Overview
Product Information on CyberArk Privileged Access Manager
What is CyberArk Privileged Access Manager?
CyberArk Privileged Access Manager Pricing
Overall experience with CyberArk Privileged Access Manager
“CyberArk Delivers Strong Credential Security But Deployment and Upgrades Are Complex”
“CyberArk - Plan accordingly ”
About Company
Company Description
Focusing on Identity Security, CyberArk is a specialist in privileged access management. It develops secure solutions for diverse identities - human or machine to cater to numerous business applications. The company ensures protection across varied work environments like distributed workforces, hybrid cloud workloads, and throughout the DevOps lifecycle. CyberArk's primary objective is to avert cyberattacks that abuse insider privileges and pose a threat to crucial enterprise assets. In addition to this focus, the company offers security solutions aimed at preventing the progression of cyber threats, thus protecting businesses from substantial damage. CyberArk's security solutions align with rigorous compliance and audit requirements to service businesses' need to guard their most valued possessions. The company has a global presence with offices spread across countries like the U.S., Israel, U.K., Singapore, Australia, France, Germany, Italy, Japan, Netherlands, and Turkey.
Company Details
Do You Manage Peer Insights at Palo Alto Networks (CyberArk)?
Access Vendor Portal to update and manage your profile.
Key Insights
A Snapshot of What Matters - Based on Validated User Reviews
User Sentiment About CyberArk Privileged Access Manager
Reviewer Insights for: CyberArk Privileged Access Manager
Deciding Factors: CyberArk Privileged Access Manager Vs. Market Average
Performance of CyberArk Privileged Access Manager Across Market Features
CyberArk Privileged Access Manager Likes & Dislikes
The level of control and session isolation it provides is unmatched. In our high stakes operations environment where we manage access to critical production servers and sensitive financial infrastructure, the Privileged Session Manager (PSM) ensures that external vendors and internal admins never see the root credentials. They just get a secure, proxy session. The video-recorded audit logs are practically bulletproof, which makes our regulator compliance audits much less painful.
Security First Architecture for the end user is what I do like, but unfortunately the journey has been very long in the implementation phase which is what lets this product down. Remote access, when it works, is smooth, there's not much latency. Future updates look good with AI driven analytics and TDR.
Highly secure privileged credential management capabilities, session isolation, rotation and secure vaulting are all reliable to a large extent. Privileged session recording and auditing contribute to the existence of detailed visibility that allows compliance and investigation. Ability to grow and integrate: This solution is also compatible with external security products, security tools for on-prem environments, and different types of cloud security technologies.
The architecture is incredibly heavy and the administrative interface feels quite outdated compared to modern SaaS tools. Upgrading on-prem or hybrid components (like the Vault or the PSM servers) is a massive project that usually requires professional services or a dedicated engineering sprint. It is also very unforgiving; if you misconfigure a password rotation policy, you can easily lock out your own IT team and cause operational headaches.
Configurations can vary (on premise, cloud, LDAP etc). CA didn't initially offer best practices or tell us some of those don't work with password rotations etc. Check ins are a major pain with the teams due to needing an admin user to manually check them out. 365 logins don't work for us. It just takes us to our tenant due to browser addons being blocked on our company.
Setting up for the first time is complicated, a proper and effective usage needs a great amount of work and the expert knowledge of the user. The user interface is functional, however it might be somewhat less user-friendly, particularly if compared to the latest PAM competitors. Continuous administrative costs managing the software in different aspects such as upgrades, onboarding accounts and policies is a very lengthy process
Top CyberArk Privileged Access Manager Alternatives
Peer Discussions
CyberArk Privileged Access Manager Reviews and Ratings
- Senior Technical Lead50M-1B USDIT ServicesReview Source
CyberArk - Plan accordingly
Customers want a PAM solution, so we looked at Cyber Ark to reduce the risks associated with privilege sprawl. It provides advanced auditing, video recording and credential rotation capabilities that are intended to add value to a secure by design methodology. The journey thus far has been mixed. While the platform offers strong features, there are technical gaps. Password rotation only works in specific setups - don't expect it to work with all configurations. If you use scanners or zealot firewalls in your own environment, expect some features such as 365 access etc to not work as it requires an add-on in your browser which most environments will look to block. Check-ins and check-outs don't work reliably. Administrators have to constantly unlock accounts, even while following best practices. Support is okay - they do help but to a point, as if it's hosted on your own environment they can't help as much. When it does work, and in the right setups (PAM servers hosted locally in the customer's environment), it works fine for the most part (minus check in/outs). - Operations Manager<50M USDServices (non-Government)Review Source
CyberArk Delivers Strong Credential Security But Deployment and Upgrades Are Complex
CyberArk is the absolute gold standard for securing our most critical infrastructure credentials, but the deployment requires significant heavy lifting and cross-departmental coordination to get it right. - NETWORK AND SECURITY ENGINEER<50M USDIT ServicesReview Source
CyberArc PAM Delivers Strong Security and Compliance, but Requires Careful Planning and Administration
We have been using CyberArk PAM to handle credentials and secure our privileged accounts through our hybrid architecture and the platform has been dependable. It also minimized the hazards linked to unlawful access and improved compliance readiness to a great extent. - It Associate1B-10B USDBankingReview Source
Initial Setup Requires Planning, But Audit Readiness Improved With CyberArk Deployment
Our overall experience with CyberArk has been very positive.The Platform delivers a robust, enterprise grade solution for managing privileged access across our hybrid infrastructure. We have successfully deployed Vault, PVWA, PSM, CPM and PTA across DC-DR Sites and combined with AD MFA and QRadar integrations, it has strengthened our security and compliance posture. We were able to onboard accounts for the Systems, Network and Database teams covering everything from RDP - SSH Connections to web-based apps and smart consoles. While the initial configuration required dedicated planning, the outcome in terms of audit readiness and risk reduction was worth the effort. - It Security & Risk Management Associate<50M USDIT ServicesReview Source
CyberArk PAM Enhances Credential Security But Presents Configuration Complexities
My overall experience with CyberArk PAM has been very positive, particularly in strengthening our privileged access governance and reducing credential-related risks. The platform significantly improves visibility and control over access control across on-premises assets.



