The primary use case of this solution is for third-party developers that come into our infrastructure from VPN to connect. They are organizations that are outside of our organization.
Consultant at a financial services firm with 5,001-10,000 employees
Stable, secured access solution with good flexibility
Pros and Cons
- "The most valuable feature is that it is flexible. It has many connectors. that have done well, the EPV and SSH sessions are all being recorded and everything works fine."
- "In the next release, they could simplify the setup and I would like some tasks added like file sharing. When a client connects to CyberArk and wants to put a file on the server, they cannot."
What is our primary use case?
How has it helped my organization?
Before CyberArk, our developers would connect from the VPN directly to the jump servers to get all of their access. We have removed the jump servers to connect to CyberArk.
The security has improved. We know who is accessing and what they are doing. The access is secure.
CyberArk has increased our security.
What is most valuable?
The most valuable feature is that it is flexible. It has many connectors. that have done well, the EPV and SSH sessions are all being recorded and everything works fine.
What needs improvement?
This solution does not support the SQL Developer. We have to purchase separately from CyberArk and we have to ask them to develop it.
This solution is a bit complex compared to other solutions. The installation and administration are complex.
Some things can be done through the interface, but the whole installation process and upgrade process can be done with the installation script but it's complex.
This is too complex for some organizations that do not have a large scale.
In the next release, they could simplify the setup and I would like some tasks added like file sharing. When a client connects to CyberArk and wants to put a file on the server, they cannot.
I thought that the client would be able to drop a file onto the server and the file would be visible on the server.
I have to disable the connection to provide a copy and this is a security issue, and I closed this file to the client then he can't upload and files to us.
They need to come up with a way for the client to file share with CyberArk.
Buyer's Guide
CyberArk Privileged Access Manager
May 2025

Learn what your peers think about CyberArk Privileged Access Manager. Get advice and tips from experienced pros sharing their opinions. Updated: May 2025.
851,823 professionals have used our research since 2012.
For how long have I used the solution?
I have been using this solution for six months.
What do I think about the stability of the solution?
This solution is stable. We have not had any issues.
What do I think about the scalability of the solution?
This solution is scalable but pricey.
There are fifty users and they are developers.
How are customer service and support?
I have not contacted technical support. I am not an engineer, I work for the bank and I have implemented this solution.
Which solution did I use previously and why did I switch?
Previously we used Fudo and jump servers with OTP. It is not the same, but from a security perspective, it is also quite good and less expensive.
How was the initial setup?
The initial setup is complex.
You need at least one engineer to manage the software. I must have dedicated people to administer it.
What about the implementation team?
We worked with integrators for the installation. The first step was the installation process and the hardening. This process took two weeks to implement.
The migration process was more complex and more time-consuming.
What's my experience with pricing, setup cost, and licensing?
This solution is expensive.
What other advice do I have?
My advice would be to compare with other products and if they don't want such a large solution they could try Fudo or a similar solution that is easier and can scale like CyberArk.
I would rate this solution a nine out of ten.
Which deployment model are you using for this solution?
On-premises
Disclosure: I am a real user, and this review is based on my own experience and opinions.

Project Manager at a tech services company with 10,001+ employees
It is secure and simple to use
Pros and Cons
- "The voice technology is very good."
- "It is very simple to use."
- "The initial setup was somewhat complex."
What is our primary use case?
We are using it for privileged access management.
What is most valuable?
- It is very secure.
- The voice technology is very good.
- It is very simple to use.
For how long have I used the solution?
More than five years.
What do I think about the scalability of the solution?
We haven't had issues with scalability.
How are customer service and technical support?
We have good support from support. They are very helpful.
Which solution did I use previously and why did I switch?
We did not have a previous solution.
How was the initial setup?
The initial setup was somewhat complex, but we received help from the product support team with the installation.
What's my experience with pricing, setup cost, and licensing?
The product is costly due to its active management features.
What other advice do I have?
The product is the best in the market at the moment.
I would recommend the product for sales learning.
Disclosure: I am a real user, and this review is based on my own experience and opinions.
Buyer's Guide
CyberArk Privileged Access Manager
May 2025

Learn what your peers think about CyberArk Privileged Access Manager. Get advice and tips from experienced pros sharing their opinions. Updated: May 2025.
851,823 professionals have used our research since 2012.
Technical Consultant at a outsourcing company with 51-200 employees
Resource and administration costs are less but support needs to improve knowledge and quality
Pros and Cons
- "The accounts are maintained automatically. Hence, resource and administration costs are less."
- "CyberArk Enterprise Password Vault's deployment is complex for resources with little experience. Tech support needs to be improved as well based on quality and knowledge."
What is most valuable?
The accounts are maintained automatically. Hence, resource and administration costs are less.
What needs improvement?
CyberArk Enterprise Password Vault's deployment is complex for resources with little experience. Tech support needs to be improved as well based on quality and knowledge.
For how long have I used the solution?
I have been working with the product for more than five years.
What do I think about the stability of the solution?
The product is very stable.
What do I think about the scalability of the solution?
CyberArk Enterprise Password Vault is scalable.
How was the initial setup?
CyberArk Enterprise Password Vault's deployment can be done with two to three resources.
What other advice do I have?
I rate the solution a nine out of ten.
Disclosure: My company has a business relationship with this vendor other than being a customer: Partner
Information Security Engineer - Pre-sales at a tech services company with 11-50 employees
Beneficial privileged threat analytics, high availability, and priced well
Pros and Cons
- "The most valuable feature of CyberArk Privileged Access Manager is privileged threat analytics."
- "The issue of technical support is crucial, as there are not many specialized partners available in Brazil to provide this service. While English language support is of good quality, there is a significant shortage of partners capable of meeting the demand locally."
What is our primary use case?
We currently employ CyberArk Privileged Access Management, which involves extremely complex processes for ensuring the secure management, verification, and guarantee of credentials. Implementing the professional installation tool represents another challenging aspect of this task.
What is most valuable?
The most valuable feature of CyberArk Privileged Access Manager is privileged threat analytics.
What needs improvement?
The support could improve for CyberArk Privileged Access Manager.
For how long have I used the solution?
I have been using CyberArk Privileged Access Manager for approximately three years.
What do I think about the stability of the solution?
The solution has high availability.
What do I think about the scalability of the solution?
CyberArk Privileged Access Manager is highly scalable. When compared to other solutions it scales well.
I plan to use the solution more in the future.
How are customer service and support?
The issue of technical support is crucial, as there are not many specialized partners available in Brazil to provide this service. While English language support is of good quality, there is a significant shortage of partners capable of meeting the demand locally.
How was the initial setup?
The initial setup of CyberArk Privileged Access Manager is easy.
What was our ROI?
We have received a high ROI using CyberArk Privileged Access Manager.
What's my experience with pricing, setup cost, and licensing?
The price of the solution is reasonable.
I rate the price CyberArk Privileged Access Manager a seven out of ten.
What other advice do I have?
Individuals who wish to utilize CyberArk should be cautious when selecting a partner to implement the solution, as proper architecture design is essential to ensure a streamlined and effective implementation.
I rate CyberArk Privileged Access Manager a nine out of ten.
Which deployment model are you using for this solution?
On-premises
Disclosure: I am a real user, and this review is based on my own experience and opinions.
Director Of Technical Operations at BNB Security Alliance
Beneficial integration, helpful support, and scales well
Pros and Cons
- "The most valuable feature of CyberArk Privileged Access Manager is the vault. I am satisfied with the interface and the documentation."
- "CyberArk Privileged Access Manager could improve the integration with other solutions and ease of use. Additionally, there should be a feature to have remote connections without a VPN."
What is most valuable?
The most valuable feature of CyberArk Privileged Access Manager is the vault. I am satisfied with the interface and the documentation.
What needs improvement?
CyberArk Privileged Access Manager could improve the integration with other third-party secret managers, and vault solutions.
For how long have I used the solution?
I have been working with CyberArk Privileged Access Manager for approximately three years. Our clients are typically financial institutions.
What do I think about the stability of the solution?
CyberArk Privileged Access Manager is stable.
What do I think about the scalability of the solution?
The scalability of CyberArk Privileged Access Manager is good.
Most of our clients are enterprise-sized companies.
How are customer service and support?
I am satisfied with the vendor's support.
How would you rate customer service and support?
Positive
Which solution did I use previously and why did I switch?
I have used Balabit and One Identity prior to using CyberArk Privileged Access Manager. I found that CyberArk has more integration out of the box with other solutions and it solves a lot of problems for customers if they have different solutions.
How was the initial setup?
The initial setup CyberArk Privileged Access Manager is easy.
What's my experience with pricing, setup cost, and licensing?
The price of CyberArk Privileged Access Manager could be less expensive.
What other advice do I have?
My advice to others is this solution can solve a lot of problems.
I rate CyberArk Privileged Access Manager a nine out of ten.
Which deployment model are you using for this solution?
On-premises
Disclosure: My company has a business relationship with this vendor other than being a customer: B&B Security Alliance has been established in 2019 and only deals with cyber security. B&B Security Alliance provides cyber security solutions to customers wanting to be resilient against new and existing threats. We offer professional services, advisory and through our vendor network we will help you select a suite of best in class products that enhances your reputation and company value.
Senior Presale - BU Information Security at a tech services company with 51-200 employees
Feature-rich, good performance, scalable, and has a user-friendly interface
Pros and Cons
- "It's a highly flexible solution that can adapt to each customer's needs."
- "The initial setup could be simpler but it may not be as effective."
What is our primary use case?
We implement this solution for our customers. We are system integrators, not end-users.
The main use case is for secure access, and monitoring the access by IT administrators.
What is most valuable?
I like the performance of CyberArk Enterprise Password Vault.
Definitely, it's a reliable solution.
It has a wide range of features. They are probably the widest range of features on the market. It is the main reason customers usually select this product.
This solution works very well, and the feedback from our customers is very good.
Integration is one of the strongest capabilities of this solution. There are hundreds of integrations that are ready to use. It is continuously growing, which is one of its strengths.
The interface is really user-friendly.
It's a highly flexible solution that can adapt to each customer's needs.
Another strength, for both performance and the security levels, is the segregation of the different rules of the solution.
What needs improvement?
The initial setup could be simpler but it may not be as effective.
For how long have I used the solution?
I've been using CyberArk Enterprise Password Vault for three years, and the company began using it in 2003.
This solution is used mainly on-premises, but the trend is to go with hybrid and cloud deployment for new projects.
What do I think about the stability of the solution?
CyberArk Enterprise Password Vault is a stable product.
What do I think about the scalability of the solution?
CyberArk Enterprise Password Vault is easy to scale.
How are customer service and support?
I have not contacted technical support. I deal in the presales department. I don't manage the technical aspects of delivery and support.
How was the initial setup?
We needed to build a specific project that is tailored for each customer. It requires a bit of design with the first part of the project, which is a benefit because the solution has high performance and is built on the needs of the customer.
There is a bit of a setup initially, but it provides them with a good result for the project.
What's my experience with pricing, setup cost, and licensing?
It's an affordable platform.
It is not the cheapest solution available on the market, but if you want a good project, you need to have the value of the solution you are selecting.
In my opinion, it is a good compromise between the cost and the benefits. I think the price is fair.
What other advice do I have?
I would definitely recommend this solution to others who are interested in using it.
I do not have visibility with other solutions that may be better or more up-to-date.
I would rate CyberArk Enterprise Password Vault a ten out of ten.
Which deployment model are you using for this solution?
On-premises
Disclosure: My company has a business relationship with this vendor other than being a customer: Partner
Director / Engineer at Provincia
Enables users to connect to a target machine without the need to know the privileged accounts' password
Pros and Cons
- "Our most valuable features would probably be key rotation, the SKM or SSH key manager, and account discovery."
- "I think they can improve account onboarding. For instance, you have to use the Password Vault utility, whereas in Thycotic I think there is a feature in the user interface that allows you to upload your account with an Excel file. So I'd like to have a similar thing in CyberArk."
What is our primary use case?
I have worked as a CyberArk SME, team leader, project manager in the financial industry. I've managed both the implementation and configuration of enterprise CyberArk infrastructures.
How has it helped my organization?
As an end-user within the organization, I can't and I don't need to know the passwords of privileged accounts as CyberArk is taking care of the password/SSH Keys management on the target machines. The solution provides this security without changing the end-user experience because they are able to use the end-user tool like putty or remote desktop connection even without passing through the CyberArk interface
What is most valuable?
Our most valuable features would probably be password/key rotation, the SSH key manager, account discovery and quality of video recordings.
What needs improvement?
I think they can add a new feature for the account onboarding like I've seen for another PAM tool: for instance they should give to the CyberArk administrator the chance to upload the accounts via the PVWA using a txt or an xls file.
For how long have I used the solution?
We've been using this solution for five years.
How was the initial setup?
If you don't know the product well, it might not be easy to set up, because CyberArk has several modules. You need to study it before to start to implement this solution. It's not like other PAM tools e.g.Thycotic, which is easy to set up, as it's just a web server with a database.
The deployment itself can take between one and two work weeks. The project, or configuration documents, however, must take more time. You cannot think about the infrastructure in one week. You have to prepare all the documents, understand the infrastructure you want, etc. It's the project management that takes more time.
What other advice do I have?
You have to analyze the target hosts that you have in your organization and understand what is the scope of your project. You have to make a very clear plan for the project and CyberArk infrastructure sizing. Then you have to do a very good job with the project management and collaborate with the privileged accounts stakeholders. With all that in mind, you can go ahead with CyberArk.
Be careful with the configuration. When you make changes and so on, be very careful to understand what you are doing. Plan and test what you are doing in a test environment before switching to production.
I would rate CyberArk as nine out of ten. Ten means that it's the best solution on the market and no one else compares to it. However, before giving them a ten, they should do something related to the Password Vault utility. Maybe they should add some other features too. For me, it is one of the best tools on the market, so nine is enough for now.
Which deployment model are you using for this solution?
On-premises
Disclosure: I am a real user, and this review is based on my own experience and opinions.
Senior Manager - Privileged Access Management at a tech services company with 10,001+ employees
Has the ability to standardize our PAM across a diverse estate
What is our primary use case?
- PAM interface for staff to support customers which may include CyberArk solutions of their own.
- Managing large environments with varied and diverse environments.
How has it helped my organization?
Improved our user access and tracking, thereby safeguarding the organization and its customers. Being a user makes us a better reseller.
What is most valuable?
Shared-service accounts reducing the number of potential entry points as well as the ability to standardise our PAM across a diverse estate.
What needs improvement?
Multi-tenancy vaults should really have the same release cycle as single tenancy vaults; this will enable us to meet even more customer demand. We are striving to be at least on the latest release minus 1 (n-1) and for us to run both Single and Multi-Tenant core systems the difference in release cycles will result in a wide gap. Considering the considerable changes including user interface we have seen recently, the one concern is that we may end up with users having different interfaces to deal with different customers.
For how long have I used the solution?
Three to five years.
What do I think about the stability of the solution?
Very stable with no own goals in three years.
What do I think about the scalability of the solution?
Scalability is very good.
How are customer service and technical support?
We get excellent feedback from customer service, irrespective of the level of issues raised.
Which solution did I use previously and why did I switch?
Yes, we decided to change to CyberArk in line with our strategic intent to provide as safe a central and customer environment as possible.
How was the initial setup?
Initial setup was complex and time-consuming but the later versions are a lot faster to implement.
What about the implementation team?
We implemented through in-house specialists.
What's my experience with pricing, setup cost, and licensing?
Standardised offerings that allow for customer-specific flexibility.
Disclosure: I am a real user, and this review is based on my own experience and opinions.

Buyer's Guide
Download our free CyberArk Privileged Access Manager Report and get advice and tips from experienced pros
sharing their opinions.
Updated: May 2025
Product Categories
Privileged Access Management (PAM) User Activity Monitoring Enterprise Password Managers Mainframe Security Operational Technology (OT) SecurityPopular Comparisons
Azure Key Vault
AWS Secrets Manager
Okta Workforce Identity
HashiCorp Vault
Delinea Secret Server
CyberArk Endpoint Privilege Manager
BeyondTrust Endpoint Privilege Management
WALLIX Bastion
CyberArk Identity
One Identity Safeguard
BeyondTrust Privileged Remote Access
BeyondTrust Password Safe
Buyer's Guide
Download our free CyberArk Privileged Access Manager Report and get advice and tips from experienced pros
sharing their opinions.
Quick Links
Learn More: Questions:
- CyberArk vs. ManageEngine Password Manager Pro
- How does Sailpoint IdentityIQ compare with CyberArk PAM?
- Which PAM tool do you prefer: CyberArk Privileged Access Manager, One Identity Safeguard, Delinea Secret Server, or BeyondTrust Privileged Remote A
- What is the difference between Privileged Users and Privileged Accounts
- When evaluating Privileged Identity Management, what aspect do you think is the most important to look for?
- How was the 2020 Twitter Hack carried out? How could it have been prevented?
- Which is the best Privileged Account Management solution?
- What are the top 5 PAM solutions that can be implemented which cover both hybrid and cloud?
- What are the top 5 PAM solutions?
- How will AI and ML help or work with PIM/PAM?