Try our new research platform with insights from 80,000+ expert users
IkedeEbhole - PeerSpot reviewer
Pre sales Engineer (West Africa) at StarLink - Trusted Security Advisor
Real User
A useful solution for privileged identity and application identity management
Pros and Cons
  • "It's a good solution, it works, and the bank is happy with it."
  • "The architecture needs to be improved."

What is our primary use case?

Our primary use case for his solution is privileged identity and application identity management, and we deploy the solution on-premises.

What is most valuable?

We have found the core features of the product most valuable, such as password management, session recording and vaulting.

What needs improvement?

The architecture needs to be improved. For example, the whole solution can come within a single software bundle instead of the distributed components we have for the on-premise deployments. I think there's room for improvements in that area because the competitors within that space have appliances and software that are just a single software. You don't have to split functionality across several servers like the current deployment.

For how long have I used the solution?

We have been using this solution for approximately five years.

Buyer's Guide
CyberArk Privileged Access Manager
May 2025
Learn what your peers think about CyberArk Privileged Access Manager. Get advice and tips from experienced pros sharing their opinions. Updated: May 2025.
851,823 professionals have used our research since 2012.

What do I think about the scalability of the solution?

The solution is scalable. At the point of implementation, 300 users in our organization were using it, but that number may have increased.

How was the initial setup?

The initial setup is not very complex because of my experience and skills. Still, the end users are only in charge of the administrative aspects, but I think the set up is a bit complex for those who are not very savvy with the solution. Implementation took approximately two weeks.

What other advice do I have?

I rate the solution nine out of ten. The solution is good, but the main feature to be improved is having the product in a consolidated software bundle. So the moment we have PSM, it's a dedicated server. We can also have a PVWA in another server, so having a singular bundle is just like the cloud offering. The infrastructure is abstracted from the end user. So if we can have something like that for on-premises, that would simplify implementation. Regardless it's a good solution, it works, and the bank is happy with it. My recommendation to people considering implementing this product is to get the scoping appropriately done. It comes down to scoping the initial deployment, so it doesn't take forever. Still, if you're not scoping correctly, you could have a situation where people keep adding new accounts continuously, and your project never ends. Hence, scoping is kind of important.

Disclosure: I am a real user, and this review is based on my own experience and opinions.
PeerSpot user
Senior Security Manager at SMU
Real User
Reliable, scalable, and easy to install but the pricing could be better as it's expensive
Pros and Cons
  • "Its' quite stable."
  • "They need to provide better training for the System Integrator."

What is our primary use case?

We use this solution for ID purposes. When we remove a user from the server, we need a privileged ID password.

We are a University. It's a large organization.

What is most valuable?

It's not very different when compared with other products.

What needs improvement?

From what I can see, the Systems Integrator is useless. When I ask for the information, nothing is given to me. They need to provide better training for the System Integrator.

For how long have I used the solution?

I have been working with this solution for two years.

What do I think about the stability of the solution?

Its' quite stable.

What do I think about the scalability of the solution?

It's a scalable solution but could be improved. On a scale of one to five, I would rate it a four.

How are customer service and technical support?

I have not used technical support.

How was the initial setup?

The initial setup is pretty easy. It is not complex.

What about the implementation team?

We used a reseller, integrators, but they were useless to me.

What's my experience with pricing, setup cost, and licensing?

Pricing is quite high and it could be improved.

What other advice do I have?

I would rate CyberArk Privileged Access Security a six out of ten.

Which deployment model are you using for this solution?

On-premises
Disclosure: I am a real user, and this review is based on my own experience and opinions.
PeerSpot user
Buyer's Guide
CyberArk Privileged Access Manager
May 2025
Learn what your peers think about CyberArk Privileged Access Manager. Get advice and tips from experienced pros sharing their opinions. Updated: May 2025.
851,823 professionals have used our research since 2012.
PeerSpot user
Princ. Info Security Analyst at a insurance company with 10,001+ employees
Real User
Ensures accounts are managed according to corporate policies
Pros and Cons
  • "Ensures accounts are managed according to corporate policies."
  • "It takes people out of the machine work of ensuring credentials remain up-to-date, and handles connection brokering such that human usage and credential management remain independent."
  • "It is easily customized, and that customization makes it very easy to start trying to shoehorn the solution into roles it was never intended to fill."

What is our primary use case?

We use it all.

  • Privileged account access and management
  • Credential rotation
  • Access control
  • Privileged session recording

How has it helped my organization?

CyberArk PAS helps ensure accounts are managed according to corporate policies. In short, it takes people out of the machine work of ensuring credentials remain up-to-date, and handles connection brokering such that human usage and credential management remain independent.

What is most valuable?

All of the features we use have helped our security posture in some way. All of these have their place in defining and supporting the security posture:

  • Password management
  • Session management
  • Recording
  • Access control.

What needs improvement?

Overall, I think it is a fantastic product, when used as designed and intended.

One of its biggest downfalls is also one of its biggest strengths. It is easily customized, and that customization makes it very easy to start trying to shoehorn the solution into roles it was never intended to fill.

For how long have I used the solution?

More than five years.
Disclosure: I am a real user, and this review is based on my own experience and opinions.
PeerSpot user
PeerSpot user
Senior Consultant at a consultancy with 10,001+ employees
Consultant
The combination of CPM and PSM resolves a lot of use cases.
Pros and Cons
  • "The combination of CPM and PSM resolves a lot of use cases."
  • "They can do a better job in the PSM space."

How has it helped my organization?

All the high privileged accounts are managed by CyberArk at a regular frequency. This mitigates the big risk that we had for passwords not changing forever.

What is most valuable?

The combination of CPM and PSM resolves a lot of use cases.

What needs improvement?

They can do a better job in the PSM space.

What do I think about the stability of the solution?

It has been pretty stable. No ongoing issues; only one-off, and CyberArk support has been pretty good for support.

What do I think about the scalability of the solution?

I can foresee some issues if we suddenly have to put thousands of passwords into CyberArk Vault. I know they have the password upload utility, but it has its limitations.

How are customer service and technical support?

Customer Service:

Their support is pretty good and responsive.

Technical Support:

Their support is pretty good and responsive. Their L3 is in Israel, so sometimes it takes more time getting responses for complicated use cases.

Which solution did I use previously and why did I switch?

I did not previously use a different solution. I have always used CyberArk.

How was the initial setup?

I would rate initial setup as a medium complexity. They have good documentation, as well.

What about the implementation team?

I am from a vendor team that does the implementation.

What's my experience with pricing, setup cost, and licensing?

I was not involved in the pricing and licensing. I have an idea that it's on the higher side of the price scale.

Which other solutions did I evaluate?

Before choosing this product, we also evaluated Dell and NetIQ.

Disclosure: I am a real user, and this review is based on my own experience and opinions.
PeerSpot user
it_user512265 - PeerSpot reviewer
Consultant at a tech company with 1,001-5,000 employees
Vendor
It is modular, and each module can extend its operational area with plug-ins.

What is most valuable?

I think that one of the advantages of the CyberArk PAS suite is that it is modular. On top of the basics, you can implement modules to:

  • Manage (verify, change and reset) privileged passwords and SSH keys
  • Manage (isolate and monitor) privileged session to the different types of devices
  • Control Applications (e.g., malware)
  • Detect, e.g., backdoor use, unusual behavior, and Kerberos hacks of privileged accounts
  • Avoid/remove hardcoded passwords in applications/scripts
  • Implement the principle of least privilege

Even those components can extend their operational area by use of, e.g., plug-ins, making it possible to manage about any kind of privileged account or session.

How has it helped my organization?

I see companies that already have thought about their privileged accounts, while others have not (to that extent). Implementing the CyberArk solution, it helps (and sometimes forces) these companies to think about their privileged accounts. Are they really needed? Who needs access to them? What kind of privileges do these accounts need (service accounts/log on accounts/etc.)? And so on. Thinking about these things helps customers to organize their data/privilege accounts in the CyberArk solution. It then helps the organizations to get control of their privileged accounts and to safely store and manage these, knowing that only the correct persons can access these accounts and that the different devices can only be managed via one central entry point to the datacenter.

What needs improvement?

With every version, I can see that the product wins on functionality and user experience. On the latter though, I hear from customers that on the UI level, things could be better. CyberArk continuously asks for feedback on the product (e.g., via support, yearly summits) from customers and partners, and hence, with version 10, they are addressing these remarks already.

The web portal (and hence the user interface) has some legacy behavior:

  • Some pages are created for past-generation monitors. With current resolutions, filling the pages and resizing some elements on the pages could be handled better.
  • They are not consistent with the layout of different pages. Some have, let’s say, a Windows 7 look and feel, while others have the Windows 8 look and feel.

Nevertheless, even with those remarks, it does what it is supposed to do.

For how long have I used the solution?

I’m working as a partner of CyberArk for about four years now. I started on version v7.1 (currently on v9.7) and I have served about 20 happy customers.

What do I think about the stability of the solution?

As no software is perfect, I don’t think it is any different with CyberArk. Their support, however, is able to tackle most of the problems. Sometimes patches are distributed. The CyberArk solution highly integrates with different platforms (Windows/Linux) and applications (AD, SIEM, email, etc.). So, not configuring it well can result in unexpected behavior. You need to consider the limitations of the platforms it is installed on, as well.

What do I think about the scalability of the solution?

As mentioned, one of the advantages of the CyberArk PAS suite is the modular build up; not only on covering the functional area, but also on size of your network/datacenter. If you, e.g., notice that the number of privileged accounts to manage increases, you can simply add an additional module/component that manages those passwords.

How are customer service and technical support?

Their support is good. It is split up into different areas (technical, implementation, etc.) and I always have a quick answer. And they go all the way for their customers.

Which solution did I use previously and why did I switch?

I saw customers using another product for their privileged accounts. Due to its limitations (e.g., on password and session management) and stability, they decided to switch to CyberArk.

How was the initial setup?

This question goes both ways; initial setup can be straightforward and it can become complex. The architecture in the network and installation of the software itself is pretty straightforward. Most of the modules/components are agentless. This makes it possible to install the solution in the datacenter without impacting any existing devices (no impact on running systems, and simplifying change and release management). Integrating the systems (privileged accounts) in the CyberArk solution can happen gradually.

The flexibility of the product, on the other hand, has as a consequence that there is a lot to configure. Depending on the existing infrastructure and functional demands at the different organizations, care has to be taken to have a correct implementation.

What's my experience with pricing, setup cost, and licensing?

As far as pricing, personally, I’m not involved in the sales part. So, I cannot elaborate on this topic. For licensing, I can advise the same thing as mentioned elsewhere: Start small and gradually grow.

Which other solutions did I evaluate?

Before choosing this product, I did not evaluate other options (being a partner, not customer).

What other advice do I have?

The Privileged Account Security product is a suite. That means that the product consists of different components/modules that cover a particular functional area (check their website) on privileged accounts. Plugging in more of those components in the environment results in covering a greater part of that area. Of course, there is a common layer that is used by all components. This is the security layer that holds and protects the privileged accounts.

Start small. Use first the basic components that, e.g., include password management. Gradually grow the number of components/modules/functional area to include, e.g., other types of accounts, session management, intrusion detection, end-point protection, etc. Having a project scope that is too large will make the step of using the solution too big. Make sure every stakeholder in the project is aware and let them gradually ‘grow’ with the product.

Disclosure: My company has a business relationship with this vendor other than being a customer: My company has a partnership with CyberArk.
PeerSpot user
it_user326337 - PeerSpot reviewer
it_user326337Customer Success Manager at PeerSpot
Real User

Which improvements are you waiting to see in the product's UI?

Identity and Access Management Analyst at Security Finance Corporation
Real User
Stable feature functionality and usage has been reliable
Pros and Cons
  • "The solution is stable and reliable."
  • "The solution is too complicated to use and should be simplified. It took me a long time to understand how to use it. There is a lot that the solution can improve for the future."

What needs improvement?

The solution is too complicated to use and should be simplified. It took me a long time to understand how to use it. There is a lot that the solution can improve for the future.

For how long have I used the solution?

I used CyberArk Enterprise Password within the last 12 months.

What do I think about the stability of the solution?

The solution is stable and reliable.

What do I think about the scalability of the solution?

We have approximately eight people in my organization that use this solution.

What other advice do I have?

I did not like the solution at all and I was happy when we stopped using it.

I rate CyberArk Enterprise Password an eight out of ten.

Disclosure: I am a real user, and this review is based on my own experience and opinions.
PeerSpot user
it_user834369 - PeerSpot reviewer
Associate Vice President & Head of Apps Support at a tech services company with 10,001+ employees
Consultant
Excellent product for privileged access management and easy to implement
Pros and Cons
  • "For a while, there were individual IDs having privileged access. We wanted to restrict that. We implemented the solution so that it can be more of internal control. We can have session recordings happening and reduce our attacks."
  • "Integration with the ticketing system should allow any number of fields to be used for validation before allowing a user to be evaluated and able to access a server."

What is our primary use case?

Our primary use of CyberArk Privileged Access Manager is to bring control on to the privileged access. For a while, there were individual IDs having privileged access. We wanted to restrict that. We implemented the solution so that it can be more of internal control. We can have session recordings happening and reduce our attacks.

How has it helped my organization?

There are two main ways CyberArk Privileged Access Manager Server Control has been helpful to us.

  1. Any administrator using his own or her own ID and password to connect to the server or the domain that has been removed and the credentials for accessing the domain or the servers has been locked down into the password wallet, the access to it is controlled now through that group. Now we know who has access and what kind of access. Also, we control access through tickets. Unless there is an approved ticket, an administrator cannot just log onto a server and make changes. In this way, we are ensuring that an attack cannot just steal somebody's ADID and get into the server and create problems.
  2. Through the application and team managers, we have removed the hardcoded user ID and password in our applications. Those are now in a password vault that is not known to anyone. The vault knows and changes the password, then connects the applications to the database.

What is most valuable?

The features that we find most valuable are:

  • Enterprise Password Vault
  • Privilege Session Manager
  • Application Manager
  • Team Manager

These modules help us in locking down the credentials, rotating passwords automatically without us having to worry about it, isolation of servers from the user machine and availability of privileged session recordings for us to check on demand.

What needs improvement?

I think that the connectors, the integration pieces, the integration to ticketing system. This is something which is not meeting our requirements via out-of-the-box solutions, so we have to look for a customized solution, that could be improved.

Integration with the ticketing system should allow any number of fields to be used for validation before allowing a user to be evaluated and able to access a server.

Additional features: We are looking at the connectors. The connectors to be more robust and provide more flexibility for out-of-the-box implication.

For how long have I used the solution?

Less than one year.

What do I think about the stability of the solution?

It's quite stable so we've not faced any problems so far and it's been working smoothly for us. Initially, there were some technical issues, disconnections happening, and the slowness was there, but we've been able to overcome those challenges. Now for the past 15, 20 days, it's been running smoothly.

What do I think about the scalability of the solution?

The software is scalable enough, so if we want to add more domains, we can just go ahead and do it. I don't see a challenge with that. There are a couple of other parts of the solution that we are not rolling out, but we'll be doing that.

How are customer service and technical support?

The support has been good. Turnaround times have been okay. They have not been immediate, but they do respond in a few hours, or in a day.

Which solution did I use previously and why did I switch?

We didn't have a previous solution at the time.

How was the initial setup?

AIM was a complex piece, but the install was straightforward. It took us around five months.

What about the implementation team?

We went with an implementation partner for the deployment which included a number of admins. Currently, there are around 60 users but they are going to be 150 plus in a month or so.

We want the implementation partner for supporting it for the next three months, and then we will make the call whether we want to continue with them or maybe our resources should be good enough internally to support it.

What's my experience with pricing, setup cost, and licensing?

The cost and licensing fees of the software are fairly reasonable.

Which other solutions did I evaluate?

There were a few competitors we evaluated like CA Technologies, Arcos, Oracle, and Microsoft.

What other advice do I have?

My advice would be to plan ahead of time. Put up the plan for all the modules that you are going to implement. Look at what the dependencies of those are and plan for those dependencies in advance, then start the project.

Especially where it is the application identity manager, the AIM part, which is not only dependent upon the implementation partner but also the customer dev team to make the changes.

That's what makes it critical to plan ahead, ensure all stakeholders' commitment of their time and support, then start the implementation.

I would rate it nine out of ten.

Disclosure: I am a real user, and this review is based on my own experience and opinions.
PeerSpot user
Cyber security architect at a financial services firm with 10,001+ employees
Real User
Helpful support, reliable, and useful privileged support manager
Pros and Cons
  • "The privileged support manager is the most valuable feature of CyberArk Enterprise Password Vault."
  • "The interface could be improved it is not user-friendly, but they have improved but it could still improve. In the policies configuration, it would be a benefit to have more details."

What is our primary use case?

CyberArk Enterprise Password Vault is important to do privileged session management, access a privileged access manager. Additionally, it is important to do segmentation in your core environment with the support team. For example, it is doing access monitoring support in our servers.

What is most valuable?

The privileged support manager is the most valuable feature of CyberArk Enterprise Password Vault.

What needs improvement?

The interface could be improved it is not user-friendly, but they have improved but it could still improve. In the policies configuration, it would be a benefit to have more details.

For how long have I used the solution?

I have been using CyberArk Enterprise Password Vault for approximately five years.

What do I think about the stability of the solution?

CyberArk Enterprise Password Vault is stable.

What do I think about the scalability of the solution?

I have found CyberArk Enterprise Password Vault not to be scalable. There are hardware limitations.

How are customer service and support?

The technical support is very good and helpful.

How was the initial setup?

The initial installation is difficult because of the configuration. The process involved with the privileged access cycle is not easy to connect the process with the technology from CyberArk Enterprise Password Vault.

What other advice do I have?

I rate CyberArk Enterprise Password Vault an eight out of ten.

Which deployment model are you using for this solution?

On-premises
Disclosure: I am a real user, and this review is based on my own experience and opinions.
PeerSpot user
Buyer's Guide
Download our free CyberArk Privileged Access Manager Report and get advice and tips from experienced pros sharing their opinions.
Updated: May 2025
Buyer's Guide
Download our free CyberArk Privileged Access Manager Report and get advice and tips from experienced pros sharing their opinions.