"We can make a policy that affects everybody instantly."
"The most valuable feature of CyberArk Privileged Access Manager is privileged threat analytics."
"You can gradually implement CyberArk, starting with more easily attainable goals."
"It enables companies to automate password management on target systems gaining a more secure access management approach."
"It supports lots of requirements in the privileged access management area."
"The integrations are the most valuable aspect of CyberArk Privileged Access Manager. The software offers pre-built integrations, and our team can also create custom connectors. This flexibility allows us to integrate with systems that we previously didn't consider integrating with, making it a significant advantage for us."
"The automatic password management is the most important feature. The second most important feature is the ability to enforce dual control on the release of those passwords. The combination of these two features is the most important thing for us because we can show that we're in control of who uses any non-personal account, and when they do so."
"You can write different types of policies for custom business needs or any developer needs. If they need certain functions allocated, they can be customized easily."
"We have used the Remote Desktop Protocol (RDP) and Citrix session recording features, and have found them to be extremely valuable."
"The issue of technical support is crucial, as there are not many specialized partners available in Brazil to provide this service. While English language support is of good quality, there is a significant shortage of partners capable of meeting the demand locally."
"PAM could be more user-friendly and CyberArk could update the documentation to include more real-world examples. You have to learn it yourself through trial and error. In particular, the online documentation should have more information about troubleshooting."
"Initial setup is complex. Lots of architecture, lots of planning, and lots of education and training are needed."
"This is probably a common thing, but they do ask for a lot of log files, a lot of information. They ask you to provide a lot of information to them before they're willing to give you anything at all upfront. It would be better if they were a little more give-and-take upfront: "Why don't you try these couple of things while we take your log files and stuff and go research them?" A little bit of that might be more helpful."
"It's hard to find competent resellers/support."
"It is web-based, but other competitors have apps. We need to get there. It is just smoother to have an app. You don't have all the bugs from having a browser, and people like them better, since you can get to them via mobile."
"Overall what I would really love to see is the third-party PAS reporter tool pulled more into the overall solution, ideally as its own deployable component service installation package."
"Its pricing is a big challenge here. When it started, the product came in at a very low cost. Now, they are the leaders in the market, so the cost has grown and is quite huge."
"A built in utility that alerts when connections are made, either via RDP or ICA."
More CyberArk Privileged Access Manager Pricing and Cost Advice →
Earn 20 points
CyberArk Privileged Access Manager is ranked 1st in User Activity Monitoring with 144 reviews while TSFactory RecordTS is ranked 6th in User Activity Monitoring. CyberArk Privileged Access Manager is rated 8.8, while TSFactory RecordTS is rated 9.0. The top reviewer of CyberArk Privileged Access Manager writes "Lets you ensure relevant, compliant access in good time and with an audit trail, yet lacks clarity on MITRE ATT&CK". On the other hand, the top reviewer of TSFactory RecordTS writes "Utilize support for installation. They are quick to respond, and quick at getting to the bottom of issues". CyberArk Privileged Access Manager is most compared with Cisco ISE (Identity Services Engine), Microsoft Entra ID, Delinea Secret Server, WALLIX Bastion and One Identity Safeguard, whereas TSFactory RecordTS is most compared with .
See our list of best User Activity Monitoring vendors.
We monitor all User Activity Monitoring reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.