Chart Key
Average Rating
Average rating based on reviews
Views
Number of total page views
Comparisons
Number of times compared to another product
Reviews
Total number of reviews on IT Central Station
Followers
Number of followers on IT Central Station
The total ranking of a product, represented by the bar length, is based on a weighted aggregate score. The score is calculated as follows: The product with the highest count in each area gets the highest available score. (20 points for Reviews; 16 points for Views, Comparisons, and Followers.) Every other product gets assigned points based on its total in proportion to the #1 product in that area. For example, if a product has 80% of the number of reviews compared to the product with the most reviews then the product's score for reviews would be 20% (weighting factor) * 80% = 16. For Average Rating, the maximum score is 32 points awarded linearly based on our rating scale of 1-10. If a product has fewer than ten reviews, the point contribution for Average Rating is reduced (one-third reduction in points for products with 5-9 reviews; two-thirds reduction for products with fewer than five reviews). Reviews that are more than 24 months old, as well as those written by resellers, are completely excluded from the ranking algorithm.

User Activity Monitoring Reviews

Read top reviews of User Activity Monitoring solutions from the IT Central Station community:
Your trust is our top concern, so companies can't alter or remove reviews.
Real User
Consultant at a tech company with 1,001-5,000 employees
Sep 25 2016

What is most valuable?

I think that one of the advantages of the CyberArk PAS suite is that it is modular. On top of the basics, you can implement modules to: * Manage (verify, change and reset) privileged passwords and SSH keys * Manage (isolate and monitor)... more»

How has it helped my organization?

I see companies that already have thought about their privileged accounts, while others have not? And so on. Thinking about these things helps customers to organize their data/privilege accounts in the CyberArk solution. It then helps the... more»

What needs improvement?

With every version, I can see that the product wins on functionality and user experience. On the latter though, I hear from customers that on the UI level, things could be better. CyberArk continuously asks for feedback on the product (e.g.,... more»
Real User
Security Expert at SecurIT
Sep 13 2016

What is most valuable?

As a security engineer, I mostly implement the Enterprise Password Vault Suite (Vault Server, Central Policy Manager, Password Vault Web Access) as this is the base upon which every additional component is built. I am using and implementing... more»

How has it helped my organization?

When implementing CyberArk, I see that a lot of security issues are addressed by the solution. For example, audit issues for privileged (non-personal) accounts, which have a sufficient amount of impact on the organization when being... more»

What needs improvement?

In every product, there is room for improvement. Within CyberArk, I would like to see more support for personal accounts. It can be done right now, but I can imagine changing a few aspects would make this easier and more foolproof. Next to... more»

Have A Question About User Activity Monitoring?

Our experts can help. 279,075 professionals have used our research on 6,309 solutions.
Consultant
Cyber Security Consultant at a tech services company with 1,001-5,000 employees
Feb 14 2017

What is most valuable?

* Client-less feature * Flexible architecture support * High level of customization for maximize utilization * User friendly and Flexibility of multiple choice * Adhere to Security Compliance

How has it helped my organization?

This tool is in Leader's quadrant in Gartner Quadrant report. Not just because it has more features than other but also it improves the way organization function. CyberArk can be used as many as you can think of. Such Granular ways of... more»

What needs improvement?

Since this tool major utilizing modules are PAM and PSM, hence AIM and OPM are least considered by client. Client is somehow reluctant to use these features. Yes, i do agree that these Modules are not that friendly but also CyberArk do not... more»
Real User
Information Security Advisor at a insurance company with 1,001-5,000 employees
Sep 25 2016

What is most valuable?

Account discovery, account rotation, and account management features make it a well-rounded application. Account discovery allows for auto-detection to search for new accounts in a specific environment such as an LDAP domain. This allows... more»

How has it helped my organization?

In the past, standard practice was to assign role-based rights to standard accounts. Moving away from this structure allows us to require that all heightened access accounts be “checked out” and only operate within a set window. CyberArk... more»

What needs improvement?

Like any software, improvements and upgrades are a necessity. As CyberArk is used by many Fortune 100 and Global 2000 companies, they offer custom solutions that need to be continuously improved as the company changes. I am looking forward to... more»
Consultant
IT Security Consultant at a tech services company with 1,001-5,000 employees
Sep 11 2016

What is most valuable?

Every feature of this product - Password Management, Session Management and so on has its own value depending on different use cases, but I like: * It's a clientless product and does not require any third-party product for any of its... more»

How has it helped my organization?

Due to regular growth of an organization infrastructure, managing passwords within the organization becomes extremely difficult. In larger organizations with a large user and infrastructure base, it can be very difficult to ensure that the... more»

What needs improvement?

CyberArk has evolved a lot in the last 16 years and has nearly all the features required for effective operation. The only area for improvement is using a native client while connecting to the target device instead of the current method of... more»
Real User
Systems Admin Analyst 3 at CPS Energy
May 16 2018

What is most valuable?

The Password Upload Utility tool makes it easier when setting up a Safe that contains multiple accounts and has cut down the amount of time that it takes to complete the task. Using the PSMP to connect to a privileged target without having to... more»

How has it helped my organization?

By using this product, it has placed a new culture in my company by making employees more aware of IT compliance and cyber security. It has also placed us in a position to meet NERC CIP v6 requirements.

What needs improvement?

I would like to see a product enhancement with the Secure Connect feature. Today, there is no functionality to create "Accounts" using Secure Connect to permanently store a user's working tab. It is a tedious manual process of entering host... more»
Real User
Head of Technical Services at a tech services company with 51-200 employees
Jun 07 2017

What is most valuable?

* The ability to isolate sessions to protect the target system. * Automates password management to remove the human chain weakness. * Creates a full audit chain to ensure privilege management is responsibly done * Creates an environment in... more»

How has it helped my organization?

With the ability to better control access to systems and privileged accounts, we no longer need to manage privilege accounts per user. We are able to manage privilege accounts for the service, which is automatically managed by the CPM as part... more»

What needs improvement?

The web interface has come a long way, but the PrivateArk client seems clunky and not intuitive. It could use an update to be brought up to speed with the usability of PVWA. Whilst the client is completely functional, it's been around for a... more»
User
Systems Analyst
Oct 30 2017

What do you think of TSFactory RecordTS?

Valuable Features We have used the Remote Desktop Protocol (RDP) and Citrix session recording features, and have found them to be extremely valuable. • Improvements to My Organization We were asked by security auditors to monitor vendor connections to our assets (servers and users' workstations) when providing tech support via live connection. This enables us to keep track of those sessions, and monitor unsolicited connections should they occur. • Room for Improvement A built in utility that alerts when connections are made, either via RDP or ICA. • Use of Solution About six weeks. • Deployment Issues Not really. When following the written instructions, it goes pretty smoothly. Sequencing of the products needed for IE: The database The dashboard The licensing...
Consultant
CyberArk Consultant at a comms service provider with 10,001+ employees
Jun 14 2017

What is most valuable?

The password management component (CPM) is the most valuable. This enables companies to automate password management on target systems gaining a more secure access management approach. Another major component is the PSM, which enables session... more»

How has it helped my organization?

Implementing CyberArk is not only "rolling out" a tool. It also will force the company to have a good look at the access management strategy, improve security processes and clean data. Implementation of CyberArk will increase the insight the... more»

What needs improvement?

Allthough it's highly configurable, the user interface could use a do-over. The current interface doesn't scale that well, has some screens still in the old layout, while others are in the new ones and consistency in layout between pages... more»
Real User
Technical Director at Unique Performance Techsoft Pvt Ltd
May 23 2018

What is most valuable?

* Ability to provide native experience for users to login to privilege accounts. They do not need to go through a portal to access servers and accounts. * Agentless solution which is easy to customise to any platform having network... more»

How has it helped my organization?

* Automatic password management, which will automatically change passwords based on compliance requirements. * DVR like video recording and text-based recording for easier audits. * Easily scan the network for all privilege accounts and has... more»

What needs improvement?

This product needs professional consulting services to onboard accounts effectively based user profiles.
Real User
Senior Executive Information Security at a manufacturing company with 1,001-5,000 employees
Aug 17 2016

What is most valuable?

* Password management and accountability for Privileged accounts * Identify, protect and monitor the usage of Privileged accounts * Record and control privileged sessions on critical systems i.e. Windows, Unix, DBs * Application credentials... more»

How has it helped my organization?

Privileged accounts represent the largest security vulnerability an organization faces today. Most organisations are not aware of the total number of privilege accounts. Compromising privilege accounts leads to various breaches. With this... more»

What needs improvement?

Integration of this tool with SAML is a problem, as there is a bug. We’d like to be able to integrate AWS accounts in CyberArk.
Consultant
Security Technical Consultant at a tech services company with 1,001-5,000 employees
Sep 19 2016

What is most valuable?

The ability to create custom connector components is the most valuable feature of the product. Once the organisation matures in their privileged access strategy, CyberArk’s customisation capability allows you to target application-level... more»

How has it helped my organization?

It has improved our organization by being able to consolidate several privileged access technologies into a unified tool. Session recording and auditing capability, and approval workflows allow a high degree of control over the organisation’s... more»

What needs improvement?

* Authentication to the solution: Authentication to the PVWA utilises integration to IIS. Therefore, it is not as strong as desired. * Reporting capability and customisation: Reporting utilises predefined templates with limited customisation... more»
Real User
Technical Manager, System Division at a tech services company with 501-1,000 employees
Aug 31 2016

What is most valuable?

With the Privileged Session Manager, we can monitor sessions in real time and terminate the session if there's any unnecessary activity found. For example: We give access to user to access the server only to update patches, but if we find any... more»

How has it helped my organization?

Actually my company/previous company does not use this product, but we sold it to our customer. This product helped our customer manage their privileged accounts. It’s easier to them to manage and control the privileged accounts.

What needs improvement?

It needs more plugin connectors for all devices. CyberArk currently can manage or make it easier to manage about 80% of our total devices. The rest still need R&D to develop the plugin. If CyberArk had more plugin connectors, the customer... more»
Real User
Chief Technology Officer & Solution Architect at a tech services company with 51-200 employees
Feb 20 2017

What is most valuable?

* Fully transparent for users. * Supports many protocols. * Full OCR indexing: You can find anything that happened in sessions, including commands, programs opened, etc. Without OCR, you would only be able to find who did which sessions, but... more»

How has it helped my organization?

Our customers use it to provide full privileged-access monitoring for external users/administrators, so they are fully compliant and still have easy access to external user’s activity.

What needs improvement?

VMware PCoIP protocol support: Many customers are switching from normal computers/environment to VDI infrastructure and some of them are switching to VMware Horizon that uses PCoIP protocol, which is not supported right now. Central... more»
Real User
Technology Architect at a renewables & environment company with 51-200 employees
Feb 22 2017

What do you think of CyberArk Privileged Account Security?

Valuable Features EPV: Enterprise Password Vault PSM: Privileged Session Manager AIM: Application Identity Manager The latest version of the product is mature and there is more functionality than we need. • Improvements to My Organization Improved security Reduced the overhead to protect enterprise data from delays Receives logs about all activities Compliance with several standards • Use of Solution I’m not the end-user. As a solutions architect (consultant), I designed and planned the solution in a very complex network environment. • Stability Issues We have not encountered any stability issues. After more than six years with my first CyberArk client, everything works great. • Scalability Issues We have not encountered any scalability issues. The solution was...
Consultant
Sr. Technical Consultant at a tech company with 51-200 employees
Sep 14 2016

What do you think of CyberArk Privileged Account Security?

Valuable Features I see the Auto IT integration as the most valuable feature. • Improvements to My Organization I have seen improvements compared to the older versions and the integration of Auto IT provided the flexibility to add thick clients and websites. • Room for Improvement Session recording search capability has to be improved. It should include more platforms for password management. It should include more thick client integrations. • Use of Solution I used it for almost six years. • Stability Issues There is dependency on Windows tasks and if any AD GPO changes are pushed, it affects the system and stops working. • Scalability Issues I have not encountered any scalability issues. The product scales as the organisation grows. • Customer Service and...
Consultant
ITSM & AntiFraud Consultant with 51-200 employees
Aug 08 2016

What is most valuable?

The most valuable feature is the password Vault which gives the administrator control over privileged accounts. The other components that are valuable are Private Session Manager, OPM, Viewfinity, and AIM, which came as an add-on to the... more»

How has it helped my organization?

The client can see all the users sessions through PSM, and can protect the applications on servers using AIM. Also, the Privileged Threat Assessment helps the organisation to see all the account risks, including accounts not managed by... more»

What needs improvement?

The DNA scan should be able to scan Unix machines for privileged accounts.
Real User
Security Engineer at a tech services company with 51-200 employees
Jul 26 2017

What is most valuable?

The product enables us manage passwords of highly privileged (service) accounts. These are not tied to a person, and they include a full audit trail and approval workflow functionality.

How has it helped my organization?

Management of these accounts is typically required to prevent abuse and gain control of this.

What needs improvement?

Perhaps improve the user registry integration. It is already fine, but a bit atypical. My experience with the product was with older versions, so this may not represent the actual case anymore. In essence, user registry integration is... more»
Consultant
CyberArk PAS Solution Professional | Project Manager at a tech services company with 1,001-5,000 employees
Jul 12 2017

What is most valuable?

All features of the CyberArk PAS solution are valuable. The Digital Vault is one of the key components of the solution along with many other great benefits. The highly secured vault stores the privileged account passwords and data files using... more»

How has it helped my organization?

Unmanaged, highly privileged accounts increase risks that can be exploited by attackers. The security controls defined by the organization require protection of the privileged account passwords. CyberArk helps organizations to identify,... more»

What needs improvement?

An immediate improvement was the implementation of security controls to protect, control and monitor privileged accounts through CyberArk solution.
Real User
IT Security Engineer
Jun 18 2017

What is most valuable?

Flexible modes are easily integrated into the customer infrastructure. It's easy to find needed information and the indexer does a good job. Secure replays: Balabit SCB supports multiple security officers (something like senior and junior... more»

How has it helped my organization?

When I worked in a bank, it greatly facilitated the control admins and reduced the length of investigations.

What needs improvement?

With release 4f4a, I am pleased with the changes. The developers have spent a lot of time optimizing the interface for the convenience of users and it’s functional. Now, I think the best way to improve it will be to optimize the software,... more»

Have A Question About User Activity Monitoring?

Our experts can help. 279,075 professionals have used our research on 6,309 solutions.

User Activity Monitoring Articles

Content and Community Manager
IT Central Station
What do our users think about their Identity and Access Management tools? What do users discuss in their identity and access management reviews in 2017? What have their experiences been this year? In the excerpts below, users discuss valuable features and room for improvement for the following... more»
6,774

3
TOP 5POPULAR
ITSM & AntiFraud Consultant
After an experience of 7 years in the IT gaming field, the next period was filled with a lot of new informations and oportunities of developement. Working for a leading system integrator and provider of IT services, has many advantages as access to new technologies, and the ability to learn new... more>>
Reviewed McAfee Complete Endpoint Protection: If a client needs new components, ePO helps them to...
115
CyberArk PAS Solution Professional | Project Manager
An experienced professional with expertise in CyberArk PAS suite solution implementation, Project Management, Infrastructure Technologies and Enterprise Security Solutions. CyberArk PAS v7.2, v8.2 and v9.7 -Application / Solution Design -Implementation Security Solutions: -Identity... more>>
Reviewed CyberArk Privileged Account Security: Provides automatic password management. We can...
20
CyberArk Consultant
LinkTo ►► yuqaili@hotmail.com ◄◄ All invitations to connect on LinkedIn are welcome - LION - 7K+ Never I D K Mohammad is a seasoned IT Security Professional with 10+ years of hands on IT experience, He has actively worked on multiple IT Security & Infrastructure Projects for major... more>>
Reviewed CyberArk Privileged Account Security: Helped us to identify, store, protect, and monitor...
10
Global Privilege Access Management Technical Architect
CyberArk Privilege Access Management Architect
Reviewed CyberArk Privileged Account Security: All access to our servers, by both staff and...
19
Senior Consultant - Information Security Engineering
CISSP with 15+ years of enterprise-level experience in Information Security and Identity & Access Management, specializing in Directory Services, Provisioning, Single Sign-on technologies, RBAC, Access Governance, Privileged Identity Management (certified in CyberArk), File Integrity... more>>
Reviewed CyberArk Privileged Account Security: Can provide transparent connection to targeted...
327
IT Security Consultant
Information Technology and IT Security professional with 7.6 year experience in planning, solution designing implementation/deployment of Privileged Identity management, Security Support and Operations, Process implementation and documentations, LDAP Directories, Privilege Single Sign-On (PSSO),... more>>
Reviewed CyberArk Privileged Account Security: It is clientless, and does not require any...
281
Cyber Security Consultant
Have 5 years of diverse experience in compliance, consulting, security tool implementation, configuration, IT Security and operations. Creative professional, proficient in prioritizing and completing tasks in a timely manner, yet flexible to multitask when necessary. Customer focused with diverse... more>>
Reviewed CyberArk Privileged Account Security: I can customize it to meet our customers'...
147
Senior Consultant
KEY STRENGHS • Proficiency in business process mapping, requirement study, client interaction for finalizing requirements and defining functional specifications for application implementation • An effective communicator with relationship management and problem solving skills • Ability to... more>>
Reviewed CyberArk Privileged Account Security: The combination of CPM and PSM resolves a lot of use...

Sign Up with Email