CyberArk Privileged Access Manager Review

Anomaly detection and prevention for all privilege accounts

What is our primary use case?

We provide privilege account security and consulting to our customers. Organisations that we work with use CyberArk Privileged Account Security to secure their privilege accounts, which are shared between users in the organisation. It provides automatic password management and provides the single sign-on experience to users for all privilege accounts (Windows - administrator, Linux - root, MS SQL - SA, Oracle - SYS, SSH keys, etc.).

It also provides DVR like recording for all privilege access and text-based recording to easily audit all privilege activities.

The new Privilege Threat Analytics platform provides proactive protection by suspending the user session when it detects an anomaly based on past user login and session activity details. In addition, we can configure the solution to detect scoring on all privilege sessions for easier audits.

The Application Identity Manager module helps to eliminate hard-coded passwords in the application and enables us to easily change database passwords.

How has it helped my organization?

  1. Automatic password management, which will automatically change passwords based on compliance requirements.
  2. DVR like video recording and text-based recording for easier audits.
  3. Easily scan the network for all privilege accounts and has an easier onboarding process.
  4. SSH key management
  5. Command level restriction for all SSH-based devices.
  6. Anomaly detection and prevention for all privilege accounts.
  7. Integration with ticketing tools and SIEM solutions.

What is most valuable?

  1. Ability to provide native experience for users to login to privilege accounts. They do not need to go through a portal to access servers and accounts.
  2. Agentless solution which is easy to customise to any platform having network connectivity.
  3. Wide range of devices supported out-of-the-box.
  4. Easy to configure HA and DR options.
  5. Online training enables cost effective valuable training.

What needs improvement?

This product needs professional consulting services to onboard accounts effectively based user profiles.

For how long have I used the solution?

One to three years.

What do I think about the stability of the solution?

No issues.

What do I think about the scalability of the solution?

No issues.

How are customer service and technical support?

Excellent customer support.

Which solution did I use previously and why did I switch?

We did not previously use another solution.

How was the initial setup?

The setup is very straightforward.

What's my experience with pricing, setup cost, and licensing?

The cost is high compared to other products, but CyberArk provides all the features bundled. This is compared to other vendors who provide them as a different license for each functionality.

Which other solutions did I evaluate?

At present, we are only focusing on CyberArk for privilege account security. Comparing it to other providers, Cyberark provides a more user-friendly environment with many more features and benefits.

What other advice do I have?

I have used and deployed it in various environments so far. It really covers all the use cases provided by the customer.

**Disclosure: My company has a business relationship with this vendor other than being a customer: We are certified Gold partners for CyberArk and implemented this solution for a customer from various industry verticals.
More CyberArk Privileged Access Manager reviews from users
Learn what your peers think about CyberArk Privileged Access Manager. Get advice and tips from experienced pros sharing their opinions. Updated: July 2021.
521,637 professionals have used our research since 2012.
Add a Comment
ITCS user