Leaderboard for CyberArk Privileged Access Manager
Check out the members with the highest scores who have reviewed CyberArk Privileged Access Manager.
#1. S Azeem
505
Points
Senior Technology Manager at a outsourcing company
Reviewed CyberArk Privileged Access Manager:
A scalable and easy-to-deploy solution that provides password rotation and password encryption…375
Points
Security Engineer at Suraksha
Reviewed CyberArk Privileged Access Manager:
A highly scalable PAM solution that needs to improve its GUI#3. AnantUpadhyay
320
Points
CEO at CareerCraftly
Reviewed CyberArk Privileged Access Manager:
Privileged access management escalates efficiently with robust access control and remote…#4. Américo Silva
300
Points
System Administrator at Porto Editora
Reviewed CyberArk Privileged Access Manager:
Passwords are stored securely within the vault and eliminates the need for users to store passwords…#5. DerrickAkankwasa
265
Points
Cyber Security Engineer at Isolutions Associates Ltd (ISOLS)
Reviewed CyberArk Privileged Access Manager:
Improved security infrastructure and reduced risks through comprehensive credential management#6. reviewer1247523
260
Points
Head of Sales Services Department at a comms service provider
Reviewed CyberArk Privileged Access Manager:
Role management and session recording increase operational efficiency#7. Shad Smith
210
Points
Technical Architect at a tech vendor
Reviewed CyberArk Privileged Access Manager:
Simplified access to credentials with continuous updates for better security#8. Deepak Sahani
190
Points
Senior Manager, Cyber Security at OPTIV
Reviewed CyberArk Privileged Access Manager:
Comes with automatic password rotation feature but UI and pricing needs improvement #9. Nawaz Sarwar
190
Points
Consultant at a tech vendor
Reviewed CyberArk Privileged Access Manager:
Helps monitor activities and rotate passwords, also it's very customizable#10. Jonathan Hawes
185
Points
CyberArk PAS Administrator at L3Harris Technologies
Reviewed CyberArk Privileged Access Manager:
Easy to secure, control, and monitor privileged access on highly critical networks