Privileged identity management report from it central station 2018 05 05 thumbnail
Find out what your peers are saying about CyberArk, CA Technologies, Quest Software and others in Privileged Identity Management.
270,647 professionals have used our research since 2012.
Privileged identity management report from it central station 2018 05 05 thumbnail
Find out what your peers are saying about CyberArk, CA Technologies, Quest Software and others in Privileged Identity Management.
270,647 professionals have used our research since 2012.
Chart Key
Average Rating
Average rating based on reviews
Views
Number of total page views
Comparisons
Number of times compared to another product
Reviews
Total number of reviews on IT Central Station
Followers
Number of followers on IT Central Station
The total ranking of a product, represented by the bar length, is based on a weighted aggregate score. The score is calculated as follows: The product with the highest count in each area gets the highest available score. (20 points for Reviews; 16 points for Views, Comparisons, and Followers.) Every other product gets assigned points based on its total in proportion to the #1 product in that area. For example, if a product has 80% of the number of reviews compared to the product with the most reviews then the product's score for reviews would be 20% (weighting factor) * 80% = 16. For Average Rating, the maximum score is 32 points awarded linearly based on our rating scale of 1-10. If a product has fewer than ten reviews, the point contribution for Average Rating is reduced (one-third reduction in points for products with 5-9 reviews; two-thirds reduction for products with fewer than five reviews). Reviews that are more than 24 months old, as well as those written by resellers, are completely excluded from the ranking algorithm.

What is Privileged Identity Management?

Privileged Identity Management (PIM) oversees requirements of critical, private accounts living in an enterprise’s IT infrastructure. It is alternatively called Privileged Access Management, Privileged Account Management or Privileged Session Management – collectively known as PxM. A privileged user is a person who can access the administrative backend of a critical system, delete data or change settings. PIM is essential to strong security.

The Privileged Identity Management process is normally used as a tool for information security, and IT Central Station users look for richness in the functionality provided for oversight. Enterprises must prevent unauthorized backend system access while always adhering to compliance. Privileged Identity Management safeguards aggressive data breaches and is intended to protect confidential data from the efforts of bad actors. PIM is constantly being updated to protect the security of the enterprise IT Central Station users are responsible for controlling shared frameworks and monitor authorized user access along with interim levels of permissions for privileged access within an enterprise.

IT and DevOps teams look for a number of categories necessary for Privileged Identity Management, sometimes referred to as a “PIM Solution.” Requirements include life cycle and provisioning management, authorization, authentication, password management, access controls and auditing. Operating system components such as routers, switches, and firewalls all come into question with Privileged Identity Management.

Functionality must meet risk management and compliance parameters. The goal is to protect, control and monitor operating systems, applications and the database. This can be achieved in part through session recording and session isolation to prevent unauthorized access, always a concern whether IT is talking about on-premises or cloud solution.

IT professionals are looking for easy to use GUI, availability of OOTB integration functionalities with other systems and availability of OOTB connectors to manage password and sessions of devices. High availability / failover to DR environment with no data loss should be provided and scalable components are key. Time is always a factor, so having the agility and ability to establish and manage simultaneous operating sessions to target devices is ideal. Ultimately, speed, coverage and security are the best ways to keep out the bad guys.


Privileged Identity Management Reviews

Read reviews of Privileged Identity Management that are trending in the IT Central Station community:
Your trust is our top concern, so companies can't alter or remove reviews.
Anonymous avatar x80
Real User
Cyber Security Engineer at a recruiting/HR firm with 51-200 employees
Jan 24 2017

What is most valuable?

Randomizing local accounts on all endpoints * ERPM's greatest ability is that it can easily randomize ALL local accounts on almost any endpoint. One of biggest security risks that occur within a company is the ability of an attacker to... more»

How has it helped my organization?

* RDP * Admin Checkouts * Removing hard-coded credentials from most of our built-in Apps

What needs improvement?

One of the features that ERPM is capable of providing is giving users the ability to 'request' admin credentials on their machines for a specific purpose (provided you have removed all users from local admin on their machines). You can force... more»
Anonymous avatar x80
Real User
Manager (Systems) at a financial services firm with 1,001-5,000 employees
Apr 12 2018

What is most valuable?

Mainly the password vault. So, we have all of our generic IDs, which are present in the infrastructure, we have it securely vaulted. When we want to have access, we use ARCON only to have the access of the target devices or systems.

How has it helped my organization?

Our purpose initially was to have a few critical projects. Not to have password management of all projects. So we started on a smaller scope. Later on, we implemented it across the organization. So now, all technical solutions are being... more»

What needs improvement?

We have the load balancer and we have certain cloud environments. So, if you take Microsoft hypervisor - which comes with its own interface, its own web layer, etc. - something like that also requires privileged IDs. As per our institution... more»
Privileged identity management report from it central station 2018 05 05 thumbnail
Find out what your peers are saying about CyberArk, CA Technologies, Quest Software and others in Privileged Identity Management.
270,647 professionals have used our research since 2012.
B6c426b2 be87 49c4 ba43 c406eaebb5d4 avatar?1449121566
Reseller
Information Security & PreSales Officer at a tech services company with 51-200 employees
Aug 30 2016

What is most valuable?

The main areas of focus of BeyondTrust products is Privileged Access Management. Along with it, they've also bundled the PAM solutions with a Vulnerability Management solution. We all know Retina Network Security Scanner has been around for... more»

How has it helped my organization?

We implemented the BeyondTrust suite of products as part of our initial evaluation and continued to use the product because we liked it very much. We distribute security solutions to our customers, so we can only sell something to our... more»

What needs improvement?

I'm of the thought that the best products in the market have room for improvement, always, and so is the case with this product as well. I have always submitted the improvements / bugs list to the vendor and am looking forward for them to be... more»
Anonymous avatar x80
Real User
Cloud SME
May 08 2017

What is most valuable?

When you look at the whole PAM itself, session manager is very important. It records what happens. Access manager and credential manager are very important as well. Those are the key things. Session manager, access manager, and credential... more»

How has it helped my organization?

On the access management side, our system administrators, under privileged management, don't have to use their local tools to log on to the production servers. They basically will log on, but they need access controls. They log on to a web... more»

What needs improvement?

When we look at CA PAM, the multi-tenant deployment is definitely an improvement that we want to see. They don't offer multi-tenancy. If I have an enterprise, or if I am an MSP and I would like use an instantiation of CA PAM for multiple... more»
86a124fa 9fa6 4ff2 8766 fb5759579d36 avatar
Real User
Senior Identity and Access Management Specialist at a tech vendor with 1,001-5,000 employees
Jan 15 2017

What is most valuable?

* The GUI is very impressive and clean (even cleaner and minimalistic in v7). * JobQueueInfo does an amazing job tracking all processes. * Synchronizations are easy to set up. * Reporting capabilities are fantastic once you get the hang of... more»

How has it helped my organization?

* Auditing becomes easier from an admin perspective. * There is more control over everything. * Processes are much better defined. * People tend to take some functional roles much more seriously. There were some roles that were very old in... more»

What needs improvement?

* DBQueue processes can bottleneck the system at times. In v7, its apparently re-architectured, and is better. There can be too many of them and they process very slowly, causing actual processes to take a lot more time to complete. * There... more»
3ff6f1d1 706f 47bc ae09 1a9a7e36bae4 avatar
Real User
Consultant at a tech company with 1,001-5,000 employees
Sep 25 2016

What is most valuable?

I think that one of the advantages of the CyberArk PAS suite is that it is modular. On top of the basics, you can implement modules to: * Manage (verify, change and reset) privileged passwords and SSH keys * Manage (isolate and monitor)... more»

How has it helped my organization?

I see companies that already have thought about their privileged accounts, while others have not? And so on. Thinking about these things helps customers to organize their data/privilege accounts in the CyberArk solution. It then helps the... more»

What needs improvement?

With every version, I can see that the product wins on functionality and user experience. On the latter though, I hear from customers that on the UI level, things could be better. CyberArk continuously asks for feedback on the product (e.g.,... more»
Jeffrey everling li?1422123501
Real User
Security Expert at SecurIT
Sep 13 2016

What is most valuable?

As a security engineer, I mostly implement the Enterprise Password Vault Suite (Vault Server, Central Policy Manager, Password Vault Web Access) as this is the base upon which every additional component is built. I am using and implementing... more»

How has it helped my organization?

When implementing CyberArk, I see that a lot of security issues are addressed by the solution. For example, audit issues for privileged (non-personal) accounts, which have a sufficient amount of impact on the organization when being... more»

What needs improvement?

In every product, there is room for improvement. Within CyberArk, I would like to see more support for personal accounts. It can be done right now, but I can imagine changing a few aspects would make this easier and more foolproof. Next to... more»
Ff7ad4b5 cbbf 4b95 9065 2d7c1eabd073 avatar
Real User
Head IT-Security at a financial services firm with 10,001+ employees
Apr 29 2018

What is most valuable?

Provisioning of all administrative access through this solution. The privileged administrators are logging in to the solution using their domain ID and then getting access to the required servers based on their credentials. The administrators do not need to know the actual administrator's password. Otherwise, in an environment if you have N of servers, the... more»

What needs improvement?

One thing which needs improvement is where it is keeping video logs of Windows Servers, whatever activities are being carried out by the administrator. Because Windows logs are a video, they are unsearchable, so if you need to search for a specific administrator and what he has done on a server, right now you need to go through different video logs of that... more»
89343959 c66d 4e1d a2f5 d1c0d2b63f32 avatar
Real User
Cyber Security Consultant at a tech services company with 1,001-5,000 employees
Feb 14 2017

What is most valuable?

* Client-less feature * Flexible architecture support * High level of customization for maximize utilization * User friendly and Flexibility of multiple choice * Adhere to Security Compliance

How has it helped my organization?

This tool is in Leader's quadrant in Gartner Quadrant report. Not just because it has more features than other but also it improves the way organization function. CyberArk can be used as many as you can think of. Such Granular ways of... more»

What needs improvement?

Since this tool major utilizing modules are PAM and PSM, hence AIM and OPM are least considered by client. Client is somehow reluctant to use these features. Yes, i do agree that these Modules are not that friendly but also CyberArk do not... more»
Anonymous avatar x80
Real User
Information Security Advisor at a insurance company with 1,001-5,000 employees
Sep 25 2016

What is most valuable?

Account discovery, account rotation, and account management features make it a well-rounded application. Account discovery allows for auto-detection to search for new accounts in a specific environment such as an LDAP domain. This allows... more»

How has it helped my organization?

In the past, standard practice was to assign role-based rights to standard accounts. Moving away from this structure allows us to require that all heightened access accounts be “checked out” and only operate within a set window. CyberArk... more»

What needs improvement?

Like any software, improvements and upgrades are a necessity. As CyberArk is used by many Fortune 100 and Global 2000 companies, they offer custom solutions that need to be continuously improved as the company changes. I am looking forward to... more»
Anonymous avatar x80
Real User
Senior Solutions Architect, at a tech services company with 1,001-5,000 employees
Oct 07 2016

What is most valuable?

* Ease of use. * The way in which it can learn about the connectivity to systems, e.g., VMware vCenter Console; it can wrap that into its internal Java-based shell. Therefore, one does not need a terminal server solution. * The non-Java based... more»

How has it helped my organization?

We only did an evaluation of the product, but we do feel that it will improve our security and governance posture and shave time off our engineers having to connect to systems managed by the PAM solution. It also gives us the accountability... more»

What needs improvement?

* Reporting is very limited. * Online Help is not detailed enough. * Canned reports provided results for all targets and cannot simply be run for a particular customer when used in a service provider environment; one has to create some custom... more»
5a00a002 1a46 4d2e b8fb 5f0ea82ff632 avatar
Consultant
IT Security Consultant at a tech services company with 1,001-5,000 employees
Sep 11 2016

What is most valuable?

Every feature of this product - Password Management, Session Management and so on has its own value depending on different use cases, but I like: * It's a clientless product and does not require any third-party product for any of its... more»

How has it helped my organization?

Due to regular growth of an organization infrastructure, managing passwords within the organization becomes extremely difficult. In larger organizations with a large user and infrastructure base, it can be very difficult to ensure that the... more»

What needs improvement?

CyberArk has evolved a lot in the last 16 years and has nearly all the features required for effective operation. The only area for improvement is using a native client while connecting to the target device instead of the current method of... more»
Ce6f674c f2a6 4b7a abd1 6b7f133f8a5f avatar
Real User
Security Engineer at EarthLink
Dec 16 2016

What is most valuable?

With CA PAM, it's mainly the vaulting of credentials that we're looking for, and then after that, probably the bastion functionality where we force all of our administrators through that to get to the servers. We'll also do session recording... more»

How has it helped my organization?

It definitely helps with security. It also helps with how we audit which credentials are being used. When somebody actually logs in to CA PAM, they have to go in through second factor authentication. Once they're logged in, whatever... more»

What needs improvement?

A better discovery interface of accounts. It does do discovery of accounts for Windows servers, and you could do UNIX servers as well, but it's kind of clunky how it does it.
56b501cf 3896 45a2 862a 56d260b90e2e avatar
Consultant
CIO/Management Consultant at a tech company with 51-200 employees
Oct 10 2016

What is most valuable?

The CA PAM’s ability to seamlessly integrate and provide a demarcation between users and systems is the most attractive aspect. It: * Enables all control to start with Xsuite’s Deny All, Permit by Exception (DAPE) approach to limit privilege... more»

How has it helped my organization?

In retrospect, we and our clients have seen a reduction in service-related issues for application server and mainframe environments, a reduction in the provisioning lifecycle and requirements for systems such as mainframes, and a substantial... more»

What needs improvement?

I believe continued expansion of integration to multiple systems including SSO and SAML technologies will provide a more-expansive, enterprise view of access orchestration, which will in turn strengthen the security of the environment.
Anonymous avatar x80
Real User
Program Manager at a financial services firm with 1,001-5,000 employees
Jan 01 2018

What is most valuable?

The session recording is useful. We can capture what each of our users are doing. It gives you list of servers, so you can see which users have access to which servers. This is really useful, so we can make sure nobody is getting extra access... more»

How has it helped my organization?

It will provide us with more security. Anybody who has access can only get it. It makes admin access more critical. People are not building service accounts. It will provide more security and monitoring.

What needs improvement?

We are going to work on Trade Analytics, so we wanted to see how Trade Analytics work and all. They need to work on some of the enhancements, which we have already given to them. They need to have zero tier and active-active setup with zero... more»
Anonymous avatar x80
Real User
Information Security Manager at United Parcel Service
Aug 09 2017

What is most valuable?

Transparent login for users of privileged IDs (Linux, Windows). This prevents sharing of the password because it is never seen.

How has it helped my organization?

Once we implemented the solution, we found that support groups were sharing the Root password with some application teams to facilitate implementations and upgrades. The applications required Root due to software requirements or other issues.... more»

What needs improvement?

Reporting. It's difficult to locate the reports, there are limits on what reports can be run from the GUI, and the report formats are lacking. I have already spoken to product management about this specific area.
9a6362be e3d2 49a6 b300 a32024a76dcd avatar
Real User
Pre-Sales Engineer at a tech services company with 51-200 employees
Jul 25 2017

What is most valuable?

Password Management and Session Recording. The simplicity and ease that it is to be up and running out-of-the-box is very much appreciated. The recording feature uses a proprietary format that is very light, even with high definition videos,... more»

How has it helped my organization?

We are now able to record all technical support requests that require a remote control session, therefore accountability has risen reducing the amount of mistakes or errors. Clients are also more confident that all activities are recorded and... more»

What needs improvement?

The support for other remote assistance tools would be excellent. Free included tools in Windows, and would also allow a company to demand that a provider use a tool such as CA PAM when providing remote assistance, in order to record evidence... more»
Anonymous avatar x80
Real User
Director Of Information Security at a insurance company with 1,001-5,000 employees
Dec 01 2016

What is most valuable?

So far the best value is the centralized management of all administrative accounts. Before PAM, domain administrators, Unix administrators with root access, end-users with elevated desktop privileges, and so on, were managed by those... more»

How has it helped my organization?

It is very helpful with passing audits. It’s one thing to say you have a control; it’s another to show your control. This is very easy to show. It also simplifies the security team's role in that we aren't chasing as many accounts with... more»

What needs improvement?

I would like to see better integration with Security Incident Management solutions, a SIM, like a Splunk. The integration with IBM’s Guardian is useful, but it is not a specific plug-in or API. It is just log information; so a little more... more»
Aa5f3c11 f34e 4b9c a239 78eca20b5d6c avatar
Real User
Architect at a comms service provider with 1,001-5,000 employees
Feb 02 2018

What is most valuable?

One of the key things for us about the product is around its simplicity. Being able to put in the technology that allows the business to remove complexity and also allow the security improvements. This is high on our agenda.

How has it helped my organization?

The key benefits are we improve our governance. We ensure we can build more trust in the way we run and operate our environment, and most of all is the accountability. Where things do go wrong from time to time, we are in a good position to... more»

What needs improvement?

As with most things CA, once we are bringing more technology into the portfolio and being able to collapse those products into a much more integrated way, that will definitely come over the time. In terms of improvement, keep listening to... more»
Anonymous avatar x80
Real User
Senior Solutions Engineer at a tech services company with 501-1,000 employees
Feb 23 2017

What is most valuable?

The solid-state aspects of the platform. Once properly built out, the ERPM environment will run pre-configured, complex operations with little human intervention.

How has it helped my organization?

We have benefited as follows: * Automation of the rotation of privileged credentials across the enterprise * The Active Directory discovery almost always uncovers previously undiscovered accounts that are running processes in the environment... more»

What needs improvement?

The included session recording is not very robust. The session recording feature is supplementary to the core product. It is an implementation of Microsoft Expressions and IIS Media components, freely available from Microsoft, that plugs into... more»
Privileged identity management report from it central station 2018 05 05 thumbnail
Find out what your peers are saying about CyberArk, CA Technologies, Quest Software and others in Privileged Identity Management.
270,647 professionals have used our research since 2012.

Privileged Identity Management Articles

A5223938 eed9 42af 9f16 9a9bd1568f21 avatar
Content and Community Manager
IT Central Station
What do our users think about their Identity and Access Management tools? What do users discuss in their identity and access management reviews in 2017? What have their experiences been this year? In the excerpts below, users discuss valuable features and room for improvement for the following... more»
Birzu alexandru adrian li?1414334311
6,633

3
TOP 5POPULAR
ITSM & AntiFraud Consultant
After an experience of 7 years in the IT gaming field, the next period was filled with a lot of new informations and oportunities of developement. Working for a leading system integrator and provider of IT services, has many advantages as access to new technologies, and the ability to learn new... more>>
2be514f8 31cd 4ee4 b367 0ebf2d21b38d avatar
18
CyberArk Consultant
LinkTo ►► yuqaili@hotmail.com ◄◄ All invitations to connect on LinkedIn are welcome - LION - 7K+ Never I D K Mohammad is a seasoned IT Security Professional with 10+ years of hands on IT experience, He has actively worked on multiple IT Security & Infrastructure Projects for major... more>>
Reviewed CyberArk Privileged Account Security: Helped us to identify, store, protect, and monitor...
5889e19e 4af9 4472 bd37 19370fa30e57 avatar
19
Senior Consultant - Information Security Engineering
CISSP with 15+ years of enterprise-level experience in Information Security and Identity & Access Management, specializing in Directory Services, Provisioning, Single Sign-on technologies, RBAC, Access Governance, Privileged Identity Management (certified in CyberArk), File Integrity... more>>
Reviewed CyberArk Privileged Account Security: Can provide transparent connection to targeted...
F642cd8a 4a28 4842 9165 f7f14a2d7665 avatar
27
IT Security Consultant
18+ years’ total experience in ICT area, focus and research on Network & Information Security, Forensic Investigation, Security Governance and Audit.
Reviewed CA Privileged Access Manager: Some of the valuable features include session...
5a00a002 1a46 4d2e b8fb 5f0ea82ff632 avatar
323
IT Security Consultant
Information Technology and IT Security professional with 7.6 year experience in planning, solution designing implementation/deployment of Privileged Identity management, Security Support and Operations, Process implementation and documentations, LDAP Directories, Privilege Single Sign-On (PSSO),... more>>
Reviewed CyberArk Privileged Account Security: It is clientless, and does not require any...
Baa7dec6 0e6a 4b0b 97f6 60fe478bc4fe avatar
146
Senior Consultant
KEY STRENGHS • Proficiency in business process mapping, requirement study, client interaction for finalizing requirements and defining functional specifications for application implementation • An effective communicator with relationship management and problem solving skills • Ability to... more>>
Reviewed CyberArk Privileged Account Security: The combination of CPM and PSM resolves a lot of use...

Sign Up with Email