Senior server administrator at a financial services firm with 1,001-5,000 employees
Real User
Significantly decreases the amount of time our teams spend mitigating security issues
Pros and Cons
  • "Because we now have the ability to grant access to management utilities like DNS Manager, Sequel Studio, and MMC, in a secure fashion, without system admins being required to continually reenter various passwords that are stored who knows where, it has really made the system admin's job much easier. It has made the PSM's job much easier. It has made the auditor's job and the security team's job and the access manager's job significantly easier, because we're able to move much more quickly toward a role-based access management system, and that is really streamlining the whole onboarding/offboarding management process."
  • "I would like to see better automation in granting access, better tools, more efficient tools, to be able to customize the solution that CyberArk provides."

What is our primary use case?

We use CyberArk to assist with implementing security solutions that our auditors require. It also assists us in giving secure, monitored, audited access to non-technical people who, because of their jobs, or because of the application, require direct access to servers.

We are utilizing CyberArk's secure application credentials and endpoints.

It is performing very well.

We're not planning to utilize CyberArk's secure infrastructure or applications running in the cloud because our industry is, for the present, barred from using cloud resources. We don't yet have experience using the Plugin Generator Utility and we are not using any of the other integrations available through CyberArk marketplace.

How has it helped my organization?

Because we now have the ability to grant access to management utilities like DNS Manager, Sequel Studio, and MMC, in a secure fashion, without system admins being required to continually reenter various passwords that are stored who knows where, it has really made the system admin's job much easier. It has made the PSM's job much easier. It has made the auditor's job and the security team's job and the access manager's job significantly easier, because we're able to move much more quickly toward a role-based access management system, and that is really streamlining the whole onboarding/offboarding management process.

CyberArk is the key technology around which we have built our security management solution. We chose it four years ago to assist with password management, and it has grown to where it is managing the entire security posture of the company at this point.

What is most valuable?

Number one would be the company, CyberArk, itself. The support, the ongoing assistance that is there, the ongoing ideas that are out there from champions, and from the other community forums that are out there, is just phenomenal.

What needs improvement?

My list of enhancement requests on the portal is quite extensive.

My goal as a system administrator is to enable people to do their jobs more easily, more efficiently. So, I'm looking for ways to enable people to leverage the security posture in CyberArk, and still be able to do their jobs. Better yet, to be able to do their jobs more easily, and that's exactly what I've been finding. There are a lot of ways that CyberArk is able to be used to give people access to things that they normally wouldn't be able to access, in a secure fashion, but there are still some roadblocks in the way there. I would like to see better automation in granting access, better tools, more efficient tools, to be able to customize the solution that CyberArk provides.

Buyer's Guide
CyberArk Privileged Access Manager
June 2024
Learn what your peers think about CyberArk Privileged Access Manager. Get advice and tips from experienced pros sharing their opinions. Updated: June 2024.
772,679 professionals have used our research since 2012.

For how long have I used the solution?

One to three years.

What do I think about the stability of the solution?

It is very stable. We started off on version 7, moved to 8, to 9, and now we're moving to 10, and each revision has brought about an increase in confidence and stability.

What do I think about the scalability of the solution?

It is very scalable for an organization of our size, and I have talked with other CyberArk administrators running worldwide enterprises with CyberArk.

How are customer service and support?

The tech support for CyberArk is definitely one of the best I've used, and I've been in IT for 35 years.

How was the initial setup?

I wasn't involved in the initial setup but I am involved in upgrade processing. Now, it is very straightforward. When we did the first major upgrade, it was very complex and required Professional Services for two weeks. Since we made it to version 9, the upgrades have been as simple as you could possibly hope for.

What was our ROI?

The amount of time that the security team spends mitigating risk has gone down. The amount of time that the server team spends managing security issues, mitigating security issues, has gone down tremendously.

What other advice do I have?

My advice to a colleague would be: First, don't allow the security team to be the driving force. It has to be the server team that implements it, that is the driving force behind it, and the for that reason is there is always animosity between the people who are there to enforce security and the people who are there to get a job done.

When you are on the enforcement team, you are dictating to the people who are trying to get a job done, "Here is something that I'm going to put in your way to make it harder for you to get your job done." Regardless of what happens, that's the way it comes across. Going to the server team saying, 'I've got a solution that's going to make our lives easier, and oh, by the way, it's also going to be more secure," you have a much easier time selling it, much lower push-back, because you're one of them.

Second, you've got to have buy-in before you pull the trigger. You can't just force it on them: "Oh, we just took away all your admin rights." You have to give them a new solution, let them prove to themselves that this solution works, that it does exactly what they need, and that it really is easier. Now, when you revoke the rights that they've had for probably decades, there is much less push-back.

In terms of selecting or working with a vendor, our most important criterion is the ability to connect with a vendor that not only gives us the solution we need but can also work with us to customize exactly what we need.

I would rate CyberArk a nine out of 10 for two reasons: 

  1. there is always room for growth
  2. there are still gaps in what the solution provides.

It's not complete across the board. If it were, it would be a 10. But I do see its potential to eventually reach that.

Disclosure: PeerSpot contacted the reviewer to collect the review and to validate authenticity. The reviewer was referred by the vendor, but the review is not subject to editing or approval by the vendor.
PeerSpot user
it_user796542 - PeerSpot reviewer
Works at a financial services firm with 10,001+ employees
Real User
Securely protects our TAP/NUID and privileged access accounts within the company
Pros and Cons
  • "The regulation of accounts is by far the most needed and valuable part of the application."
  • "Helped us meet our standards and requirements to help us comply with industry standards and banking regulations."
  • "Securely protects our TAP/NUID and privileged access accounts within the company."

    What is our primary use case?

    Our main use is for CyberArk to hold, maintain, and securely protect our TAP/NUID and "privileged access" accounts within the company.

    How has it helped my organization?

    For audit and risk purposes, CyberArk EPV has helped us meet our standards and requirements to help us comply with industry standards and banking regulations. Reports and other quick audit checks make this possible.

    What is most valuable?

    EPV, as a whole, is very valuable to the company. However, the regulation of accounts is by far the most needed and valuable part of the application.

    What needs improvement?

    Cost efficiency is the number one thing that can be improved in my mind. This would change lots of companies minds on purchasing the product.

    For how long have I used the solution?

    Less than one year.
    Disclosure: I am a real user, and this review is based on my own experience and opinions.
    PeerSpot user
    Buyer's Guide
    CyberArk Privileged Access Manager
    June 2024
    Learn what your peers think about CyberArk Privileged Access Manager. Get advice and tips from experienced pros sharing their opinions. Updated: June 2024.
    772,679 professionals have used our research since 2012.
    PeerSpot user
    Global Privilege Access Management Technical Architect at a consultancy with 10,001+ employees
    Real User
    All access to our servers, by both staff and vendors, is monitored and recorded
    Pros and Cons
    • "CyberArk has resulted in a massive increase in our security footprint."
    • "All access to our servers by both staff and vendors is monitored and recorded."
    • "The current user interface is a little dated. However, I hear there are changes coming in the next version."
    • "There is a learning curve when it comes to planning out the deployment strategy, but once it is defined, it runs itself."

    What is our primary use case?

    We are leveraging CyberArk to provide Windows server access management across our enterprise. All our staff is looking for access to a server and needs to use CyberArk.

    How has it helped my organization?

    CyberArk has resulted in a massive increase in our security footprint. All access to our servers, by both staff and vendors, is monitored and recorded.

    What is most valuable?

    Session recording and key logging. We can track down not only who made a change, but exactly what they changed or did.

    What needs improvement?

    The current user interface is a little dated. However, I hear there are changes coming in the next version. 

    There is a learning curve when it comes to planning out the deployment strategy, but once it is defined, it runs itself.

    For how long have I used the solution?

    More than five years.
    Disclosure: I am a real user, and this review is based on my own experience and opinions.
    PeerSpot user
    Rodney Dapilmoto - PeerSpot reviewer
    Rodney DapilmotoSystems Admin Analyst 3 at CPS Energy
    Top 20Real User

    The UI has been completely revamped in Version 10. It has a differently look and feel. We will be looking to test it in our Development landscape and possibly go to Production towards the end of the year.

    Information Security Engineer at a international affairs institute with 1,001-5,000 employees
    User
    Helps control use of shared passwords and the practice of sharing passwords disappeared completely

    What is our primary use case?

    The main purpose of getting CyberArk was to control the use of the shared passwords. 

    Secondly, we needed to take out the secrets from the applications' source code (database connection strings). 

    Thirdly, we wanted to improve the network segmentation and reduce the number of firewall exceptions. We're doing that by assigning a PSM per network zone and limiting the exceptions to its connections.

    How has it helped my organization?

    The practice of sharing passwords disappeared completely and the most sensitive application is using the AIM to retrieve database passwords for all its users.

    We're still struggling with the use of RDP through PSMs.

    What is most valuable?

    The most valuable features for us are the AIM and PSM because they helped us by reducing the number of secrets floating around.

    What needs improvement?

    The AIM providers registration process could be easier and could allow re-registration. Also, some sort of policies for assigning access rights and safe ownership would be useful for deployment automation. We're seeing difficulties with hosts requiring 2FA, and we need to better cover them with PSM and PSMP.

    For how long have I used the solution?

    More than five years.

    What do I think about the stability of the solution?

    I am very impressed with the stability, but I still need to convince some colleagues.

    What do I think about the scalability of the solution?

    Scalability is rather good, we haven't reached any technical limitations yet.

    How are customer service and technical support?

    The support is always very responsive, accurate, and complete in their solutions. I've always had a personal contact that would know our setup and was able to concentrate on our specifics instead of pointing to a generic document on the support site.

    Which solution did I use previously and why did I switch?

    No, we haven't used any other solution.

    How was the initial setup?

    The initial setup was straightforward because its entire complexity was hidden by the CyberArk expert who guided the whole process.

    What about the implementation team?

    Our vendor's implementation team was stellar.

    What was our ROI?

    We haven't yet calculated the ROI.

    What's my experience with pricing, setup cost, and licensing?

    Attempt to minimize the AIM deployments as the license is expensive. Take a license for a test instance even if it might cost extra.

    Which other solutions did I evaluate?

    I cannot tell what other options were evaluated.

    What other advice do I have?

    Keep an eye on the cloud integrations and be ready for Conjur.

    Disclosure: I am a real user, and this review is based on my own experience and opinions.
    PeerSpot user
    PeerSpot user
    Senior Consultant at a consultancy with 10,001+ employees
    Consultant
    The combination of CPM and PSM resolves a lot of use cases.
    Pros and Cons
    • "The combination of CPM and PSM resolves a lot of use cases."
    • "They can do a better job in the PSM space."

    How has it helped my organization?

    All the high privileged accounts are managed by CyberArk at a regular frequency. This mitigates the big risk that we had for passwords not changing forever.

    What is most valuable?

    The combination of CPM and PSM resolves a lot of use cases.

    What needs improvement?

    They can do a better job in the PSM space.

    What do I think about the stability of the solution?

    It has been pretty stable. No ongoing issues; only one-off, and CyberArk support has been pretty good for support.

    What do I think about the scalability of the solution?

    I can foresee some issues if we suddenly have to put thousands of passwords into CyberArk Vault. I know they have the password upload utility, but it has its limitations.

    How are customer service and technical support?

    Customer Service:

    Their support is pretty good and responsive.

    Technical Support:

    Their support is pretty good and responsive. Their L3 is in Israel, so sometimes it takes more time getting responses for complicated use cases.

    Which solution did I use previously and why did I switch?

    I did not previously use a different solution. I have always used CyberArk.

    How was the initial setup?

    I would rate initial setup as a medium complexity. They have good documentation, as well.

    What about the implementation team?

    I am from a vendor team that does the implementation.

    What's my experience with pricing, setup cost, and licensing?

    I was not involved in the pricing and licensing. I have an idea that it's on the higher side of the price scale.

    Which other solutions did I evaluate?

    Before choosing this product, we also evaluated Dell and NetIQ.

    Disclosure: I am a real user, and this review is based on my own experience and opinions.
    PeerSpot user
    it_user512235 - PeerSpot reviewer
    Sr. Technical Consultant at a tech company with 51-200 employees
    Vendor
    The integration of Auto IT provided the flexibility to add thick clients and websites. It is expensive and the professional service team charges for each and every thing.

    Valuable Features

    I see the Auto IT integration as the most valuable feature.

    Improvements to My Organization

    I have seen improvements compared to the older versions and the integration of Auto IT provided the flexibility to add thick clients and websites.

    Room for Improvement

    Session recording search capability has to be improved. It should include more platforms for password management. It should include more thick client integrations.

    Use of Solution

    I used it for almost six years.

    Stability Issues

    There is dependency on Windows tasks and if any AD GPO changes are pushed, it affects the system and stops working.

    Scalability Issues

    I have not encountered any scalability issues. The product scales as the organisation grows.

    Customer Service and Technical Support

    Technical support from the vendor is the worst and that is one reason I stopped using CyberArk.

    Initial Setup

    The initial setup is not so complex, but CyberArk does require more servers for a full-fledged installation.

    Pricing, Setup Cost and Licensing

    The solution is costly and the licensing is very complex.

    Other Solutions Considered

    I was using CyberArk for more than six years and I have now switched to ARCOS. I was impressed with ARCOS because of the following reasons:

    • Cost-effective solution
    • Fewer servers required
    • Flexibility, performance
    • More features
    • Simple licensing
    • Good support

    I evaluated other solutions such as Leiberman, ManageEngine, TPAM, and Xceedium.

    ARCOS seems to be very promising and cost effective. Also, ARCOS doesn’t have a traditional jump server concept, which saves the customer from spending more on hardware. The licensing is very simple (number of admins & target IPs), where most of the features are available by default with the basic license.

    Other Advice

    CyberArk architecture is good and more secure, but I see the solution as expensive. Support is the worst; CyberArkstaff is not supportive, their professional service team charges for each and every thing.

    Disclosure: My company has a business relationship with this vendor other than being a customer: We were the distributor for Cyber Ark.
    PeerSpot user
    IT Security Analyst at a mining and metals company with 10,001+ employees
    Real User
    We are utilizing it to secure applications, credentials, and endpoints
    Pros and Cons
    • "We are utilizing CyberArk to secure applications, credentials, and endpoints."
    • "On the customer accounts side, our account managers are responsive. If you ask them, they will get you whomever you need."
    • "It is web-based, but other competitors have apps. We need to get there. It is just smoother to have an app. You don't have all the bugs from having a browser, and people like them better, since you can get to them via mobile."
    • "Stability is a huge concern right now. We are on a version which is very unstable. We have to upgrade to stabilize it. It is fine, but the problem is we have to hire CyberArk to do the upgrade. This costs money, and it is their bug."

    What is our primary use case?

    • Credential faulting
    • Credential management
    • Privilege session management
    • Secure file storage

    We are utilizing CyberArk to secure applications, credentials, and endpoints.

    The product is performing very well. It is a difficult product to implement into a large organization though. There is a lot of customization and a lot of hands on stuff, which is not just install and be done. This isn't bad, but it does require a lot of time. 

    The value is probably the best of all of the other products which are offering the same services.

    How has it helped my organization?

    Having the keys securely locked helps drive policy. We can say what policy is, then we can point to the solution which provides it. Having that availability is strong in a large enterprise, especially in a global enterprise where there is a lot of different cultures and people do not want to hand off their privilege, rights, or workflows. Having that all set up and making it easier for them takes a lot of the stress off of our job.

    We are implementing PSM right now. It is providing a secured workflow substitute where people would go in and check out their passwords. They want to use it instead of having passwords, similar to Guard Check. 

    You go in because you need a key. You get the key, and you are accountable for that key while you have it. You open the door, do your work, close it, and return the key. People get that analogy, and it is awesome.

    We are in the basics, like Windows, Unix, and databases. We do plan on getting everything eventually managed. It is just a lot of customization and time to get it fully matured.

    What is most valuable?

    The support is good and quick. This is what we are paying for. We can try to implement something on our own end. However, when we need immediate support, because something is down, we usually get it within acceptable time frames.

    What needs improvement?

    It is web-based, but other competitors have apps. We need to get there. It is just smoother to have an app. You don't have all the bugs from having a browser, and people like them better, since you can get to them via mobile. There are competitors that have mobile apps which do the same thing. Mobile browsing is just not there with CyberArk. 

    This might be out of scope for CyberArk, but LastPass is an example of personal credential management. It would be cool if we could give personalized solutions to people, even if it is stored in the cloud. We have an enterprise solution, but we don't have a personalized one. It would be nice to have it all under one umbrella.

    What do I think about the stability of the solution?

    Stability is a huge concern right now. We are on a version which is very unstable. We have to upgrade to stabilize it. It is fine, but the problem is we have to hire CyberArk to do the upgrade. This costs money, and it is their bug. Our management is very upset about it.

    CyberArk has been helping out, and it has been okay. However, the stability is definitely a concern, because with PSM, it becomes more critical to have it up. All of a sudden you have to have PSM up to be able to do your work.

    The stability issues started when we upgraded from 9.7 to 9.95. Then, we were told during one of our cases that there was a bug in our new version and the only solution was to upgrade.

    What do I think about the scalability of the solution?

    The scalability is big. We are a large company, and there are only a few companies that can scale so well.

    How are customer service and technical support?

    We use their technical support all the time. It is a little slow to start a case. Then, once you get through that door (Level 1), it does escalate appropriately.

    On the customer accounts side, our account managers are responsive. If you ask them, they will get you whomever you need.

    Which solution did I use previously and why did I switch?

    Since I started, it has always been CyberArk.

    What was our ROI?

    I can't say we have an ROI. Our CIO is not about measuring profit from our security stuff. Our risk is definitely significantly lower. Also, our resources are low.

    What other advice do I have?

    Start small and don't try to overwhelm your scope. Do small steps and get them completed. Take notes, document, then scale out. Go from high risk out instead of trying to get everything in, then fixing it.

    One of my homework assignments at CyberArk Impact is to find out more about how to utilize CyberArk to secure infrastructure or applications running in the cloud.

    We have a lot of the out-of-the-box plugins with one custom plugin, but we are still new to using them.

    Most important criteria when selecting a vendor

    Age of the company, because we do not want to be first to market. We want to hear about it from other people. How is the sales rep is communicating. Whether it is more of a sales pitch or if it is a genuine concern for our security.

    Then, make sure our vision is lined up with the product. We want to get our bang for the buck

    Disclosure: PeerSpot contacted the reviewer to collect the review and to validate authenticity. The reviewer was referred by the vendor, but the review is not subject to editing or approval by the vendor.
    PeerSpot user
    PeerSpot user
    Security Expert at SecurIT
    Consultant
    I see a lot of security issues are addressed by the solution. For example, audit issues for privileged accounts.

    What is most valuable?

    As a security engineer, I mostly implement the Enterprise Password Vault Suite (Vault Server, Central Policy Manager, Password Vault Web Access) as this is the base upon which every additional component is built. I am using and implementing the additional components, such as the Privileged Session Manager and Application Identity Manager, more and more.

    How has it helped my organization?

    When implementing CyberArk, I see that a lot of security issues are addressed by the solution. For example, audit issues for privileged (non-personal) accounts, which have a sufficient amount of impact on the organization when being compromised or misused.

    A major benefit next to the auditing capabilities is the secure storage of the accounts in questions. CyberArk has the most extensive hardening and encryption techniques I have seen in a product, with equal intentions.

    Additionally, CyberArk can reduce the attack surface of these accounts by retaining the privileged accounts (protecting the credentials) within a secure environment only to be accessed through a secured proxy server (Privileged Session Manager). What I have also seen is that the Privileged Session Manager can aid in the adoption of CyberArk within an organization as it allows the end user to keep using his personal way of working (e.g., Remote Desktop Manager, Customized Putty).

    Another burden that organizations have is the need to manage hard-coded credentials. CyberArk also has a solution for this, allowing the credentials to be stored in the vault, where they can be retrieved by a script or applications through the execution of a command instead of hard-coding the credentials. There is also a solution available for accounts used in Windows scheduled tasks, services and more.

    The last generic, relatively new improvement for customers is the ability to monitor and identify the usage of the accounts managed by the suite. By using Privileged Threat Analytics, you can match the usage of CyberArk against the actual (logon) events retrieved from the corporate SIEM. Next to this, PTA profiles privileged account usage to discover malicious patterns such as different IP addresses or usage of an account on an unusual day. This is a very useful practice to gain an enhanced view on these privileged accounts and can eventually limit the impact of any malicious usage because of early detection.

    What needs improvement?

    In every product, there is room for improvement. Within CyberArk, I would like to see more support for personal accounts. It can be done right now, but I can imagine changing a few aspects would make this easier and more foolproof.

    Next to that, the REST API is not as capable as I would like. CyberArk is getting close, though.

    Lastly, I would love to see a password filler that can provide raw input (like a keyboard). There are scenarios where administrators do not have the ability to copy and paste a password from the clipboard. As typing over a long random password is a tricky job, a raw password filler would be a solution that could overcome this issue.

    For how long have I used the solution?

    I have been involved with CyberArk for three years now. During this period, I have designed, implemented and supported multiple CyberArk environments.

    What do I think about the stability of the solution?

    During the time that I have worked with CyberArk, I was able to conclude - based on experience and colleague stories - that this is one of the most stable products I have ever encountered. I have never seen any stability issue that was not related to a human error or a configuration issue.

    What do I think about the scalability of the solution?

    As far as I’m aware, we have not encountered any scalability issues. I have heard of some issues with the database of CyberArk when scaling to excessive amounts of entries, a long time ago. These issues have been fixed, as far as I know.

    In addition, it is possible to have issues with the Central Policy Manager when you configure it wrong.

    How are customer service and technical support?

    The technical support for our customers is primarily handled by ourselves, with CyberArk technical support to fall back to. I have seen great improvements in the quality of support over the years and they continue to do so. The response is fast and the quality is good.

    There is room for improvement in bug tracking. When a bug is confirmed, it is hard to track when or if it will be released in one of the future releases. As CyberArk is building an entire new support portal, I hope that this will be improved someday.

    Which solution did I use previously and why did I switch?

    My company did not previously use a different solution. My company has had CyberArk in their portfolio for more than 10 years now.

    How was the initial setup?

    Our company has set up a ‘generic’ and fast implementation plan based on our experiences and best practices. This plan provides a straightforward approach, which can be customized into a complex solution to suit every customer's needs.

    In general, the installation is quick, but the actual work is found in the process of onboarding new account(type)s as this requires a significant amount of communication and coordination.

    What's my experience with pricing, setup cost, and licensing?

    Try to create a good design with a CyberArk partner before you start thinking about licensing. Then, you will have a good view on the components needed to suit your environment from the start towards a fully mature environment.

    What other advice do I have?

    Do not think too big at the start.

    Disclosure: My company has a business relationship with this vendor other than being a customer: My company is a certified CyberArk partner.
    PeerSpot user
    Buyer's Guide
    Download our free CyberArk Privileged Access Manager Report and get advice and tips from experienced pros sharing their opinions.
    Updated: June 2024
    Buyer's Guide
    Download our free CyberArk Privileged Access Manager Report and get advice and tips from experienced pros sharing their opinions.