
What needs improvement?
CyberArk Enterprise Password Vault can improve the distributive vault feature. Distributing the vault in multiple areas and multiple data centers should improve.
For how long have I used the solution?
I have been using CyberArk Enterprise Password Vault for approximately seven years.
What do I think about the stability of the solution?
The stability of CyberArk Enterprise Password Vault depends on what you use it for. It is very stable when using a single vault. I had the most problems using the distributive vault. They've worked through some of that, so it's more stable now.
What do I think about the scalability of the solution?
The scalability of CyberArk Enterprise Password Vault is okay. The distributive vault is what would affect the scalability and there were some issues with that that I've run into.
We only have a small number of users in the current company I am working at, and the previous company I was working for had hundreds of users using the solution.
We do not plan to increase the usage of this solution.
How are customer service and support?
The support from CyberArk Enterprise Password Vault is good.
I rate the support from CyberArk Enterprise Password Vault a four out of five.
How would you rate customer service and support?
Positive
Which solution did I use previously and why did I switch?
I did not use a solution similar to CyberArk Enterprise Password Vault.
How was the initial setup?
The initial setup of CyberArk Enterprise Password Vault was straightforward. The time it took to implement was two months.
What about the implementation team?
We did the implementation of CyberArk Enterprise Password Vault in-house.
We have approximately nine people for the deployment and maintenance of CyberArk Enterprise Password Vault.
What was our ROI?
We have seen a return on investment from using CyberArk Enterprise Password Vault.
What's my experience with pricing, setup cost, and licensing?
There are no additional costs other than the standard licensing fees.
Which other solutions did I evaluate?
We evaluated other solutions but we decided to choose CyberArk Enterprise Password Vault because they were a key player in the market who invented the space.
What other advice do I have?
CyberArk Enterprise Password Vault is great. It excels on-premise. If you were looking at the hybrid or other solutions, there are other solutions that were built in that environment. They're probably a little ahead of CyberArk Enterprise Password Vault at this point.
I rate CyberArk Enterprise Password Vault an eight out of ten.
Which deployment model are you using for this solution?
On-premises
Disclosure: My company does not have a business relationship with this vendor other than being a customer.
Associate Manager at Wipro
Good support, stable, and helpful in securing access to our lab
Pros and Cons
- "It is one of the best solutions in the market. Ever since I started using this solution, there has not been any compromise when it comes to our lab."
- "It is one of the best solutions in the market, and ever since I started using this solution, there has not been any compromise when it comes to our lab."
- "There is a lot of room for improvement in the report section. I also work on other tools, such as Thycotic, which allows you to create customized reports for your organization's needs. In CyberArk, there are limited reports, whereas in Thycotic or some of the other PAM tools, because the database is different, you can customize the report based on your needs through SQL queries."
- "There is a lot of room for improvement in the report section."
What is our primary use case?
It is for the lab. We just onboard all the privileged accounts and then try to make them compliant and provide access to end-users. We are CyberArk administrators, and our responsibility is to onboard the accounts and provide access to end-users so that there is no business impact and the users are able to connect to their target services.
I started with version 10.6, and now, the current version of CyberArk is 12.1. It is deployed on-prem, but in my lab, it is my virtual setup.
What is most valuable?
It is one of the best solutions in the market. Ever since I started using this solution, there has not been any compromise when it comes to our lab.
What needs improvement?
There is a lot of room for improvement in the report section. I also work on other tools, such as Thycotic, which allows you to create customized reports for your organization's needs. In CyberArk, there are limited reports, whereas in Thycotic or some of the other PAM tools, because the database is different, you can customize the report based on your needs through SQL queries.
The GUI part can be better. Previously, they had a classic one, and then they upgraded to the new one, but it is less user-friendly than other PAM solutions. Its GUI is a little bit complex.
For how long have I used the solution?
I have been using this solution for almost five years.
What do I think about the stability of the solution?
It is a stable solution. It is a top PAM solution as per Gartner.
What do I think about the scalability of the solution?
Its scalability is good.
How are customer service and support?
I have contacted them multiple times. They helped me in a good way. Whenever I raised a ticket, depending on the ticket priority, they provided good support. Sometimes, I got a response within two hours.
How was the initial setup?
CyberArk has a distributed architecture. Therefore, as compared to other PAM solutions, it is a little bit complex. You first need to understand the environment and then install the individual components, whereas, in other PAM solutions, you have to build the database and then simply run the application and directly connect to the application. You can then start using the application.
What other advice do I have?
If you are using this solution for the first time, you need to be a little bit aware of Windows, Linux, and AD. Otherwise, it might be complex for you.
I would rate it a nine out of ten.
Which deployment model are you using for this solution?
On-premises
Disclosure: My company does not have a business relationship with this vendor other than being a customer.
Information Security Engineer II at a healthcare company with 1,001-5,000 employees
Stable and solid solution for managing passwords, and comes with auto password recycling and PSM features
Pros and Cons
- "If properly set up, CyberArk Enterprise Password Vault has good stability, and is a very solid tool. It can run by itself. Its most valuable features are auto password recycling and PSM."
- "CyberArk Enterprise Password Vault stability is good; if it's properly set up, it can just run by itself and is a very solid tool."
- "What needs to be improved in CyberArk Enterprise Password Vault is their customer support, particularly in terms of responsiveness, willingness to help, and being more understanding. The initial setup and upgrade process for the solution is complex and can only be done by CyberArk, so this is another area for improvement."
- "The initial setup and upgrade process for CyberArk Enterprise Password Vault is complex and can only be done by CyberArk, so this is another area for improvement."
What is our primary use case?
Our use case for CyberArk Enterprise Password Vault is managing privileged accounts. These are local accounts, e.g. local desktops, laptops, or servers. They have a built-in administration account, so part of the solution is to ensure that that account's username and password are stored in the vault and managed by CyberArk Enterprise Password Vault.
What is most valuable?
The most valuable feature of CyberArk Enterprise Password Vault is the auto password recycling feature, which works this way: previous accounts which are managed by this solution get their password reset every time, based on our given parameters, e.g. every two days, every five days, every week, etc. You give CyberArk Enterprise Password Vault the number of days that you want the passwords to be changed, so users won't need to have their passwords written somewhere. They can just log on to the solution and retrieve the password. They may even be able to remotely connect to the devices that they want to connect to via the PSM function of CyberArk Enterprise Password Vault.
What needs improvement?
What needs to be improved in CyberArk Enterprise Password Vault is their customer support, because as administrative engineers, since we're not experts in the solution, we have to rely on customer support.
Their customer support needs improvement in terms of being responsive and being understanding. They are knowledgeable, but responding and willingness to come and help knowing that it's their tool, rather than relying on the engineers from the customer side, e.g. our side, to do all the technical things.
The initial setup and upgrade process for CyberArk Enterprise Password Vault is complex and can only be done by CyberArk, so this is another area for improvement.
For how long have I used the solution?
My experience with CyberArk Enterprise Password Vault is almost three years.
What do I think about the stability of the solution?
CyberArk Enterprise Password Vault stability is good. If it's properly set up, it can just run by itself. It's a very solid tool, but it has to be properly set up because a simple misconfiguration can create a lot of pain. Once set up, it's really good.
How are customer service and support?
Customer support for this product still needs some improvement.
How was the initial setup?
The initial setup for CyberArk Enterprise Password Vault is another pain point, because the setup, including upgrading the solution, can only be done by CyberArk themselves. They have professional services involved to get an initial setup done, and to even do an upgrade, because of the complexity of the product itself.
What's my experience with pricing, setup cost, and licensing?
The SaaS version of CyberArk Enterprise Password Vault is very expensive, but the on-premises version is relative, e.g. depending on the size of the environment, it can be a bit pricey, but it's relatively okay compared to the others. It's their SaaS solution that's expensive.
What other advice do I have?
We're using version 11.1 of CyberArk Enterprise Password Vault.
It's probably not fair to judge CyberArk Enterprise Password Vault based on my overall experience with it, because the tool itself is brilliant, though it's a little bit complex in terms of how it is set up. The customer service could still be improved to meet the standards, but I'm giving CyberArk Enterprise Password Vault a score of seven out of ten.
Which deployment model are you using for this solution?
On-premises
Disclosure: My company does not have a business relationship with this vendor other than being a customer.
Buyer's Guide
Download our free CyberArk Privileged Access Manager Report and get advice and tips from experienced pros
sharing their opinions.
Updated: May 2026
Product Categories
Privileged Access Management (PAM) User Activity Monitoring Enterprise Password Managers Mainframe Security Operational Technology (OT) SecurityPopular Comparisons
Okta Platform
Azure Key Vault
AWS Secrets Manager
Saviynt Identity Cloud
Claroty Platform
CyberArk Identity
Delinea Secret Server
One Identity Safeguard
CyberArk Endpoint Privilege Manager
HashiCorp Vault
BeyondTrust Endpoint Privilege Management
Keeper Enterprise Password Manager
BeyondTrust Privileged Remote Access
LastPass Business
Buyer's Guide
Download our free CyberArk Privileged Access Manager Report and get advice and tips from experienced pros
sharing their opinions.
Quick Links
Learn More: Questions:
- CyberArk vs. ManageEngine Password Manager Pro
- Which PAM tool do you prefer: CyberArk Privileged Access Manager, One Identity Safeguard, Delinea Secret Server, or BeyondTrust Privileged Remote A
- How does Sailpoint IdentityIQ compare with CyberArk PAM?
- What is the difference between Privileged Users and Privileged Accounts
- When evaluating Privileged Identity Management, what aspect do you think is the most important to look for?
- How was the 2020 Twitter Hack carried out? Could it have been prevented?
- Which is the best Privileged Account Management solution?
- What are the top 5 PAM solutions that can be implemented which cover both hybrid and cloud?
- What are the top 5 PAM solutions?
- Which PAM tool do you prefer: CyberArk Privileged Access Manager, One Identity Safeguard, Delinea Secret Server, or BeyondTrust Privileged Remote A



















