Try our new research platform with insights from 80,000+ expert users
DerrickAkankwasa - PeerSpot reviewer
Cyber Security Engineer at a computer software company with 11-50 employees
Real User
Top 5Leaderboard
Mar 7, 2025
Improved security infrastructure and reduced risks through comprehensive credential management
Pros and Cons
  • "I find the discovery feature, which includes credential management, session management, monitoring, and remediation within a session, to be very valuable."
  • "CyberArk is a pioneer for PAM; they've always been the leader in terms of research and development and bringing new capabilities to the PAM."
  • "Improved user-friendliness, granularity, and functionality would enhance the product further."

What is our primary use case?

My company partners with CyberArk. I come from a service provider standpoint, so I don't use CyberArk within my company, however, I implement and support it for customers. 

Through the CyberArk partnership, I am certified in CyberArk. I perform activities such as demonstrations, presentations, deployments on-premises, and cloud solutions. 

CyberArk is now a comprehensive identity security solution. My interaction with CyberArk is mostly on the implementation side for our customers, focusing on design and integrating it into customer environments.

It's used in industries such as banking and finance. 

What is most valuable?

I find the discovery feature, which includes credential management, session management, monitoring, and remediation within a session, to be very valuable. It can remediate bad activities occurring in sessions. It offers good management and monitoring as well as good remediating within a session to help users remediate within managed sessions. There's good auditing and activity monitoring.

The session monitoring helps enhance security protocols. With it, users can have more control over what's happening within the session. You have more visibility and can restrict certain activities from happening, such as someone running a malicious command or someone trying to open or edit some sort of platform configurations. You can also send notifications and remediate or terminate sessions. Monitoring helps you build in polices around how to build polices around what's happening within a session.

The implementation of CyberArk impacted our customers' compliance with the regulatory standards in a positive way. Now customers are very happy since they can ensure credentials are compliant. In terms of password management complexity, since they're managing everything through CyberArk, they're able to create complex passwords. The user doesn't really need to remember passwords since the session is entirely being launched through CyberArk. That means that they're able to have much more compliant account management within an organization. They're also able to run reports as well as activity and compliance reports in terms of data related to accounts. It is much easier when you have a tool that manages that. Before CyberArk, having reporting and visibility around usage of accounts was really tricky. In terms of compliance, it's able to cover that by giving just a whole overview of accounts within the organization. 

CyberArk incorporates AI to improve Privileged Access Management. It's consistently improved as well. They do have a previous threat analysis analytics engine, which also can ingest logs from a SIEM solution if it's in place at the customer site. It's able to ingest this information and then give much more correlated security events. This module, the privileged analytics, is able to utilize behavior analytics and AI-related capabilities to be able to give security alerts to the teams. They can action alerts, or even automate to be able to have things blocked or terminated. For example, if someone changes their location. It has a geolocation that's able to then trigger maybe a password or QR code or email with a verification code to check it's that person. It utilizes AI capabilities or behavior analytics capabilities to have capabilities like that enforced.

It has the most plug-ins. Maybe thousands. So in terms of integration within different customer environments, it's much easier compared the competition. CyberArk a pioneer for PAM. They've always been the leader in terms of research and development and bringing new capabilities to the PAM. It will be able to cover 99.9% of most use cases.

What needs improvement?

In terms of improvement, since I am familiar with the product, there are no major issues. 

However, customer feedback suggests that unless it's on-premises, complaints about resources are justified as it enhances security with multiple functionalities. The managed cloud deployment option by CyberArk is easier to manage. Resource issues could be mitigated by choosing this option. 

I suggest adding more plugins and systems, which are often introduced later. Essentially, as long as capable personnel manage it, the solution works well. 

They should continue refining it and adding more dashboards and reporting features. Improved user-friendliness, granularity, and functionality would enhance the product further.

For how long have I used the solution?

I have been using the solution for maybe four or five years. I would say it's closer to four years.

Buyer's Guide
CyberArk Privileged Access Manager
February 2026
Learn what your peers think about CyberArk Privileged Access Manager. Get advice and tips from experienced pros sharing their opinions. Updated: February 2026.
881,757 professionals have used our research since 2012.

Which solution did I use previously and why did I switch?

At the moment, I work with CyberArk mostly. I haven’t interacted much with other solutions like Imperva, as other engineers have taken over those responsibilities.

What about the implementation team?

We are resellers, working ideally with partners, and I am certified with CyberArk. I am a certified delivery engineer for CyberArk PAM, and my experience is vast with the projects and teams I've been involved with.

What was our ROI?

When looking at Privileged Access Monitoring, many IT administrators have access to numerous privileged accounts, which increases the attack surface. CyberArk's PAM solution manages these credentials, providing value by reducing risks like data breaches or financial losses. The return on investment lies in improved security infrastructure, addressing over-privileged access, and reducing the risk of credential compromise, which is a major source of data breaches.

What other advice do I have?

We're a service provider and offer services to customers that acquire CyberArk. I come from a design perspective for those implementing CyberArk. 

The company is open and shares information with partners. They inform us about new versions and allow enhancement requests through a portal. Many enhancements have come through this channel. If they keep going this way, everything will be good with CyberArk. 

I'd recommend the solution to others. 

Overall, I would rate the product nine out of ten. They've been the leader in PAM for maybe six years.

Disclosure: My company has a business relationship with this vendor other than being a customer. Reseller
PeerSpot user
Delivery Manager at a tech vendor with 10,001+ employees
Reseller
Top 5Leaderboard
May 14, 2025
Offers quick access, ease of use, and seamless integration
Pros and Cons
  • "The most valuable features of CyberArk Privileged Access Manager include quick access, ease of use, and a variety of connection methods beyond the web portal."
  • "CyberArk Privileged Access Manager is the best solution for safeguarding sensitive patient data in healthcare, providing visibility and traceability that enhance compliance."
  • "Improvements in CyberArk Privileged Access Manager should focus on simplifying installation and upgrade times, and also consider making professional services training more accessible to implementers and partners."
  • "Sometimes critical issues require follow-ups, as the support team doesn't always recognize the urgency of a critical ticket immediately."

What is our primary use case?

I'm using CyberArk Privileged Access Manager in the telecom industry, specifically for one of the clients. The main use case for CyberArk Privileged Access Manager is the Endpoint Privilege Management part, where privileged access needs to be managed, monitored, and recorded as part of SOX compliance. Other major use cases involve event management, trigger management, and notifications for break glass scenarios for various customers.

How has it helped my organization?

CyberArk Privileged Access Manager offers various exposed REST APIs, allowing for quick onboarding and reporting from the SOX compliance perspective, which wasn't available before. The exposed APIs give us the flexibility to perform scripting using Python and other languages to develop native tools.

CyberArk Privileged Access Manager integrates with various incident management tools, enabling automated actions through triggers for generated events. The integration with Ignimission provides operations teams with a dashboard for compliance management more efficiently. 

CyberArk Privileged Access Manager offers customers good visibility of accounts to onboard. The DNA tool provides an overview of their network entity, thereby helping them streamline their network from a privilege management perspective. They can see how many assets there are, how many assets have different accounts, and which accounts are currently active or not. From the dashboard, the customer has clear visibility.

Its integration is seamless with out-of-the-box connectors. You just need to provide the input in a configuration file. It can be integrated very easily.

What is most valuable?

The most valuable features of CyberArk Privileged Access Manager include quick access, ease of use, and a variety of connection methods beyond the web portal. The Just-in-Time functionality within CyberArk is very important, and recent features such as the MFA gateway allow external customers to perform their work while being monitored seamlessly. Any events not adhering to SOP trigger notifications to admins for prompt action.

What needs improvement?

Improvements in CyberArk Privileged Access Manager should focus on simplifying installation and upgrade times, and also consider making professional services training more accessible to implementers and partners. Free training for implementers should be offered, and the installation and upgrade process should take less time. 

In addition to that, CyberArk should communicate their Impact events to customers and SI partners, and consider making them free, as these events showcase their roadmap and new features.

For how long have I used the solution?

I have been working with CyberArk Privileged Access Manager for more than eight years.

What do I think about the stability of the solution?

I find CyberArk Privileged Access Manager to be a stable solution and would rate its stability a nine out of ten.

What do I think about the scalability of the solution?

I would rate the scalability of CyberArk Privileged Access Manager an eight out of ten.

How are customer service and support?

I would rate CyberArk's customer support as a seven out of ten. The rating stems from the fact that sometimes critical issues require follow-ups, as the support team doesn't always recognize the urgency of a critical ticket immediately. There is a need for more dedicated support for some customers moving forward.

How would you rate customer service and support?

Neutral

How was the initial setup?

The previous versions were a bit difficult, but the newer versions have improved. They have done some scripting for the installation part, which has improved the overall installation very much. There is still some scope for improvement. I'm looking for an automated script where all the entities or inputs can be provided. Once that script runs on a particular server, CyberArk gets installed without any user interruptions. Currently, we have to be very specific with prerequisites and everything else. If the prerequisites are not met, there are some issues, and you have to sometimes rebuild that particular server. To avoid such things, an automated script should be there to check the overall prerequisites. After installation, there should be a global script that checks all the functionalities to see whether every entity and every component has been installed correctly or not.

What about the implementation team?

I am the implementer for CyberArk. As an implementer, my customers are from various industries, currently managing customers from the healthcare, telecom, and semiconductor industries.

What's my experience with pricing, setup cost, and licensing?

Since CyberArk is at the top of the Gartner list, the cost is indeed on the higher side, but customers must discern which entities are essential to purchase. They should weigh the cost against the quality received.

The setup cost for CyberArk depends upon the customer's infrastructure, and while it may be on the expensive side, the quality and support provided justify the investment, along with documentation and training that add value.

What other advice do I have?

CyberArk Privileged Access Manager is the best solution for safeguarding sensitive patient data in healthcare, providing visibility and traceability that enhance compliance. Its strong design offers security and visibility for events across all industries, showcasing its robust capabilities. CyberArk Privileged Access Manager is crucial for safeguarding credentials in healthcare organizations. 

I would recommend CyberArk Privileged Access Manager to those looking to use it. The biggest benefit is its versatility, providing comprehensive flexibility across various operational needs, while also offering expert support to resolve any issues encountered.

It stands out as the best tool on the market. It deserves a nine out of ten overall. 

Which deployment model are you using for this solution?

On-premises
Disclosure: My company has a business relationship with this vendor other than being a customer. Implementer
Last updated: May 14, 2025
Flag as inappropriate
PeerSpot user
Buyer's Guide
CyberArk Privileged Access Manager
February 2026
Learn what your peers think about CyberArk Privileged Access Manager. Get advice and tips from experienced pros sharing their opinions. Updated: February 2026.
881,757 professionals have used our research since 2012.
Mohammad Jasim - PeerSpot reviewer
Senior Information Security at a non-profit with 501-1,000 employees
Real User
Top 20
Feb 4, 2025
A comprehensive solution for securing our environment but it could be more user-friendly
Pros and Cons
  • "It has a lot of good tools, including everything we need."
  • "CyberArk Privileged Access Manager is cool."
  • "It could be more user-friendly. Sometimes I encounter issues, and I do not know what the issue is. It takes a lot of time to find the error and fix it. Sometimes it gives an error, but I do not know what the error is. I have to find the documents, but it does not provide all the details needed to fix the error. This is one of the day-to-day issues with CyberArk."
  • "It could be more user-friendly. Sometimes I encounter issues, and I do not know what the issue is."

What is our primary use case?

I am an admin, and I use this solution for all our users. We have 80 users in our environment.

How has it helped my organization?

By implementing CyberArk Privileged Access Manager, we wanted to secure our environment and track everything.

We were able to realize its benefits within four to five months of its deployment after we had onboarded everything.

What is most valuable?

CyberArk Privileged Access Manager is cool. It has a lot of good tools, including everything we need. 

What needs improvement?

It could be more user-friendly. Sometimes I encounter issues, and I do not know what the issue is. It takes a lot of time to find the error and fix it. Sometimes it gives an error, but I do not know what the error is. I have to find the documents, but it does not provide all the details needed to fix the error. This is one of the day-to-day issues with CyberArk. 

When I contact support, it takes a long time to get help. They request all these logs, but they are not always relevant to my case. It is not always a definite help because I sometimes need help with issues that do not require any logs or device details. I am not sure if they read the case or not.

For how long have I used the solution?

I have been using CyberArk Privileged Access Manager for four years.

What do I think about the stability of the solution?

It is good. We had a ten-minute outage last month. That is all. We do not know the reason. 

It is reliable.

How are customer service and support?

CyberArk's support quality has to improve because we are totally dependent on them. I would rate their support a five out of ten.

How would you rate customer service and support?

Neutral

Which solution did I use previously and why did I switch?

I used to use Okta. CyberArk Privileged Access Manager has more features.

How was the initial setup?

We had a third-party professional service that helped us to install it. It took about four or five months. To deploy, we worked with three people.

It does not require any maintenance. We just have to do the day-to-day operations work.

What other advice do I have?

New users should have training before they sign up for CyberArk. CyberArk should provide mandatory training so that everyone implements it properly. Sometimes, new users do not know what is going on, and they open a ticket, which might be an issue from their end. CyberArk should have a new user training service so that everyone is familiar with it.

I would rate CyberArk Privileged Access Manager a seven out of ten.

Which deployment model are you using for this solution?

Public Cloud

If public cloud, private cloud, or hybrid cloud, which cloud provider do you use?

Other
Disclosure: PeerSpot contacted the reviewer to collect the review and to validate authenticity. The reviewer was referred by the vendor, but the review is not subject to editing or approval by the vendor.
PeerSpot user
Consultant at a tech vendor with 11-50 employees
Reseller
Top 5Leaderboard
Mar 7, 2025
Helps monitor activities and rotate passwords, also it's very customizable
Pros and Cons
  • "The features that are most effective, like every PAM solution, include monitoring and password rotations."
  • "The solution is very stable."
  • "There are some options in the web portal where they can improve the user experience. For example, in remote, there is a parameter called 'access to remote machine.' When we put host names in that field, we are not able to search it. It"
  • "There is a lot of complexity if we are installing the solution on-premises."

What is our primary use case?

Our main use cases are to monitor all privileged accesses. It can be HTTPS, LDAP, SSH, or SQL management, so anywhere we have privileged access, we want to monitor it and place it under CyberArk.

How has it helped my organization?

Its monitoring capabilities are good. Whenever the end users start their session, it quickly allows you to monitor. However, if there are no firewall rules, it creates a video, but it does not take all the audit logs. For audit logs, you need firewall rules. It is very well described in their documentation. At the start, they communicate this to clients. The documentation is well-defined.

What is most valuable?

The features that are most effective, like every PAM solution, include monitoring and password rotations. 

The best thing about this solution, especially on-premises, is that we can interact with it directly. If we need to develop something, we are allowed or can do it by ourselves, which is most effective for us as administrators. It is not a black box. We have the ability to customize, especially the connection components.

What needs improvement?

There are some options in the web portal where they can improve the user experience. For example, in remote, there is a parameter called 'access to remote machine.' When we put host names in that field, we are not able to search it. It would be useful if a search feature was there to check if a machine is already onboarded. When we onboard a few machines in the same domain using just one account, we put the domain name in the address field and host machine names in the remote access parameter. However, we are not able to search within that field, which makes it difficult for us as admins to know if a machine has already been onboarded.

Other than that, I do not have any areas for improvement. Whenever we find any bugs or have a need for a feature, we open a ticket with them. They usually work on that if the same request has also come from other people. They are already good at doing that.

For how long have I used the solution?

I have been working with CyberArk for almost six to seven years.

What do I think about the stability of the solution?

The solution is very stable. If you install the solution with CyberArk's guidelines, it remains stable. I also offer 24/7 services, and in three years, I have received two or three calls from clients indicating the solution was not working. It means the solution is very stable.

What do I think about the scalability of the solution?

It is scalable. If a client has 100 users and wants to add 100 more users, it is possible. They can make it bigger and smaller, depending on their needs.

Our clients are medium enterprises.

How are customer service and support?

Their technical support is good. They provide solutions and also the documentation if you ask. If you cannot find something, they point you to the right documentation. With support, I have never found any problems.

How would you rate customer service and support?

Positive

How was the initial setup?

There is a lot of complexity if we are installing the solution on-premises. On the cloud, there is no such complexity, but on-premises, it is complex because there are different components like Vault, PVWA, PSM, and CPM. There are many components, and we need to follow a sequence to install these products. One needs a good knowledge of these components to install because we cannot just follow the documentation and install it. The documentation is vast. First, we need to read all of it. For first-time users, it is a bit difficult, but with experience, it is not a big deal. In terms of ease of use, I would rate it a six out of ten for on-premises and a nine out of ten for the cloud.

The deployment model depends on the clients. Our clients from banks usually use it on-premises. Clients in other fields do not want to install the machines on-premises because that is resource-consuming, so they go for the cloud deployment.

With the cloud deployment model, the clients need to deploy fewer components in their infrastructure. Vault and PVWA are already in the cloud, but other components like PSM, CPM, and PSMP are on-premises. It is not that all the infrastructure is on the cloud. There are a few components that are on-premises. However, in the case of on-premises, all the components are on-premises inside the infrastructure of the client, and they are responsible for maintaining that.

What was our ROI?

Our clients have seen an ROI.

What's my experience with pricing, setup cost, and licensing?

If you want a Ferrari, it will cost you. The solution is really nice, so it costs the client, but in the long run, it is very good. If you buy a solution that costs a lot to maintain because it is not stable, and you are frequently asking for consultant support, it costs more. It is better if the client spends a little more money initially. In the long run, it is very good.

What other advice do I have?

My recommendation depends on your needs and what you want to achieve. If you just want SSH, LDAP, and basic monitoring, you can consider other solutions like Wallix or One Identity, which cost less. If you need a lot of customization, such as you want to put in a lot of HTTPS ports and change the passwords of internal applications, this solution is much better than others. 

I would rate it a nine out of ten.

Disclosure: My company has a business relationship with this vendor other than being a customer.
PeerSpot user
Operation Specialists at a tech vendor with 10,001+ employees
Real User
Top 10
Aug 19, 2025
Protects financial infrastructure with credential security and audits while continuously recording sessions
Pros and Cons
  • "The ability of CyberArk Privileged Access Manager to safeguard the financial services infrastructure by protecting credentials is extremely important, as every activity in a financial organization needs to be recorded for accountability in auditing."
  • "A notable request I have regarding CyberArk Privileged Access Manager is to address the issues of database corruption identified in cluster environments experienced by multiple clients."

What is our primary use case?

We use CyberArk Privileged Access Manager for least privilege and accountability purposes, while we also utilize the EPM solution for endpoint protection. Additionally, PTA is one of the most important tools from CyberArk Privileged Access Manager, which we use on a real-time protection basis. CyberArk Privileged Access Manager effectively prevents attacks on the financial service infrastructure, as we protect against lateral movement, credential stuffing, and since no passwords are available because they are rotated through CyberArk Privileged Access Manager, we can isolate every session and record all activity while monitoring in real-time.

What is most valuable?

The ability of CyberArk Privileged Access Manager to safeguard the financial services infrastructure by protecting credentials is extremely important, as every activity in a financial organization needs to be recorded for accountability in auditing. Therefore, CyberArk Privileged Access Manager is a crucial tool, and we utilize credential rotation as 85% of successful attacks in the last 10 years have been initiated through credential theft. Monitoring, recording, and credential rotating activities are crucial because if CyberArk Privileged Access Manager goes out of service, the total environment would collapse due to the lack of passwords for respective servers.

What needs improvement?

While I cannot suggest major changes, I did encounter a vulnerability concerning RADIUS blasts, which was recently mitigated by CyberArk Privileged Access Manager in their latest version, indicating an area for improvement in vulnerability assessments. Improvements in vulnerability assessment are essential. A notable request I have regarding CyberArk Privileged Access Manager is to address the issues of database corruption identified in cluster environments experienced by multiple clients.

For how long have I used the solution?

From 2021 to now, I have been working on CyberArk Privileged Access Manager.

What do I think about the stability of the solution?

I have not experienced any stability issues with CyberArk Privileged Access Manager.

What do I think about the scalability of the solution?

It is easy to scale.

How are customer service and support?

In terms of technical support, CyberArk Privileged Access Manager has provided excellent support without any doubt. Based on the issue resolution and support quality, I rate the support 10 out of 10.

How would you rate customer service and support?

Which solution did I use previously and why did I switch?

Before using CyberArk Privileged Access Manager, I did not evaluate any other PAM tools.

How was the initial setup?

Setting up CyberArk Privileged Access Manager is not complex, especially if you properly follow the recommendations from CyberArk.

What about the implementation team?

I handled the deployment myself.

What was our ROI?

CyberArk Privileged Access Manager has been very effective in helping my company meet compliance and regulatory requirements. Implementing CyberArk Privileged Access Manager saved time on compliance requirements in finance, typically around one hour.

What's my experience with pricing, setup cost, and licensing?

There has been no reduced cost associated with CyberArk Privileged Access Manager, as when it is required, you must pay for their licensing and prepare the full environment. While there are costs for the licensing of CyberArk Privileged Access Manager, it definitely provides value when I need any accountability or session recording.

What other advice do I have?

CyberArk Privileged Access Manager is one of the most important components from CyberArk, along with EPM (Endpoint Privilege Manager) and PTA (Privileged Threat Analytics tool). I recommend anyone considering CyberArk Privileged Access Manager to view it as a friendly environment, as it stands out among the other PAM solutions I have encountered. CyberArk Privileged Access Manager is highly recommended for its user-friendly nature. I rate CyberArk Privileged Access Manager a ten out of ten.

Which deployment model are you using for this solution?

On-premises
Disclosure: My company does not have a business relationship with this vendor other than being a customer.
Last updated: Aug 19, 2025
Flag as inappropriate
PeerSpot user
Coordenador at a computer software company with 1,001-5,000 employees
Real User
Top 10
Jun 10, 2025
Provides secure access and visibility, and it's highly configurable
Pros and Cons
  • "It's user-friendly and very configurable. We can do many things with it, especially with password management."
  • "CyberArk Privileged Access Manager's abilities to safeguard the infrastructure are important, as protecting credentials provides us with security and visibility."
  • "Making the reports more editable would be beneficial."
  • "It's not a cheap application. It's very expensive."

What is our primary use case?

The use cases for CyberArk Privileged Access Manager include access to Windows, Windows servers, Linux servers, firewalls, clouds, GCP, AWS, and Azure, but I do not administer the clouds. I only administer CyberArk.

How has it helped my organization?

CyberArk Privileged Access Manager helps us maintain an inventory of our privileged credentials and manage password rotation easily for our organization. It provides a secure way to access and monitor.

CyberArk Privileged Access Manager has positively impacted visibility into the PAM accounts. It has a very good dashboard that provides visibility into our accounts and password information.

CyberArk Privileged Access Manager's abilities to safeguard the infrastructure are important, as protecting credentials provides us with security and visibility.

CyberArk Privileged Access Manager is effective for preventing attacks and threats. It's very effective since it connects to a SIEM, such as Splunk and ArcSight. The functionality called PTA, Privileged Threat Analytics, is very good.

CyberArk Privileged Access Manager integrates well with other products.

CyberArk Privileged Access Manager improves operations because it's all centralized. When you have CyberArk to gain access to the admin console and other applications, it's the easiest way to configure your firewall rule because everything comes from CyberArk.

What is most valuable?

It's user-friendly and very configurable. We can do many things with it, especially with password management. It's easy to manage, and the controls are straightforward. It's a specialized solution for which it's hard to find professionals to work with, but it's very effective.

It's a very good solution for data privacy.

What needs improvement?

The reports could be more editable. I want to be able to edit a dashboard to see other information or graphics. Making the reports more editable would be beneficial.

For how long have I used the solution?

I've been using this solution for at least five years.

How are customer service and support?

I would evaluate the customer service and technical support of CyberArk Privileged Access Manager as very good.

How would you rate customer service and support?

Positive

Which solution did I use previously and why did I switch?

I worked with Senhasegura, which is a Brazilian application for password security. We switched to CyberArk Privileged Access Manager because it is recommended for larger environments.

How was the initial setup?

The initial setup is easy. I was involved in the setup process and was part of it.

It takes six months for the full implementation in a big company.

What about the implementation team?

The deployment team consisted of approximately 10 people. While I don't know the exact job titles, a manager and at least two engineers on the CyberArk team were required.

What was our ROI?

CyberArk Privileged Access Manager has helped our organization save on costs. CyberArk Privileged Access Manager is expensive, but it helps protect us from losing money. 

Its benefits are visible immediately after the deployment, but in Brazil, people generally implement CyberArk Privileged Access Manager after an incident.

What's my experience with pricing, setup cost, and licensing?

It's not a cheap application. It's very expensive.

What other advice do I have?

Don't wait to be attacked or lose your data. Protect your credentials, even if you use other security tools. 

I would rate this solution a nine out of ten.

Which deployment model are you using for this solution?

On-premises
Disclosure: My company does not have a business relationship with this vendor other than being a customer.
Last updated: Jun 10, 2025
Flag as inappropriate
PeerSpot user
reviewer2620185 - PeerSpot reviewer
IT Cyber Security Lead at a mining and metals company with 1,001-5,000 employees
Real User
Top 20
Dec 29, 2024
Personalized assistance, session recording and monitoring capabilities make it the best option for us
Pros and Cons
  • "The session recording and monitoring capabilities are valuable. We have real-time session management ability to record, audit, and monitor any privileged user activities. That is a big deal."
  • "CyberArk's support is excellent, providing personalized assistance through a dedicated local account manager and sales engineer."
  • "CyberArk has brought a feature called Vendor Team Manager, but it does not provide full access. It requires the vendor team leader to be onboarded as a local account instead of using their email address. Improvements could be made to onboard the vendor team leaders using their email, allowing them to manage their own team. That would greatly reduce the overhead in managing vendor team members."
  • "There is room for improvement, particularly with Vendor PAM."

What is our primary use case?

The primary use case for CyberArk Privileged Access Manager in our organization is to ensure we move away from named identity admin access, which lacks protection such as MFA and other features offered by cloud privileged identity management solutions. Our goal was to protect anything on-prem related to Active Directory privileged access, so we chose to go with CyberArk Privileged Access Manager.

How has it helped my organization?

I am the cybersecurity lead in my organization. Every single year when we do the audit, one of the things that consistently comes up is how there are hashes floating around the environment. Since switching over from named admin-privileged identities to CyberArk PAM identities, like PAM accounts, there have been almost no breadcrumbs left behind. There are no hashes and that sort of thing. We hardly see any hashes floating around the environment. We have not done the audit yet, which is due next month, but I have been keeping an eye on the hashes and it is looking promising.

What is most valuable?

The session recording and monitoring capabilities are valuable. We have real-time session management ability to record, audit, and monitor any privileged user activities. That is a big deal.

Automatic credential rotation and granular access control for target resources accessed by admins add to the value. 

Seamless integration with the SIEM, especially Microsoft Sentinel, is valuable.

Lastly, the platform's versatility allows for the use of different types of platforms beyond just RDP and SSH, including SQL and web applications.

What needs improvement?

There is room for improvement, particularly with Vendor PAM. We were previously using a competitor product that allowed vendors to manage their own teams. CyberArk has brought a feature called Vendor Team Manager, but it does not provide full access. It requires the vendor team leader to be onboarded as a local account instead of using their email address. Improvements could be made to onboard the vendor team leaders using their email, allowing them to manage their own team. That would greatly reduce the overhead in managing vendor team members. We have 50 to 100 vendors. Each vendor has at least 10 to 20 accounts., so we are talking about 500 to 1,000 accounts. It would be easier if we could just manage those 50 vendor team leaders rather than hundreds.

For how long have I used the solution?

We have been using CyberArk Privileged Access Manager for six months, having started on the first of July.

What do I think about the stability of the solution?

Stability has been impressive. We have not experienced downtime for any reason. We did encounter one bug, but it was resolved once a patch was applied. The system is very stable and seamless. It requires minimal intervention to maintain high functionality.

When we took over as system owners of CyberArk, I thought every single time there was an update, we would have to stay up the night to do the patches and make sure it worked, but it has been very smooth and seamless. There is no friction. Everything has been taken care of at the back end, and we have not had to do anything out of hours. It has been very good.

I would rate it a ten out of ten for stability.

What do I think about the scalability of the solution?

So far, scalability has been excellent. Initially, we deployed the architecture for 10 to 20 users, but we have onboarded 30 users while still on that mid-tier configuration. We have had no issues.

Being a mining company, we do have operations at various sites. That includes multiple sites in Australia as well as a couple of sites in Northern America. We do have multiple sites with critical infrastructure on every single site. 

At the moment, we have 50 user licenses, and so far, we have onboarded 30 users. We have 20 more users and some more coming on board in the new year.

I would rate it a ten out of ten for scalability.

How are customer service and support?

CyberArk's support is excellent, providing personalized assistance through a dedicated local account manager and sales engineer. Their responsiveness is impressive, even though our location is quite isolated. We receive prompt support, which often exceeds expectations.

The dedicated local account manager has been providing us with personalized assistance tailored to the unique challenges that we have as a mining organization. The sales engineer supported us with his expert technical guidance during the deployment as well. It has been amazing. Both of these guys ensured smooth implementation.

For any issues that are not important, we raise tickets for customer support, and they have been very responsive. They get us back promptly. That is something unheard of because we are a very isolated city in Australia. Ours is the most isolated city in the world. The nearest city to us is 2,400 kilometers away. For someone like us, the support has been amazing. Sometimes, with other vendors, we have to wait a couple of days to hear back from them, but CyberArk has been exceptional in coming back to us with immediate responses. Their support has been perfect. I would rate them a ten out of ten.

How would you rate customer service and support?

Positive

Which solution did I use previously and why did I switch?

Previously, we used BeyondTrust. We decided to switch to CyberArk due to its superior support, scalability, adaptability, and the local presence of account managers and sales engineers, which facilitated a smooth and effective experience. 

While other products in the market may offer certain features at a competitive price, they often compromise on support, scalability, and adaptability. The main thing for us was the support. CyberArk combines top-notch technical capabilities with the local human touch of the local account managers and sales engineers. That was a big thing for us because that ensured a smooth and effective experience throughout the journey, which other products lacked. 

We are in the West of Australia, and all the competitors are in the East. The only way to communicate is over the phone, and we would only see them once or twice a year. Having local account managers and a sales community was a game changer. Also, considering the reputation and the gold standard for Privileged Access Manager, others cannot compete with CyberArk.

How was the initial setup?

It is a fully SaaS model, but because of the way CyberArk is architected, we do have our jump servers, PSM connector servers, and Secure Infrastructure Access servers in Azure, but it is not self-hosted. It is a cloud solution.

The jump start that was offered as a part of the product licensing was a game changer. When it comes to CyberArk, the complexity is quite high. That comes with security. Security and usability do not go hand in hand, but we have had help throughout our journey. The initial setup was detailed and supported actively by CyberArk's jump-start engineer. Every question was addressed, and the deployment was well-structured.

To realize its benefits, we had to wait until the users were happy using the PAM accounts. The individual privileged identities were still being used, so it took almost three months. That was the time it took for us to onboard the PAM accounts, hand over those accounts to the users, and confirm that it was working as expected.

In terms of maintenance, I thought there was going to be a lot of maintenance because we are the system owners, but so far, it has not skipped a beat. All the updates were very smooth. We did not have to do any work installing the patches, apart from underlying Windows patches, which is the sysadmin's job. If sysadmins are able to patch them, the product is resilient enough to come back up and do its function. Any updates related to the product itself are installed in the background, and it is very transparent for the user. It has been very seamless.

What about the implementation team?

CyberArk's jump-start engineer played a crucial role in our successful deployment. He helped us all the way. Even now, about six months into the journey, he is helping us out with a few bits and pieces. Having that jump-start there was a game changer.

What was our ROI?

During our quantitative analysis, we estimated potential savings of one to ten million dollars a year by using a PAM solution. A cyber breach relating to admin-privileged access could lead to a financial loss of ten million dollars. If a standard user account is breached or compromised using their credentials, they cannot escalate to our higher privilege ones or cannot move laterally within the network. That was a game-changer.

What's my experience with pricing, setup cost, and licensing?

CyberArk Privileged Access Manager is perceived to be somewhat overpriced compared to similar market products. It is a little bit overvalued. It could come down a little bit for my liking. However, the industry-leading reputation and the quality of service justify the high price point to some extent.

What other advice do I have?

I would highly recommend CyberArk Privileged Access Manager. It is a leader in the privileged access management space, offering robust tools to secure credentials across IT and OT environments. We are very heavy on OT environments. It has been nothing but the best.

I would rate CyberArk Privileged Access Manager a ten out of ten.

Which deployment model are you using for this solution?

Public Cloud
Disclosure: PeerSpot contacted the reviewer to collect the review and to validate authenticity. The reviewer was referred by the vendor, but the review is not subject to editing or approval by the vendor.
PeerSpot user
reviewer2699367 - PeerSpot reviewer
Sr IT Security Spec at a financial services firm with 5,001-10,000 employees
Real User
Top 20
Apr 28, 2025
Provides good control over privileged access but users sometimes experience lagging
Pros and Cons
  • "CyberArk Privileged Access Manager has made our operations more streamlined. There is an approval process, so it helps us keep tabs on who's working on what and for how long."
  • "CyberArk Privileged Access Manager has made our operations more streamlined."
  • "Occasionally, there are lagging issues. Sometimes users have to re-login. When users copy passwords, there is sometimes a lag, so they have to log out and log in, but these are very rare cases."
  • "The solution that they proposed was not straightforward because of the backend processes of CyberArk."

What is our primary use case?

We use CyberArk Privileged Access Manager to manage privileged access, so all the privileged accounts are vaulted in CyberArk, and that's our control method to manage privileged access. We also manage access for developers, so we have dual control to give approval to developers.

How has it helped my organization?

CyberArk Privileged Access Manager has made our operations more streamlined. There is an approval process, so it helps us keep tabs on who's working on what and for how long. We also have to give a reason when we're using privileged accounts, which helps keep track of whether they're being used correctly. 

It's been good so far in safeguarding the infrastructure, but we've not used additional features of CyberArk Privileged Access Manager. Modern PAM with secure web sessions or secure infrastructure access is something that I learned about at the conference. I am curious about how we can use it.

It has not helped to reduce the number of privileged accounts. Whatever we find privileged in the environment, we want to control that by using CyberArk Privileged Access Manager. That's how we're able to control it. It has helped us identify privileged access better because we discovered users who didn't need privileged access. There have been cases where users with privileged access don't want their accounts in PAM because they need to pick up the password on a daily basis to perform their actions. There have been cases where they've gotten their privileged access off the account because it's not needed.

The user interface needs some training, but with a guide telling the user how to go about it, we have received positive feedback from whoever has used it.

It took us some time to realize its benefits because any new tool needs a proper understanding of how it can be used. A lot of testing was done on the engineering side, and demos were given. It took some time, but it is going smoothly.

What is most valuable?

Given that this is the only tool that I've worked with for the control process of privileged access, I don't have anything to compare it with. However, it's helped us keep our privileged access in check. We're able to get logs as to when the user checks out an ID and for how long, so it's a good monitoring tool.

What needs improvement?

They covered a lot at the conference. I don't have visibility into what product we've bought. It would be nice for them to approach us with what we have bought versus the new features being added. We need clarity on whether new features come included in the package that we already have, or if it's something that we need to have over and above.

Occasionally, there are lagging issues. Sometimes users have to re-login. When users copy passwords, there is sometimes a lag, so they have to log out and log in, but these are very rare cases.

For how long have I used the solution?

I've been using it for about 5 years.

What do I think about the stability of the solution?

Occasionally lagging occurs. I've not heard about crashing, but there is a lag. Sometimes users will have to re-login and get it right.

How are customer service and support?

The team that I work with is our in-house engineering team. I've had a conversation with CyberArk once last year revolving around efficiently generating the inventory reports. I contacted the technical support, but I didn't get a very straightforward solution that I was expecting.

We were developing a dashboard to find all the privileged accounts that weren't vaulted in CyberArk. We wanted the inventory report to be generated on a daily basis, but were having some trouble. We reached out to their technical support. The solution that they proposed was not straightforward because of the backend processes of CyberArk. We had to approach it in a different way.

How would you rate customer service and support?

Neutral

What other advice do I have?

I would rate CyberArk Privileged Access Manager a seven out of ten.

Disclosure: PeerSpot contacted the reviewer to collect the review and to validate authenticity. The reviewer was referred by the vendor, but the review is not subject to editing or approval by the vendor.
PeerSpot user
Buyer's Guide
Download our free CyberArk Privileged Access Manager Report and get advice and tips from experienced pros sharing their opinions.
Updated: February 2026
Buyer's Guide
Download our free CyberArk Privileged Access Manager Report and get advice and tips from experienced pros sharing their opinions.