4.5
1589 Reviews (All time)
Review weighting

Browse CyberArk Reviews

CyberArk is present in 8 markets with 19 products. CyberArk has 1589 reviews with an overall average rating of 4.5.

Access Management

Gartner defines access management (AM) as tools that include authentication and single sign-on (SSO) capabilities, and that establish, manage and enforce runtime access controls for modern standards-based and classic web applications and APIs. AM’s purpose is to enable SSO access for people (employees, consumers and other users) and machines to protected applications in a streamlined and consistent way that enhances the user experience. AM is also responsible for providing security controls to protect the user session in runtime, enforcing authentication and authorization using adaptive access. Lastly, AM can provide identity context for other cybersecurity tools and reliant applications to enable identity-first security.

CyberArk has 2 products in Access Management market

CPS Protection Platforms

Gartner defines the cyber-physical systems (CPS) protection platforms market as products that use knowledge of industrial protocols, operational/production network packets or traffic metadata, and physical process asset behavior to discover, categorize, map and protect CPS in production or mission-critical environments outside of enterprise IT environments. CPS protection platforms can be delivered from the cloud, on-premises or in hybrid form. Gartner defines CPS as engineered systems that orchestrate sensing, computation, control, networking and analytics to interact with the physical world (including humans). When secure, they enable safe, real-time, reliable, resilient and adaptable performance.

CyberArk has 1 product in CPS Protection Platforms market

Certificate Lifecycle Management (CLM)

Certificate Lifecycle Management (CLM) is the process of managing digital certificates from their creation to their expiration or revocation. Digital certificates are electronic credentials that verify the identity of individuals, devices, or organizations and enable secure, encrypted communication over networks. They are a fundamental part of Public Key Infrastructure (PKI), ensuring trust and data integrity in digital interactions. CLM involves key stages such as requesting, issuing, installing, monitoring, renewing, and revoking certificates. This process helps prevent service disruptions, security breaches, and compliance failures. CLM is used by a wide range of users including IT administrators, security teams, DevOps engineers, and compliance officers who rely on it to maintain secure and reliable digital environments.

CyberArk has 1 product in Certificate Lifecycle Management (CLM) market

Identity Governance and Administration

Gartner defines identity governance and administration (IGA) as the solution to manage the identity life cycle and govern access across on-premises and cloud environments. To accomplish this, IGA tools aggregate and correlate disparate identity and access rights data, and provide full capability controls over accounts and associated access. IGA solutions also fulfill the purpose of unifying and correlating identity data for organizations with multiple person and machine identity authoritative sources. This is done to provide a single view of identity (system of record) for their dependent processes and systems

CyberArk has 2 products in Identity Governance and Administration market

Password Management Tools

Password management (PM) tools are products that provide users with the means to reset their own passwords after an account lockout or when they forget their passwords. PM tools can also synchronize passwords for users across multiple systems, allowing users to access multiple applications with the same password.

CyberArk has 1 product in Password Management Tools market

Privileged Access Management

Gartner defines privileged access management (PAM) as tools that provide an elevated level of technical access through the management and protection of accounts, credentials and commands, which are used to administer or configure systems and applications. PAM tools — available as software, SaaS or hardware appliances — manage privileged access for both people (system administrators and others) and machines (systems or applications). Gartner defines four distinct tool categories for PAM tools: privileged account and session management (PASM), privilege elevation and delegation management (PEDM), secrets management, and cloud infrastructure entitlement management (CIEM).

CyberArk has 5 products in Privileged Access Management market

Secure Enterprise Browsers

Secure enterprise browsers (SEBs) are solutions that deliver enterprise security policies and controls through a centrally managed custom web browser, plug-in or browser extension. SEBs provide security and policy enforcement for web, SaaS and private applications, as well as browser hardening delivered through the browser rather than at the endpoint OS or network level. SEBs also enable visibility, control and auditability of web application data accessed by end users from managed or unmanaged devices without the need for in-line decryption of web traffic.

CyberArk has 1 product in Secure Enterprise Browsers market

Security Solutions - Others

Reviews for 'Security Solutions - Others'

CyberArk has 6 products in Security Solutions - Others market