• HOME
  • CATEGORIES

    • CATEGORIES

    • Browse All Categories
  • FOR VENDORS

    • FOR VENDORS

    • Log In to Vendor Portal
    • Get Started
  • REVIEWS

    • REVIEWS

    • Write a Review
    • Product Reviews
    • Vendor Directory
    • Product Comparisons
  • GARTNER PEER COMMUNITY™
  • GARTNER.COM
  • Community GuidelinesListing GuidelinesBrowse VendorsRules of EngagementFAQPrivacyTerms of Service
    ©2026 Gartner, Inc. and/or its affiliates.
    All rights reserved.
  • Categories

    • Loading categories...

      Browse All Categories

      Loading markets...

  • For Vendors

    • Log In to Vendor Portal 

    • Get Started 

  • Write a Review

Join / Sign In
  1. Home
  2. /
  3. CyberArk Privileged Access Manager
Logo of CyberArk Privileged Access Manager

CyberArk Privileged Access Manager

byPalo Alto Networks (CyberArk)
in Privileged Access Management
4.4

Overview

Product Information on CyberArk Privileged Access Manager

Updated 13th October 2025

What is CyberArk Privileged Access Manager?

CyberArk Privileged Access Manager is a software designed to manage and secure privileged accounts across IT environments. It provides features such as credential management, session monitoring, and threat analytics to help organizations reduce risk associated with privileged access. The software offers automated auditing and centralized policy enforcement for controlling privileged account usage, aiming to prevent unauthorized access and limit the potential impact of credential misuse. It addresses the business problem of protecting sensitive data and systems from internal and external threats, supporting regulatory compliance and reducing attack surfaces related to privileged credentials.

CyberArk Privileged Access Manager Pricing

CyberArk Privileged Access Manager software uses a subscription-based pricing model, with costs typically determined by the number of privileged accounts and features required. Pricing may vary based on deployment options such as cloud or on-premises, as well as additional capabilities like session monitoring, threat analytics, or advanced account management. Custom quotations are often provided based on organizational size and security needs.

Overall experience with CyberArk Privileged Access Manager

NETWORK AND SECURITY ENGINEER
<50M USD, IT Services
FAVORABLE

“CyberArc PAM Delivers Strong Security and Compliance, but Requires Careful Planning and Administration”

4.0
Sep 26, 2025
We have been using CyberArk PAM to handle credentials and secure our privileged accounts through our hybrid architecture and the platform has been dependable. It also minimized the hazards linked to unlawful access and improved compliance readiness to a great extent.
Senior Technical Lead
500M - 1B USD, IT Services
CRITICAL

“CyberArk - Plan accordingly ”

3.0
Nov 12, 2025
Customers want a PAM solution, so we looked at Cyber Ark to reduce the risks associated with privilege sprawl. It provides advanced auditing, video recording and credential rotation capabilities that are intended to add value to a secure by design methodology. The journey thus far has been mixed. While the platform offers strong features, there are technical gaps. Password rotation only works in specific setups - don't expect it to work with all configurations. If you use scanners or zealot firewalls in your own environment, expect some features such as 365 access etc to not work as it requires an add-on in your browser which most environments will look to block. Check-ins and check-outs don't work reliably. Administrators have to constantly unlock accounts, even while following best practices. Support is okay - they do help but to a point, as if it's hosted on your own environment they can't help as much. When it does work, and in the right setups (PAM servers hosted locally in the customer's environment), it works fine for the most part (minus check in/outs).

About Company

Company Description

Updated 12th September 2025

Focusing on Identity Security, CyberArk is a specialist in privileged access management. It develops secure solutions for diverse identities - human or machine to cater to numerous business applications. The company ensures protection across varied work environments like distributed workforces, hybrid cloud workloads, and throughout the DevOps lifecycle. CyberArk's primary objective is to avert cyberattacks that abuse insider privileges and pose a threat to crucial enterprise assets. In addition to this focus, the company offers security solutions aimed at preventing the progression of cyber threats, thus protecting businesses from substantial damage. CyberArk's security solutions align with rigorous compliance and audit requirements to service businesses' need to guard their most valued possessions. The company has a global presence with offices spread across countries like the U.S., Israel, U.K., Singapore, Australia, France, Germany, Italy, Japan, Netherlands, and Turkey.

Company Details

Updated 12th September 2025
Company type
Public
Year Founded
1999
Head office location
Newton, United States
Number of employees
1001 - 5000
Website
http://www.cyberark.com

Do You Manage Peer Insights at Palo Alto Networks (CyberArk)?

Access Vendor Portal to update and manage your profile.

Key Insights

A Snapshot of What Matters - Based on Validated User Reviews

User Sentiment About CyberArk Privileged Access Manager
Reviewer Insights for: CyberArk Privileged Access Manager
Deciding Factors: CyberArk Privileged Access Manager Vs. Market Average
Performance of CyberArk Privileged Access Manager Across Market Features

CyberArk Privileged Access Manager Likes & Dislikes

Like

Highly secure privileged credential management capabilities, session isolation, rotation and secure vaulting are all reliable to a large extent. Privileged session recording and auditing contribute to the existence of detailed visibility that allows compliance and investigation. Ability to grow and integrate: This solution is also compatible with external security products, security tools for on-prem environments, and different types of cloud security technologies.

Like

Security First Architecture for the end user is what I do like, but unfortunately the journey has been very long in the implementation phase which is what lets this product down. Remote access, when it works, is smooth, there's not much latency. Future updates look good with AI driven analytics and TDR.

Like

CyberArk has the ability to manage accounts and update passwords in several different locations to keep applications running when the password is changed. Working with the staff at CyberArk is also very good. If I reach out to my person at CyberArk he gets back to me right away and does what needs to be done to get my issue resolved.

Dislike

Setting up for the first time is complicated, a proper and effective usage needs a great amount of work and the expert knowledge of the user. The user interface is functional, however it might be somewhat less user-friendly, particularly if compared to the latest PAM competitors. Continuous administrative costs managing the software in different aspects such as upgrades, onboarding accounts and policies is a very lengthy process

Dislike

Configurations can vary (on premise, cloud, LDAP etc). CA didn't initially offer best practices or tell us some of those don't work with password rotations etc. Check ins are a major pain with the teams due to needing an admin user to manually check them out. 365 logins don't work for us. It just takes us to our tenant due to browser addons being blocked on our company.

Dislike

1. Patching CyberArk is difficult. 2. Upgrading without Vendor support is not easy. 3. Documentation on their support site could be better.

Top CyberArk Privileged Access Manager Alternatives

Logo of Secret Server
1. Secret Server
4.6
(1304 Ratings)
Logo of ARCON | Privileged Access Management
2. ARCON | Privileged Access Management
4.8
(604 Ratings)
Logo of BeyondTrust Remote Support
3. BeyondTrust Remote Support
4.7
(356 Ratings)
View All Alternatives

Peer Discussions

CyberArk Privileged Access Manager Reviews and Ratings

4.4

(951 Ratings)

Rating Distribution

5 Star
52%
4 Star
39%
3 Star
7%
2 Star
1%
1 Star
1%
Why ratings and reviews count differ?

Customer Experience

Evaluation & Contracting

4.4

Integration & Deployment

4.3

Service & Support

4.3

Product Capabilities

4.6

Filter Reviews
Sort By:
Most helpful
Last 12 Months
Star Rating
Reviewer Type
Reviewer's Company Size
Reviewer's Industry
Reviewer's Region
Reviewer's Job Function
  • Senior Technical Lead
    50M-1B USD
    IT Services
    Review Source

    CyberArk - Plan accordingly

    3.0
    Nov 12, 2025
    Customers want a PAM solution, so we looked at Cyber Ark to reduce the risks associated with privilege sprawl. It provides advanced auditing, video recording and credential rotation capabilities that are intended to add value to a secure by design methodology. The journey thus far has been mixed. While the platform offers strong features, there are technical gaps. Password rotation only works in specific setups - don't expect it to work with all configurations. If you use scanners or zealot firewalls in your own environment, expect some features such as 365 access etc to not work as it requires an add-on in your browser which most environments will look to block. Check-ins and check-outs don't work reliably. Administrators have to constantly unlock accounts, even while following best practices. Support is okay - they do help but to a point, as if it's hosted on your own environment they can't help as much. When it does work, and in the right setups (PAM servers hosted locally in the customer's environment), it works fine for the most part (minus check in/outs).
  • NETWORK AND SECURITY ENGINEER
    <50M USD
    IT Services
    Review Source

    CyberArc PAM Delivers Strong Security and Compliance, but Requires Careful Planning and Administration

    4.0
    Sep 26, 2025
    We have been using CyberArk PAM to handle credentials and secure our privileged accounts through our hybrid architecture and the platform has been dependable. It also minimized the hazards linked to unlawful access and improved compliance readiness to a great extent.
  • Information Security Administrator II
    50M-1B USD
    Healthcare and Biotech
    Review Source

    CyberArk Effective Privileged Account Management

    5.0
    Sep 10, 2025
    I brought CyberArk on 13 years ago and it has been a great product to work with. We manage all of our service accounts and local server accounts successfully.
  • It Associate
    <50M USD
    IT Services
    Review Source

    Robust privileged access security with strong controls & enterprise grade capabilities.

    4.0
    Feb 12, 2026
    Overall, our experience with CyberArk has been very positive. It provides strong security controls for privileged accounts, reliable session monitoring & detailed auditing. While the initial setup and onboarding can be complex, once implemented it significantly improves security posture & compliance.
  • CHIEF INFORMATION SECURITY OFFICER
    1B-10B USD
    Manufacturing
    Review Source

    Installation/upgrade Failures and Slow Support Response Impact Cyberark PAM Experience

    1.0
    Sep 18, 2025
    We have the PAM solution from Cyberark for several years now. There have been multiple cases where their SW fails to install or upgrade and the troubleshooting takes too long from their support. In some cases the support claims that the errors we see they don't know why they are happening and that it's probably OK to continue using the SW despite the errors. In some cases it took them several months to just identify misconfiguration on the backend that they run (SaaS solution) and of course we couldn't use the relevant servers/services during that time. There has been no support from the Account team, and the Cyberark support is really bad, avoiding or delaying the engagement from the engineering team, when they clearly don't grasp the problem they are handling.
...
Showing Result 1-5 of 1009

Recommended Gartner Research

  • Critical Capabilities for Privileged Access Management
  • Magic Quadrant for Privileged Access Management

Gartner Peer Insights content consists of the opinions of individual end users based on their own experiences, and should not be construed as statements of fact, nor do they represent the views of Gartner or its affiliates. Gartner does not endorse any vendor, product or service depicted in this content nor makes any warranties, expressed or implied, with respect to this content, about its accuracy or completeness, including any warranties of merchantability or fitness for a particular purpose.

This site is protected by hCaptcha and its Privacy Policy and Terms of Use apply.


Software reviews and ratings for EMMS, BI, CRM, MDM, analytics, security and other platforms - Peer Insights by Gartner
Community GuidelinesListing GuidelinesBrowse VendorsRules of EngagementFAQsPrivacyTerms of Use

©2026 Gartner, Inc. and/or its affiliates.

All rights reserved.