Focusing on Identity Security, CyberArk is a specialist in privileged access management. It develops secure solutions for diverse identities - human or machine to cater to numerous business applications. The company ensures protection across varied work environments like distributed workforces, hybrid cloud workloads, and throughout the DevOps lifecycle. CyberArk's primary objective is to avert cyberattacks that abuse insider privileges and pose a threat to crucial enterprise assets. In addition to this focus, the company offers security solutions aimed at preventing the progression of cyber threats, thus protecting businesses from substantial damage. CyberArk's security solutions align with rigorous compliance and audit requirements to service businesses' need to guard their most valued possessions. The company has a global presence with offices spread across countries like the U.S., Israel, U.K., Singapore, Australia, France, Germany, Italy, Japan, Netherlands, and Turkey.
Do You Manage Peer Insights at Palo Alto Networks (CyberArk)?
Access Vendor Portal to update and manage your profile.
Session Isolation and Monitoring (PSM). The ability to record every single action an administrator takes on a critical serverand to do so without the admin ever knowing the actual passwordis a game-changer. It provides a definitive audit trail and prevents lateral movement by attackers. Additionally, its Vault architecture is incredibly secure, providing a physical-like security layer for digital secrets.
Security First Architecture for the end user is what I do like, but unfortunately the journey has been very long in the implementation phase which is what lets this product down. Remote access, when it works, is smooth, there's not much latency. Future updates look good with AI driven analytics and TDR.
The level of control and session isolation it provides is unmatched. In our high stakes operations environment where we manage access to critical production servers and sensitive financial infrastructure, the Privileged Session Manager (PSM) ensures that external vendors and internal admins never see the root credentials. They just get a secure, proxy session. The video-recorded audit logs are practically bulletproof, which makes our regulator compliance audits much less painful.
Complexity and Administrative Overhead. The platform is notoriously difficult to set up and maintain. The user interface (UI) can feel dated and clunky compared to newer, cloud-native competitors. It requires a dedicated team of certified experts to manage it effectively; if you don't have the right staff, the system can quickly become a bottleneck for your IT operations.
Configurations can vary (on premise, cloud, LDAP etc). CA didn't initially offer best practices or tell us some of those don't work with password rotations etc. Check ins are a major pain with the teams due to needing an admin user to manually check them out. 365 logins don't work for us. It just takes us to our tenant due to browser addons being blocked on our company.
The architecture is incredibly heavy and the administrative interface feels quite outdated compared to modern SaaS tools. Upgrading on-prem or hybrid components (like the Vault or the PSM servers) is a massive project that usually requires professional services or a dedicated engineering sprint. It is also very unforgiving; if you misconfigure a password rotation policy, you can easily lock out your own IT team and cause operational headaches.