The primary use case is to monitor the official activity of a privileged user for privilege violations.
Information Security Analyst at a financial services firm with 1,001-5,000 employees
User-friendly GUI but more expensive than most competitors
Pros and Cons
- "CyberArk's GUI is user friendly."
- "Password Vault is much pricier than other solutions. A vendor team might struggle to explain why that price is justified. There are good alternatives that cost less."
What is our primary use case?
What is most valuable?
CyberArk's GUI is user friendly.
For how long have I used the solution?
I have been using CyberArk for only six months.
What do I think about the stability of the solution?
Password Vault is a reasonably stable solution.
Buyer's Guide
CyberArk Privileged Access Manager
May 2025

Learn what your peers think about CyberArk Privileged Access Manager. Get advice and tips from experienced pros sharing their opinions. Updated: May 2025.
851,823 professionals have used our research since 2012.
What do I think about the scalability of the solution?
I've only used it for a few months, so it's hard for me to say how scalable Password Vault is. Those who've used it longer and deployed it on more endpoints could answer that question better.
How are customer service and support?
We're served by CyberArk's regional support based in India and Singapore, but I want country-level support in Bangladesh, so I can get help quickly. Also, online support is annoying. I would like to get face-to-face support from a local CyberArk representative.
How was the initial setup?
Setting up Password Vault is not easy. We needed an online consultant to help us.
What's my experience with pricing, setup cost, and licensing?
Password Vault is much pricier than other solutions. A vendor team might struggle to explain why that price is justified. There are good alternatives that cost less.
What other advice do I have?
I rate CyberArk Enterprise Password Vault seven out of 10
Which deployment model are you using for this solution?
On-premises
Disclosure: I am a real user, and this review is based on my own experience and opinions.
CDO & Co-Founder at ELYTIK
Complete package, thorough threat detection, but expensive
Pros and Cons
- "This is a complete solution that can detect cyber attacks well."
What is most valuable?
This is a complete solution that can detect cyber attacks well. I have found the proxy features most valuable for fast password web access.
For how long have I used the solution?
I use the solution for security. I make sure the bulk of the password of the certificate for the cloud and on-premise applications are good. I action and administer them when needed.
What do I think about the stability of the solution?
The solution is stable, it is very resilient.
What do I think about the scalability of the solution?
I have found the solution to be scalable.
How was the initial setup?
The installation is not difficult for me because all the information is on the website.
What's my experience with pricing, setup cost, and licensing?
The solution is very expensive and requires a license. We pay for an enterprise license.
What other advice do I have?
This is a complete package that has a lot of the capabilities you would want in this type of solution but it is very expensive.
I rate CyberArk PAS a seven out of ten.
Which deployment model are you using for this solution?
On-premises
Disclosure: I am a real user, and this review is based on my own experience and opinions.
Buyer's Guide
CyberArk Privileged Access Manager
May 2025

Learn what your peers think about CyberArk Privileged Access Manager. Get advice and tips from experienced pros sharing their opinions. Updated: May 2025.
851,823 professionals have used our research since 2012.
IT Security Consultant at a tech services company with 10,001+ employees
It is clientless, and does not require any third-party product for any of its operations.
What is most valuable?
Every feature of this product - Password Management, Session Management and so on has its own value depending on different use cases, but I like:
- It's a clientless product and does not require any third-party product for any of its operations (Password Management, Privileged Session Management).
- For password and session management, it can integrate with any device/script with a password OOB or via a custom plugin.
- Compared to other products, CyberArk is extremely easy to install and configure.
How has it helped my organization?
Due to regular growth of an organization infrastructure, managing passwords within the organization becomes extremely difficult.
In larger organizations with a large user and infrastructure base, it can be very difficult to ensure that the passwords for privileged accounts are changed according to the organization security policy. This can be especially true in case of local admins for Windows and Unix boxes. Unmanaged/neglected local admins accounts lead to a major security threat.
Another major risk is to monitor activities and usages associated with privileged accounts to hold people accountable for their actions.
CyberArk helps organizations to manage all the privileged account passwords (server or workstation) in a centralization location as per organizational security policies. It also helps to hold people accountable by controlling and managing password usage using privileged session management.
Accountability is set up using CyberArk OOB temper-proof reports.
What needs improvement?
CyberArk has evolved a lot in the last 16 years and has nearly all the features required for effective operation. The only area for improvement is using a native client while connecting to the target device instead of the current method of using a web portal (PVWA). CyberArk seems to be working on this area and we expect these features in coming versions.
It would be great if in the future CyberArk considers launching an installer for Unix-based OSs.
For how long have I used the solution?
I have been using this product since 2010.
What do I think about the stability of the solution?
In my seven years of experience with CyberArk products, I have never seen an unstable environment due to product functionality. It's always lack of proper planning, inexperience and faulty configuration that leads to an unstable environment.
What do I think about the scalability of the solution?
CyberArk can be horizontally and vertically scaled, if it is well thought out during panning phase. As an example, if an organization feels that they may need high availability of Vault servers (CyberArk’s centralized storage for passwords and audit data) in the foreseeable future, they should consider installing CyberArk Vault in cluster mode instead of standalone mode. One can't use a standalone vault as a cluster vault or convert a standalone vault to a cluster vault, but in terms of increasing the number of passwords and session recording, underlying hardware can be scale to achieve desired size.
How are customer service and technical support?
Three-year support (unlimited case and call support) is free with license purchase but I would say sometimes it's not sufficient to resolve the issues with this model.
Nonetheless, CyberArk Profession Services is quite impressive, even though it's a costly affair.
Which solution did I use previously and why did I switch?
I was part of the PIM product evaluation team at my previous organization. I stayed with CyberArk because is it's extremely easy to implement, and very stable when implemented with well-thought-out planning and experience. It has all of the required features for a PIM product, it does not have dependencies on third-party products for it to function and it is clientless.
How was the initial setup?
Initial set up is super simple and if planned properly, can be installed within a couple of hours.
What's my experience with pricing, setup cost, and licensing?
I cannot comment much on this because CyberArk has different pricing for its partners or resellers, and might also vary according to size of procurement.
Which other solutions did I evaluate?
Before choosing this product, I also I evaluated NetIQ PIM, Dell TPAM, CA PIM and ARCOS.
What other advice do I have?
Invest as much as possible in the planning and design phase. Consider at least future three-year growth in password and user base such as growth in virtual environments, and size accordingly. Also consider requirements like high availability of vaults, PSM and other components.
Disclosure: I am a real user, and this review is based on my own experience and opinions.
Cyber Security Supervisor at a tech company with 1,001-5,000 employees
Sys/DB admins and third parties no longer need to have system credentials.
What is most valuable?
- Password vaulting
- Granular commands profiling with OPM
How has it helped my organization?
- Sys/DB admins no longer need to have system credentials (and the same for third parties)
- Access profiling
- Request demands from domain groups
What needs improvement?
The management console has a lot of functionalities, but is a little bit complex to use.
Customer support and technical support can be better, compared with the level of products.
For how long have I used the solution?
I have used it for one year.
What do I think about the stability of the solution?
I have not encountered any stability issues.
What do I think about the scalability of the solution?
I have not encountered any scalability issues, technically speaking. Issues with the licenses can occur; the pricing model is not easy to understand.
How are customer service and technical support?
Technical support is 7/10.
Which solution did I use previously and why did I switch?
I did not previously use a different solution.
How was the initial setup?
Initial setup was very easy. We started integrating systems and providing access to systems within few days.
What's my experience with pricing, setup cost, and licensing?
From my experience, for small environments, the subscription licensing model is very cheap.
Which other solutions did I evaluate?
We also evaluate other solutions in the Magic Quadrant for PAM solutions.
What other advice do I have?
Before defining the solution’s architecture, clearly define your requirements and the kind of systems in scope. Some systems/device can be integrated out-of-the-box, others need customization.
Plus: easy to deploy, highly customizable
Minus: a little bit complex to integrate in large environment, complex rules/customization takes time
Disclosure: I am a real user, and this review is based on my own experience and opinions.
Director - Enterprise Security, Fraud and Supplier Risk Management at a financial services firm with 1,001-5,000 employees
Secure and functionally complete
Pros and Cons
- "I haven't really thought about anything that I want to use it for, that I couldn't use it for."
- "I would like to see more integration with more tools, for more APIs."
What is our primary use case?
I used CyberArk for vaulting passwords.
What is most valuable?
I haven't really thought about anything that I want to use it for, that I couldn't use it for.
What needs improvement?
I would like to see more integration with more tools, for more APIs.
For how long have I used the solution?
I have used this solution in the last 12 months.
How was the initial setup?
The initial setup was not overly complex but it wasn't straightforward.
Once it was prepared properly, it was okay.
What other advice do I have?
I would rate CyberArk Enterprise Password Vault an eight out of ten.
Disclosure: I am a real user, and this review is based on my own experience and opinions.
Vice President - Cyber Security at a tech services company with 10,001+ employees
This product is stable. But, we did encounter some issues with the decentralized mode of the product.
Pros and Cons
- "This solution is quite stable."
- "I think having a distributed architecture would certainly help this solution."
What is our primary use case?
We primarily use this product for privileged identity management, restricting privileged IDs, and governance. This is the primary function of the program, and what we expect from it within the broad business level.
What needs improvement?
One limitation is that we are not able to put this into a decentralized mode.
For how long have I used the solution?
One to three years.
What do I think about the stability of the solution?
This solution is quite stable.
What do I think about the scalability of the solution?
We have no issues with scalability.
How is customer service and technical support?
The tech support is decent.
How was the initial setup?
It takes a while to adapt to the product.
What's my experience with pricing, setup cost, and licensing?
I do not have experience with the pricing or licensing of this product.
What other advice do I have?
I think having a distributed architecture would certainly help this solution.
Disclosure: I am a real user, and this review is based on my own experience and opinions.
Lead Systems Architect at IT Specialist LLC
Very good security, good scalability and a recently lowered pricing model
Pros and Cons
- "Security is the solution's most valuable feature. As far as I know, this solution is the most secure system of this class on the market today, even considering another management system like Fudo Security, which we also use. The integration capabilities are very good; it helps strengthen our overall security."
- "The solution is too big and complex for any businesses that are small or medium-sized. They should offer a more compact version or make a solution better suited to smaller businesses."
What is our primary use case?
The primary use case of the solution is to gather privileged accounts from different systems and to contain privileged accounts in one secure place.
What is most valuable?
Security is the solution's most valuable feature. As far as I know, this solution is the most secure system of this class on the market today, even considering another management system like Fudo Security, which we also use. The integration capabilities are very good; it helps strengthen our overall security.
What needs improvement?
The interface and user experience could be improved. In comparison, in Fudo Security, items are very searchable and it's very comfortable to work with. CyberArk is not very good at that. It could be improved and it wouldn't be too complicated to do so. The solution is too big and complex for any business that is small or medium-sized. They should offer a more compact version or make a solution better suited to smaller businesses.
For how long have I used the solution?
I've been using the solution for five to ten years.
What do I think about the scalability of the solution?
It's an enterprise-level solution. So long as you can afford it, you can scale.
How are customer service and technical support?
I've never had to reach out to technical support.
Which solution did I use previously and why did I switch?
We didn't really use a different solution. We use Fudo Security, but it's not for password management alone. It's more of an all-in-one solution. We still use it; it's cheap and it's a very simple solution in comparison to CyberArk.
How was the initial setup?
The initial setup is okay; I'd rate it seven out of ten in terms of ease of use compared to other solutions.
Many different things during installation are not straightforward. For example, it would be better to make some kind of pre-installed machine or virtual machine or to make it easy to deploy various ISO files. There are competitors that have just one machine and no infrastructure involved. It would also be better if they embedded the license or offered some free options.
Deployment took about a month.
What's my experience with pricing, setup cost, and licensing?
As far as I know, CyberArk changed its pricing policy for our region. Overall it was very expensive a few years ago, but now, just around a year ago, it became less expensive and it's easier for us to sell it.
What other advice do I have?
We use the on-premises deployment model.
In terms of advice, I'd suggest others follow the implementation carefully.
I'd rate the solution eight out of ten. It's not easy to install and it's got too many components which means it's not really suitable for small or medium-sized businesses.
Disclosure: I am a real user, and this review is based on my own experience and opinions.
Information Technology Specialist (Contract role) at a tech services company with 10,001+ employees
Takes away all ambiguity around "known" admin accounts
What is our primary use case?
Privileged account access into customer environments.
How has it helped my organization?
A higher level of password rotation and usage auditing.
What is most valuable?
- OTP
- Session recording
- Auditing
- It takes away all ambiguity around "known" admin accounts.
What needs improvement?
The native PSM components are really good, however, if you have to apply environmental tweaks to an application launch, custom AutoIt scripts are needed.
Options for specifying drive mappings or script execution without the need for AutoIt based scripting in the native components would be good.
Disclosure: I am a real user, and this review is based on my own experience and opinions.

Buyer's Guide
Download our free CyberArk Privileged Access Manager Report and get advice and tips from experienced pros
sharing their opinions.
Updated: May 2025
Product Categories
Privileged Access Management (PAM) User Activity Monitoring Enterprise Password Managers Mainframe Security Operational Technology (OT) SecurityPopular Comparisons
Azure Key Vault
AWS Secrets Manager
Okta Workforce Identity
HashiCorp Vault
Delinea Secret Server
CyberArk Endpoint Privilege Manager
BeyondTrust Endpoint Privilege Management
WALLIX Bastion
CyberArk Identity
One Identity Safeguard
BeyondTrust Privileged Remote Access
BeyondTrust Password Safe
Buyer's Guide
Download our free CyberArk Privileged Access Manager Report and get advice and tips from experienced pros
sharing their opinions.
Quick Links
Learn More: Questions:
- CyberArk vs. ManageEngine Password Manager Pro
- How does Sailpoint IdentityIQ compare with CyberArk PAM?
- Which PAM tool do you prefer: CyberArk Privileged Access Manager, One Identity Safeguard, Delinea Secret Server, or BeyondTrust Privileged Remote A
- What is the difference between Privileged Users and Privileged Accounts
- When evaluating Privileged Identity Management, what aspect do you think is the most important to look for?
- How was the 2020 Twitter Hack carried out? How could it have been prevented?
- Which is the best Privileged Account Management solution?
- What are the top 5 PAM solutions that can be implemented which cover both hybrid and cloud?
- What are the top 5 PAM solutions?
- How will AI and ML help or work with PIM/PAM?
New version 10.x had made the PAS Solution more graphical for the end users.
Its uses the new gen CPMs and so can overcome the reconcile delays.
Dashboard views also make it a bit enhanced.