Our main use is for CyberArk to hold, maintain, and securely protect our TAP/NUID and "privileged access" accounts within the company.
Works at a financial services firm with 10,001+ employees
Securely protects our TAP/NUID and privileged access accounts within the company
Pros and Cons
- "The regulation of accounts is by far the most needed and valuable part of the application."
- "Helped us meet our standards and requirements to help us comply with industry standards and banking regulations."
- "Securely protects our TAP/NUID and privileged access accounts within the company."
What is our primary use case?
How has it helped my organization?
For audit and risk purposes, CyberArk EPV has helped us meet our standards and requirements to help us comply with industry standards and banking regulations. Reports and other quick audit checks make this possible.
What is most valuable?
EPV, as a whole, is very valuable to the company. However, the regulation of accounts is by far the most needed and valuable part of the application.
What needs improvement?
Cost efficiency is the number one thing that can be improved in my mind. This would change lots of companies minds on purchasing the product.
Buyer's Guide
CyberArk Privileged Access Manager
June 2025

Learn what your peers think about CyberArk Privileged Access Manager. Get advice and tips from experienced pros sharing their opinions. Updated: June 2025.
860,592 professionals have used our research since 2012.
For how long have I used the solution?
Less than one year.
Disclosure: My company does not have a business relationship with this vendor other than being a customer.
Senior Consultant - Information Security Engineering at a financial services firm with 10,001+ employees
Can provide transparent connection to targeted systems and record activities
Pros and Cons
- "Rather than multiple tools for maintaining regulatory compliance around passwords and privileged accounts, we have centralized as much as possible with CyberArk. This is now a one stop shop for end users to access their elevated credentials."
- "You can gradually implement CyberArk, starting with more easily attainable goals."
What is our primary use case?
We proactively vault and manage all elevated accounts across multiple platforms.
For especially sensitive business units, we additionally leverage Privilege Session Manager to provide transparent connection to targeted systems and record activities.
How has it helped my organization?
Rather than multiple tools for maintaining regulatory compliance around passwords and privileged accounts, we have centralized as much as possible with CyberArk. This is now a one stop shop for end users to access their elevated credentials.
What is most valuable?
You can gradually implement CyberArk, starting with more easily attainable goals, such as basic vaulting and password rotation and build on that with additional modules, such as Privileged Session Manager and Application Identity Manager.
What needs improvement?
While in the past, administration required several tools and multiple screens/options in those products, v10 is moving towards a single pane of glass with common functions easily found and information regarding privileged accounts given to users in plain, easy to understand terms, now enhanced with graphics.
For how long have I used the solution?
Three to five years.
Disclosure: My company does not have a business relationship with this vendor other than being a customer.
Buyer's Guide
CyberArk Privileged Access Manager
June 2025

Learn what your peers think about CyberArk Privileged Access Manager. Get advice and tips from experienced pros sharing their opinions. Updated: June 2025.
860,592 professionals have used our research since 2012.
Princ. Info Security Analyst at a insurance company with 10,001+ employees
Ensures accounts are managed according to corporate policies
Pros and Cons
- "Ensures accounts are managed according to corporate policies."
- "It takes people out of the machine work of ensuring credentials remain up-to-date, and handles connection brokering such that human usage and credential management remain independent."
- "It is easily customized, and that customization makes it very easy to start trying to shoehorn the solution into roles it was never intended to fill."
What is our primary use case?
We use it all.
- Privileged account access and management
- Credential rotation
- Access control
- Privileged session recording
How has it helped my organization?
CyberArk PAS helps ensure accounts are managed according to corporate policies. In short, it takes people out of the machine work of ensuring credentials remain up-to-date, and handles connection brokering such that human usage and credential management remain independent.
What is most valuable?
All of the features we use have helped our security posture in some way. All of these have their place in defining and supporting the security posture:
- Password management
- Session management
- Recording
- Access control.
What needs improvement?
Overall, I think it is a fantastic product, when used as designed and intended.
One of its biggest downfalls is also one of its biggest strengths. It is easily customized, and that customization makes it very easy to start trying to shoehorn the solution into roles it was never intended to fill.
For how long have I used the solution?
More than five years.
Disclosure: My company does not have a business relationship with this vendor other than being a customer.
Identity and Access Management System Administrator Sr. at a financial services firm with 1,001-5,000 employees
Increased our insight into how privileged accounts are being used and distributed within our footprint
Pros and Cons
- "Our go-to solution for securing against the pass the hash attack vector and auditing privileged account usage."
- "Increased our insight into how privileged accounts are being used and distributed within our footprint."
- "Areas the product could be improved are in some of the reporting capabilities and how the reports are configured."
What is our primary use case?
CyberArk PAS is our go-to solution for securing against the pass the hash attack vector and auditing privileged account usage.
How has it helped my organization?
The CyberArk PAS has greatly increased our insight into how privileged accounts are being used and distributed within our footprint.
What is most valuable?
- Ease of use
- The auditing capabilities
- The great support of their customer success teams
What needs improvement?
Areas the product could be improved are in some of the reporting capabilities and how the reports are configured.
For how long have I used the solution?
One to three years.
Disclosure: My company does not have a business relationship with this vendor other than being a customer.
Works at a energy/utilities company with 1,001-5,000 employees
The ability to write your own connectors and plugins is invaluable as far as flexibility goes
Pros and Cons
- "Our privileged accounts are now stored in a more secure location and lateral movement within the network have been lessened."
- "The PSM is excellent and the ability to write your own connectors and plugins is invaluable as far as flexibility goes."
- "Enhanced PSM support for Java based applications."
What is our primary use case?
- Vaulting of privileged credentials.
- Used as a jump host solution.
- We wanted to keep passwords from being exposed to end users and connect them seamlessly to their target devices.
How has it helped my organization?
Our privileged accounts are now stored in a more secure location and lateral movement within the network have been lessened.
What is most valuable?
The PSM is excellent and the ability to write your own connectors and plugins is invaluable as far as flexibility goes.
What needs improvement?
- Enhanced PSM support for Java based applications.
- Easier to use bulk uploader tools (which are already being worked on).
For how long have I used the solution?
One to three years.
Disclosure: My company does not have a business relationship with this vendor other than being a customer.
Global Privilege Access Management Technical Architect at a consultancy with 10,001+ employees
All access to our servers, by both staff and vendors, is monitored and recorded
Pros and Cons
- "CyberArk has resulted in a massive increase in our security footprint."
- "All access to our servers by both staff and vendors is monitored and recorded."
- "The current user interface is a little dated. However, I hear there are changes coming in the next version."
- "There is a learning curve when it comes to planning out the deployment strategy, but once it is defined, it runs itself."
What is our primary use case?
We are leveraging CyberArk to provide Windows server access management across our enterprise. All our staff is looking for access to a server and needs to use CyberArk.
How has it helped my organization?
CyberArk has resulted in a massive increase in our security footprint. All access to our servers, by both staff and vendors, is monitored and recorded.
What is most valuable?
Session recording and key logging. We can track down not only who made a change, but exactly what they changed or did.
What needs improvement?
The current user interface is a little dated. However, I hear there are changes coming in the next version.
There is a learning curve when it comes to planning out the deployment strategy, but once it is defined, it runs itself.
For how long have I used the solution?
More than five years.
Disclosure: My company does not have a business relationship with this vendor other than being a customer.
Security Engineer at a tech services company with 51-200 employees
Enables us to manage passwords of highly privileged accounts.
What is most valuable?
The product enables us manage passwords of highly privileged (service) accounts. These are not tied to a person, and they include a full audit trail and approval workflow functionality.
How has it helped my organization?
Management of these accounts is typically required to prevent abuse and gain control of this.
What needs improvement?
Perhaps improve the user registry integration. It is already fine, but a bit atypical.
My experience with the product was with older versions, so this may not represent the actual case anymore. In essence, user registry integration is atypical in the sense that the product creates a copy of the user inside the product itself (to accommodate for license seat counting, I guess).
Depending upon the size of the user base and license model, it may not allow new users to log in to the platform. I doubt the vendor considers this an issue, though.
For how long have I used the solution?
I have used this for three years, including the implementation of the product
What do I think about the stability of the solution?
There were no issues with stability.
What do I think about the scalability of the solution?
There were no issues with scalability.
How is customer service and technical support?
Technical support is OK. The product is not very difficult to install, but there are some considerations that need to be taken into account. Tech support is very well aware of this.
How was the initial setup?
The initial setup was simple. It is windows based and leverages installation wizards to perform installation. Also, sufficient documentation exists to guide the setup procedure.
What's my experience with pricing, setup cost, and licensing?
Look well at the user base and frequency of use. A lot of licensing models exist, but having this clear will immediately indicate what fits best.
As for pricing, I cannot comment.
Which other solutions did I evaluate?
We did not evaluate other solutions.
What other advice do I have?
Make sure that the organization is ready and willing to adopt this, as the typical business cases cannot be addressed by the product alone.
Disclosure: My company has a business relationship with this vendor other than being a customer. We are a CyberArk business partner.
CyberArk PAS Solution Professional | Project Manager at a tech services company with 10,001+ employees
Provides automatic password management. We can monitor, record, and control sessions.
What is most valuable?
All features of the CyberArk PAS solution are valuable.
The Digital Vault is one of the key components of the solution along with many other great benefits. The highly secured vault stores the privileged account passwords and data files using encryption. In version v9.7, CyberArk has introduced the Cluster Vault feature, which enhances high availability of the Vault server.
Other important features:
- Automatic password management
- Monitor, record, and control privileged sessions
- Flexible architecture
- Clientless product
- Custom plug-ins for managing privileged accounts and sessions
How has it helped my organization?
Unmanaged, highly privileged accounts increase risks that can be exploited by attackers. The security controls defined by the organization require protection of the privileged account passwords. CyberArk helps organizations to identify, store, protect, and monitor the usage of privileged accounts.
What needs improvement?
An immediate improvement was the implementation of security controls to protect, control and monitor privileged accounts through CyberArk solution.
For how long have I used the solution?
I have used CyberArk for over two and a half years.
What do I think about the stability of the solution?
It’s a very stable product. I haven’t encountered any stability issues.
What do I think about the scalability of the solution?
I haven’t encountered any scalability issues. All the components are scalable.
How are customer service and technical support?
I would give technical support a rating of 4.5/5.
Which solution did I use previously and why did I switch?
This is the first PAM product that I have used.
How was the initial setup?
The initial installation was straightforward. The configuration or integration can be complex depending on the requirements, design, and infrastructure of the organization.
What's my experience with pricing, setup cost, and licensing?
The pricing and licensing depend on many factors and on the components considered for implementation.
What other advice do I have?
The PAM solution brings cultural change and adds a layer to the way IT administrators access the privileged accounts before implementing the PAM tool. A great, valuable product like CyberArk requires good planning and time to implement all the features.
Disclosure: My company does not have a business relationship with this vendor other than being a customer.

Buyer's Guide
Download our free CyberArk Privileged Access Manager Report and get advice and tips from experienced pros
sharing their opinions.
Updated: June 2025
Product Categories
Privileged Access Management (PAM) User Activity Monitoring Enterprise Password Managers Mainframe Security Operational Technology (OT) SecurityPopular Comparisons
Azure Key Vault
AWS Secrets Manager
Okta Workforce Identity
HashiCorp Vault
Delinea Secret Server
CyberArk Endpoint Privilege Manager
BeyondTrust Endpoint Privilege Management
WALLIX Bastion
CyberArk Identity
One Identity Safeguard
BeyondTrust Privileged Remote Access
BeyondTrust Password Safe
Buyer's Guide
Download our free CyberArk Privileged Access Manager Report and get advice and tips from experienced pros
sharing their opinions.
Quick Links
Learn More: Questions:
- CyberArk vs. ManageEngine Password Manager Pro
- How does Sailpoint IdentityIQ compare with CyberArk PAM?
- Which PAM tool do you prefer: CyberArk Privileged Access Manager, One Identity Safeguard, Delinea Secret Server, or BeyondTrust Privileged Remote A
- What is the difference between Privileged Users and Privileged Accounts
- When evaluating Privileged Identity Management, what aspect do you think is the most important to look for?
- How was the 2020 Twitter Hack carried out? Could it have been prevented?
- Which is the best Privileged Account Management solution?
- What are the top 5 PAM solutions that can be implemented which cover both hybrid and cloud?
- What are the top 5 PAM solutions?
- How will AI and ML help or work with PIM/PAM?
The UI has been completely revamped in Version 10. It has a differently look and feel. We will be looking to test it in our Development landscape and possibly go to Production towards the end of the year.