- PAM interface for staff to support customers which may include CyberArk solutions of their own.
- Managing large environments with varied and diverse environments.
Senior Manager - Privileged Access Management at a tech services company with 10,001+ employees
Has the ability to standardize our PAM across a diverse estate
What is our primary use case?
How has it helped my organization?
Improved our user access and tracking, thereby safeguarding the organization and its customers. Being a user makes us a better reseller.
What is most valuable?
Shared-service accounts reducing the number of potential entry points as well as the ability to standardise our PAM across a diverse estate.
What needs improvement?
Multi-tenancy vaults should really have the same release cycle as single tenancy vaults; this will enable us to meet even more customer demand. We are striving to be at least on the latest release minus 1 (n-1) and for us to run both Single and Multi-Tenant core systems the difference in release cycles will result in a wide gap. Considering the considerable changes including user interface we have seen recently, the one concern is that we may end up with users having different interfaces to deal with different customers.
Buyer's Guide
CyberArk Privileged Access Manager
August 2025

Learn what your peers think about CyberArk Privileged Access Manager. Get advice and tips from experienced pros sharing their opinions. Updated: August 2025.
865,295 professionals have used our research since 2012.
For how long have I used the solution?
Three to five years.
What do I think about the stability of the solution?
Very stable with no own goals in three years.
What do I think about the scalability of the solution?
Scalability is very good.
How are customer service and support?
We get excellent feedback from customer service, irrespective of the level of issues raised.
Which solution did I use previously and why did I switch?
Yes, we decided to change to CyberArk in line with our strategic intent to provide as safe a central and customer environment as possible.
How was the initial setup?
Initial setup was complex and time-consuming but the later versions are a lot faster to implement.
What about the implementation team?
We implemented through in-house specialists.
What's my experience with pricing, setup cost, and licensing?
Standardised offerings that allow for customer-specific flexibility.
Disclosure: My company does not have a business relationship with this vendor other than being a customer.

Information Technology Specialist (Contract role) at a tech services company with 10,001+ employees
Auditing and recording functionality has made compliance with customer requirements a much clearer and easily managed process
What is our primary use case?
Primary use case: having privileged access management and ingress into customer networks and infrastructure.
How has it helped my organization?
The auditing and recording functionality along with stringent password-change policies and one-time password use has made compliance with customer requirements a much clearer and easily managed process.
What is most valuable?
- Recordings
- Exclusive use, and
- OTP.
There can be no ambiguity: An account can only be in use by one single known user, and they have no knowledge of the password.
What needs improvement?
Functionality to enable drive mappings to platforms and default connectors without the need to use AutoIt.
Disclosure: My company does not have a business relationship with this vendor other than being a customer.
Buyer's Guide
CyberArk Privileged Access Manager
August 2025

Learn what your peers think about CyberArk Privileged Access Manager. Get advice and tips from experienced pros sharing their opinions. Updated: August 2025.
865,295 professionals have used our research since 2012.
Information Security Engineer at a international affairs institute with 1,001-5,000 employees
Helps control use of shared passwords and the practice of sharing passwords disappeared completely
What is our primary use case?
The main purpose of getting CyberArk was to control the use of the shared passwords.
Secondly, we needed to take out the secrets from the applications' source code (database connection strings).
Thirdly, we wanted to improve the network segmentation and reduce the number of firewall exceptions. We're doing that by assigning a PSM per network zone and limiting the exceptions to its connections.
How has it helped my organization?
The practice of sharing passwords disappeared completely and the most sensitive application is using the AIM to retrieve database passwords for all its users.
We're still struggling with the use of RDP through PSMs.
What is most valuable?
The most valuable features for us are the AIM and PSM because they helped us by reducing the number of secrets floating around.
What needs improvement?
The AIM providers registration process could be easier and could allow re-registration. Also, some sort of policies for assigning access rights and safe ownership would be useful for deployment automation. We're seeing difficulties with hosts requiring 2FA, and we need to better cover them with PSM and PSMP.
For how long have I used the solution?
More than five years.
What do I think about the stability of the solution?
I am very impressed with the stability, but I still need to convince some colleagues.
What do I think about the scalability of the solution?
Scalability is rather good, we haven't reached any technical limitations yet.
How are customer service and technical support?
The support is always very responsive, accurate, and complete in their solutions. I've always had a personal contact that would know our setup and was able to concentrate on our specifics instead of pointing to a generic document on the support site.
Which solution did I use previously and why did I switch?
No, we haven't used any other solution.
How was the initial setup?
The initial setup was straightforward because its entire complexity was hidden by the CyberArk expert who guided the whole process.
What about the implementation team?
Our vendor's implementation team was stellar.
What was our ROI?
We haven't yet calculated the ROI.
What's my experience with pricing, setup cost, and licensing?
Attempt to minimize the AIM deployments as the license is expensive. Take a license for a test instance even if it might cost extra.
Which other solutions did I evaluate?
I cannot tell what other options were evaluated.
What other advice do I have?
Keep an eye on the cloud integrations and be ready for Conjur.
Disclosure: My company does not have a business relationship with this vendor other than being a customer.
Identity and Access Management Analyst at a financial services firm with 1,001-5,000 employees
We're now able to start managing service accounts with AIM
What is our primary use case?
We use CyberArk to manage anything privileged including our admin IDs, AWS root credentials, service accounts, etc.
How has it helped my organization?
It's been a big win for us as we're now able to start managing service accounts with AIM. This is a big win, especially with our web hosting team.
What is most valuable?
There are several features we've found valuable. We're auto-discovering our new Windows servers, we're managing root in our Unix environment, and now we're pushing for SA password rotation this year.
What needs improvement?
As we have not yet moved to the core licensing model, we don't have the benefit of PSM and a few other things that were not previously included.
For how long have I used the solution?
One to three years.
Disclosure: My company does not have a business relationship with this vendor other than being a customer.
IT Support Specialist / Project Lead at a energy/utilities company with 10,001+ employees
Provides a more secure computing environment, allowing only approved programs to run securely
What is our primary use case?
Used to allow the removal of local administrators from 12,000 endpoints and yet still allows users to have the applications they need with the proper permissions required.
How has it helped my organization?
Users were removed from local administrators group on all desktop endpoints providing a more secure computing environment, allowing only those programs approved to run securely.
What is most valuable?
- The visibility of what is being run and control of those applications.
- Limiting the unnecessary application users think they need, and producing security vulnerabilities.
What needs improvement?
Better search functionality in the EPM console. It becomes difficult to search lengthy policies for specific items. Additionally, some of the windows sizes cannot be manipulated to allow a better user experience.
For how long have I used the solution?
Less than one year.
What do I think about the stability of the solution?
The product is relatively stable, but as with most software, it has room for improvement.
What do I think about the scalability of the solution?
This solution is very scalable from what we have seen.
How are customer service and technical support?
Our experience with tech support has been positive with slight delays due to the location of some of the deep-level resources.
Which solution did I use previously and why did I switch?
No, we used no other services/software previous to EPM.
How was the initial setup?
Straightforward setup with a substantial learning curve to implement.
What about the implementation team?
We implemented in-house with the direction of a third-party.
What was our ROI?
Our ROI is currently being looked at.
What's my experience with pricing, setup cost, and licensing?
Setup, costs, and licensing are fairly straightforward and easy to navigate. Questions to the account manager typically resulted in the answers needed.
Which other solutions did I evaluate?
We looked at several different vendors and conducted detailed POCs on each to ensure we were getting what we needed.
Disclosure: My company does not have a business relationship with this vendor other than being a customer.
Senior Specialist Identity System Support at Roche
The master policy allows us to establish a security baseline for our privileged accounts
What is our primary use case?
We are using CyberArk to store credentials of privileged assets in a secure way. In addition, CyberArk helps us to meet our security policy effortlessly, defining the complexity of the passwords, rotation period, etc.
We are also using the Privileged Session Manager to provide remote access to servers with security controls in place (session isolated and recorded).
How has it helped my organization?
With CyberArk, we can meet our compliance requirements reducing security risks without introducing additional operational complexity. This is very valuable for our company because we have regular audits where we have to provide evidence about the use of our privileged accounts (password use, password rotation, etc.)
In addition, we have several third parties that need access to our infrastructure. CyberArk PAS helps us to provide this access in a quick and secure way.
What is most valuable?
- Master policy: allows us to establish a security baseline for our privileged accounts.
- CPM: allows us to rotate passwords following the policy defined.
- PSM: allows us to provide isolated sessions to the customer with additional controls (real-time monitoring, session isolation, and session recording).
What needs improvement?
- We would like to have more flexibility in the RBAC model and have more options to define who should have access to what, not only based on safe membership.
- In addition, the user interface could be improved. When a team manages thousands of accounts, advanced filters are very valuable to search the accounts.
For how long have I used the solution?
More than five years.
Disclosure: My company does not have a business relationship with this vendor other than being a customer.
IT Analyst at a tech services company with 10,001+ employees
Enables us to connect to the target system component and helps us with recordings
Pros and Cons
- "There are no issues with scalability. Our clients are very happy to use the product."
- "The initial setup of CyberArk is a challenge if you do not have prior experience with it."
What is our primary use case?
We have different privileged accounts in our enterprise. All of the application owners and the stakeholders want to store those accounts CyberArk privileged security, so they can connect to the target systems. It also allows for session recordings at the time of auditing.
What is most valuable?
We can be connected to the target system and the PSM component comes into play. In addition, a true asset is the recordings the solution keeps.
What needs improvement?
We have found with the recent upgrade a lot of issues we had with the connection have been resolved.
For how long have I used the solution?
One to three years.
What do I think about the stability of the solution?
It is stable.
What do I think about the scalability of the solution?
There are no issues with scalability. Our clients are very happy to use the product.
How is customer service and technical support?
Tech support is very quick to answer our request tickets.
How was the initial setup?
It is necessary to use professional service for the setup of the solution. It is a challenge if you are not well-versed in CyberArk.
What's my experience with pricing, setup cost, and licensing?
In comparison to other products on the market, CyberArk is a more costly product.
Disclosure: My company does not have a business relationship with this vendor other than being a customer.
We are able to know who is accessing what and when; having accountability
Pros and Cons
- "We are maintaining compliance in PCI, SOX and HIPPA, which is a big thing. Auditors really like it, and it has made us stay compliant."
- "We are able to know who is accessing what and when; having accountability."
- "Make it easier to deploy."
What is our primary use case?
Primary use case is for compliance, SOX, PCI, HIPAA, and securing privileged access accounts. It seems to be performing well. We have had pretty good success with it.
We plan to utilize CyberArk to secure infrastructure and applications running in the cloud with AWS Management Console. We are testing it right now, so we hopefully it will be ready in about two months.
How has it helped my organization?
We are maintaining compliance in PCI, SOX and HIPPA, which is a big thing. Auditors really like it, and it has made us stay compliant.
There is at least one place to go to for getting privileged accounts. Now, users have to go through the portal or go through CyberArk front-end, the PVWA, or we could use the OPM or PSMP. It has helped out quite a bit.
What is most valuable?
We are able to know who is accessing what and when; having accountability. That is the big thing.
What needs improvement?
Make it easier to deploy. In 10.4, we did it with the cloud and could actually script the installs.
For how long have I used the solution?
Three to five years.
What do I think about the stability of the solution?
It has been pretty stable. We had some issues before, but customer support has been helping us out quite a bit.
We think we had some PSM issues, and that was the big problem we had. Basically, it had to be rebuilt.
What do I think about the scalability of the solution?
Scalability is impressive because you can set up clusters, so you can grow as your needs grow.
How is customer service and technical support?
Technical support has been excellent. They have been really good and knowledgeable. They come out and help us out. They have also helped us do our roadmapping.
We feel like we get the right person the right time that we call.
How was the initial setup?
The upgrading process was pretty straightforward. We had some issues with the platforms when we upgraded. That was probably on our part, maybe we missed something.
What about the implementation team?
The vendor was retained to implement our Cyberark rollout initially.
What was our ROI?
It keeps us from getting dinged by the compliance officers. Keeps us in compliance.
What's my experience with pricing, setup cost, and licensing?
Understand your needs prior to purchasing. Cyberark team will advise as well which is a plus.
What other advice do I have?
It does what it promised. It secures our platforms, haves the scalability, and it is just a solid product.
Know what you are getting into upfront. Work with IT to ensure you have buy-in from upper management, and work with them to get a roadmap to deploy.
Most important criteria when selecting a vendor:
- Reliability
- Having good customer support.
Disclosure: PeerSpot contacted the reviewer to collect the review and to validate authenticity. The reviewer was referred by the vendor, but the review is not subject to editing or approval by the vendor.

Buyer's Guide
Download our free CyberArk Privileged Access Manager Report and get advice and tips from experienced pros
sharing their opinions.
Updated: August 2025
Product Categories
Privileged Access Management (PAM) User Activity Monitoring Enterprise Password Managers Mainframe Security Operational Technology (OT) SecurityPopular Comparisons
Azure Key Vault
AWS Secrets Manager
Okta Workforce Identity
HashiCorp Vault
Delinea Secret Server
CyberArk Endpoint Privilege Manager
BeyondTrust Endpoint Privilege Management
CyberArk Identity
WALLIX Bastion
One Identity Safeguard
Keeper Enterprise Password Manager
BeyondTrust Privileged Remote Access
Buyer's Guide
Download our free CyberArk Privileged Access Manager Report and get advice and tips from experienced pros
sharing their opinions.
Quick Links
Learn More: Questions:
- CyberArk vs. ManageEngine Password Manager Pro
- How does Sailpoint IdentityIQ compare with CyberArk PAM?
- Which PAM tool do you prefer: CyberArk Privileged Access Manager, One Identity Safeguard, Delinea Secret Server, or BeyondTrust Privileged Remote A
- What is the difference between Privileged Users and Privileged Accounts
- When evaluating Privileged Identity Management, what aspect do you think is the most important to look for?
- How was the 2020 Twitter Hack carried out? Could it have been prevented?
- Which is the best Privileged Account Management solution?
- What are the top 5 PAM solutions that can be implemented which cover both hybrid and cloud?
- What are the top 5 PAM solutions?
- How will AI and ML help or work with PIM/PAM?