I see the Auto IT integration as the most valuable feature.
Sr. Technical Consultant at a tech company with 51-200 employees
The integration of Auto IT provided the flexibility to add thick clients and websites. It is expensive and the professional service team charges for each and every thing.
What is most valuable?
How has it helped my organization?
I have seen improvements compared to the older versions and the integration of Auto IT provided the flexibility to add thick clients and websites.
What needs improvement?
Session recording search capability has to be improved. It should include more platforms for password management. It should include more thick client integrations.
For how long have I used the solution?
I used it for almost six years.
Buyer's Guide
CyberArk Privileged Access Manager
May 2025

Learn what your peers think about CyberArk Privileged Access Manager. Get advice and tips from experienced pros sharing their opinions. Updated: May 2025.
851,823 professionals have used our research since 2012.
What do I think about the stability of the solution?
There is dependency on Windows tasks and if any AD GPO changes are pushed, it affects the system and stops working.
What do I think about the scalability of the solution?
I have not encountered any scalability issues. The product scales as the organisation grows.
How are customer service and support?
Technical support from the vendor is the worst and that is one reason I stopped using CyberArk.
How was the initial setup?
The initial setup is not so complex, but CyberArk does require more servers for a full-fledged installation.
What's my experience with pricing, setup cost, and licensing?
The solution is costly and the licensing is very complex.
Which other solutions did I evaluate?
I was using CyberArk for more than six years and I have now switched to ARCOS. I was impressed with ARCOS because of the following reasons:
- Cost-effective solution
- Fewer servers required
- Flexibility, performance
- More features
- Simple licensing
- Good support
I evaluated other solutions such as Leiberman, ManageEngine, TPAM, and Xceedium.
ARCOS seems to be very promising and cost effective. Also, ARCOS doesn’t have a traditional jump server concept, which saves the customer from spending more on hardware. The licensing is very simple (number of admins & target IPs), where most of the features are available by default with the basic license.
What other advice do I have?
CyberArk architecture is good and more secure, but I see the solution as expensive. Support is the worst; CyberArkstaff is not supportive, their professional service team charges for each and every thing.
Disclosure: My company has a business relationship with this vendor other than being a customer: We were the distributor for Cyber Ark.
Technical Manager, System Division at a tech services company with 501-1,000 employees
We can monitor sessions in real time. If there's any unnecessary activity, we can terminate the session.
What is most valuable?
With the Privileged Session Manager, we can monitor sessions in real time and terminate the session if there's any unnecessary activity found. For example: We give access to user to access the server only to update patches, but if we find any activity not related to patch updates, we can terminate the session.
How has it helped my organization?
Actually my company/previous company does not use this product, but we sold it to our customer. This product helped our customer manage their privileged accounts. It’s easier to them to manage and control the privileged accounts.
What needs improvement?
It needs more plugin connectors for all devices. CyberArk currently can manage or make it easier to manage about 80% of our total devices. The rest still need R&D to develop the plugin. If CyberArk had more plugin connectors, the customer would not need to raise plugin development requests for several devices and CyberArk could easily connect to these devices.
What I mean with CyberArk needing to improve plugin connector is that currently CyberArk is able to manage almost all devices (server, network devices, security devices etc.) which are more than 80% of all devices. In my experience device such as IBM OS/390 and Cisco TACACS still need custom plugin connectors developed by CyberArk R&D.
If CyberArk IS able manage more than 95% from total devices it would help the customer to using it without raising a support ticket to create a plugin connector. CyberArk will more easier to manage all devices with no compromise
For how long have I used the solution?
I used this solution from mid-2013 until mid-2015.
What do I think about the stability of the solution?
So far, it is stable.
What do I think about the scalability of the solution?
This product is scales easily.
How are customer service and technical support?
Technical support is good. They have good technical teams around the world including southeast Asia.
Which solution did I use previously and why did I switch?
Most customers using a different solution switch to CyberArk because CyberArk is more user-friendly than its competitors and have more plugins compared to the others.
How was the initial setup?
Initial setup was actually easier.
What's my experience with pricing, setup cost, and licensing?
Start small.
Which other solutions did I evaluate?
Yes, we evaluate other options. The issue was about price, stability, scalability and the development of this product to ensure support.
What other advice do I have?
Contact the local distributor for help.
Disclosure: I am a real user, and this review is based on my own experience and opinions.
Buyer's Guide
CyberArk Privileged Access Manager
May 2025

Learn what your peers think about CyberArk Privileged Access Manager. Get advice and tips from experienced pros sharing their opinions. Updated: May 2025.
851,823 professionals have used our research since 2012.
Information Security Engineer at a international affairs institute with 1,001-5,000 employees
Helps control use of shared passwords and the practice of sharing passwords disappeared completely
What is our primary use case?
The main purpose of getting CyberArk was to control the use of the shared passwords.
Secondly, we needed to take out the secrets from the applications' source code (database connection strings).
Thirdly, we wanted to improve the network segmentation and reduce the number of firewall exceptions. We're doing that by assigning a PSM per network zone and limiting the exceptions to its connections.
How has it helped my organization?
The practice of sharing passwords disappeared completely and the most sensitive application is using the AIM to retrieve database passwords for all its users.
We're still struggling with the use of RDP through PSMs.
What is most valuable?
The most valuable features for us are the AIM and PSM because they helped us by reducing the number of secrets floating around.
What needs improvement?
The AIM providers registration process could be easier and could allow re-registration. Also, some sort of policies for assigning access rights and safe ownership would be useful for deployment automation. We're seeing difficulties with hosts requiring 2FA, and we need to better cover them with PSM and PSMP.
For how long have I used the solution?
More than five years.
What do I think about the stability of the solution?
I am very impressed with the stability, but I still need to convince some colleagues.
What do I think about the scalability of the solution?
Scalability is rather good, we haven't reached any technical limitations yet.
How are customer service and technical support?
The support is always very responsive, accurate, and complete in their solutions. I've always had a personal contact that would know our setup and was able to concentrate on our specifics instead of pointing to a generic document on the support site.
Which solution did I use previously and why did I switch?
No, we haven't used any other solution.
How was the initial setup?
The initial setup was straightforward because its entire complexity was hidden by the CyberArk expert who guided the whole process.
What about the implementation team?
Our vendor's implementation team was stellar.
What was our ROI?
We haven't yet calculated the ROI.
What's my experience with pricing, setup cost, and licensing?
Attempt to minimize the AIM deployments as the license is expensive. Take a license for a test instance even if it might cost extra.
Which other solutions did I evaluate?
I cannot tell what other options were evaluated.
What other advice do I have?
Keep an eye on the cloud integrations and be ready for Conjur.
Disclosure: I am a real user, and this review is based on my own experience and opinions.
IT Analyst at a tech services company with 10,001+ employees
Enables us to connect to the target system component and helps us with recordings
Pros and Cons
- "There are no issues with scalability. Our clients are very happy to use the product."
- "The initial setup of CyberArk is a challenge if you do not have prior experience with it."
What is our primary use case?
We have different privileged accounts in our enterprise. All of the application owners and the stakeholders want to store those accounts CyberArk privileged security, so they can connect to the target systems. It also allows for session recordings at the time of auditing.
What is most valuable?
We can be connected to the target system and the PSM component comes into play. In addition, a true asset is the recordings the solution keeps.
What needs improvement?
We have found with the recent upgrade a lot of issues we had with the connection have been resolved.
For how long have I used the solution?
One to three years.
What do I think about the stability of the solution?
It is stable.
What do I think about the scalability of the solution?
There are no issues with scalability. Our clients are very happy to use the product.
How is customer service and technical support?
Tech support is very quick to answer our request tickets.
How was the initial setup?
It is necessary to use professional service for the setup of the solution. It is a challenge if you are not well-versed in CyberArk.
What's my experience with pricing, setup cost, and licensing?
In comparison to other products on the market, CyberArk is a more costly product.
Disclosure: I am a real user, and this review is based on my own experience and opinions.
Works at a energy/utilities company with 1,001-5,000 employees
The ability to write your own connectors and plugins is invaluable as far as flexibility goes
Pros and Cons
- "Our privileged accounts are now stored in a more secure location and lateral movement within the network have been lessened."
- "The PSM is excellent and the ability to write your own connectors and plugins is invaluable as far as flexibility goes."
- "Enhanced PSM support for Java based applications."
What is our primary use case?
- Vaulting of privileged credentials.
- Used as a jump host solution.
- We wanted to keep passwords from being exposed to end users and connect them seamlessly to their target devices.
How has it helped my organization?
Our privileged accounts are now stored in a more secure location and lateral movement within the network have been lessened.
What is most valuable?
The PSM is excellent and the ability to write your own connectors and plugins is invaluable as far as flexibility goes.
What needs improvement?
- Enhanced PSM support for Java based applications.
- Easier to use bulk uploader tools (which are already being worked on).
For how long have I used the solution?
One to three years.
Disclosure: I am a real user, and this review is based on my own experience and opinions.
IT Admin at a tech company with 10,001+ employees
The proxy solution using PSM and PSMP gives leverage to reach out to servers which are NATed.
What is most valuable?
The proxy solution using PSM and PSMP is valuable. It gives leverage to reach out to servers which are NATed in separate networks and can be reached only by using a jump server.
How has it helped my organization?
Security has been improved. It has improved compliance and there is more control over the privileged users.
What needs improvement?
The performance of this product needs to be improved. When the number of privileged accounts increases, i.e., exceeds 2000, then the performance of the system reduces. The login slows down drastically and also the connection to the target system slows down. This is my observation and thus, the server sizing needs to be increased.
For how long have I used the solution?
I have used this solution for three years.
What do I think about the stability of the solution?
We have not encountered any stability issues so far.
What do I think about the scalability of the solution?
We have experienced some scalability issues, in terms of the performance.
How are customer service and technical support?
The technical support is good.
Which solution did I use previously and why did I switch?
Initially, we were using the CA ControlMinder. There were many issues with this solution, mainly in regards to no proxy solution and poor performance.
How was the initial setup?
The setup has a medium level of complexity.
What's my experience with pricing, setup cost, and licensing?
One should negotiate well.
Which other solutions did I evaluate?
We looked at other solutions such as CA PAM, Lieberman Software, Thycotic and ARCOS.
What other advice do I have?
This is the best product from its breed.
Disclosure: I am a real user, and this review is based on my own experience and opinions.
Identity and Access Management Consultant at a tech services company with 10,001+ employees
With the PSM connect option, authorized users do not need passwords to open a session. The user experience needs to be improved.
What is most valuable?
The features that I value most are the PSM connect option, where an authorized user doesn't even require a password to open a session to perform their role. Another feature that I think is really valuable is being able to monitor a user's activity; there is always a log recording activities performed by the privileged accounts in CyberArk.
How has it helped my organization?
This tool has definitely helped us manage all the privilege accounts, which mostly have access to the organization's crown-jewel data. Additionally, having a monitoring system puts extra visibility on these account's activities, so any irregular activity is highlighted and quickly escalated.
What needs improvement?
I think there can be improvement in providing information on how to develop connectors for various applications’ APIs.
Additionally, I think the user experience needs to improve. It's not very intuitive at the moment. An account could be more descriptive, and could have more attributes based on its functionality.
For how long have I used the solution?
I have used the product for almost a year. I have been part of the implementation project and post-release, supported account onboarding.
What do I think about the stability of the solution?
For the most part, there weren't many stability issue. Usually the issue persisted with system/application accounts, with the API and the object ref ID not being in sync.
What do I think about the scalability of the solution?
I didn't feel there were any scalability issues.
How are customer service and technical support?
Although I was part of business side of the team, and I only had interaction with internal engineering team, I found the internal engineering team very helpful and knowledgeable about the product and how it worked.
Which solution did I use previously and why did I switch?
We previously used a different solution, and then we updated it; we did not switch.
Which other solutions did I evaluate?
I am unable to comment on this, as I was not part of product evaluation team.
What other advice do I have?
My advice is that this tool does what it advertises. If your business/organization has crown-jewel data, this is the tool to use.
From a security standpoint, I find the tool very reliable and innovative. However, it could improve the user experience and become more intuitive. When the user experience becomes more intuitive, then I am willing to rate the product even higher.
Disclosure: I am a real user, and this review is based on my own experience and opinions.
Ashish, may I ask where you generally look for these types of courses? Are there any that you can recommend?
Security at a tech services company with 201-500 employees
Its privileged session management is valuable for monitoring your inside threats, but it's a lot of work to set up
Pros and Cons
- "Password Vault's main advantage is its scalability. We constantly see huge enterprises implementing something like this, and the privileged session management is an excellent piece. You can kind of watch videos of whatever an admin has done."
- "There are upwards of six components you need to set it up. And you might need anywhere from two to five servers. It takes some work to set that up, especially in a larger environment."
What is our primary use case?
Companies often have an enormous amount of admin credentials out there. They want to find out how many they have, start cleaning them up, and ensure they're all kept in an encrypted vault. Password Vault is probably the top product in that space, and it's a monster to implement, but CyberArk is great at what they do.
What is most valuable?
Password Vault's main advantage is its scalability. We constantly see huge enterprises implementing something like this, and the privileged session management is an excellent piece. You can kind of watch videos of whatever an admin has done. So, for example, if an admin doesn't check out their password and fires up a session on a machine, you can see playback. Scalability and those particular features are pretty valuable for monitoring your insider threat.
What do I think about the stability of the solution?
Our customers haven't complained about any stability issues, and we've set Password Vault up for quite a few customers. However, the stability depends on the equipment unless they do it in the cloud. But if they're setting up on a bunch of VMs, and that VM store goes down, that's not necessarily a CyberArk problem. That's more of a problem with Windows or VMware, etc., or something like that. So I guess the stability's fine.
How was the initial setup?
There are upwards of six components you need to set it up. And you might need anywhere from two to five servers. It takes some work to set that up, especially in a larger environment.
What's my experience with pricing, setup cost, and licensing?
On-prem CyberArk is pretty expensive. It's pricey and you get what you pay for. It's an incredible product for what it does, but it's significantly cheaper to go to the cloud.
What other advice do I have?
I would rate Password Vault seven out of 10. I'd only go that low because of how challenging the installation can be. I advise our customers to consider using CyberArk's cloud option because many people just reflexively lean toward the on-prem solution. The cloud solution is considerably less expensive. It's still complex to set up the different components and make it all work together, so I suggest you make sure you need all those components. Maybe you don't even want to use everything there, but consider the cloud version. It's the same product, but it's more straightforward and cost-effective. You're not losing any functionality.
Which deployment model are you using for this solution?
Hybrid Cloud
Disclosure: My company has a business relationship with this vendor other than being a customer: Partner

Buyer's Guide
Download our free CyberArk Privileged Access Manager Report and get advice and tips from experienced pros
sharing their opinions.
Updated: May 2025
Product Categories
Privileged Access Management (PAM) User Activity Monitoring Enterprise Password Managers Mainframe Security Operational Technology (OT) SecurityPopular Comparisons
Azure Key Vault
AWS Secrets Manager
Okta Workforce Identity
HashiCorp Vault
Delinea Secret Server
CyberArk Endpoint Privilege Manager
BeyondTrust Endpoint Privilege Management
WALLIX Bastion
CyberArk Identity
One Identity Safeguard
BeyondTrust Privileged Remote Access
BeyondTrust Password Safe
Buyer's Guide
Download our free CyberArk Privileged Access Manager Report and get advice and tips from experienced pros
sharing their opinions.
Quick Links
Learn More: Questions:
- CyberArk vs. ManageEngine Password Manager Pro
- How does Sailpoint IdentityIQ compare with CyberArk PAM?
- Which PAM tool do you prefer: CyberArk Privileged Access Manager, One Identity Safeguard, Delinea Secret Server, or BeyondTrust Privileged Remote A
- What is the difference between Privileged Users and Privileged Accounts
- When evaluating Privileged Identity Management, what aspect do you think is the most important to look for?
- How was the 2020 Twitter Hack carried out? How could it have been prevented?
- Which is the best Privileged Account Management solution?
- What are the top 5 PAM solutions that can be implemented which cover both hybrid and cloud?
- What are the top 5 PAM solutions?
- How will AI and ML help or work with PIM/PAM?
The beauty of using the PSMP is that an end user can bypass logging through the PVWA and go directly to using their choice of terminal emulation for SSH (i.e. Putty or SecureCRT, etc.).