Overview
Product Information on CyberArk Privileged Access Manager
What is CyberArk Privileged Access Manager?
CyberArk Privileged Access Manager Pricing
Overall experience with CyberArk Privileged Access Manager
“CyberArc PAM Delivers Strong Security and Compliance, but Requires Careful Planning and Administration”
“CyberArk - Plan accordingly ”
About Company
Company Description
Focusing on Identity Security, CyberArk is a specialist in privileged access management. It develops secure solutions for diverse identities - human or machine to cater to numerous business applications. The company ensures protection across varied work environments like distributed workforces, hybrid cloud workloads, and throughout the DevOps lifecycle. CyberArk's primary objective is to avert cyberattacks that abuse insider privileges and pose a threat to crucial enterprise assets. In addition to this focus, the company offers security solutions aimed at preventing the progression of cyber threats, thus protecting businesses from substantial damage. CyberArk's security solutions align with rigorous compliance and audit requirements to service businesses' need to guard their most valued possessions. The company has a global presence with offices spread across countries like the U.S., Israel, U.K., Singapore, Australia, France, Germany, Italy, Japan, Netherlands, and Turkey.
Company Details
Do You Manage Peer Insights at Palo Alto Networks (CyberArk)?
Access Vendor Portal to update and manage your profile.
Key Insights
A Snapshot of What Matters - Based on Validated User Reviews
User Sentiment About CyberArk Privileged Access Manager
Reviewer Insights for: CyberArk Privileged Access Manager
Deciding Factors: CyberArk Privileged Access Manager Vs. Market Average
Performance of CyberArk Privileged Access Manager Across Market Features
CyberArk Privileged Access Manager Likes & Dislikes
Highly secure privileged credential management capabilities, session isolation, rotation and secure vaulting are all reliable to a large extent. Privileged session recording and auditing contribute to the existence of detailed visibility that allows compliance and investigation. Ability to grow and integrate: This solution is also compatible with external security products, security tools for on-prem environments, and different types of cloud security technologies.
Security First Architecture for the end user is what I do like, but unfortunately the journey has been very long in the implementation phase which is what lets this product down. Remote access, when it works, is smooth, there's not much latency. Future updates look good with AI driven analytics and TDR.
CyberArk has the ability to manage accounts and update passwords in several different locations to keep applications running when the password is changed. Working with the staff at CyberArk is also very good. If I reach out to my person at CyberArk he gets back to me right away and does what needs to be done to get my issue resolved.
Setting up for the first time is complicated, a proper and effective usage needs a great amount of work and the expert knowledge of the user. The user interface is functional, however it might be somewhat less user-friendly, particularly if compared to the latest PAM competitors. Continuous administrative costs managing the software in different aspects such as upgrades, onboarding accounts and policies is a very lengthy process
Configurations can vary (on premise, cloud, LDAP etc). CA didn't initially offer best practices or tell us some of those don't work with password rotations etc. Check ins are a major pain with the teams due to needing an admin user to manually check them out. 365 logins don't work for us. It just takes us to our tenant due to browser addons being blocked on our company.
1. Patching CyberArk is difficult. 2. Upgrading without Vendor support is not easy. 3. Documentation on their support site could be better.
Top CyberArk Privileged Access Manager Alternatives
Peer Discussions
CyberArk Privileged Access Manager Reviews and Ratings
- Senior Technical Lead50M-1B USDIT ServicesReview Source
CyberArk - Plan accordingly
Customers want a PAM solution, so we looked at Cyber Ark to reduce the risks associated with privilege sprawl. It provides advanced auditing, video recording and credential rotation capabilities that are intended to add value to a secure by design methodology. The journey thus far has been mixed. While the platform offers strong features, there are technical gaps. Password rotation only works in specific setups - don't expect it to work with all configurations. If you use scanners or zealot firewalls in your own environment, expect some features such as 365 access etc to not work as it requires an add-on in your browser which most environments will look to block. Check-ins and check-outs don't work reliably. Administrators have to constantly unlock accounts, even while following best practices. Support is okay - they do help but to a point, as if it's hosted on your own environment they can't help as much. When it does work, and in the right setups (PAM servers hosted locally in the customer's environment), it works fine for the most part (minus check in/outs). - NETWORK AND SECURITY ENGINEER<50M USDIT ServicesReview Source
CyberArc PAM Delivers Strong Security and Compliance, but Requires Careful Planning and Administration
We have been using CyberArk PAM to handle credentials and secure our privileged accounts through our hybrid architecture and the platform has been dependable. It also minimized the hazards linked to unlawful access and improved compliance readiness to a great extent. - Information Security Administrator II50M-1B USDHealthcare and BiotechReview Source
CyberArk Effective Privileged Account Management
I brought CyberArk on 13 years ago and it has been a great product to work with. We manage all of our service accounts and local server accounts successfully. - It Associate<50M USDIT ServicesReview Source
Robust privileged access security with strong controls & enterprise grade capabilities.
Overall, our experience with CyberArk has been very positive. It provides strong security controls for privileged accounts, reliable session monitoring & detailed auditing. While the initial setup and onboarding can be complex, once implemented it significantly improves security posture & compliance. - CHIEF INFORMATION SECURITY OFFICER1B-10B USDManufacturingReview Source
Installation/upgrade Failures and Slow Support Response Impact Cyberark PAM Experience
We have the PAM solution from Cyberark for several years now. There have been multiple cases where their SW fails to install or upgrade and the troubleshooting takes too long from their support. In some cases the support claims that the errors we see they don't know why they are happening and that it's probably OK to continue using the SW despite the errors. In some cases it took them several months to just identify misconfiguration on the backend that they run (SaaS solution) and of course we couldn't use the relevant servers/services during that time. There has been no support from the Account team, and the Cyberark support is really bad, avoiding or delaying the engagement from the engineering team, when they clearly don't grasp the problem they are handling.



