Try our new research platform with insights from 80,000+ expert users
reviewer1426374 - PeerSpot reviewer
Director - Enterprise Security, Fraud and Supplier Risk Management at a financial services firm with 1,001-5,000 employees
Real User
Feb 28, 2021
Secure and functionally complete
Pros and Cons
  • "I haven't really thought about anything that I want to use it for, that I couldn't use it for."
  • "I would like to see more integration with more tools, for more APIs."

What is our primary use case?

I used CyberArk for vaulting passwords.

What is most valuable?

I haven't really thought about anything that I want to use it for, that I couldn't use it for.

What needs improvement?

I would like to see more integration with more tools, for more APIs. 

For how long have I used the solution?

I have used this solution in the last 12 months.

Buyer's Guide
CyberArk Privileged Access Manager
January 2026
Learn what your peers think about CyberArk Privileged Access Manager. Get advice and tips from experienced pros sharing their opinions. Updated: January 2026.
881,114 professionals have used our research since 2012.

How was the initial setup?

The initial setup was not overly complex but it wasn't straightforward.

Once it was prepared properly, it was okay.

What other advice do I have?

I would rate CyberArk Enterprise Password Vault an eight out of ten.

Disclosure: My company does not have a business relationship with this vendor other than being a customer.
PeerSpot user
Product Manager at a tech services company with 11-50 employees
Reseller
Feb 7, 2021
Priced well with good support, stable, and scalable
Pros and Cons
  • "The most valuable feature is Special Monitoring."
  • "The authentication port is available in CyberArk Alero but not Fortinet products."

What is our primary use case?

I am a consultant. We are in the process of using this in our clients' companies.

What is most valuable?

The most valuable feature is Special Monitoring.

What needs improvement?

The authentication port is available in CyberArk Alero but not Fortinet products.

For how long have I used the solution?

I have been working with CyberArk PAS for one year.

What do I think about the stability of the solution?

CyberArk is stable.

What do I think about the scalability of the solution?

It's a scalable solution. 

How are customer service and technical support?

I have limited experience with technical support, but our customers like the support.

In general, it appears to be fine.

Which solution did I use previously and why did I switch?

I have also worked with Thycotic, until the completion of the project.

How was the initial setup?

The initial setup is straightforward.

What's my experience with pricing, setup cost, and licensing?

It is best suited for mid to large-size enterprises. It is not the best for smaller companies, largely because of the price.

I believe that this solution is priced well. It's the market leader and I think that it's the best solution.

The price is quite good for us.

What other advice do I have?

For those who are interested in using this product, you have to know your requirements and compare them with CyberArk to see if it is suitable for them and fits their budget.

I would rate this solution a nine out of ten.

Disclosure: My company has a business relationship with this vendor other than being a customer. reseller
PeerSpot user
Buyer's Guide
CyberArk Privileged Access Manager
January 2026
Learn what your peers think about CyberArk Privileged Access Manager. Get advice and tips from experienced pros sharing their opinions. Updated: January 2026.
881,114 professionals have used our research since 2012.
it_user1386480 - PeerSpot reviewer
Junior Product Consultant at a tech services company with 501-1,000 employees
Real User
Dec 9, 2020
Good technical support with helpful third party vendors and good at recording actions
Pros and Cons
  • "The technical support is good."
  • "We found a lot of errors during the initial setup. They should work to improve the implementation experience and to remove errors from the process."

What is our primary use case?

I primarily use the solution to record any actions taken on specific important targets. It allows management to look at actions and play them back to see what was done within the environment.

What is most valuable?

The technical support is good.

It's pretty good at recording actions taken within an environment.

What needs improvement?

We found a lot of errors during the initial setup. They should work to improve the implementation experience and to remove errors from the process.

The solution could be more stable. 

 It should have more specific configurations. There are lots of types of servers and devices. The product should have a more detailed, specific configuration and integration with other products.

For how long have I used the solution?

I've been using the solution for about three months at this point.

What do I think about the stability of the solution?

This was my first experience in the solution's UI and UX user experience and user interface. I didn't find the solution to be very stable at all.

What do I think about the scalability of the solution?

We do plan to continue to use the solution, however, it's unclear as to if we will scale it further.

How are customer service and technical support?

We're pretty satisfied with technical support. They are helpful. I find them knowledgable and responsive and I've been happy with the level of service we've been given thus far.

How was the initial setup?

We found the initial setup quite difficult. There were a lot of errors and we found the process to be a bit complex. I wouldn't describe the implementation as straightforward.

In total, the deployment took about one week from beginning to end.

What about the implementation team?

We did not handle the entire implementation ourselves. We had assistance from an outside firm. They were helpful.

What other advice do I have?

We're just users of the solution. We're customers. We aren't resellers or consultants. We don't have a business relationship with the solution.

I'm using the latest version of the solution.

I'd recommend the product to others.

Overall, we've been mostly happy with the solution. I'd rate it at an eight out of ten so far.

Which deployment model are you using for this solution?

Public Cloud
Disclosure: My company does not have a business relationship with this vendor other than being a customer.
PeerSpot user
reviewer1455795 - PeerSpot reviewer
Technical Lead IMSS at a computer software company with 1,001-5,000 employees
Real User
Nov 24, 2020
Create, request, access and manage privileged passwords
Pros and Cons
  • "It's highly secure and very flexible. It gives us all types of storage options and it gives us a high level of security."
  • "The only problem involves granting access to people who are authorized to view it."

What is our primary use case?

We use it for storing and rotating passwords.

Within our organization, a lot of people are using this solution for a lot of projects. We have already implemented CyberArk as a SaaS solution. We are not using the core parts, but we are using the software as a service for a project.

At my previous job, there was a team of seven people who were in charge of maintenance. Mostly analysts, senior analysts, and a technical lead used this solution. 

What is most valuable?

It completely depends on the requirement. For some of the RPA robotic types of user identity, we prefer for it to happen in an automatic way, but some of them are highly critical, so we don't do it automatically. As for the end-user experience or expectation, if they want to change it at their end, they can do it.

What needs improvement?

I don't see any problems because it's highly secure and very flexible. It gives us all types of storage options and it gives us a high level of security. From my experience, overall, I don't see many problems that need to be rectified.

The only problem involves granting access to people who are authorized to view it. This user management area is the most critical. We have to constantly check on that area and we have to review and give proper access. Nobody should have more access than they are authorized for.

For how long have I used the solution?

I have been using CyberArk Enterprise Password Vault for eight years.

What do I think about the scalability of the solution?

It's scalable at the component level. If you want to add some of the latest components, or if you want to implement biometrics or MFA, this solution can handle that — it's very easy to implement.

How are customer service and technical support?

The tech support is amazing. If you have any issues that you need help with, the CyberArk support team reaches out very quickly, depending on the criticality of the issue. If it's critical, they will reach out to you within hours.

The vendor support is really good.

How was the initial setup?

The initial setup is quite straightforward. These days they have an automatic script — It is much less time-consuming.

We used to do it manually which would take almost two to three hours in total.

What about the implementation team?

We did it in-house. I'm certified in CyberArk; I've also installed it for clients as well.

What's my experience with pricing, setup cost, and licensing?

The licensing plan is either six months or one year — it's not on a monthly basis.

Every company will have a different license fee, but ultimately, it comes down to how many users you want to manage and how many companies you want to support. If you want three CPMs, then you'll need licensing for three. It's per-company, license-based.

Which other solutions did I evaluate?

I am currently evaluating other solutions. A few of them do not support PTA. Some of them don't have DevOps properly managed. Others don't give you the DNE facility, which is free of charge with CyberArk.

What other advice do I have?

I would definitely recommend CyberArk Enterprise Password Vault.

On a scale from one to ten, I would give this solution a rating of eight.

Which deployment model are you using for this solution?

Hybrid Cloud
Disclosure: My company has a business relationship with this vendor other than being a customer. Partner
PeerSpot user
it_user1333062 - PeerSpot reviewer
Director at a tech services company with 11-50 employees
Reseller
Jul 26, 2020
Every aspect of the solution is very well integrated and it is fail-safe
Pros and Cons
  • "Every aspect of the solution is very well integrated, and even that gives comfort. It is a fail-safe kind of environment."
  • "Having a cloud version would be very helpful. You have to invest a lot of money for the infrastructure hardware so the cloud version would help."

What is our primary use case?

There are threats that get opened because of the vulnerability of privileged access that says to directly put it in a vault.

What is most valuable?

Every aspect of the solution is very well integrated, and that gives comfort. It is a fail-safe kind of environment. I think that's the fail-safe feature makes customers comfortable because there are no non-integrable stuff or cures. For example, a vault would have its own anti-virus,  its own application, its own operating system to stay hardened. It is absolutely hardened for it to be protected from the outside world.

What needs improvement?

Having a cloud version would be very helpful. You have to invest a lot of money for the infrastructure hardware so the cloud version would help.

For how long have I used the solution?

My organization has been using this solution for a few years but I joined the company three months back.

What do I think about the stability of the solution?

It is very stable.

What do I think about the scalability of the solution?

Our clients are large enterprises. It is easy to scale.

How are customer service and technical support?

Our customers contact us for any technical support, but we are able to sort out customer issues to a very large extent. We only had to connect with CyberArk at L-3 level or L-4 level. We are able to address most of our customer's issues. 

I would rate their support a nine out of ten. 

Which solution did I use previously and why did I switch?

We have had customers use a competitive product that CyberArk has replaced but it is not very common. It is not very easy to change your Privileged Access Management framework so easily.

CyberArk is fail-safe, it has a threat intelligence filter, and prevention threat attacks. That sets the product apart from others, and I think the other part is their ability to onboard a maximum number of resources like storage network, security, IoT devices, and RPAs. Its ability to pervasively onboard almost all critical privileges and resources across the organization is where it stands out in a really big way.

How was the initial setup?

I didn't implement it. I don't believe we've had any problems implementing it. I've never heard any issues. I'd say it's neutral.

What's my experience with pricing, setup cost, and licensing?

There are costs in addition to the standard licensing. There is an implementation fee. Those are additional fees and the customer has the annual maintenance, the software, and whole maintenance cost added to that. So there are additional costs besides this standard license.

What other advice do I have?

The most important phase is the discovery phase. Pay the most attention to that. Spend the most amount of time on the discovery phase, which is really the startup planning. The project becomes smoother. Book stricter guidelines on timelines and let there be a senior sponsor part of the project so that you are able to get milestones addressed quickly otherwise, these projects tend to drag longer.

In the next release, I would like to have the cloud option and all of the features that come with it. 

I would rate CyberArk a nine out of ten. 

Which deployment model are you using for this solution?

On-premises
Disclosure: My company has a business relationship with this vendor other than being a customer. Reseller.
PeerSpot user
reviewer1386330 - PeerSpot reviewer
Manager Engineering at a comms service provider with 1,001-5,000 employees
Real User
Jul 17, 2020
Superior security, simple to use, and the technical support is good
Pros and Cons
  • "The interface is very simple to use."
  • "The installation process should be easier and more user-friendly so that you don't need to hire a third party to deploy it."

What is our primary use case?

Our primary use of this solution is as a password manager.

What is most valuable?

The interface is very simple to use.

Security-wise, CyberyberArk is better than the other products.

What needs improvement?

The pricing is too expensive and should be reduced. This is our only concern. When a small industry wants to invest in these kinds of tools, they don't have the budget to spend a lot of money on security. If the price were more reasonable then many other small businesses would consider using it.

The installation process should be easier and more user-friendly so that you don't need to hire a third party to deploy it. Instead, an in-house administrator could do it.

For how long have I used the solution?

I have been using this product for the last two years.

What do I think about the stability of the solution?

Over the past two years, I hardly remember us facing any large problems. We have experienced small bugs, but they release patches to fix those.

What do I think about the scalability of the solution?

This is a scalable product. In our company, we have about 100 users, most of which are part of our DevOps team or are administrators.

How are customer service and technical support?

We are satisfied with the technical support.

Which solution did I use previously and why did I switch?

Prior to CyberArk, we were using a Microsoft product, but it didn't fulfill our entire requirement. We adopted this new solution because it met all of our needs.

How was the initial setup?

The initial setup is complex. It took two or three days to complete the deployment.

What about the implementation team?

We implemented this solution with the help of consultants who had experience with it.

What's my experience with pricing, setup cost, and licensing?

This product is very expensive.

Which other solutions did I evaluate?

I have seen demonstrations of similar products by other vendors and what I found was that the security on this solution is better.

What other advice do I have?

Overall, I feel that this is a good product and I recommend it. The only thing that people have to consider is pricing.

I would rate this solution an eight out of ten.

Which deployment model are you using for this solution?

Public Cloud

If public cloud, private cloud, or hybrid cloud, which cloud provider do you use?

Microsoft Azure
Disclosure: My company has a business relationship with this vendor other than being a customer. partner
PeerSpot user
reviewer1337610 - PeerSpot reviewer
Security Architect at a financial services firm with 10,001+ employees
Real User
Jun 27, 2020
Easy to set up and gives us the flexibility to grant access when we need it
Pros and Cons
  • "The most valuable feature is the ability to delegate access to admins when they need it."
  • "I would prefer that this is a fully-managed service, rather than have to manage the software ourselves and keep it up to date."

What is our primary use case?

This solution is used primarily for privileged segment access and break-glass access. We also use it for log-on session recording and access control, where we can grant access to our key systems for ad-hoc use.

What is most valuable?

The most valuable feature is the ability to delegate access to admins when they need it. It allows us to have some kind of proof on the approval process, rather than give people standing access on a full-time basis.

What needs improvement?

I would prefer that this is a fully-managed service, rather than have to manage the software ourselves and keep it up to date. A cloud-based deployment would ultimately be better for us than an on-premises appliance.

What do I think about the stability of the solution?

Stability has not been a problem.

What do I think about the scalability of the solution?

We didn't have any issues with scalability, although we only have 30 or 40 systems integrated. There were not tens of thousands.

How are customer service and technical support?

We did not need to contact technical support.

How was the initial setup?

The initial setup was not very hard, although it took a little while to get it set up. The only difficult part is making sure that it is integrated with all of the applications. If you've got Active Directory then it is easy, and pretty straightforward. If instead, you have all local accounts then it can get a lot harder, although I don't think that any other application can improve it if you've got local accounts everywhere.

The actual installation that included getting it up and running was pretty quick, taking only a couple of days. Going through all of the change management and other processes took much longer, on the order of months. The more problems there are with accounts inside the organization, the longer the deployment will take.

What about the implementation team?

Our in-house team was responsible for the deployment.

What's my experience with pricing, setup cost, and licensing?

The price of this solution is expensive.

What other advice do I have?

My advice for anybody who is implementing this product is to get the admins familiar with the setup. They have to learn how to get the process approved, especially in an ad-hoc scenario. The scheduled changes are ok, but the ad-hoc ones can be a little bit problematic if you don't have enough approvals ready to approve access.

If an organization can afford it then the Cyberark Enterprise Password Vault works well.

I would rate this solution a nine out of ten.

Which deployment model are you using for this solution?

On-premises
Disclosure: My company does not have a business relationship with this vendor other than being a customer.
PeerSpot user
Technical Architect at a tech vendor with 10,001+ employees
MSP
Top 5Leaderboard
Apr 14, 2020
Reduces the number of “admin” accounts by utilizing accounts that can be used by individuals with the same role

What is our primary use case?

Managing passwords to infrastructure and applications, keeping those accounts “safe,” and being able to audit their use.

How has it helped my organization?

The audit capabilities include video so that not only keystrokes but also mouse clicks are captured. This provides safety and reassurance for anyone working in our infrastructure. 

What is most valuable?

Reducing the number of “admin” accounts by utilizing accounts that can be used by individuals with the same role, but only one at a time. When the accounts have been used, its password is changed (to something a user would have had to write down) before being made available for reuse. The passwords which are hidden from the users are not known, and thus can be long and complex, while only being used for a session before being changed.

What needs improvement?

Privileged Threat Analytics (PTA) that can function in more that one AD domain at a time. The recent enhancement that allows resilience in PTA is great, but operation in more than one domain is required as many organizations have multiple AD domains. Even if it’s just prod and test or PPE split, you still want to know what’s going on in it.

For how long have I used the solution?

Three to five years.

Which solution did I use previously and why did I switch?

No Previous PAM solution used.

Which other solutions did I evaluate?

Yes, based on Gartner

Which deployment model are you using for this solution?

On-premises
Disclosure: My company does not have a business relationship with this vendor other than being a customer.
PeerSpot user
Shad Smith - PeerSpot reviewer
Shad SmithTechnical Architect at a tech vendor with 10,001+ employees
Top 5LeaderboardMSP

With the accounts being used in CyberArk being made available for “exclusive use” it can only be used by one person at a time. When the account is checked back in at the end of a session, the password is then changed before being made available for use by another person.

Buyer's Guide
Download our free CyberArk Privileged Access Manager Report and get advice and tips from experienced pros sharing their opinions.
Updated: January 2026
Buyer's Guide
Download our free CyberArk Privileged Access Manager Report and get advice and tips from experienced pros sharing their opinions.