2016-04-16T14:05:00Z

What do you like most about CyberArk PAS?

Julia Miller - PeerSpot reviewer
  • 0
  • 8
PeerSpot user
42

42 Answers

LT
Reseller
2021-03-11T09:18:30Z
Mar 11, 2021

Within the solution, I love the fact that everything is recorded. The configuration capabilities are great, too.

Search for a product comparison
JL
Reseller
2021-02-19T09:15:00Z
Feb 19, 2021

The technical support for this solution is very good. If I was to rate it on a scale of one to five, I would give it a five.

AT
Reseller
Top 10
2021-02-16T19:01:41Z
Feb 16, 2021

Their legacy of more than 20 years is very valuable. It brings a lot of stability to the product and a wide variety of integration with the ecosystem. Because of these factors, it has also been very successful in deployment. So, the legacy and integration with other technologies make the PAM platform very stable and strong.

In terms of features, most of the other vendors are still focusing just on the privileged access management or session recording, but CyberArk has incorporated artificial intelligence to make PAM a more proactive system. They have implemented threat analytics into this, and there is also a lot of focus on domain controller production, Windows Server protection, and stuff like that. They have also further advanced it with the security on the cloud and DevOps systems.

They have a bundle licensing model, which really helps. They don't have a complex licensing model. Even though in our market, people say CyberArk is expensive as compared to some of the other products, but in terms of overall value and as a bundling solution, it is an affordable and highly scalable product.

RN
Reseller
2021-02-04T07:52:57Z
Feb 4, 2021

The most valuable feature is Special Monitoring.

KN
Real User
2020-12-08T05:35:26Z
Dec 8, 2020

The technical support is good.

YP
Real User
2020-07-08T14:17:00Z
Jul 8, 2020

The risk of lost password and forbidden access to resources has been drastically reduced which increased the security level for the entire company,

Learn what your peers think about CyberArk Privileged Access Manager. Get advice and tips from experienced pros sharing their opinions. Updated: March 2024.
765,234 professionals have used our research since 2012.
GO
Real User
2019-12-15T09:11:00Z
Dec 15, 2019

CyberArk is a very stable product and it's a stable product because it has a simple design and a simple architecture that allows you to leverage the economies of scale across the base of your infrastructure that you already have implemented. It doesn't really introduce any new complex pieces of infrastructure that would make it that much more difficult to scale.

BA
Real User
2019-12-15T09:11:00Z
Dec 15, 2019

CyberArk has been easy for us to implement and the adoption has been good. We've been able to standardize a bunch of things. We've been able to standardize relatively easily with the use of the platforms and managing the policies.

KC
Real User
2019-12-15T09:11:00Z
Dec 15, 2019

When we started with RPA, there was a requirement that every credential and the bots themselves be protected through the PAM system. From the get-go, we've had CyberArk in the middle... We've got a pretty robust RPA implementation with our PAM platform. Users, bots, the credentials — everything is managed via our PAM solution.

DP
Real User
2019-12-15T09:11:00Z
Dec 15, 2019

Right off the bat, the most valuable feature is the DNA scan. It gives us the ability to scan our environment and find the accounts that we're going to need to take under control.

it_user834369 - PeerSpot reviewer
Consultant
2019-02-26T08:25:00Z
Feb 26, 2019

For a while, there were individual IDs having privileged access. We wanted to restrict that. We implemented the solution so that it can be more of internal control. We can have session recordings happening and reduce our attacks.

it_user871449 - PeerSpot reviewer
Real User
2018-12-02T07:34:00Z
Dec 2, 2018

There are no issues with scalability. Our clients are very happy to use the product.

it_user635622 - PeerSpot reviewer
Consultant
2018-11-25T07:41:00Z
Nov 25, 2018

This solution is quite stable.

HP
Real User
2018-11-06T13:08:00Z
Nov 6, 2018

I really like the PTA (Privileged Threat Analytics). I find this the best feature.

VS
Real User
2018-10-29T15:46:00Z
Oct 29, 2018

The most valuable feature is that it always provides flexibility, password quality and one-time user check-in and check-out.

RS
Consultant
2018-10-21T07:40:00Z
Oct 21, 2018

The threat analytics is an important feature.

SB
Real User
2018-10-08T17:34:00Z
Oct 8, 2018

Technical support is very helpful whenever we have any questions.

AP
Real User
Top 20
2018-10-02T19:05:00Z
Oct 2, 2018

It helps our customers in their software requirement imports.

it_user514779 - PeerSpot reviewer
Real User
2018-08-16T08:28:00Z
Aug 16, 2018

The voice technology is very good.

MW
Real User
2018-07-19T07:00:00Z
Jul 19, 2018

Because we now have the ability to grant access to management utilities like DNS Manager, Sequel Studio, and MMC, in a secure fashion, without system admins being required to continually reenter various passwords that are stored who knows where, it has really made the system admin's job much easier. It has made the PSM's job much easier. It has made the auditor's job and the security team's job and the access manager's job significantly easier, because we're able to move much more quickly toward a role-based access management system, and that is really streamlining the whole onboarding/offboarding management process.

BB
Real User
2018-07-19T07:00:00Z
Jul 19, 2018

Provides improved security around having your credentials locked down and rotated regularly.

MU
Real User
2018-07-19T07:00:00Z
Jul 19, 2018

The most important feature is managing the credentials and implementing those policies which rotate the credentials. Session Manager is also key in not letting the users have access to those credentials. Instead, CyberArk actually manages everything by itself.

CH
Real User
2018-07-19T07:00:00Z
Jul 19, 2018

I love the ability to customize the passwords: the forbidden characters, the length of the password, the number of capital, lowercase, and special characters. You can customize the password so that it tailor fits, for example, mainframes that can't have more than eight characters. You can say, "I want a random password that doesn't have these special characters, but it is exactly eight characters," so that it doesn't throw errors.

MS
Consultant
2018-07-19T07:00:00Z
Jul 19, 2018

The flexibility of integrating with other technologies is important because of a lot of applications - a lot of COTS products - are not supported when we are bringing the application IDs. The CyberArk platform provides a lot of opportunities to do customization.

DM
Real User
2018-07-19T07:00:00Z
Jul 19, 2018

CyberArk is not just an IT security or cybersecurity tool. It's also an administrator tool. I had a fair number of systems where the passwords were not fully managed by CyberArk yet, and they were expiring every 30 or 45 days. I was able to get management turned on for those accounts. From an administrator perspective, I didn't have to go back into those systems and manually change those passwords anymore. CyberArk... lightened the load on our administrative work.

DR
Real User
2018-07-18T09:22:00Z
Jul 18, 2018

It gives us the capability to rotate passwords.

EG
Real User
2018-07-18T09:22:00Z
Jul 18, 2018

The central password manager is the most valuable feature because the password is constantly changing. If an outsider threat came in and gained access to one of those passwords, they would not have access for long.

JG
Real User
2018-07-18T09:22:00Z
Jul 18, 2018

We are able to rotate privileged user passwords to eliminate fraudulent use.

JM
Real User
2018-07-18T09:22:00Z
Jul 18, 2018

It enables us to secure accounts and make sure they are compliant.

SY
Real User
2018-07-18T09:22:00Z
Jul 18, 2018

CyberArk has allowed us to get the credentials and passwords out of hard-coded property files.

NR
Real User
2018-07-18T09:22:00Z
Jul 18, 2018

It has helped us with our adoption with other teams, and it has also helped us to integrate it at the ground level.

SN
Real User
2018-07-18T09:22:00Z
Jul 18, 2018

It has helped from an auditing perspective identify who has access to privileged accounts.

SP
Real User
2018-07-18T09:22:00Z
Jul 18, 2018

It allows users to self-provision access to the accounts that they need.

BW
Real User
2018-07-18T09:22:00Z
Jul 18, 2018

We are able to rotate credentials and have privileged account access.

DH
Real User
2018-07-18T09:22:00Z
Jul 18, 2018

We are maintaining compliance in PCI, SOX and HIPPA, which is a big thing. Auditors really like it, and it has made us stay compliant.

RK
Real User
2018-07-18T09:22:00Z
Jul 18, 2018

We can make a policy that affects everybody instantly.

HP
Real User
2018-07-18T09:22:00Z
Jul 18, 2018

You can write different types of policies for custom business needs or any developer needs. If they need certain functions allocated, they can be customized easily.

KR
Real User
2018-07-17T08:27:00Z
Jul 17, 2018

The key aspects of privileged access management are being able rotate passwords, make sure someone is accountable, and tie it back to a user (when the system is being used).

SB
Real User
2018-07-17T08:27:00Z
Jul 17, 2018

It has the ability to scale out. We have scaled out quite a bit with our product and use of it to get to multiple locations and businesses, so it has the breadth to do that.

KE
Real User
2018-07-17T08:27:00Z
Jul 17, 2018

We know when passwords will be expiring so we can force users to change their passwords, as well as requiring specific password requirements for length, complexity, etc.

MM
Real User
2018-07-17T08:27:00Z
Jul 17, 2018

We are utilizing CyberArk to secure applications, credentials, and endpoints.

RD
Real User
Top 20
2016-04-16T14:05:00Z
Apr 16, 2016

The Password Upload Utility tool makes it easier when setting up a Safe that contains multiple accounts and has cut down the amount of time that it takes to complete the task.

CyberArk Privileged Access Manager is a next-generation solution that allows users to secure both their applications and their confidential corporate information. It is extremely flexible and can be implemented across a variety of environments. This program runs with equal efficiency in a fully cloud-based, hybrid, or on-premises environment. Users can now protect their critical infrastructure and access it in any way that best meets their needs. CyberArk Privileged Access Manager possesses...
Download CyberArk Privileged Access Manager ReportRead more

Related Q&As