• HOME
  • CATEGORIES

    • CATEGORIES

    • Browse All Categories
  • FOR VENDORS

    • FOR VENDORS

    • Log In to Vendor Portal
    • Get Started
  • REVIEWS

    • REVIEWS

    • Write a Review
    • Product Reviews
    • Vendor Directory
    • Product Comparisons
  • GARTNER PEER COMMUNITY™
  • GARTNER.COM
  • Community GuidelinesListing GuidelinesBrowse VendorsRules of EngagementFAQPrivacyTerms of Service
    ©2026 Gartner, Inc. and/or its affiliates.
    All rights reserved.
  • Categories

    • Loading categories...

      Browse All Categories

      Loading markets...

  • For Vendors

    • Log In to Vendor Portal 

    • Get Started 

  • Write a Review

Join / Sign In
cyberark
4.5
1629 Reviews (All time)
Review weighting


Browse CyberArk Reviews

CyberArk is present in 8 markets with 20 products. CyberArk has 1629 reviews with an overall average rating of 4.5.

Access Management

Gartner defines access management (AM) as tools that include authentication, authorization, single sign-on (SSO) and adaptive access capabilities for modern standards-based web applications, classic web applications and APIs. AM’s purpose is to give people (employees, consumers and other users) and machines access to protected applications in a streamlined and consistent way that enhances the user experience. For people, SSO is part of the enhanced experience. AM is also responsible for providing security controls to protect the user session during runtime. It enforces authentication and runtime authorization using adaptive access. Lastly, AM can provide identity context for other cybersecurity tools and reliant applications to enable identity-first security.

CyberArk has 2 products in Access Management market
  • CyberArk Customer Identity
    4.5
    42 Reviews
  • CyberArk Workforce Identity
    4.5
    176 Reviews

CPS Protection Platforms

Gartner defines the cyber-physical systems (CPS) protection platforms market as products that use knowledge of industrial protocols, operational/production network packets or traffic metadata, and physical process asset behavior to discover, categorize, map and protect CPS in production or mission-critical environments outside of enterprise IT environments. CPS protection platforms can be delivered from the cloud, on-premises or in hybrid form. Gartner defines CPS as engineered systems that orchestrate sensing, computation, control, networking and analytics to interact with the physical world (including humans). When secure, they enable safe, real-time, reliable, resilient and adaptable performance.

CyberArk has 1 product in CPS Protection Platforms market
  • Core Privileged Access Security (Legacy)
    4.5
    14 Reviews

Certificate Lifecycle Management (CLM)

Certificate Lifecycle Management (CLM) is the process of managing digital certificates from their creation to their expiration or revocation. Digital certificates are electronic credentials that verify the identity of individuals, devices, or organizations and enable secure, encrypted communication over networks. They are a fundamental part of Public Key Infrastructure (PKI), ensuring trust and data integrity in digital interactions. CLM involves key stages such as requesting, issuing, installing, monitoring, renewing, and revoking certificates. This process helps prevent service disruptions, security breaches, and compliance failures. CLM is used by a wide range of users including IT administrators, security teams, DevOps engineers, and compliance officers who rely on it to maintain secure and reliable digital environments.

CyberArk has 1 product in Certificate Lifecycle Management (CLM) market
  • CyberArk Certificate Manager
    4.6
    196 Reviews

IT Security

IT Security refers to products and services that protect digital systems and data from cyber threats and unauthorized access. This category includes markets that focus on network security, identity management, data protection, and cloud security, enabling organizations to reduce risk, ensure compliance, and operate securely in a digital world.

CyberArk has 7 products in IT Security market
  • CyberArk Cloud Entitlements Manager
    5.0
    1 Review
  • CyberArk On-Demand Privileges Manager
    4.9
    14 Reviews
  • 5 more products

Identity Governance and Administration

Gartner defines identity governance and administration (IGA) as the solution to manage the identity life cycle and govern access across on-premises and cloud environments. To accomplish this, IGA tools aggregate and correlate disparate identity and access rights data, and provide full capability controls over accounts and associated access.

CyberArk has 2 products in Identity Governance and Administration market
  • CyberArk Identity Lifecycle Management
    4.0
    2 Reviews
  • CyberArk Identity Security Platform
    4.8
    11 Reviews

Password Management Tools

Password management (PM) tools are products that provide users with the means to reset their own passwords after an account lockout or when they forget their passwords. PM tools can also synchronize passwords for users across multiple systems, allowing users to access multiple applications with the same password.

CyberArk has 1 product in Password Management Tools market
  • CyberArk Workforce Identity
    4.5
    2 Reviews

Privileged Access Management

Gartner defines privileged access management (PAM) as tools that provide an elevated level of technical access through the management and protection of accounts, credentials and commands, which are used to administer or configure systems and applications. PAM tools — available as software, SaaS or hardware appliances — manage privileged access for both people (system administrators and others) and machines (systems or applications). Gartner defines five distinct tool categories for PAM tools: privileged account and session management (PASM), privilege elevation and delegation management (PEDM), secrets management, cloud infrastructure entitlement management (CIEM) and remote PAM (RPAM). Privileged access is access beyond the normal level granted to both human and machine accounts. It allows users to override existing access controls, change security configurations, or make changes affecting multiple users or systems. As privileged access can create, modify and delete IT infrastructure, along with company data contained in that infrastructure, it presents catastrophic risk. Managing privileged access is thus a critical security function for every organization and requires a specific set of procedures and tools. PAM tools focus on either privileged accounts or privileged commands.

CyberArk has 5 products in Privileged Access Management market
  • Cloud Privilege Security (Legacy)
    5.0
    1 Review
  • CyberArk Endpoint Privilege Manager
    4.6
    122 Reviews
  • 3 more products

Secure Enterprise Browsers

Secure enterprise browsers (SEBs) are solutions that deliver enterprise security policies and controls through a centrally managed custom web browser, plug-in or browser extension. SEBs provide security and policy enforcement for web, SaaS and private applications, as well as browser hardening delivered through the browser rather than at the endpoint OS or network level. SEBs also enable visibility, control and auditability of web application data accessed by end users from managed or unmanaged devices without the need for in-line decryption of web traffic.

CyberArk has 1 product in Secure Enterprise Browsers market
  • CyberArk Secure Browser
    4.7
    23 Reviews
Gartner Peer Insights content consists of the opinions of individual end users based on their own experiences, and should not be construed as statements of fact, nor do they represent the views of Gartner or its affiliates. Gartner does not endorse any vendor, product or service depicted in this content nor makes any warranties, expressed or implied, with respect to this content, about its accuracy or completeness, including any warranties of merchantability or fitness for a particular purpose.
This site is protected by hCaptcha and its Privacy Policy and Terms of Service apply.
  • Community Guidelines
  • Listing Guidelines
  • Browse Vendors
  • Rules of Engagement
  • FAQ
  • Privacy
  • Terms of Service
©
 
©