Try our new research platform with insights from 80,000+ expert users
PeerSpot user
CyberArk Consultant at a hospitality company with 10,001+ employees
Real User
Helped us to identify, store, protect, and monitor usage of privileged accounts
Pros and Cons
  • "CyberArk has helped us to identify, store, protect, and monitor the usage of privileged accounts."
  • "The Vault offers great capabilities for structuring and accessing data."
  • "Central Password Manager is useful for agentless automated password management through AD integration as well as endpoints for different devices."
  • "Online help needs to be looked into with live agent support."
  • "The product documentation has to be more precise in certain aspects with explanations for functionality limitations along with reference material or screenshots."
  • "New functionalities and discovered bugs take longer to patch. We would greatly appreciate quicker development of security patches and bug corrections."

What is our primary use case?

Managing and securing the access to the environment.

I have worked with CyberArk solutions/applications for more than three years.

I have completed several implementations, proofs of concept, operational, and development activities. I have also worked with or checked most CyberArk releases since version 8.7.

How has it helped my organization?

Much stricter rotation of credentials.

Unmanaged and highly privileged accounts increase risks that can be exploited. The security controls defined by the organization require protection of the privileged account passwords. CyberArk has helped us to identify, store, protect, and monitor the usage of privileged accounts.

What is most valuable?

  • Controlled access and rotation of credentials.
  • The Vault offers great capabilities for structuring and accessing data. 
  • Central Password Manager is useful for agentless automated password management through AD integration as well as endpoints for different devices.
  • Privileged Session Manager is for provisioning, securing, and recording sessions.

What needs improvement?

  • The product documentation has to be more precise in certain aspects with explanations for functionality limitations along with reference material or screenshots. 
  • New functionalities and discovered bugs take longer to patch. We would greatly appreciate quicker development of security patches and bug corrections.
  • Online help also needs to be looked into with live agent support.
Buyer's Guide
CyberArk Privileged Access Manager
August 2025
Learn what your peers think about CyberArk Privileged Access Manager. Get advice and tips from experienced pros sharing their opinions. Updated: August 2025.
865,295 professionals have used our research since 2012.

For how long have I used the solution?

One to three years.
Disclosure: My company does not have a business relationship with this vendor other than being a customer.
PeerSpot user
it_user585702 - PeerSpot reviewer
Senior Consultant at a tech services company with 5,001-10,000 employees
Consultant
Allows secure, logged access to highly sensitive servers and services
Pros and Cons
  • "Allows secure, logged access to highly sensitive servers and services."
  • "​It's hard to find competent resellers/support."
  • "Initial setup is complex. Lots of architecture, lots of planning, and lots of education and training are needed."
  • "it manages creds based on Organizational Units. That is, a "safe" is limited to specific OUs. That makes for very elaborate OU structure, or you risk exposing too many devices by putting most of them in fewer OUs."

How has it helped my organization?

It has made things more complex, but has eliminated the possibility of Pass The Hash.

What is most valuable?

Allows secure, logged access to highly sensitive servers and services.

What needs improvement?

Perhaps by design, but it manages creds based on Organizational Units. That is, a "safe" is limited to specific OUs. That makes for very elaborate OU structure, or you risk exposing too many devices by putting most of them in fewer OUs.

For how long have I used the solution?

Three to five years.

What do I think about the stability of the solution?

No scalability issues.

What do I think about the scalability of the solution?

Yes. The OU limitations, noted above.

How is customer service and technical support?

It's hard to find competent resellers/support.

How was the initial setup?

Complex. Lots of architecture, lots of planning, and lots of education and training are needed. Technically, roll-out isn’t bad. It’s the support, training, education, philosophy, and integration within existing ways of doing things that are challenging.

What other advice do I have?

I’m a consultant. I help implement and train others on how to use it in a highly secure environment.

I’d give it a nine out of 10. It is very, very secure.

Plan for major culture change, especially in non-progressive shops. This is a necessary evil to endure for the sake of real security.

Disclosure: My company does not have a business relationship with this vendor other than being a customer.
PeerSpot user
Buyer's Guide
CyberArk Privileged Access Manager
August 2025
Learn what your peers think about CyberArk Privileged Access Manager. Get advice and tips from experienced pros sharing their opinions. Updated: August 2025.
865,295 professionals have used our research since 2012.
it_user796542 - PeerSpot reviewer
Works at a financial services firm with 10,001+ employees
Real User
Securely protects our TAP/NUID and privileged access accounts within the company
Pros and Cons
  • "The regulation of accounts is by far the most needed and valuable part of the application."
  • "Helped us meet our standards and requirements to help us comply with industry standards and banking regulations."
  • "Securely protects our TAP/NUID and privileged access accounts within the company."

    What is our primary use case?

    Our main use is for CyberArk to hold, maintain, and securely protect our TAP/NUID and "privileged access" accounts within the company.

    How has it helped my organization?

    For audit and risk purposes, CyberArk EPV has helped us meet our standards and requirements to help us comply with industry standards and banking regulations. Reports and other quick audit checks make this possible.

    What is most valuable?

    EPV, as a whole, is very valuable to the company. However, the regulation of accounts is by far the most needed and valuable part of the application.

    What needs improvement?

    Cost efficiency is the number one thing that can be improved in my mind. This would change lots of companies minds on purchasing the product.

    For how long have I used the solution?

    Less than one year.
    Disclosure: My company does not have a business relationship with this vendor other than being a customer.
    PeerSpot user
    PeerSpot user
    Senior Consultant - Information Security Engineering at a financial services firm with 10,001+ employees
    Real User
    Can provide transparent connection to targeted systems and record activities
    Pros and Cons
    • "Rather than multiple tools for maintaining regulatory compliance around passwords and privileged accounts, we have centralized as much as possible with CyberArk. This is now a one stop shop for end users to access their elevated credentials."
    • "You can gradually implement CyberArk, starting with more easily attainable goals."

      What is our primary use case?

      We proactively vault and manage all elevated accounts across multiple platforms. 

      For especially sensitive business units, we additionally leverage Privilege Session Manager to provide transparent connection to targeted systems and record activities.

      How has it helped my organization?

      Rather than multiple tools for maintaining regulatory compliance around passwords and privileged accounts, we have centralized as much as possible with CyberArk. This is now a one stop shop for end users to access their elevated credentials.

      What is most valuable?

      You can gradually implement CyberArk, starting with more easily attainable goals, such as basic vaulting and password rotation and build on that with additional modules, such as Privileged Session Manager and Application Identity Manager.

      What needs improvement?

      While in the past, administration required several tools and multiple screens/options in those products, v10 is moving towards a single pane of glass with common functions easily found and information regarding privileged accounts given to users in plain, easy to understand terms, now enhanced with graphics.

      For how long have I used the solution?

      Three to five years.
      Disclosure: My company does not have a business relationship with this vendor other than being a customer.
      PeerSpot user
      PeerSpot user
      Princ. Info Security Analyst at a insurance company with 10,001+ employees
      Real User
      Ensures accounts are managed according to corporate policies
      Pros and Cons
      • "Ensures accounts are managed according to corporate policies."
      • "It takes people out of the machine work of ensuring credentials remain up-to-date, and handles connection brokering such that human usage and credential management remain independent."
      • "It is easily customized, and that customization makes it very easy to start trying to shoehorn the solution into roles it was never intended to fill."

      What is our primary use case?

      We use it all.

      • Privileged account access and management
      • Credential rotation
      • Access control
      • Privileged session recording

      How has it helped my organization?

      CyberArk PAS helps ensure accounts are managed according to corporate policies. In short, it takes people out of the machine work of ensuring credentials remain up-to-date, and handles connection brokering such that human usage and credential management remain independent.

      What is most valuable?

      All of the features we use have helped our security posture in some way. All of these have their place in defining and supporting the security posture:

      • Password management
      • Session management
      • Recording
      • Access control.

      What needs improvement?

      Overall, I think it is a fantastic product, when used as designed and intended.

      One of its biggest downfalls is also one of its biggest strengths. It is easily customized, and that customization makes it very easy to start trying to shoehorn the solution into roles it was never intended to fill.

      For how long have I used the solution?

      More than five years.
      Disclosure: My company does not have a business relationship with this vendor other than being a customer.
      PeerSpot user
      PeerSpot user
      Identity and Access Management System Administrator Sr. at a financial services firm with 1,001-5,000 employees
      Real User
      Increased our insight into how privileged accounts are being used and distributed within our footprint
      Pros and Cons
      • "Our go-to solution for securing against the pass the hash attack vector and auditing privileged account usage."
      • "Increased our insight into how privileged accounts are being used and distributed within our footprint."
      • "Areas the product could be improved are in some of the reporting capabilities and how the reports are configured."

      What is our primary use case?

      CyberArk PAS is our go-to solution for securing against the pass the hash attack vector and auditing privileged account usage.

      How has it helped my organization?

      The CyberArk PAS has greatly increased our insight into how privileged accounts are being used and distributed within our footprint.

      What is most valuable?

      • Ease of use
      • The auditing capabilities
      • The great support of their customer success teams

      What needs improvement?

      Areas the product could be improved are in some of the reporting capabilities and how the reports are configured.

      For how long have I used the solution?

      One to three years.
      Disclosure: My company does not have a business relationship with this vendor other than being a customer.
      PeerSpot user
      it_user789450 - PeerSpot reviewer
      Works at a energy/utilities company with 1,001-5,000 employees
      User
      The ability to write your own connectors and plugins is invaluable as far as flexibility goes
      Pros and Cons
      • "Our privileged accounts are now stored in a more secure location and lateral movement within the network have been lessened."
      • "The PSM is excellent and the ability to write your own connectors and plugins is invaluable as far as flexibility goes."
      • "Enhanced PSM support for Java based applications."

      What is our primary use case?

      • Vaulting of privileged credentials. 
      • Used as a jump host solution. 
      • We wanted to keep passwords from being exposed to end users and connect them seamlessly to their target devices.

      How has it helped my organization?

      Our privileged accounts are now stored in a more secure location and lateral movement within the network have been lessened.

      What is most valuable?

      The PSM is excellent and the ability to write your own connectors and plugins is invaluable as far as flexibility goes.

      What needs improvement?

      • Enhanced PSM support for Java based applications.
      • Easier to use bulk uploader tools (which are already being worked on).

      For how long have I used the solution?

      One to three years.
      Disclosure: My company does not have a business relationship with this vendor other than being a customer.
      PeerSpot user
      PeerSpot user
      Global Privilege Access Management Technical Architect at a consultancy with 10,001+ employees
      Real User
      All access to our servers, by both staff and vendors, is monitored and recorded
      Pros and Cons
      • "CyberArk has resulted in a massive increase in our security footprint."
      • "All access to our servers by both staff and vendors is monitored and recorded."
      • "The current user interface is a little dated. However, I hear there are changes coming in the next version."
      • "There is a learning curve when it comes to planning out the deployment strategy, but once it is defined, it runs itself."

      What is our primary use case?

      We are leveraging CyberArk to provide Windows server access management across our enterprise. All our staff is looking for access to a server and needs to use CyberArk.

      How has it helped my organization?

      CyberArk has resulted in a massive increase in our security footprint. All access to our servers, by both staff and vendors, is monitored and recorded.

      What is most valuable?

      Session recording and key logging. We can track down not only who made a change, but exactly what they changed or did.

      What needs improvement?

      The current user interface is a little dated. However, I hear there are changes coming in the next version. 

      There is a learning curve when it comes to planning out the deployment strategy, but once it is defined, it runs itself.

      For how long have I used the solution?

      More than five years.
      Disclosure: My company does not have a business relationship with this vendor other than being a customer.
      PeerSpot user
      Rodney Dapilmoto - PeerSpot reviewer
      Rodney DapilmotoSystems Admin Analyst 3 at CPS Energy
      Real User

      The UI has been completely revamped in Version 10. It has a differently look and feel. We will be looking to test it in our Development landscape and possibly go to Production towards the end of the year.

      Buyer's Guide
      Download our free CyberArk Privileged Access Manager Report and get advice and tips from experienced pros sharing their opinions.
      Updated: August 2025
      Buyer's Guide
      Download our free CyberArk Privileged Access Manager Report and get advice and tips from experienced pros sharing their opinions.