We are using the solution for privileged account management. (Rotation, session isolation, checkout, etc.)
Senior IT Security Engineer at a insurance company with 5,001-10,000 employees
Having the vaulting tech ensures that the credentials are secure
What is our primary use case?
How has it helped my organization?
Accounts are managed, passwords change frequently, and we have better audit logs! When something happens, there is a better chance you can determine the who/what/where/when/why of the situation.
What is most valuable?
The vaulting technology as well as the privileged session management: Having the vaulting tech ensures that the credentials are secure, and PSM ensures that the end user can perform needed tasks without knowing or needing the credentials.
What needs improvement?
A greater number of out-of-the-box integrations with other vendors: They are working on it, but more is better!
Buyer's Guide
CyberArk Privileged Access Manager
May 2025

Learn what your peers think about CyberArk Privileged Access Manager. Get advice and tips from experienced pros sharing their opinions. Updated: May 2025.
851,823 professionals have used our research since 2012.
For how long have I used the solution?
One to three years.
What do I think about the stability of the solution?
Rock solid! I would say it is, set it and forget it, but the vendor keeps on top of upgrades and enhancements.
What do I think about the scalability of the solution?
It seems to work well for any size of organization, or any size of deployment in my experience.
How was the initial setup?
Pretty straightforward, a lot of time will be spent on the initial engineering phase where you determine how you want to use the solution, naming requirements, admin accounts, etc.
What's my experience with pricing, setup cost, and licensing?
As with everything, try before you buy. Get a trial licence, set up a demo environment and see if it meets the use case for your enterprise.
Disclosure: I am a real user, and this review is based on my own experience and opinions.
Senior Specialist Identity System Support at Roche
The master policy allows us to establish a security baseline for our privileged accounts
What is our primary use case?
We are using CyberArk to store credentials of privileged assets in a secure way. In addition, CyberArk helps us to meet our security policy effortlessly, defining the complexity of the passwords, rotation period, etc.
We are also using the Privileged Session Manager to provide remote access to servers with security controls in place (session isolated and recorded).
How has it helped my organization?
With CyberArk, we can meet our compliance requirements reducing security risks without introducing additional operational complexity. This is very valuable for our company because we have regular audits where we have to provide evidence about the use of our privileged accounts (password use, password rotation, etc.)
In addition, we have several third parties that need access to our infrastructure. CyberArk PAS helps us to provide this access in a quick and secure way.
What is most valuable?
- Master policy: allows us to establish a security baseline for our privileged accounts.
- CPM: allows us to rotate passwords following the policy defined.
- PSM: allows us to provide isolated sessions to the customer with additional controls (real-time monitoring, session isolation, and session recording).
What needs improvement?
- We would like to have more flexibility in the RBAC model and have more options to define who should have access to what, not only based on safe membership.
- In addition, the user interface could be improved. When a team manages thousands of accounts, advanced filters are very valuable to search the accounts.
For how long have I used the solution?
More than five years.
Disclosure: I am a real user, and this review is based on my own experience and opinions.
Buyer's Guide
CyberArk Privileged Access Manager
May 2025

Learn what your peers think about CyberArk Privileged Access Manager. Get advice and tips from experienced pros sharing their opinions. Updated: May 2025.
851,823 professionals have used our research since 2012.
Global Privilege Access Management Technical Architect at a consultancy with 10,001+ employees
All access to our servers, by both staff and vendors, is monitored and recorded
Pros and Cons
- "CyberArk has resulted in a massive increase in our security footprint."
- "All access to our servers by both staff and vendors is monitored and recorded."
- "The current user interface is a little dated. However, I hear there are changes coming in the next version."
- "There is a learning curve when it comes to planning out the deployment strategy, but once it is defined, it runs itself."
What is our primary use case?
We are leveraging CyberArk to provide Windows server access management across our enterprise. All our staff is looking for access to a server and needs to use CyberArk.
How has it helped my organization?
CyberArk has resulted in a massive increase in our security footprint. All access to our servers, by both staff and vendors, is monitored and recorded.
What is most valuable?
Session recording and key logging. We can track down not only who made a change, but exactly what they changed or did.
What needs improvement?
The current user interface is a little dated. However, I hear there are changes coming in the next version.
There is a learning curve when it comes to planning out the deployment strategy, but once it is defined, it runs itself.
For how long have I used the solution?
More than five years.
Disclosure: I am a real user, and this review is based on my own experience and opinions.
Identity and Access Management Analyst at a financial services firm with 1,001-5,000 employees
We're now able to start managing service accounts with AIM
What is our primary use case?
We use CyberArk to manage anything privileged including our admin IDs, AWS root credentials, service accounts, etc.
How has it helped my organization?
It's been a big win for us as we're now able to start managing service accounts with AIM. This is a big win, especially with our web hosting team.
What is most valuable?
There are several features we've found valuable. We're auto-discovering our new Windows servers, we're managing root in our Unix environment, and now we're pushing for SA password rotation this year.
What needs improvement?
As we have not yet moved to the core licensing model, we don't have the benefit of PSM and a few other things that were not previously included.
For how long have I used the solution?
One to three years.
Disclosure: I am a real user, and this review is based on my own experience and opinions.
Technical Director at Unique Performance Techsoft Pvt Ltd
Anomaly detection and prevention for all privilege accounts
Pros and Cons
- "Automatic password management, which will automatically change passwords based on compliance requirements."
- "DVR like video recording and text-based recording for easier audits."
- "This product needs professional consulting services to onboard accounts effectively based user profiles."
What is our primary use case?
We provide privilege account security and consulting to our customers. Organisations that we work with use CyberArk Privileged Account Security to secure their privilege accounts, which are shared between users in the organisation. It provides automatic password management and provides the single sign-on experience to users for all privilege accounts (Windows - administrator, Linux - root, MS SQL - SA, Oracle - SYS, SSH keys, etc.).
It also provides DVR like recording for all privilege access and text-based recording to easily audit all privilege activities.
The new Privilege Threat Analytics platform provides proactive protection by suspending the user session when it detects an anomaly based on past user login and session activity details. In addition, we can configure the solution to detect scoring on all privilege sessions for easier audits.
The Application Identity Manager module helps to eliminate hard-coded passwords in the application and enables us to easily change database passwords.
How has it helped my organization?
- Automatic password management, which will automatically change passwords based on compliance requirements.
- DVR like video recording and text-based recording for easier audits.
- Easily scan the network for all privilege accounts and has an easier onboarding process.
- SSH key management
- Command level restriction for all SSH-based devices.
- Anomaly detection and prevention for all privilege accounts.
- Integration with ticketing tools and SIEM solutions.
What is most valuable?
- Ability to provide native experience for users to login to privilege accounts. They do not need to go through a portal to access servers and accounts.
- Agentless solution which is easy to customise to any platform having network connectivity.
- Wide range of devices supported out-of-the-box.
- Easy to configure HA and DR options.
- Online training enables cost effective valuable training.
What needs improvement?
This product needs professional consulting services to onboard accounts effectively based user profiles.
For how long have I used the solution?
One to three years.
What do I think about the stability of the solution?
No issues.
What do I think about the scalability of the solution?
No issues.
How are customer service and technical support?
Excellent customer support.
Which solution did I use previously and why did I switch?
We did not previously use another solution.
How was the initial setup?
The setup is very straightforward.
What's my experience with pricing, setup cost, and licensing?
The cost is high compared to other products, but CyberArk provides all the features bundled. This is compared to other vendors who provide them as a different license for each functionality.
Which other solutions did I evaluate?
At present, we are only focusing on CyberArk for privilege account security. Comparing it to other providers, Cyberark provides a more user-friendly environment with many more features and benefits.
What other advice do I have?
I have used and deployed it in various environments so far. It really covers all the use cases provided by the customer.
Disclosure: My company has a business relationship with this vendor other than being a customer: We are certified Gold partners for CyberArk and implemented this solution for a customer from various industry verticals.
Senior Manager of System Security at a tech services company with 51-200 employees
The most valuable feature of this product is the Central Policy Manager but CyberArk can be improved in all areas
What is most valuable?
The most valuable feature of this product is the Central Policy Manager. From the Operation and Security point of view a robot that can connect to destination machines, change passwords at fixed times, and put them in the vault, like a person, and therefore, is the best that you can ask for.
It combines more functionality in a single product and solve a lot of problem, from security to compliance.
How has it helped my organization?
It has improved many parts of the organization. From the security and audit perspective, we're now fully aware of who accessed data and from where they accessed it. This helped us with regulatory compliance. We've improved our level of security in many typically-unsafe environments, such as domains.
What needs improvement?
I think that this product can be improved in all the areas. The details usually are important as the funcionallity. So I think that understanding the request from the customer CyberArk, as is already doing, can improve day by day his product.
For how long have I used the solution?
I have used Cyber-Ark PAS since 2008, so thid is the seventh year that I will be working with it.
What was my experience with deployment of the solution?
Usually not. The biggest problem was the incompatibility or non-default installation of an OS to be managed by the Central Policy Manager.
What do I think about the stability of the solution?
Never encountered any problems with stability.
What do I think about the scalability of the solution?
Never encountered any problems with scalability. The Vault, Central Policy Manager, Password Vault Web Access, Privileged Session Manager and Application Identity Management architecture are designed to support scalability.
How are customer service and technical support?
Customer Service:
It's improved over the years and now is very fast and efficient. We've got a very good Italian customer service.
Technical Support:Very high level of technical support. Fast and organized.
Which solution did I use previously and why did I switch?
Never used a different solution.
How was the initial setup?
The initial setup is really fast, simple and straightforward. It consist of a simple Windows installation (next-next type) for any component. The only requirement is to do the installation step by step following a list of components to do beforehand.
What about the implementation team?
I work in a vendor team, and we installed the product in a large company.
Disclosure: I am a real user, and this review is based on my own experience and opinions.
Security Engineer at a tech services company with 51-200 employees
Enables us to manage passwords of highly privileged accounts.
What is most valuable?
The product enables us manage passwords of highly privileged (service) accounts. These are not tied to a person, and they include a full audit trail and approval workflow functionality.
How has it helped my organization?
Management of these accounts is typically required to prevent abuse and gain control of this.
What needs improvement?
Perhaps improve the user registry integration. It is already fine, but a bit atypical.
My experience with the product was with older versions, so this may not represent the actual case anymore. In essence, user registry integration is atypical in the sense that the product creates a copy of the user inside the product itself (to accommodate for license seat counting, I guess).
Depending upon the size of the user base and license model, it may not allow new users to log in to the platform. I doubt the vendor considers this an issue, though.
For how long have I used the solution?
I have used this for three years, including the implementation of the product
What do I think about the stability of the solution?
There were no issues with stability.
What do I think about the scalability of the solution?
There were no issues with scalability.
How is customer service and technical support?
Technical support is OK. The product is not very difficult to install, but there are some considerations that need to be taken into account. Tech support is very well aware of this.
How was the initial setup?
The initial setup was simple. It is windows based and leverages installation wizards to perform installation. Also, sufficient documentation exists to guide the setup procedure.
What's my experience with pricing, setup cost, and licensing?
Look well at the user base and frequency of use. A lot of licensing models exist, but having this clear will immediately indicate what fits best.
As for pricing, I cannot comment.
Which other solutions did I evaluate?
We did not evaluate other solutions.
What other advice do I have?
Make sure that the organization is ready and willing to adopt this, as the typical business cases cannot be addressed by the product alone.
Disclosure: My company has a business relationship with this vendor other than being a customer: We are a CyberArk business partner.
Technical Lead at a tech services company with 10,001+ employees
Enterprise Password Vault, Privilege Session Manager & Application Identity Management have been very useful for our client environment.
Pros and Cons
- "Enterprise Password Vault, Privilege Session Manager, and Application Identity Management have been very useful for our client environment."
- "Performance of PIM could be better and intended for usability as well as security."
How has it helped my organization?
Its features like detailed audit and reporting, automated workflows, granulated privileged access controls, automated password rotation, and centralized and secure storage have helped us in developing a secure environment for customers, along with audit and compliance coverage.
What is most valuable?
Enterprise Password Vault, Privilege Session Manager, and Application Identity Management have been very useful for our client environment.
What needs improvement?
Performance of PIM could be better and intended for usability as well as security. Another point is that the free trials should be in place for all components so that PoC could be made easy.
What do I think about the stability of the solution?
No.
What do I think about the scalability of the solution?
No.
How are customer service and technical support?
Technical support is quite efficient and they always provide a timely response.
Which solution did I use previously and why did I switch?
Haven’t use any solution prior to CyberArk.
How was the initial setup?
As this was new product, there were some small challenges in understanding but the setup was straightforward.
What's my experience with pricing, setup cost, and licensing?
As our deployment was not so large, our client was happy with the pricing and licensing.
Which other solutions did I evaluate?
Yes, we did a research and chose CyberArk above all due to its components that were suitable to our environment.
What other advice do I have?
Proper implementation and prior study of product will give you efficient results. Organizations looking for a product that can provide proper paper trail for risk and compliance audits should certainly give it a try because the product's auditing and reporting capabilities are really bliss.
Disclosure: I am a real user, and this review is based on my own experience and opinions.

Buyer's Guide
Download our free CyberArk Privileged Access Manager Report and get advice and tips from experienced pros
sharing their opinions.
Updated: May 2025
Product Categories
Privileged Access Management (PAM) User Activity Monitoring Enterprise Password Managers Mainframe Security Operational Technology (OT) SecurityPopular Comparisons
Azure Key Vault
AWS Secrets Manager
Okta Workforce Identity
HashiCorp Vault
Delinea Secret Server
CyberArk Endpoint Privilege Manager
BeyondTrust Endpoint Privilege Management
WALLIX Bastion
CyberArk Identity
One Identity Safeguard
BeyondTrust Privileged Remote Access
BeyondTrust Password Safe
Buyer's Guide
Download our free CyberArk Privileged Access Manager Report and get advice and tips from experienced pros
sharing their opinions.
Quick Links
Learn More: Questions:
- CyberArk vs. ManageEngine Password Manager Pro
- How does Sailpoint IdentityIQ compare with CyberArk PAM?
- Which PAM tool do you prefer: CyberArk Privileged Access Manager, One Identity Safeguard, Delinea Secret Server, or BeyondTrust Privileged Remote A
- What is the difference between Privileged Users and Privileged Accounts
- When evaluating Privileged Identity Management, what aspect do you think is the most important to look for?
- How was the 2020 Twitter Hack carried out? How could it have been prevented?
- Which is the best Privileged Account Management solution?
- What are the top 5 PAM solutions that can be implemented which cover both hybrid and cloud?
- What are the top 5 PAM solutions?
- How will AI and ML help or work with PIM/PAM?
The UI has been completely revamped in Version 10. It has a differently look and feel. We will be looking to test it in our Development landscape and possibly go to Production towards the end of the year.