The primary use case is to monitor the official activity of a privileged user for privilege violations.
Information Security Analyst at a financial services firm with 1,001-5,000 employees
User-friendly GUI but more expensive than most competitors
Pros and Cons
- "CyberArk's GUI is user friendly."
- "Password Vault is much pricier than other solutions. A vendor team might struggle to explain why that price is justified. There are good alternatives that cost less."
What is our primary use case?
What is most valuable?
CyberArk's GUI is user friendly.
For how long have I used the solution?
I have been using CyberArk for only six months.
What do I think about the stability of the solution?
Password Vault is a reasonably stable solution.
Buyer's Guide
CyberArk Privileged Access Manager
August 2025

Learn what your peers think about CyberArk Privileged Access Manager. Get advice and tips from experienced pros sharing their opinions. Updated: August 2025.
865,295 professionals have used our research since 2012.
What do I think about the scalability of the solution?
I've only used it for a few months, so it's hard for me to say how scalable Password Vault is. Those who've used it longer and deployed it on more endpoints could answer that question better.
How are customer service and support?
We're served by CyberArk's regional support based in India and Singapore, but I want country-level support in Bangladesh, so I can get help quickly. Also, online support is annoying. I would like to get face-to-face support from a local CyberArk representative.
How was the initial setup?
Setting up Password Vault is not easy. We needed an online consultant to help us.
What's my experience with pricing, setup cost, and licensing?
Password Vault is much pricier than other solutions. A vendor team might struggle to explain why that price is justified. There are good alternatives that cost less.
What other advice do I have?
I rate CyberArk Enterprise Password Vault seven out of 10
Which deployment model are you using for this solution?
On-premises
Disclosure: My company does not have a business relationship with this vendor other than being a customer.

Senior Security Manager at SMU
Reliable, scalable, and easy to install but the pricing could be better as it's expensive
Pros and Cons
- "Its' quite stable."
- "They need to provide better training for the System Integrator."
What is our primary use case?
We use this solution for ID purposes. When we remove a user from the server, we need a privileged ID password.
We are a University. It's a large organization.
What is most valuable?
It's not very different when compared with other products.
What needs improvement?
From what I can see, the Systems Integrator is useless. When I ask for the information, nothing is given to me. They need to provide better training for the System Integrator.
For how long have I used the solution?
I have been working with this solution for two years.
What do I think about the stability of the solution?
Its' quite stable.
What do I think about the scalability of the solution?
It's a scalable solution but could be improved. On a scale of one to five, I would rate it a four.
How are customer service and technical support?
I have not used technical support.
How was the initial setup?
The initial setup is pretty easy. It is not complex.
What about the implementation team?
We used a reseller, integrators, but they were useless to me.
What's my experience with pricing, setup cost, and licensing?
Pricing is quite high and it could be improved.
What other advice do I have?
I would rate CyberArk Privileged Access Security a six out of ten.
Which deployment model are you using for this solution?
On-premises
Disclosure: My company does not have a business relationship with this vendor other than being a customer.
Buyer's Guide
CyberArk Privileged Access Manager
August 2025

Learn what your peers think about CyberArk Privileged Access Manager. Get advice and tips from experienced pros sharing their opinions. Updated: August 2025.
865,295 professionals have used our research since 2012.
CDO & Co-Founder at ELYTIK
Complete package, thorough threat detection, but expensive
Pros and Cons
- "This is a complete solution that can detect cyber attacks well."
What is most valuable?
This is a complete solution that can detect cyber attacks well. I have found the proxy features most valuable for fast password web access.
For how long have I used the solution?
I use the solution for security. I make sure the bulk of the password of the certificate for the cloud and on-premise applications are good. I action and administer them when needed.
What do I think about the stability of the solution?
The solution is stable, it is very resilient.
What do I think about the scalability of the solution?
I have found the solution to be scalable.
How was the initial setup?
The installation is not difficult for me because all the information is on the website.
What's my experience with pricing, setup cost, and licensing?
The solution is very expensive and requires a license. We pay for an enterprise license.
What other advice do I have?
This is a complete package that has a lot of the capabilities you would want in this type of solution but it is very expensive.
I rate CyberArk PAS a seven out of ten.
Which deployment model are you using for this solution?
On-premises
Disclosure: My company does not have a business relationship with this vendor other than being a customer.
Presales Engineer at a tech services company with 51-200 employees
Local tech support is very helpful
Pros and Cons
- "The technical support for this solution is very good. If I was to rate it on a scale of one to five, I would give it a five."
- "The product could be easier to use. More work needs to be done on this aspect; it is not good enough yet. It also takes up a lot of server space. Sometimes we need to use up to seven servers."
What is our primary use case?
Our primary use case for this solution is business and client management. Our clients are mostly from the banking sector.
What is most valuable?
The CyberArk solutions that have been the most valuable for my solution are the Discovery & Audit (DNA) and Privileged Threat Analytics (PTA) tools. CyberArk is a very important tool for my organization.
The setup was very easy for me.
What needs improvement?
The product could be easier to use. More work needs to be done on this aspect; it is not good enough yet. It also takes up a lot of server space. Sometimes we need to use up to seven servers.
For how long have I used the solution?
I have been using the solution for about a year. My company resells and implements this solution.
What do I think about the stability of the solution?
I think this solution has a lot of stability.
How are customer service and technical support?
The technical support for this solution is very good. If I was to rate it on a scale of one to five, I would give it a five.
How was the initial setup?
The initial setup was straightforward. It can be carried out by a single person.
Which other solutions did I evaluate?
The great thing about this solution is that they offer tech support in my language.
What other advice do I have?
I recommend this product.
Disclosure: My company has a business relationship with this vendor other than being a customer. Reseller
Director - Enterprise Security, Fraud and Supplier Risk Management at a financial services firm with 1,001-5,000 employees
Secure and functionally complete
Pros and Cons
- "I haven't really thought about anything that I want to use it for, that I couldn't use it for."
- "I would like to see more integration with more tools, for more APIs."
What is our primary use case?
I used CyberArk for vaulting passwords.
What is most valuable?
I haven't really thought about anything that I want to use it for, that I couldn't use it for.
What needs improvement?
I would like to see more integration with more tools, for more APIs.
For how long have I used the solution?
I have used this solution in the last 12 months.
How was the initial setup?
The initial setup was not overly complex but it wasn't straightforward.
Once it was prepared properly, it was okay.
What other advice do I have?
I would rate CyberArk Enterprise Password Vault an eight out of ten.
Disclosure: My company does not have a business relationship with this vendor other than being a customer.
Product Manager at a tech services company with 11-50 employees
Priced well with good support, stable, and scalable
Pros and Cons
- "The most valuable feature is Special Monitoring."
- "The authentication port is available in CyberArk Alero but not Fortinet products."
What is our primary use case?
I am a consultant. We are in the process of using this in our clients' companies.
What is most valuable?
The most valuable feature is Special Monitoring.
What needs improvement?
The authentication port is available in CyberArk Alero but not Fortinet products.
For how long have I used the solution?
I have been working with CyberArk PAS for one year.
What do I think about the stability of the solution?
CyberArk is stable.
What do I think about the scalability of the solution?
It's a scalable solution.
How are customer service and technical support?
I have limited experience with technical support, but our customers like the support.
In general, it appears to be fine.
Which solution did I use previously and why did I switch?
I have also worked with Thycotic, until the completion of the project.
How was the initial setup?
The initial setup is straightforward.
What's my experience with pricing, setup cost, and licensing?
It is best suited for mid to large-size enterprises. It is not the best for smaller companies, largely because of the price.
I believe that this solution is priced well. It's the market leader and I think that it's the best solution.
The price is quite good for us.
What other advice do I have?
For those who are interested in using this product, you have to know your requirements and compare them with CyberArk to see if it is suitable for them and fits their budget.
I would rate this solution a nine out of ten.
Disclosure: My company has a business relationship with this vendor other than being a customer. reseller
Junior Product Consultant at a tech services company with 501-1,000 employees
Good technical support with helpful third party vendors and good at recording actions
Pros and Cons
- "The technical support is good."
- "We found a lot of errors during the initial setup. They should work to improve the implementation experience and to remove errors from the process."
What is our primary use case?
I primarily use the solution to record any actions taken on specific important targets. It allows management to look at actions and play them back to see what was done within the environment.
What is most valuable?
The technical support is good.
It's pretty good at recording actions taken within an environment.
What needs improvement?
We found a lot of errors during the initial setup. They should work to improve the implementation experience and to remove errors from the process.
The solution could be more stable.
It should have more specific configurations. There are lots of types of servers and devices. The product should have a more detailed, specific configuration and integration with other products.
For how long have I used the solution?
I've been using the solution for about three months at this point.
What do I think about the stability of the solution?
This was my first experience in the solution's UI and UX user experience and user interface. I didn't find the solution to be very stable at all.
What do I think about the scalability of the solution?
We do plan to continue to use the solution, however, it's unclear as to if we will scale it further.
How are customer service and technical support?
We're pretty satisfied with technical support. They are helpful. I find them knowledgable and responsive and I've been happy with the level of service we've been given thus far.
How was the initial setup?
We found the initial setup quite difficult. There were a lot of errors and we found the process to be a bit complex. I wouldn't describe the implementation as straightforward.
In total, the deployment took about one week from beginning to end.
What about the implementation team?
We did not handle the entire implementation ourselves. We had assistance from an outside firm. They were helpful.
What other advice do I have?
We're just users of the solution. We're customers. We aren't resellers or consultants. We don't have a business relationship with the solution.
I'm using the latest version of the solution.
I'd recommend the product to others.
Overall, we've been mostly happy with the solution. I'd rate it at an eight out of ten so far.
Which deployment model are you using for this solution?
Public Cloud
Disclosure: My company does not have a business relationship with this vendor other than being a customer.
Director at a tech services company with 11-50 employees
Every aspect of the solution is very well integrated and it is fail-safe
Pros and Cons
- "Every aspect of the solution is very well integrated, and even that gives comfort. It is a fail-safe kind of environment."
- "Having a cloud version would be very helpful. You have to invest a lot of money for the infrastructure hardware so the cloud version would help."
What is our primary use case?
There are threats that get opened because of the vulnerability of privileged access that says to directly put it in a vault.
What is most valuable?
Every aspect of the solution is very well integrated, and that gives comfort. It is a fail-safe kind of environment. I think that's the fail-safe feature makes customers comfortable because there are no non-integrable stuff or cures. For example, a vault would have its own anti-virus, its own application, its own operating system to stay hardened. It is absolutely hardened for it to be protected from the outside world.
What needs improvement?
Having a cloud version would be very helpful. You have to invest a lot of money for the infrastructure hardware so the cloud version would help.
For how long have I used the solution?
My organization has been using this solution for a few years but I joined the company three months back.
What do I think about the stability of the solution?
It is very stable.
What do I think about the scalability of the solution?
Our clients are large enterprises. It is easy to scale.
How are customer service and technical support?
Our customers contact us for any technical support, but we are able to sort out customer issues to a very large extent. We only had to connect with CyberArk at L-3 level or L-4 level. We are able to address most of our customer's issues.
I would rate their support a nine out of ten.
Which solution did I use previously and why did I switch?
We have had customers use a competitive product that CyberArk has replaced but it is not very common. It is not very easy to change your Privileged Access Management framework so easily.
CyberArk is fail-safe, it has a threat intelligence filter, and prevention threat attacks. That sets the product apart from others, and I think the other part is their ability to onboard a maximum number of resources like storage network, security, IoT devices, and RPAs. Its ability to pervasively onboard almost all critical privileges and resources across the organization is where it stands out in a really big way.
How was the initial setup?
I didn't implement it. I don't believe we've had any problems implementing it. I've never heard any issues. I'd say it's neutral.
What's my experience with pricing, setup cost, and licensing?
There are costs in addition to the standard licensing. There is an implementation fee. Those are additional fees and the customer has the annual maintenance, the software, and whole maintenance cost added to that. So there are additional costs besides this standard license.
What other advice do I have?
The most important phase is the discovery phase. Pay the most attention to that. Spend the most amount of time on the discovery phase, which is really the startup planning. The project becomes smoother. Book stricter guidelines on timelines and let there be a senior sponsor part of the project so that you are able to get milestones addressed quickly otherwise, these projects tend to drag longer.
In the next release, I would like to have the cloud option and all of the features that come with it.
I would rate CyberArk a nine out of ten.
Which deployment model are you using for this solution?
On-premises
Disclosure: My company has a business relationship with this vendor other than being a customer. Reseller.

Buyer's Guide
Download our free CyberArk Privileged Access Manager Report and get advice and tips from experienced pros
sharing their opinions.
Updated: August 2025
Product Categories
Privileged Access Management (PAM) User Activity Monitoring Enterprise Password Managers Mainframe Security Operational Technology (OT) SecurityPopular Comparisons
Azure Key Vault
AWS Secrets Manager
Okta Workforce Identity
HashiCorp Vault
Delinea Secret Server
CyberArk Endpoint Privilege Manager
BeyondTrust Endpoint Privilege Management
CyberArk Identity
WALLIX Bastion
One Identity Safeguard
Keeper Enterprise Password Manager
BeyondTrust Privileged Remote Access
Buyer's Guide
Download our free CyberArk Privileged Access Manager Report and get advice and tips from experienced pros
sharing their opinions.
Quick Links
Learn More: Questions:
- CyberArk vs. ManageEngine Password Manager Pro
- How does Sailpoint IdentityIQ compare with CyberArk PAM?
- Which PAM tool do you prefer: CyberArk Privileged Access Manager, One Identity Safeguard, Delinea Secret Server, or BeyondTrust Privileged Remote A
- What is the difference between Privileged Users and Privileged Accounts
- When evaluating Privileged Identity Management, what aspect do you think is the most important to look for?
- How was the 2020 Twitter Hack carried out? Could it have been prevented?
- Which is the best Privileged Account Management solution?
- What are the top 5 PAM solutions that can be implemented which cover both hybrid and cloud?
- What are the top 5 PAM solutions?
- How will AI and ML help or work with PIM/PAM?