Our primary use of this solution is as a password manager.
Manager Engineering at a comms service provider with 1,001-5,000 employees
Superior security, simple to use, and the technical support is good
Pros and Cons
- "The interface is very simple to use."
- "The installation process should be easier and more user-friendly so that you don't need to hire a third party to deploy it."
What is our primary use case?
What is most valuable?
The interface is very simple to use.
Security-wise, CyberyberArk is better than the other products.
What needs improvement?
The pricing is too expensive and should be reduced. This is our only concern. When a small industry wants to invest in these kinds of tools, they don't have the budget to spend a lot of money on security. If the price were more reasonable then many other small businesses would consider using it.
The installation process should be easier and more user-friendly so that you don't need to hire a third party to deploy it. Instead, an in-house administrator could do it.
For how long have I used the solution?
I have been using this product for the last two years.
Buyer's Guide
CyberArk Privileged Access Manager
August 2025

Learn what your peers think about CyberArk Privileged Access Manager. Get advice and tips from experienced pros sharing their opinions. Updated: August 2025.
865,295 professionals have used our research since 2012.
What do I think about the stability of the solution?
Over the past two years, I hardly remember us facing any large problems. We have experienced small bugs, but they release patches to fix those.
What do I think about the scalability of the solution?
This is a scalable product. In our company, we have about 100 users, most of which are part of our DevOps team or are administrators.
How are customer service and support?
We are satisfied with the technical support.
Which solution did I use previously and why did I switch?
Prior to CyberArk, we were using a Microsoft product, but it didn't fulfill our entire requirement. We adopted this new solution because it met all of our needs.
How was the initial setup?
The initial setup is complex. It took two or three days to complete the deployment.
What about the implementation team?
We implemented this solution with the help of consultants who had experience with it.
What's my experience with pricing, setup cost, and licensing?
This product is very expensive.
Which other solutions did I evaluate?
I have seen demonstrations of similar products by other vendors and what I found was that the security on this solution is better.
What other advice do I have?
Overall, I feel that this is a good product and I recommend it. The only thing that people have to consider is pricing.
I would rate this solution an eight out of ten.
Which deployment model are you using for this solution?
Public Cloud
If public cloud, private cloud, or hybrid cloud, which cloud provider do you use?
Microsoft Azure
Disclosure: My company has a business relationship with this vendor other than being a customer. partner
Security Architect at a financial services firm with 10,001+ employees
Easy to set up and gives us the flexibility to grant access when we need it
Pros and Cons
- "The most valuable feature is the ability to delegate access to admins when they need it."
- "I would prefer that this is a fully-managed service, rather than have to manage the software ourselves and keep it up to date."
What is our primary use case?
This solution is used primarily for privileged segment access and break-glass access. We also use it for log-on session recording and access control, where we can grant access to our key systems for ad-hoc use.
What is most valuable?
The most valuable feature is the ability to delegate access to admins when they need it. It allows us to have some kind of proof on the approval process, rather than give people standing access on a full-time basis.
What needs improvement?
I would prefer that this is a fully-managed service, rather than have to manage the software ourselves and keep it up to date. A cloud-based deployment would ultimately be better for us than an on-premises appliance.
What do I think about the stability of the solution?
Stability has not been a problem.
What do I think about the scalability of the solution?
We didn't have any issues with scalability, although we only have 30 or 40 systems integrated. There were not tens of thousands.
How are customer service and technical support?
We did not need to contact technical support.
How was the initial setup?
The initial setup was not very hard, although it took a little while to get it set up. The only difficult part is making sure that it is integrated with all of the applications. If you've got Active Directory then it is easy, and pretty straightforward. If instead, you have all local accounts then it can get a lot harder, although I don't think that any other application can improve it if you've got local accounts everywhere.
The actual installation that included getting it up and running was pretty quick, taking only a couple of days. Going through all of the change management and other processes took much longer, on the order of months. The more problems there are with accounts inside the organization, the longer the deployment will take.
What about the implementation team?
Our in-house team was responsible for the deployment.
What's my experience with pricing, setup cost, and licensing?
The price of this solution is expensive.
What other advice do I have?
My advice for anybody who is implementing this product is to get the admins familiar with the setup. They have to learn how to get the process approved, especially in an ad-hoc scenario. The scheduled changes are ok, but the ad-hoc ones can be a little bit problematic if you don't have enough approvals ready to approve access.
If an organization can afford it then the Cyberark Enterprise Password Vault works well.
I would rate this solution a nine out of ten.
Which deployment model are you using for this solution?
On-premises
Disclosure: My company does not have a business relationship with this vendor other than being a customer.
Buyer's Guide
CyberArk Privileged Access Manager
August 2025

Learn what your peers think about CyberArk Privileged Access Manager. Get advice and tips from experienced pros sharing their opinions. Updated: August 2025.
865,295 professionals have used our research since 2012.
Technical Architect at a tech vendor with 10,001+ employees
Reduces the number of “admin” accounts by utilizing accounts that can be used by individuals with the same role
What is our primary use case?
Managing passwords to infrastructure and applications, keeping those accounts “safe,” and being able to audit their use.
How has it helped my organization?
The audit capabilities include video so that not only keystrokes but also mouse clicks are captured. This provides safety and reassurance for anyone working in our infrastructure.
What is most valuable?
Reducing the number of “admin” accounts by utilizing accounts that can be used by individuals with the same role, but only one at a time. When the accounts have been used, its password is changed (to something a user would have had to write down) before being made available for reuse. The passwords which are hidden from the users are not known, and thus can be long and complex, while only being used for a session before being changed.
What needs improvement?
Privileged Threat Analytics (PTA) that can function in more that one AD domain at a time. The recent enhancement that allows resilience in PTA is great, but operation in more than one domain is required as many organizations have multiple AD domains. Even if it’s just prod and test or PPE split, you still want to know what’s going on in it.
For how long have I used the solution?
Three to five years.
Which solution did I use previously and why did I switch?
No Previous PAM solution used.
Which other solutions did I evaluate?
Yes, based on Gartner
Which deployment model are you using for this solution?
On-premises
Disclosure: My company does not have a business relationship with this vendor other than being a customer.
Cyber Security Manager at a hospitality company with 10,001+ employees
Improved our processes in terms of efficiency when it comes to creating accounts
Pros and Cons
- "CyberArk has been easy for us to implement and the adoption has been good. We've been able to standardize a bunch of things. We've been able to standardize relatively easily with the use of the platforms and managing the policies."
- "There is a bit of a learning curve, but it's a pretty complex solution."
What is our primary use case?
So far, CyberArk has done everything that we've needed it to. We are growing and moving into the cloud. We have a pretty complex environment. Everything that we've needed it to do in terms of managing our privileged accounts, it has done.
How has it helped my organization?
We have been able to really transform how all of our sysadmins manage all our infrastructure. Before, it was like the Wild West. Everybody was way over privileged and had access to everything all the time. Now, we finally have everybody into least privileged and auditing through PSM, which has been fantastic. We also have implemented dual control and just-in-time. So, it's moved the ability to manage a lot of our privileged users to where we need them to be.
CyberArk has been easy for us to implement and the adoption has been good. We've been able to standardize a bunch of things. We've been able to standardize relatively easily with the use of the platforms and managing the policies.
What is most valuable?
I like how thorough and complex it is. We have a solution, and it meets the needs that we need.
The most recent improvement with the user interface upgrade was really nice. It makes the end users very happy. It is way more intuitive. The information that they need to have is now available to them. So, I appreciate that as an update.
What needs improvement?
The user interface was a previous problem that has been overcome.
What do I think about the stability of the solution?
We have implemented our own redundancy into the product. That has worked for us very well.
What do I think about the scalability of the solution?
We have been able to find a nice process for implementing CyberArk in terms of user adoption and onboarding. It's been pretty slick, and it works very well for us.
Which solution did I use previously and why did I switch?
We were lucky to have a board of directors who really embraced security. With their support, we were able to establish the need for a PAM solution.
How was the initial setup?
When we originally implemented CyberArk, we did so incorrectly. With the help of CyberArk Professional Services, we were able to reorganize, reinstall, and upgrade within a week, then apply best practices to the implementation of CyberArk. So, I would say that it took us about a week to get setup correctly.
At first, the integration of CyberArk into our IT environment was a bit rough. People didn't want to give up the rights and privileges that they had. But, we were able to show them how easy it was for them. We even layered in multi-factor authentication to access the accounts that they needed, which were privileges for appropriate functions. Once we were able to show them how they could quickly and smoothly get the access that they needed, it was not a bad thing, as they found out.
What was our ROI?
The return of investment for the CyberArk implementation within our organization has come from the reduction of risk. That is a little tricky to quantify, but it's definitely there.
We have improved our processes in terms of efficiency when it comes to creating accounts, managing the privileged ones and providing the correct access at the right time.
Which other solutions did I evaluate?
After evaluating several vendors, we found that CyberArk met our needs.
What other advice do I have?
I would rate CyberArk an eight point five on a scale of one to 10 because it has done everything that we have asked of it. There is a bit of a learning curve, but it's a pretty complex solution. They do have ways to make it easier, but it's easy to fall down the rabbit hole when you're going into a deep dive. However, if you follow the trail, you will find some pretty cool stuff.
Disclosure: PeerSpot contacted the reviewer to collect the review and to validate authenticity. The reviewer was referred by the vendor, but the review is not subject to editing or approval by the vendor.
Identity and Access Management Advisor at a energy/utilities company with 5,001-10,000 employees
Improves our ability to control, secure, and manage access across the enterprise
Pros and Cons
- "Service count rotation is probably one of my favorite features... The ability to automatically rotate any password I need to really helps with the entire enterprise strategy that we're pushing right now."
- "I'd like it to be a little more granular. I want a little bit more control over exactly what we do. I know if you do that, you add more knobs and dials to deal with, but that's just my personal approach: granular access."
How has it helped my organization?
It was originally just a glorified KeePass. We scaled it up to an enterprise-wide solution for all our IT support teams. In that way, it improves our ability to control, secure, and manage access across the enterprise for different support teams, whether it be IAM, Exchange, or server admin. It's been a really fantastic growth opportunity for me and for the company.
What is most valuable?
Service count rotation is probably one of my favorite features. Even though we're not using it right now, we're going to be using it in the future. The ability to automatically rotate any password I need to really helps with the entire enterprise strategy that we're pushing right now.
The solution's ability to manage all our access requirements at scale is interesting, actually. It does everything we need it to, and it's not a tool that I expected we would be using at this scale, as an enterprise-wide client. A little bit of history on that being that when we first started using it, it was a glorified password vault. It was a store. It was KeePass. So we really scaled it up and it's been a really interesting journey.
What needs improvement?
I'd like it to be a little more granular. I want a little bit more control over exactly what we do. I know if you do that, you add more knobs and dials to deal with, but that's just my personal approach: granular access.
What do I think about the stability of the solution?
Lately, due to an upgrade, it hasn't been as stable as we need it to be, but I don't think that's any fault of the product. I think it's the fault of just infrastructure as a whole.
However, in the past, the product has never been down. It's been incredibly stable. And in terms of interface and usage, it's actually been really stable. There haven't been any bugs or glitches or anything of the sort to impede me from doing my job.
What do I think about the scalability of the solution?
I didn't think we'd be here. However, it's incredibly scalable. We are able to use it in two different environments: one is IT and one is OT. And the scalability, as a whole, has been able to translate to an enterprise-wide process, so it's been really great to see. We're hoping that, should we acquire anything or divest something, it would be that easy to actually deal with it in terms of scalability.
How are customer service and technical support?
Technical support has been good, even great. They have come in and assisted us whenever we had issues. If there was ever an outage, they were already on the phone by the time we needed them. They've been doing a great job helping us out so far.
Which solution did I use previously and why did I switch?
We did not have a previous solution.
What was our ROI?
We have seen ROI. Our adoption rate is way up. More teams are involved in using it. That alone stands as a return on investment when we have more adopters, more people using the tool, more people logging into the tool and utilizing its capabilities.
What other advice do I have?
Use the tool, but communicate with your user base. If you're not going to communicate with your user base, then you're dead in the water already. Don't force this on someone. Work with them in order to use it.
The product has delivered innovation with each update. When I first started, we weren't able to run scans and pull service-account information and reset those service accounts at any endpoint. That, as a whole, as I mentioned earlier, was my favorite feature of the product. That innovation alone is probably one of my favorites, and definitely something that deserves praise.
I would rate the product a nine because nobody gets a 10. It's been a fantastic product and it's been easy to use. The training courses involved have been great, so I would rate it a nine.
I wouldn't say CyberArk has been a huge impact on my career, but it's definitely played a role in helping me advance, in terms of being able to communicate with clients, utilizing my skill sets, both the technical and soft-skill use. It's allowed me to really branch out and see my growth through business liaison.
Disclosure: PeerSpot contacted the reviewer to collect the review and to validate authenticity. The reviewer was referred by the vendor, but the review is not subject to editing or approval by the vendor.
Pre-sales Engineer at StarLink - Trusted Security Advisor
Storing User Passwords and Credentials, Facilitates auditing by recording activity
Pros and Cons
- "The most valuable feature is the special management. It records the activity and the actions that we use for auditing."
- "The stability depends on the infrastructure it is installed on, which is important because CyberArk does not have the hardware appliance."
What is our primary use case?
The primary use case is for storing user passwords and administration credentials.
I am the engineer for a company that sells this solution mostly to financial institutions.
It is also useful for auditing and securing shared accounts or co-shared accounts.
What is most valuable?
The most valuable feature is the special management. It records the activity and the actions that we use for auditing.
What needs improvement?
The deployment architecture, the ability to locate and change credentials and the stability need to be improved. They need to install or include an appliance-based option, which CyberArk does not have.
The technical support can improve on the time that it takes to get a callback.
The integration is great but needs to be a bit more user-friendly.
Also, a feature with the ability to create password sync.
In the next release, I would like to see the following:
- Availability on the cloud and the appliance.
- More documentation for the setup.
- Simplify the deployment.
- Continuous operation with this solution.
- Simplify the infrastructure for better stability.
- Increase the support for applications.
- Invest in local on the ground staff in various regions.
- The ability to search by the activities, especially for Windows Servers.
- Improve the auditing capabilities for their searches.
For how long have I used the solution?
I have been using this solution for three years.
What do I think about the stability of the solution?
The stability depends on the infrastructure it is installed on, which is important because CyberArk does not have the hardware appliance.
What do I think about the scalability of the solution?
This solution is scalable. It scales very well, there are no issues.
How are customer service and technical support?
The technical support is good, there are no issues.
They know what to do when you call them, they are competent.
Sometimes they can take too long before getting back to you, which is something that can be improved.
Which solution did I use previously and why did I switch?
Previously I was using Centrify and One Identity. We switched because CyberArk has a lot of strength in my region. Some partners do not want to deploy CyberArk to their customers because they feel it will create competition when it comes to renewal. They don't want the price to be affected.
How was the initial setup?
The initial setup is complex. The architecture needs improvement in the documentation for the setup and the manageability.
If you have everything provided for you, it can take three to four hours to deploy this solution.
What's my experience with pricing, setup cost, and licensing?
I think that it might be cheaper than the other competitors in our region.
What other advice do I have?
I have learned that the deployment can be tricky. Always plan your deployment in phases.
Don't unload all of your privilege credentials at once, otherwise, you have an issue with the passwords.
Always, have help available on standby when you are deploying this solution to prevent issues.
This solution is quite efficient. You don't always have to have your applications. If you are encrypting the server, you don't need the applications. You are required to do it on your workstation. The server will deliver that to you from the managing pack when you try to implement the sessions.
I would rate this solution an eight out of ten.
Which deployment model are you using for this solution?
On-premises
Disclosure: My company does not have a business relationship with this vendor other than being a customer.
Consultant at a financial services firm with 5,001-10,000 employees
Stable, secured access solution with good flexibility
Pros and Cons
- "The most valuable feature is that it is flexible. It has many connectors. that have done well, the EPV and SSH sessions are all being recorded and everything works fine."
- "In the next release, they could simplify the setup and I would like some tasks added like file sharing. When a client connects to CyberArk and wants to put a file on the server, they cannot."
What is our primary use case?
The primary use case of this solution is for third-party developers that come into our infrastructure from VPN to connect. They are organizations that are outside of our organization.
How has it helped my organization?
Before CyberArk, our developers would connect from the VPN directly to the jump servers to get all of their access. We have removed the jump servers to connect to CyberArk.
The security has improved. We know who is accessing and what they are doing. The access is secure.
CyberArk has increased our security.
What is most valuable?
The most valuable feature is that it is flexible. It has many connectors. that have done well, the EPV and SSH sessions are all being recorded and everything works fine.
What needs improvement?
This solution does not support the SQL Developer. We have to purchase separately from CyberArk and we have to ask them to develop it.
This solution is a bit complex compared to other solutions. The installation and administration are complex.
Some things can be done through the interface, but the whole installation process and upgrade process can be done with the installation script but it's complex.
This is too complex for some organizations that do not have a large scale.
In the next release, they could simplify the setup and I would like some tasks added like file sharing. When a client connects to CyberArk and wants to put a file on the server, they cannot.
I thought that the client would be able to drop a file onto the server and the file would be visible on the server.
I have to disable the connection to provide a copy and this is a security issue, and I closed this file to the client then he can't upload and files to us.
They need to come up with a way for the client to file share with CyberArk.
For how long have I used the solution?
I have been using this solution for six months.
What do I think about the stability of the solution?
This solution is stable. We have not had any issues.
What do I think about the scalability of the solution?
This solution is scalable but pricey.
There are fifty users and they are developers.
How are customer service and technical support?
I have not contacted technical support. I am not an engineer, I work for the bank and I have implemented this solution.
Which solution did I use previously and why did I switch?
Previously we used Fudo and jump servers with OTP. It is not the same, but from a security perspective, it is also quite good and less expensive.
How was the initial setup?
The initial setup is complex.
You need at least one engineer to manage the software. I must have dedicated people to administer it.
What about the implementation team?
We worked with integrators for the installation. The first step was the installation process and the hardening. This process took two weeks to implement.
The migration process was more complex and more time-consuming.
What's my experience with pricing, setup cost, and licensing?
This solution is expensive.
What other advice do I have?
My advice would be to compare with other products and if they don't want such a large solution they could try Fudo or a similar solution that is easier and can scale like CyberArk.
I would rate this solution a nine out of ten.
Which deployment model are you using for this solution?
On-premises
Disclosure: My company does not have a business relationship with this vendor other than being a customer.
Presales Engineer/Network Security Technical Consultant at a tech services company with 51-200 employees
Good integration, excellent session monitoring and very good password protection
Pros and Cons
- "Session monitoring is excellent. It may be the solution's most valuable aspect."
- "The initial setup could be simplified. Right now, in comparison to its nearest competitors, it's quite complex."
What is most valuable?
The solution is very complete. It has the most features on the market.
Session monitoring is excellent. It may be the solution's most valuable aspect.
The solution offers very good password protection.
It offers great integration with many products.
What needs improvement?
The initial setup could be simplified. Right now, in comparison to its nearest competitors, it's quite complex.
For how long have I used the solution?
I've been using the solution for one year.
What do I think about the stability of the solution?
The solution is very stable.
What do I think about the scalability of the solution?
The solution is easy to scale.
How are customer service and technical support?
I've never had to reach out to technical support.
How was the initial setup?
The initial setup is complex. You need to install many virtual machines. You must do many configurations. It's not just one machine to another; you'll also have to handle the configuration of independent machines as well.
What's my experience with pricing, setup cost, and licensing?
The price is higher than the competition, but if the customer wants the best product for their company, they won't mind the price.
We have a permanent license. Licensing is based on how man users you have, so the pricing varies according to the size of the company.
What other advice do I have?
We're a partner of CyberArk.
I'd rate the solution nine out of ten.
Disclosure: My company does not have a business relationship with this vendor other than being a customer.

Buyer's Guide
Download our free CyberArk Privileged Access Manager Report and get advice and tips from experienced pros
sharing their opinions.
Updated: August 2025
Product Categories
Privileged Access Management (PAM) User Activity Monitoring Enterprise Password Managers Mainframe Security Operational Technology (OT) SecurityPopular Comparisons
Azure Key Vault
AWS Secrets Manager
Okta Workforce Identity
HashiCorp Vault
Delinea Secret Server
CyberArk Endpoint Privilege Manager
BeyondTrust Endpoint Privilege Management
CyberArk Identity
WALLIX Bastion
One Identity Safeguard
Keeper Enterprise Password Manager
BeyondTrust Privileged Remote Access
Buyer's Guide
Download our free CyberArk Privileged Access Manager Report and get advice and tips from experienced pros
sharing their opinions.
Quick Links
Learn More: Questions:
- CyberArk vs. ManageEngine Password Manager Pro
- How does Sailpoint IdentityIQ compare with CyberArk PAM?
- Which PAM tool do you prefer: CyberArk Privileged Access Manager, One Identity Safeguard, Delinea Secret Server, or BeyondTrust Privileged Remote A
- What is the difference between Privileged Users and Privileged Accounts
- When evaluating Privileged Identity Management, what aspect do you think is the most important to look for?
- How was the 2020 Twitter Hack carried out? Could it have been prevented?
- Which is the best Privileged Account Management solution?
- What are the top 5 PAM solutions that can be implemented which cover both hybrid and cloud?
- What are the top 5 PAM solutions?
- How will AI and ML help or work with PIM/PAM?
With the accounts being used in CyberArk being made available for “exclusive use” it can only be used by one person at a time. When the account is checked back in at the end of a session, the password is then changed before being made available for use by another person.