Our primary use case for this solution is privileged threat management and session management.
Lead Consultant at a tech services company with 10,001+ employees
I like the PTA (Privileged Threat Analytics) of this solution.
Pros and Cons
- "I really like the PTA (Privileged Threat Analytics). I find this the best feature."
- "If we could have some kind of out-of-the box feature that you can simply say "no" so they don't have to go into a development mode, that would a really helpful feature."
- "Tech support staff can be more proactive."
What is our primary use case?
How has it helped my organization?
I have an affinity towards CyberArk. I find that it works out-of-the-box, as a product.
What is most valuable?
I really like the PTA (Privileged Threat Analytics). I find this the best feature.
What needs improvement?
From what I see, like the out of the box password management features, or you can pay the tax forms, which I will write log, can become extensive. For example, we have right now 45 to 50 platforms to tell that were out of the box, like Cyber Optics 200 out of the box connectors, so if we can just put those also into out of the box so that the pros do not have to retell everything to what they think the comp manager of Cyber Optics representative. Apart from that, if we could have some kind of out-of-the box feature that you can simply say "no" so they don't have to go into a development mode, that would a really helpful feature.
Buyer's Guide
CyberArk Privileged Access Manager
May 2025

Learn what your peers think about CyberArk Privileged Access Manager. Get advice and tips from experienced pros sharing their opinions. Updated: May 2025.
851,823 professionals have used our research since 2012.
For how long have I used the solution?
More than five years.
What do I think about the stability of the solution?
I would not say there is a stability issue. There are quite a few bugs, which I have discovered in versions 10.1 and 10.2, but I believe that was rectified out of scalability.
What do I think about the scalability of the solution?
I have no scalability issues at the present time.
How are customer service and support?
I believe the tech support staff can be more proactive. Right now, I have booked a ticket with tech support for an issue, and I have labeled the ticket "moderate priority." The response from tech support was at best, an answer within three to four days. I believe that is too much time, and can be shortened.
How was the initial setup?
It's straightforward, I mean probably who for 11 years of experience is quite straightforward, but maybe for a newbie, it could be complex.
What's my experience with pricing, setup cost, and licensing?
I do not have any opinions to add about the pricing.
What other advice do I have?
I think if the industry could work together on TSM connectors, this would be a cutting-age change.
Disclosure: My company has a business relationship with this vendor other than being a customer: I am a reseller.

Procurement Manager at OTE Group
A robust solution that provides good security support
Pros and Cons
- "The solution helps our developers access internal systems. It also helps us in Privilege Access Management."
- "The tool’s pricing and scalability can be better."
What is our primary use case?
The solution helps our developers access internal systems. It also helps us in Privilege Access Management.
What needs improvement?
The tool’s pricing and scalability can be better.
For how long have I used the solution?
I have been using the solution for five years.
What do I think about the stability of the solution?
I would rate the tool’s stability a ten out of ten. It is stable.
What do I think about the scalability of the solution?
I would rate the tool’s scalability an eight out of ten. The tool is scalable.
How was the initial setup?
I would rate the tool’s setup a nine out of ten. The solution’s setup is easy. We have a good internal implementation team who completed the deployment in a few days. About five to six engineers worked on the tool’s deployment.
What about the implementation team?
We have an internal integrator for the tool.
What was our ROI?
We have seen ROI with the tool’s use.
What's my experience with pricing, setup cost, and licensing?
I would rate the tool’s pricing a six out of ten.
What other advice do I have?
The tool is robust and our IT team is happy with it. It provides you with strong security.
Which deployment model are you using for this solution?
On-premises
Disclosure: My company has a business relationship with this vendor other than being a customer: Reseller
Buyer's Guide
CyberArk Privileged Access Manager
May 2025

Learn what your peers think about CyberArk Privileged Access Manager. Get advice and tips from experienced pros sharing their opinions. Updated: May 2025.
851,823 professionals have used our research since 2012.
Senior Manager Cybersecurity at LTI - Larsen & Toubro Infotech
Beneficial secure server assess, useful user log access, and good support
Pros and Cons
- "CyberArk Privileged Access Manager's main benefit is it provides secure access to our servers. There are features to capture the user activity, it provides video recording processing. If the users are logged in to the server, we can see what activities they are performing. It's a very nice tool for Privileged Access Management. They have plenty of useful services and the solution has fulfilled our needs."
- "The solution could improve by adding more connectors."
What is our primary use case?
I am using CyberArk Privileged Access Manager to protect our servers. It can be either a Windows or Linux Server. Additionally, we have some network devices, and databases, such as Oracle and MySQL Server being protected.
How has it helped my organization?
It's improved our organization a lot. It has fulfilled some guidelines from the Indian government. There is some Indian government guideline for anonymity and access management. Similarly, there are guidelines for GDPR, and where we have vendor's control. CyberArk Privileged Access Manager has helped us to meet all the requirements.
What is most valuable?
CyberArk Privileged Access Manager's main benefit is it provides secure access to our servers. There are features to capture the user activity, it provides video recording processing. If the users are logged in to the server, we can see what activities they are performing. It's a very nice tool for Privileged Access Management. They have plenty of useful services and the solution has fulfilled our needs.
What needs improvement?
The solution could improve by adding more connectors.
For how long have I used the solution?
I have been using CyberArk Privileged Access Manager for two and a half years.
What do I think about the stability of the solution?
CyberArk Privileged Access Manager is a stable and reliable solution.
What do I think about the scalability of the solution?
We have approximately 200 people using this solution.
How are customer service and support?
The support team from CyberArk Privileged Access Manager is very good.
Which solution did I use previously and why did I switch?
I have not used other solutions.
How was the initial setup?
CyberArk Privileged Access Manager's initial setup is straightforward. However, it can depend on many factors, such as architecture.
What about the implementation team?
I used a partner for the implementation of the CyberArk Privileged Access Manager.
The number of people required for the implementation of CyberArk Privileged Access Manager depends on the number of applications. However, for my team, we have two to four people who were involved in the development of our architecture.
What was our ROI?
From a technology perspective, CyberArk Privileged Access Manager has helped us to improve our services. It helped us to meet our requirements or guidelines. Whether it's audit perspective, internal, or external, whatever the guideline is, it meets our needs. If there are any independent agencies that need to be involved we meet those requirements.
What's my experience with pricing, setup cost, and licensing?
The price of CyberArk Privileged Access Manager is expensive. There are no other fees other than the standard licensing fees.
Which other solutions did I evaluate?
As part of our company's policies, we have to evaluate other solutions.
What other advice do I have?
I would advise others that requirements should be discussed properly with all the stakeholders to understand their expectations. Additionally, it is important to explore our tool limitations. We should more focus on solution designing.
I rate CyberArk Privileged Access Manager a nine out of ten.
Which deployment model are you using for this solution?
On-premises
Disclosure: I am a real user, and this review is based on my own experience and opinions.
Works at a pharma/biotech company with 5,001-10,000 employees
Passwords are given out on a case by case basis so users don't need to worry about password sharing
Pros and Cons
- "Thus far I can say technical support is excellent. We haven't had any issues or difficulties."
- "To get it to a ten it should give other possibilities to select if you could follow the keystrokes. It should have a flexibility with things where people can use it a lot faster."
What is our primary use case?
Our primary use case of this solution is for elevated access.
How has it helped my organization?
The primary improvement to my organization is the fact that now the users are aware that: one, the work that they do will be recorded and so there will be an audit trail of what has happened; and then, two, we don't have to worry about people sharing passwords because they are given out on a case by case basis.
What is most valuable?
- Session recording
- Password rotation
What needs improvement?
Some folks would like to have keystroke tracking and some would not. I guess if they could make that an option that might be interesting for certain organizations.
For how long have I used the solution?
One to three years.
What do I think about the scalability of the solution?
Scalability and stability are both excellent. We have around 250 users. All individuals with privilege to elevated access will be required to use this after a certain amount of time.
How are customer service and technical support?
Thus far technical support is excellent. We haven't had any issues or difficulties.
How was the initial setup?
The initial setup was pretty straightforward. Deployment took approximately six months. For the deployment, there was a group of about five to six individuals. For sustainment, we just have gotten into a training mode and we will have our support team giving them assistance.
What other advice do I have?
I would rate this solution a 9.5 out of ten. To get it to a ten it should give other possibilities to select if you could follow the keystrokes. It should have a flexibility with things in which people can use it a lot faster.
Disclosure: I am a real user, and this review is based on my own experience and opinions.
Third-party teams are able to connect to the end-points in a secure and isolated manner without needing to know any end-point credentials
What is our primary use case?
The main usage of our implementation is to limit the credentials exposure to our third-party teams. They are able to connect to the end-points in a secure and isolated manner without needing to know any end-point credentials.
How has it helped my organization?
Our third-party teams are able to connect to the end-points in a secure and isolated manner without needing to know any end-point credentials. Besides this, end-points themselves are back in control when the passwords are managed by the CPM.
What is most valuable?
The two main features are the CPM and the PSM. This is to make sure that the credentials are managed in a controlled manner and the sessions that are launched are set up in an isolated way.
What needs improvement?
We are aware that in 10.6, the "just in time" access has been created. I would like to see this developed further.
For how long have I used the solution?
One to three years.
What do I think about the stability of the solution?
The vault is almost a set-and-forget solution. Once the vault has been installed and configured, not much needs to be done in there apart from the occasional upgrade.
What do I think about the scalability of the solution?
The environment is very easy to scale out. Especially running the CPM and PSM components in a load balanced virtual environment gives you the flexibility to quickly expand the environment.
How are customer service and technical support?
This has been excellent for me. They always replied quickly, and most of the time the issue was resolved. The only downside — as soon as a ticket goes to the R&D engineers, you will have to wait a bit.
Which solution did I use previously and why did I switch?
We did not use a PAM product before this.
How was the initial setup?
The initial setup (for a UAT environment) was straightforward. During the planning of the PROD environment, it became a little more tricky with different network segments and method for accessing the environment itself.
What about the implementation team?
We had a combination of in-house (with training), vendor (CyberArk) and third-party vendor. The third-party vendor Computacenter helped us with creating some design and documentation. I would not recommend this third-party to other people as they did not fully work with us and listen to our requirements.
What was our ROI?
We are still rolling out in our environment which makes the ROI difficult to calculate.
What's my experience with pricing, setup cost, and licensing?
Make sure to use the latest licensing model as that will give you most of the "cool" features to work with.
What other advice do I have?
One of the most important aspects is to ensure that the business is behind the solution. CyberArk suite will only work well if all users adopt the system.
Disclosure: I am a real user, and this review is based on my own experience and opinions.
Senior Associate at a consultancy with 10,001+ employees
The most valuable feature is that it always provides flexibility, password quality and one-time user check-in and check-out.
Pros and Cons
- "The most valuable feature is that it always provides flexibility, password quality and one-time user check-in and check-out."
- "There was a functionality of the solution that was missing. I had noticed it in Beyond Trust, but not in this solution. But, recently they have incorporated something similar."
What is our primary use case?
My primary use case for this solution is to prevent privileged access, privilege accounts, and to mark all of those for future ordering proposals. It is to limit their access.
What is most valuable?
The most valuable feature is that it always provides flexibility, password quality and one-time user check-in and check-out. It also provides flexibility and a comprehensive reporting. In terms of reporting, it can pull up to three types of reports and you can do some Excel work on those. Then, you will be able to find information that you were looking for. It is is the reporting by-laws, as well. Apart from this, it also has a lot of advanced components. It can extend the picture at the end of the productive scope.
What needs improvement?
There was a functionality of the solution that was missing. I had noticed it in BeyondTrust, but not in this solution. But, recently they have incorporated something similar.
For how long have I used the solution?
One to three years.
What do I think about the stability of the solution?
It is a stable solution for our needs.
What do I think about the scalability of the solution?
The scalability provided by this solution is a lot better than some of the other available products on the market.
How is customer service and technical support?
The technical support has been tremendous. They try to resolve the issue as soon as possible, but sometimes I would expect them to engage an L3 level of support at the very first moment, as for priority, but they take a bit longer.
How was the initial setup?
Sometimes, when we install their product, the BFN (Bridge to Future Networks) to the component manager, we have issues. When we install this component in high ability mode, and the load balancer, then sometimes that creates different problems. Sometimes, to find the issue we actually, even if one of the component goes down, get notifications easily. That is not an issue, but to rectify the issue, sometimes it takes longer than I would like, you know. When it goes for a higher ability mode for the component then it makes our work a little a cumbersome.
What's my experience with pricing, setup cost, and licensing?
This solution is considered to be more expensive than others out there on the market today.
Which other solutions did I evaluate?
I have previous experience with BeyondTrust. And, there are other products, such as Lieberman and Arcos, which are being used in the Indian market because of its cost effectiveness.
What other advice do I have?
CyberArk has vast trust across the globe. People who've used CyberArk usually don't go back and change the product, unless it is a cost issue. If it is a cost issue, I must suggest BeyondTrust as a cost-effective solution for similar services.
Disclosure: I am a real user, and this review is based on my own experience and opinions.
Senior Consultant at a tech services company with 5,001-10,000 employees
Allows secure, logged access to highly sensitive servers and services
Pros and Cons
- "Allows secure, logged access to highly sensitive servers and services."
- "It's hard to find competent resellers/support."
- "Initial setup is complex. Lots of architecture, lots of planning, and lots of education and training are needed."
- "it manages creds based on Organizational Units. That is, a "safe" is limited to specific OUs. That makes for very elaborate OU structure, or you risk exposing too many devices by putting most of them in fewer OUs."
How has it helped my organization?
It has made things more complex, but has eliminated the possibility of Pass The Hash.
What is most valuable?
Allows secure, logged access to highly sensitive servers and services.
What needs improvement?
Perhaps by design, but it manages creds based on Organizational Units. That is, a "safe" is limited to specific OUs. That makes for very elaborate OU structure, or you risk exposing too many devices by putting most of them in fewer OUs.
For how long have I used the solution?
Three to five years.
What do I think about the stability of the solution?
No scalability issues.
What do I think about the scalability of the solution?
Yes. The OU limitations, noted above.
How is customer service and technical support?
It's hard to find competent resellers/support.
How was the initial setup?
Complex. Lots of architecture, lots of planning, and lots of education and training are needed. Technically, roll-out isn’t bad. It’s the support, training, education, philosophy, and integration within existing ways of doing things that are challenging.
What other advice do I have?
I’m a consultant. I help implement and train others on how to use it in a highly secure environment.
I’d give it a nine out of 10. It is very, very secure.
Plan for major culture change, especially in non-progressive shops. This is a necessary evil to endure for the sake of real security.
Disclosure: I am a real user, and this review is based on my own experience and opinions.
Cyber Security Manager at a hospitality company with 10,001+ employees
Improved our processes in terms of efficiency when it comes to creating accounts
Pros and Cons
- "CyberArk has been easy for us to implement and the adoption has been good. We've been able to standardize a bunch of things. We've been able to standardize relatively easily with the use of the platforms and managing the policies."
- "There is a bit of a learning curve, but it's a pretty complex solution."
What is our primary use case?
So far, CyberArk has done everything that we've needed it to. We are growing and moving into the cloud. We have a pretty complex environment. Everything that we've needed it to do in terms of managing our privileged accounts, it has done.
How has it helped my organization?
We have been able to really transform how all of our sysadmins manage all our infrastructure. Before, it was like the Wild West. Everybody was way over privileged and had access to everything all the time. Now, we finally have everybody into least privileged and auditing through PSM, which has been fantastic. We also have implemented dual control and just-in-time. So, it's moved the ability to manage a lot of our privileged users to where we need them to be.
CyberArk has been easy for us to implement and the adoption has been good. We've been able to standardize a bunch of things. We've been able to standardize relatively easily with the use of the platforms and managing the policies.
What is most valuable?
I like how thorough and complex it is. We have a solution, and it meets the needs that we need.
The most recent improvement with the user interface upgrade was really nice. It makes the end users very happy. It is way more intuitive. The information that they need to have is now available to them. So, I appreciate that as an update.
What needs improvement?
The user interface was a previous problem that has been overcome.
What do I think about the stability of the solution?
We have implemented our own redundancy into the product. That has worked for us very well.
What do I think about the scalability of the solution?
We have been able to find a nice process for implementing CyberArk in terms of user adoption and onboarding. It's been pretty slick, and it works very well for us.
Which solution did I use previously and why did I switch?
We were lucky to have a board of directors who really embraced security. With their support, we were able to establish the need for a PAM solution.
How was the initial setup?
When we originally implemented CyberArk, we did so incorrectly. With the help of CyberArk Professional Services, we were able to reorganize, reinstall, and upgrade within a week, then apply best practices to the implementation of CyberArk. So, I would say that it took us about a week to get setup correctly.
At first, the integration of CyberArk into our IT environment was a bit rough. People didn't want to give up the rights and privileges that they had. But, we were able to show them how easy it was for them. We even layered in multi-factor authentication to access the accounts that they needed, which were privileges for appropriate functions. Once we were able to show them how they could quickly and smoothly get the access that they needed, it was not a bad thing, as they found out.
What was our ROI?
The return of investment for the CyberArk implementation within our organization has come from the reduction of risk. That is a little tricky to quantify, but it's definitely there.
We have improved our processes in terms of efficiency when it comes to creating accounts, managing the privileged ones and providing the correct access at the right time.
Which other solutions did I evaluate?
After evaluating several vendors, we found that CyberArk met our needs.
What other advice do I have?
I would rate CyberArk an eight point five on a scale of one to 10 because it has done everything that we have asked of it. There is a bit of a learning curve, but it's a pretty complex solution. They do have ways to make it easier, but it's easy to fall down the rabbit hole when you're going into a deep dive. However, if you follow the trail, you will find some pretty cool stuff.
Disclosure: PeerSpot contacted the reviewer to collect the review and to validate authenticity. The reviewer was referred by the vendor, but the review is not subject to editing or approval by the vendor.

Buyer's Guide
Download our free CyberArk Privileged Access Manager Report and get advice and tips from experienced pros
sharing their opinions.
Updated: May 2025
Product Categories
Privileged Access Management (PAM) User Activity Monitoring Enterprise Password Managers Mainframe Security Operational Technology (OT) SecurityPopular Comparisons
Azure Key Vault
AWS Secrets Manager
Okta Workforce Identity
HashiCorp Vault
Delinea Secret Server
CyberArk Endpoint Privilege Manager
BeyondTrust Endpoint Privilege Management
WALLIX Bastion
CyberArk Identity
One Identity Safeguard
BeyondTrust Privileged Remote Access
BeyondTrust Password Safe
Buyer's Guide
Download our free CyberArk Privileged Access Manager Report and get advice and tips from experienced pros
sharing their opinions.
Quick Links
Learn More: Questions:
- CyberArk vs. ManageEngine Password Manager Pro
- How does Sailpoint IdentityIQ compare with CyberArk PAM?
- Which PAM tool do you prefer: CyberArk Privileged Access Manager, One Identity Safeguard, Delinea Secret Server, or BeyondTrust Privileged Remote A
- What is the difference between Privileged Users and Privileged Accounts
- When evaluating Privileged Identity Management, what aspect do you think is the most important to look for?
- How was the 2020 Twitter Hack carried out? How could it have been prevented?
- Which is the best Privileged Account Management solution?
- What are the top 5 PAM solutions that can be implemented which cover both hybrid and cloud?
- What are the top 5 PAM solutions?
- How will AI and ML help or work with PIM/PAM?