The customization of CyberArk Secure Cloud Access could be improved because I found scenarios where I could not provide the correct configuration due to insufficient options available. I understand the approach that keeping it simple makes it easier to deploy in general, but additional customization capabilities would be beneficial. Real-time monitoring with CyberArk Secure Cloud Access is missing some features that I believe are on the roadmap, such as AI-generated descriptions of events and summarization of events. These features would be particularly helpful for SOC analysis and are important for SOC members. The audit trail in the past was not very informative and requires improvements. I believe this is the reason why AI enrichment was prioritized in development.
CyberArk Secure Cloud Access involves substantial effort when performing on-premises deployments. The SaaS or cloud version is less time-consuming compared to the on-premises deployment. With on-premises deployment, you must do a great deal, including spinning up the infrastructure itself and adding it to the HSM before integrating or onboarding where you want to control through PAM. This requires significant human resources. The deployment complexity may not be entirely accurate in my assessment because it has been a while since I left the engineering aspect and moved into more managerial roles. Before, when I was using it, too many components were involved in CyberArk Secure Cloud Access deployment. You need to understand every component because the least mistake results in being completely locked out of the system. Having too many components makes the deployment difficult and is not easy to understand. You have to be technically inclined to perform the deployment successfully.
CyberArk Secure Cloud Access has limitations in support for on-premise teams. When issues arise with the VPN portal or the frontend, the admin team must directly engage the vendor, which can be time-consuming. It is important for critical support to respond within fifteen to twenty minutes to minimize business impact.
CyberArk Secure Cloud Access improves security with its dynamic role-based access and efficient management of private keys, minimizing security risks and enhancing user experience in demanding cloud environments.CyberArk Secure Cloud Access is designed for lightweight deployment, offering high availability and robust security features. Its seamless integration with SIEM enhances user experience, while private key management reduces manual entry dependency. Comprehensive audit trails and...
The customization of CyberArk Secure Cloud Access could be improved because I found scenarios where I could not provide the correct configuration due to insufficient options available. I understand the approach that keeping it simple makes it easier to deploy in general, but additional customization capabilities would be beneficial. Real-time monitoring with CyberArk Secure Cloud Access is missing some features that I believe are on the roadmap, such as AI-generated descriptions of events and summarization of events. These features would be particularly helpful for SOC analysis and are important for SOC members. The audit trail in the past was not very informative and requires improvements. I believe this is the reason why AI enrichment was prioritized in development.
CyberArk Secure Cloud Access involves substantial effort when performing on-premises deployments. The SaaS or cloud version is less time-consuming compared to the on-premises deployment. With on-premises deployment, you must do a great deal, including spinning up the infrastructure itself and adding it to the HSM before integrating or onboarding where you want to control through PAM. This requires significant human resources. The deployment complexity may not be entirely accurate in my assessment because it has been a while since I left the engineering aspect and moved into more managerial roles. Before, when I was using it, too many components were involved in CyberArk Secure Cloud Access deployment. You need to understand every component because the least mistake results in being completely locked out of the system. Having too many components makes the deployment difficult and is not easy to understand. You have to be technically inclined to perform the deployment successfully.
CyberArk Secure Cloud Access has limitations in support for on-premise teams. When issues arise with the VPN portal or the frontend, the admin team must directly engage the vendor, which can be time-consuming. It is important for critical support to respond within fifteen to twenty minutes to minimize business impact.