• Categories

    • Loading categories...

      Loading markets...

  • For Vendors

    • Log In to Vendor Portal 

    • Get Started 

  • Write a Review

Join / Sign In
  1. Home
  2. /
  3. CyberArk Privileged Access Manager
Logo of CyberArk Privileged Access Manager

CyberArk Privileged Access Manager

byCyberArk
in Privileged Access Management
4.4

Overview

Product Information on CyberArk Privileged Access Manager

Updated 13th October 2025

What is CyberArk Privileged Access Manager?

CyberArk Privileged Access Manager is a software designed to manage and secure privileged accounts across IT environments. It provides features such as credential management, session monitoring, and threat analytics to help organizations reduce risk associated with privileged access. The software offers automated auditing and centralized policy enforcement for controlling privileged account usage, aiming to prevent unauthorized access and limit the potential impact of credential misuse. It addresses the business problem of protecting sensitive data and systems from internal and external threats, supporting regulatory compliance and reducing attack surfaces related to privileged credentials.

CyberArk Privileged Access Manager Pricing

CyberArk Privileged Access Manager software uses a subscription-based pricing model, with costs typically determined by the number of privileged accounts and features required. Pricing may vary based on deployment options such as cloud or on-premises, as well as additional capabilities like session monitoring, threat analytics, or advanced account management. Custom quotations are often provided based on organizational size and security needs.

Overall experience with CyberArk Privileged Access Manager

NETWORK AND SECURITY ENGINEER
<50M USD, IT Services
FAVORABLE

“CyberArc PAM Delivers Strong Security and Compliance, but Requires Careful Planning and Administration”

4.0
Sep 26, 2025
We have been using CyberArk PAM to handle credentials and secure our privileged accounts through our hybrid architecture and the platform has been dependable. It also minimized the hazards linked to unlawful access and improved compliance readiness to a great extent.
Senior Technical Lead
500M - 1B USD, IT Services
CRITICAL

“CyberArk - Plan accordingly ”

3.0
Nov 12, 2025
Customers want a PAM solution, so we looked at Cyber Ark to reduce the risks associated with privilege sprawl. It provides advanced auditing, video recording and credential rotation capabilities that are intended to add value to a secure by design methodology. The journey thus far has been mixed. While the platform offers strong features, there are technical gaps. Password rotation only works in specific setups - don't expect it to work with all configurations. If you use scanners or zealot firewalls in your own environment, expect some features such as 365 access etc to not work as it requires an add-on in your browser which most environments will look to block. Check-ins and check-outs don't work reliably. Administrators have to constantly unlock accounts, even while following best practices. Support is okay - they do help but to a point, as if it's hosted on your own environment they can't help as much. When it does work, and in the right setups (PAM servers hosted locally in the customer's environment), it works fine for the most part (minus check in/outs).

About Company

Company Description

Updated 12th September 2025

Focusing on Identity Security, CyberArk is a specialist in privileged access management. It develops secure solutions for diverse identities - human or machine to cater to numerous business applications. The company ensures protection across varied work environments like distributed workforces, hybrid cloud workloads, and throughout the DevOps lifecycle. CyberArk's primary objective is to avert cyberattacks that abuse insider privileges and pose a threat to crucial enterprise assets. In addition to this focus, the company offers security solutions aimed at preventing the progression of cyber threats, thus protecting businesses from substantial damage. CyberArk's security solutions align with rigorous compliance and audit requirements to service businesses' need to guard their most valued possessions. The company has a global presence with offices spread across countries like the U.S., Israel, U.K., Singapore, Australia, France, Germany, Italy, Japan, Netherlands, and Turkey.

Company Details

Updated 12th September 2025
Company type
Public
Year Founded
1999
Head office location
Newton, United States
Number of employees
1001 - 5000
Website
http://www.cyberark.com

Key Insights

A Snapshot of What Matters - Based on Validated User Reviews

User Sentiment About CyberArk Privileged Access Manager
Reviewer Insights for: CyberArk Privileged Access Manager
Deciding Factors: CyberArk Privileged Access Manager Vs. Market Average
Performance of CyberArk Privileged Access Manager Across Market Features

CyberArk Privileged Access Manager Likes & Dislikes

Like

Highly secure privileged credential management capabilities, session isolation, rotation and secure vaulting are all reliable to a large extent. Privileged session recording and auditing contribute to the existence of detailed visibility that allows compliance and investigation. Ability to grow and integrate: This solution is also compatible with external security products, security tools for on-prem environments, and different types of cloud security technologies.

Read Full Review
Like

Security First Architecture for the end user is what I do like, but unfortunately the journey has been very long in the implementation phase which is what lets this product down. Remote access, when it works, is smooth, there's not much latency. Future updates look good with AI driven analytics and TDR.

Read Full Review
Like

1. the seamless integration 2. The granular access controls 3. The intelligent credential management.

Read Full Review
Dislike

Setting up for the first time is complicated, a proper and effective usage needs a great amount of work and the expert knowledge of the user. The user interface is functional, however it might be somewhat less user-friendly, particularly if compared to the latest PAM competitors. Continuous administrative costs managing the software in different aspects such as upgrades, onboarding accounts and policies is a very lengthy process

Read Full Review
Dislike

Configurations can vary (on premise, cloud, LDAP etc). CA didn't initially offer best practices or tell us some of those don't work with password rotations etc. Check ins are a major pain with the teams due to needing an admin user to manually check them out. 365 logins don't work for us. It just takes us to our tenant due to browser addons being blocked on our company.

Read Full Review
Dislike

1. Their costs can spiral out of control if you do not understand your own budget and what you can afford. 2. Integration - please have someone experienced with you, it was easy because we had someone with prior knowledge of the tools. 3. Learning Curve, and that plays on the previous one, with some of our new engineers, it took a bit to get up to speed on how to use it, but with the knowledge-based articles and the community, it helped to get them up to speed faster.

Read Full Review

Top CyberArk Privileged Access Manager Alternatives

Logo of Secret Server
1. Secret Server
4.6
(1302 Ratings)
Logo of ARCON | Privileged Access Management
2. ARCON | Privileged Access Management
4.8
(559 Ratings)
Logo of BeyondTrust Remote Support
3. BeyondTrust Remote Support
4.7
(355 Ratings)
View All Alternatives

Peer Discussions

CyberArk Privileged Access Manager Reviews and Ratings

4.4

(949 Ratings)

Rating Distribution

5 Star
52%
4 Star
39%
3 Star
7%
2 Star
1%
1 Star
1%
Why ratings and reviews count differ?

Customer Experience

Evaluation & Contracting

4.4

Integration & Deployment

4.3

Service & Support

4.3

Product Capabilities

4.6

Last 12 Months
Filter Reviews
Sort By:
Most helpful
Star Rating
Reviewer Type
Reviewer's Company Size
Reviewer's Industry
Reviewer's Region
Reviewer's Job Function
  • Senior Technical Lead
    50M-1B USD
    IT Services
    Review Source

    CyberArk - Plan accordingly

    3.0
    Nov 12, 2025
    Customers want a PAM solution, so we looked at Cyber Ark to reduce the risks associated with privilege sprawl. It provides advanced auditing, video recording and credential rotation capabilities that are intended to add value to a secure by design methodology. The journey thus far has been mixed. While the platform offers strong features, there are technical gaps. Password rotation only works in specific setups - don't expect it to work with all configurations. If you use scanners or zealot firewalls in your own environment, expect some features such as 365 access etc to not work as it requires an add-on in your browser which most environments will look to block. Check-ins and check-outs don't work reliably. Administrators have to constantly unlock accounts, even while following best practices. Support is okay - they do help but to a point, as if it's hosted on your own environment they can't help as much. When it does work, and in the right setups (PAM servers hosted locally in the customer's environment), it works fine for the most part (minus check in/outs).
  • NETWORK AND SECURITY ENGINEER
    <50M USD
    IT Services
    Review Source

    CyberArc PAM Delivers Strong Security and Compliance, but Requires Careful Planning and Administration

    4.0
    Sep 26, 2025
    We have been using CyberArk PAM to handle credentials and secure our privileged accounts through our hybrid architecture and the platform has been dependable. It also minimized the hazards linked to unlawful access and improved compliance readiness to a great extent.
  • AVP, IT Security and Risk Management
    1B-10B USD
    Banking
    Review Source

    Implementation Achieves Security and Scalability Despite Integration and Cost Challenges

    5.0
    Aug 8, 2025
    Overall experience was rewarding, and they exceeded expectations. From the first call until the end of the implementation, the team was right there and was ready and willing to assist in any way we needed. The procurement process was smooth and transparent, and the licensing was something that we were able to work through as well as ensure it was in the budget. The implementation was a standout success. We worked with the deployment specialist as well as with our internal teams and were able to securely roll it out, as well as make sure it was scalable. Our admins were quickly able to get up to speed with the help of the resources and knowledge-based articles. I will say that there were a few hiccups that happened, but with all the teams coming together for a quick call/chat, they were resolved without issues. So far with post-deployment, it has been successful, and it was made immediately clear that the users loved it and its ease of use. Of course, they did not like having the additional steps, but we made sure they were comfortable and understood the need for the change.
  • Manager, IT Security and Risk Management
    50M-1B USD
    IT Services
    Review Source

    CyberArk PAM Offers Robust Features but Faces Usability and Integration Challenges

    4.0
    Jul 28, 2025
    Good Experience working with CyberArk PAM, we encountered multiple challenges during the implementation of the product.
  • Information Security Administrator II
    50M-1B USD
    Healthcare and Biotech
    Review Source

    CyberArk Effective Privileged Account Management

    5.0
    Sep 10, 2025
    I brought CyberArk on 13 years ago and it has been a great product to work with. We manage all of our service accounts and local server accounts successfully.
...
Showing Result 1-5 of 1006

Recommended Gartner Research

  • Critical Capabilities for Privileged Access Management
  • Magic Quadrant for Privileged Access Management

Gartner Peer Insights content consists of the opinions of individual end users based on their own experiences, and should not be construed as statements of fact, nor do they represent the views of Gartner or its affiliates. Gartner does not endorse any vendor, product or service depicted in this content nor makes any warranties, expressed or implied, with respect to this content, about its accuracy or completeness, including any warranties of merchantability or fitness for a particular purpose.

This site is protected by hCaptcha and its Privacy Policy and Terms of Use apply.


Software reviews and ratings for EMMS, BI, CRM, MDM, analytics, security and other platforms - Peer Insights by Gartner
Community GuidelinesListing GuidelinesBrowse VendorsRules of EngagementFAQsPrivacyTerms of Use

©2026 Gartner, Inc. and/or its affiliates.

All rights reserved.