I am a consultant. We are in the process of using this in our clients' companies.
Product Manager at a tech services company with 11-50 employees
Priced well with good support, stable, and scalable
Pros and Cons
- "The most valuable feature is Special Monitoring."
- "It is best suited for mid to large-size enterprises; it is priced well, it is the market leader, and I think that it's the best solution."
- "The authentication port is available in CyberArk Alero but not Fortinet products."
- "The authentication port is available in CyberArk Alero but not Fortinet products."
What is our primary use case?
What is most valuable?
The most valuable feature is Special Monitoring.
What needs improvement?
The authentication port is available in CyberArk Alero but not Fortinet products.
For how long have I used the solution?
I have been working with CyberArk PAS for one year.
Buyer's Guide
CyberArk Privileged Access Manager
March 2026
Learn what your peers think about CyberArk Privileged Access Manager. Get advice and tips from experienced pros sharing their opinions. Updated: March 2026.
884,976 professionals have used our research since 2012.
What do I think about the stability of the solution?
CyberArk is stable.
What do I think about the scalability of the solution?
It's a scalable solution.
How are customer service and support?
I have limited experience with technical support, but our customers like the support.
In general, it appears to be fine.
Which solution did I use previously and why did I switch?
I have also worked with Thycotic, until the completion of the project.
How was the initial setup?
The initial setup is straightforward.
What's my experience with pricing, setup cost, and licensing?
It is best suited for mid to large-size enterprises. It is not the best for smaller companies, largely because of the price.
I believe that this solution is priced well. It's the market leader and I think that it's the best solution.
The price is quite good for us.
What other advice do I have?
For those who are interested in using this product, you have to know your requirements and compare them with CyberArk to see if it is suitable for them and fits their budget.
I would rate this solution a nine out of ten.
Disclosure: My company has a business relationship with this vendor other than being a customer. reseller
Junior Product Consultant at a tech services company with 501-1,000 employees
Good technical support with helpful third party vendors and good at recording actions
Pros and Cons
- "The technical support is good."
- "I primarily use the solution to record any actions taken on specific important targets, allowing management to look at actions and play them back to see what was done within the environment."
- "We found a lot of errors during the initial setup. They should work to improve the implementation experience and to remove errors from the process."
- "We found the initial setup quite difficult. There were a lot of errors and we found the process to be a bit complex."
What is our primary use case?
I primarily use the solution to record any actions taken on specific important targets. It allows management to look at actions and play them back to see what was done within the environment.
What is most valuable?
The technical support is good.
It's pretty good at recording actions taken within an environment.
What needs improvement?
We found a lot of errors during the initial setup. They should work to improve the implementation experience and to remove errors from the process.
The solution could be more stable.
It should have more specific configurations. There are lots of types of servers and devices. The product should have a more detailed, specific configuration and integration with other products.
For how long have I used the solution?
I've been using the solution for about three months at this point.
What do I think about the stability of the solution?
This was my first experience in the solution's UI and UX user experience and user interface. I didn't find the solution to be very stable at all.
What do I think about the scalability of the solution?
We do plan to continue to use the solution, however, it's unclear as to if we will scale it further.
How are customer service and technical support?
We're pretty satisfied with technical support. They are helpful. I find them knowledgable and responsive and I've been happy with the level of service we've been given thus far.
How was the initial setup?
We found the initial setup quite difficult. There were a lot of errors and we found the process to be a bit complex. I wouldn't describe the implementation as straightforward.
In total, the deployment took about one week from beginning to end.
What about the implementation team?
We did not handle the entire implementation ourselves. We had assistance from an outside firm. They were helpful.
What other advice do I have?
We're just users of the solution. We're customers. We aren't resellers or consultants. We don't have a business relationship with the solution.
I'm using the latest version of the solution.
I'd recommend the product to others.
Overall, we've been mostly happy with the solution. I'd rate it at an eight out of ten so far.
Which deployment model are you using for this solution?
Public Cloud
Disclosure: My company does not have a business relationship with this vendor other than being a customer.
Buyer's Guide
CyberArk Privileged Access Manager
March 2026
Learn what your peers think about CyberArk Privileged Access Manager. Get advice and tips from experienced pros sharing their opinions. Updated: March 2026.
884,976 professionals have used our research since 2012.
Technical Lead IMSS at a computer software company with 1,001-5,000 employees
Create, request, access and manage privileged passwords
Pros and Cons
- "It's highly secure and very flexible. It gives us all types of storage options and it gives us a high level of security."
- "The tech support is amazing."
- "The only problem involves granting access to people who are authorized to view it."
- "The only problem involves granting access to people who are authorized to view it."
What is our primary use case?
We use it for storing and rotating passwords.
Within our organization, a lot of people are using this solution for a lot of projects. We have already implemented CyberArk as a SaaS solution. We are not using the core parts, but we are using the software as a service for a project.
At my previous job, there was a team of seven people who were in charge of maintenance. Mostly analysts, senior analysts, and a technical lead used this solution.
What is most valuable?
It completely depends on the requirement. For some of the RPA robotic types of user identity, we prefer for it to happen in an automatic way, but some of them are highly critical, so we don't do it automatically. As for the end-user experience or expectation, if they want to change it at their end, they can do it.
What needs improvement?
I don't see any problems because it's highly secure and very flexible. It gives us all types of storage options and it gives us a high level of security. From my experience, overall, I don't see many problems that need to be rectified.
The only problem involves granting access to people who are authorized to view it. This user management area is the most critical. We have to constantly check on that area and we have to review and give proper access. Nobody should have more access than they are authorized for.
For how long have I used the solution?
I have been using CyberArk Enterprise Password Vault for eight years.
What do I think about the scalability of the solution?
It's scalable at the component level. If you want to add some of the latest components, or if you want to implement biometrics or MFA, this solution can handle that — it's very easy to implement.
How are customer service and technical support?
The tech support is amazing. If you have any issues that you need help with, the CyberArk support team reaches out very quickly, depending on the criticality of the issue. If it's critical, they will reach out to you within hours.
The vendor support is really good.
How was the initial setup?
The initial setup is quite straightforward. These days they have an automatic script — It is much less time-consuming.
We used to do it manually which would take almost two to three hours in total.
What about the implementation team?
We did it in-house. I'm certified in CyberArk; I've also installed it for clients as well.
What's my experience with pricing, setup cost, and licensing?
The licensing plan is either six months or one year — it's not on a monthly basis.
Every company will have a different license fee, but ultimately, it comes down to how many users you want to manage and how many companies you want to support. If you want three CPMs, then you'll need licensing for three. It's per-company, license-based.
Which other solutions did I evaluate?
I am currently evaluating other solutions. A few of them do not support PTA. Some of them don't have DevOps properly managed. Others don't give you the DNE facility, which is free of charge with CyberArk.
What other advice do I have?
I would definitely recommend CyberArk Enterprise Password Vault.
On a scale from one to ten, I would give this solution a rating of eight.
Which deployment model are you using for this solution?
Hybrid Cloud
Disclosure: My company has a business relationship with this vendor other than being a customer. Partner
Director at a tech services company with 11-50 employees
Every aspect of the solution is very well integrated and it is fail-safe
Pros and Cons
- "Every aspect of the solution is very well integrated, and even that gives comfort. It is a fail-safe kind of environment."
- "Every aspect of the solution is very well integrated, and that gives comfort because it is a fail-safe kind of environment."
- "Having a cloud version would be very helpful. You have to invest a lot of money for the infrastructure hardware so the cloud version would help."
- "Having a cloud version would be very helpful. You have to invest a lot of money for the infrastructure hardware so the cloud version would help."
What is our primary use case?
There are threats that get opened because of the vulnerability of privileged access that says to directly put it in a vault.
What is most valuable?
Every aspect of the solution is very well integrated, and that gives comfort. It is a fail-safe kind of environment. I think that's the fail-safe feature makes customers comfortable because there are no non-integrable stuff or cures. For example, a vault would have its own anti-virus, its own application, its own operating system to stay hardened. It is absolutely hardened for it to be protected from the outside world.
What needs improvement?
Having a cloud version would be very helpful. You have to invest a lot of money for the infrastructure hardware so the cloud version would help.
For how long have I used the solution?
My organization has been using this solution for a few years but I joined the company three months back.
What do I think about the stability of the solution?
It is very stable.
What do I think about the scalability of the solution?
Our clients are large enterprises. It is easy to scale.
How are customer service and technical support?
Our customers contact us for any technical support, but we are able to sort out customer issues to a very large extent. We only had to connect with CyberArk at L-3 level or L-4 level. We are able to address most of our customer's issues.
I would rate their support a nine out of ten.
Which solution did I use previously and why did I switch?
We have had customers use a competitive product that CyberArk has replaced but it is not very common. It is not very easy to change your Privileged Access Management framework so easily.
CyberArk is fail-safe, it has a threat intelligence filter, and prevention threat attacks. That sets the product apart from others, and I think the other part is their ability to onboard a maximum number of resources like storage network, security, IoT devices, and RPAs. Its ability to pervasively onboard almost all critical privileges and resources across the organization is where it stands out in a really big way.
How was the initial setup?
I didn't implement it. I don't believe we've had any problems implementing it. I've never heard any issues. I'd say it's neutral.
What's my experience with pricing, setup cost, and licensing?
There are costs in addition to the standard licensing. There is an implementation fee. Those are additional fees and the customer has the annual maintenance, the software, and whole maintenance cost added to that. So there are additional costs besides this standard license.
What other advice do I have?
The most important phase is the discovery phase. Pay the most attention to that. Spend the most amount of time on the discovery phase, which is really the startup planning. The project becomes smoother. Book stricter guidelines on timelines and let there be a senior sponsor part of the project so that you are able to get milestones addressed quickly otherwise, these projects tend to drag longer.
In the next release, I would like to have the cloud option and all of the features that come with it.
I would rate CyberArk a nine out of ten.
Which deployment model are you using for this solution?
On-premises
Disclosure: My company has a business relationship with this vendor other than being a customer. Reseller.
Manager Engineering at a comms service provider with 1,001-5,000 employees
Superior security, simple to use, and the technical support is good
Pros and Cons
- "The interface is very simple to use."
- "Overall, I feel that this is a good product and I recommend it."
- "The installation process should be easier and more user-friendly so that you don't need to hire a third party to deploy it."
- "The pricing is too expensive and should be reduced."
What is our primary use case?
Our primary use of this solution is as a password manager.
What is most valuable?
The interface is very simple to use.
Security-wise, CyberyberArk is better than the other products.
What needs improvement?
The pricing is too expensive and should be reduced. This is our only concern. When a small industry wants to invest in these kinds of tools, they don't have the budget to spend a lot of money on security. If the price were more reasonable then many other small businesses would consider using it.
The installation process should be easier and more user-friendly so that you don't need to hire a third party to deploy it. Instead, an in-house administrator could do it.
For how long have I used the solution?
I have been using this product for the last two years.
What do I think about the stability of the solution?
Over the past two years, I hardly remember us facing any large problems. We have experienced small bugs, but they release patches to fix those.
What do I think about the scalability of the solution?
This is a scalable product. In our company, we have about 100 users, most of which are part of our DevOps team or are administrators.
How are customer service and technical support?
We are satisfied with the technical support.
Which solution did I use previously and why did I switch?
Prior to CyberArk, we were using a Microsoft product, but it didn't fulfill our entire requirement. We adopted this new solution because it met all of our needs.
How was the initial setup?
The initial setup is complex. It took two or three days to complete the deployment.
What about the implementation team?
We implemented this solution with the help of consultants who had experience with it.
What's my experience with pricing, setup cost, and licensing?
This product is very expensive.
Which other solutions did I evaluate?
I have seen demonstrations of similar products by other vendors and what I found was that the security on this solution is better.
What other advice do I have?
Overall, I feel that this is a good product and I recommend it. The only thing that people have to consider is pricing.
I would rate this solution an eight out of ten.
Which deployment model are you using for this solution?
Public Cloud
If public cloud, private cloud, or hybrid cloud, which cloud provider do you use?
Microsoft Azure
Disclosure: My company has a business relationship with this vendor other than being a customer. partner
Security Architect at a financial services firm with 10,001+ employees
Easy to set up and gives us the flexibility to grant access when we need it
Pros and Cons
- "The most valuable feature is the ability to delegate access to admins when they need it."
- "The most valuable feature is the ability to delegate access to admins when they need it, allowing us to have some kind of proof on the approval process, rather than give people standing access on a full-time basis."
- "I would prefer that this is a fully-managed service, rather than have to manage the software ourselves and keep it up to date."
- "I would prefer that this is a fully-managed service, rather than have to manage the software ourselves and keep it up to date."
What is our primary use case?
This solution is used primarily for privileged segment access and break-glass access. We also use it for log-on session recording and access control, where we can grant access to our key systems for ad-hoc use.
What is most valuable?
The most valuable feature is the ability to delegate access to admins when they need it. It allows us to have some kind of proof on the approval process, rather than give people standing access on a full-time basis.
What needs improvement?
I would prefer that this is a fully-managed service, rather than have to manage the software ourselves and keep it up to date. A cloud-based deployment would ultimately be better for us than an on-premises appliance.
What do I think about the stability of the solution?
Stability has not been a problem.
What do I think about the scalability of the solution?
We didn't have any issues with scalability, although we only have 30 or 40 systems integrated. There were not tens of thousands.
How are customer service and technical support?
We did not need to contact technical support.
How was the initial setup?
The initial setup was not very hard, although it took a little while to get it set up. The only difficult part is making sure that it is integrated with all of the applications. If you've got Active Directory then it is easy, and pretty straightforward. If instead, you have all local accounts then it can get a lot harder, although I don't think that any other application can improve it if you've got local accounts everywhere.
The actual installation that included getting it up and running was pretty quick, taking only a couple of days. Going through all of the change management and other processes took much longer, on the order of months. The more problems there are with accounts inside the organization, the longer the deployment will take.
What about the implementation team?
Our in-house team was responsible for the deployment.
What's my experience with pricing, setup cost, and licensing?
The price of this solution is expensive.
What other advice do I have?
My advice for anybody who is implementing this product is to get the admins familiar with the setup. They have to learn how to get the process approved, especially in an ad-hoc scenario. The scheduled changes are ok, but the ad-hoc ones can be a little bit problematic if you don't have enough approvals ready to approve access.
If an organization can afford it then the Cyberark Enterprise Password Vault works well.
I would rate this solution a nine out of ten.
Which deployment model are you using for this solution?
On-premises
Disclosure: My company does not have a business relationship with this vendor other than being a customer.
Technical Architect at a tech vendor with 10,001+ employees
Reduces the number of “admin” accounts by utilizing accounts that can be used by individuals with the same role
Pros and Cons
- "The audit capabilities include video so that not only keystrokes but also mouse clicks are captured, providing safety and reassurance for anyone working in our infrastructure."
- "Privileged Threat Analytics (PTA) that can function in more that one AD domain at a time."
What is our primary use case?
Managing passwords to infrastructure and applications, keeping those accounts “safe,” and being able to audit their use.
How has it helped my organization?
The audit capabilities include video so that not only keystrokes but also mouse clicks are captured. This provides safety and reassurance for anyone working in our infrastructure.
What is most valuable?
Reducing the number of “admin” accounts by utilizing accounts that can be used by individuals with the same role, but only one at a time. When the accounts have been used, its password is changed (to something a user would have had to write down) before being made available for reuse. The passwords which are hidden from the users are not known, and thus can be long and complex, while only being used for a session before being changed.
What needs improvement?
Privileged Threat Analytics (PTA) that can function in more that one AD domain at a time. The recent enhancement that allows resilience in PTA is great, but operation in more than one domain is required as many organizations have multiple AD domains. Even if it’s just prod and test or PPE split, you still want to know what’s going on in it.
For how long have I used the solution?
Three to five years.
Which solution did I use previously and why did I switch?
No Previous PAM solution used.
Which other solutions did I evaluate?
Yes, based on Gartner
Which deployment model are you using for this solution?
On-premises
Disclosure: My company does not have a business relationship with this vendor other than being a customer.
Cyber Security Manager at a hospitality company with 10,001+ employees
Improved our processes in terms of efficiency when it comes to creating accounts
Pros and Cons
- "CyberArk has been easy for us to implement and the adoption has been good. We've been able to standardize a bunch of things. We've been able to standardize relatively easily with the use of the platforms and managing the policies."
- "We have been able to really transform how all of our sysadmins manage all our infrastructure."
- "There is a bit of a learning curve, but it's a pretty complex solution."
- "There is a bit of a learning curve, but it's a pretty complex solution."
What is our primary use case?
So far, CyberArk has done everything that we've needed it to. We are growing and moving into the cloud. We have a pretty complex environment. Everything that we've needed it to do in terms of managing our privileged accounts, it has done.
How has it helped my organization?
We have been able to really transform how all of our sysadmins manage all our infrastructure. Before, it was like the Wild West. Everybody was way over privileged and had access to everything all the time. Now, we finally have everybody into least privileged and auditing through PSM, which has been fantastic. We also have implemented dual control and just-in-time. So, it's moved the ability to manage a lot of our privileged users to where we need them to be.
CyberArk has been easy for us to implement and the adoption has been good. We've been able to standardize a bunch of things. We've been able to standardize relatively easily with the use of the platforms and managing the policies.
What is most valuable?
I like how thorough and complex it is. We have a solution, and it meets the needs that we need.
The most recent improvement with the user interface upgrade was really nice. It makes the end users very happy. It is way more intuitive. The information that they need to have is now available to them. So, I appreciate that as an update.
What needs improvement?
The user interface was a previous problem that has been overcome.
What do I think about the stability of the solution?
We have implemented our own redundancy into the product. That has worked for us very well.
What do I think about the scalability of the solution?
We have been able to find a nice process for implementing CyberArk in terms of user adoption and onboarding. It's been pretty slick, and it works very well for us.
Which solution did I use previously and why did I switch?
We were lucky to have a board of directors who really embraced security. With their support, we were able to establish the need for a PAM solution.
How was the initial setup?
When we originally implemented CyberArk, we did so incorrectly. With the help of CyberArk Professional Services, we were able to reorganize, reinstall, and upgrade within a week, then apply best practices to the implementation of CyberArk. So, I would say that it took us about a week to get setup correctly.
At first, the integration of CyberArk into our IT environment was a bit rough. People didn't want to give up the rights and privileges that they had. But, we were able to show them how easy it was for them. We even layered in multi-factor authentication to access the accounts that they needed, which were privileges for appropriate functions. Once we were able to show them how they could quickly and smoothly get the access that they needed, it was not a bad thing, as they found out.
What was our ROI?
The return of investment for the CyberArk implementation within our organization has come from the reduction of risk. That is a little tricky to quantify, but it's definitely there.
We have improved our processes in terms of efficiency when it comes to creating accounts, managing the privileged ones and providing the correct access at the right time.
Which other solutions did I evaluate?
After evaluating several vendors, we found that CyberArk met our needs.
What other advice do I have?
I would rate CyberArk an eight point five on a scale of one to 10 because it has done everything that we have asked of it. There is a bit of a learning curve, but it's a pretty complex solution. They do have ways to make it easier, but it's easy to fall down the rabbit hole when you're going into a deep dive. However, if you follow the trail, you will find some pretty cool stuff.
Disclosure: PeerSpot contacted the reviewer to collect the review and to validate authenticity. The reviewer was referred by the vendor, but the review is not subject to editing or approval by the vendor.
Buyer's Guide
Download our free CyberArk Privileged Access Manager Report and get advice and tips from experienced pros
sharing their opinions.
Updated: March 2026
Product Categories
Privileged Access Management (PAM) User Activity Monitoring Enterprise Password Managers Mainframe Security Operational Technology (OT) SecurityPopular Comparisons
Okta Platform
Azure Key Vault
AWS Secrets Manager
Claroty Platform
Saviynt Identity Cloud
Delinea Secret Server
HashiCorp Vault
CyberArk Endpoint Privilege Manager
CyberArk Identity
One Identity Safeguard
BeyondTrust Endpoint Privilege Management
Keeper Enterprise Password Manager
BeyondTrust Privileged Remote Access
Buyer's Guide
Download our free CyberArk Privileged Access Manager Report and get advice and tips from experienced pros
sharing their opinions.
Quick Links
Learn More: Questions:
- CyberArk vs. ManageEngine Password Manager Pro
- Which PAM tool do you prefer: CyberArk Privileged Access Manager, One Identity Safeguard, Delinea Secret Server, or BeyondTrust Privileged Remote A
- How does Sailpoint IdentityIQ compare with CyberArk PAM?
- What is the difference between Privileged Users and Privileged Accounts
- When evaluating Privileged Identity Management, what aspect do you think is the most important to look for?
- How was the 2020 Twitter Hack carried out? Could it have been prevented?
- Which is the best Privileged Account Management solution?
- What are the top 5 PAM solutions that can be implemented which cover both hybrid and cloud?
- What are the top 5 PAM solutions?
- Which PAM tool do you prefer: CyberArk Privileged Access Manager, One Identity Safeguard, Delinea Secret Server, or BeyondTrust Privileged Remote A















With the accounts being used in CyberArk being made available for “exclusive use” it can only be used by one person at a time. When the account is checked back in at the end of a session, the password is then changed before being made available for use by another person.