Most Helpful Review
Find out what your peers are saying about CyberArk PAS vs. RSA NetWitness Logs and Packets (RSA SIEM) and other solutions. Updated: September 2019.
372,185 professionals have used our research since 2012.
We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
The Password Upload Utility tool makes it easier when setting up a Safe that contains multiple accounts and has cut down the amount of time that it takes to complete the task.
For a while, there were individual IDs having privileged access. We wanted to restrict that. We implemented the solution so that it can be more of internal control. We can have session recordings happening and reduce our attacks.
There are no issues with scalability. Our clients are very happy to use the product.
We are maintaining compliance in PCI, SOX and HIPPA, which is a big thing. Auditors really like it, and it has made us stay compliant.
We are able to know who is accessing what and when; having accountability.
This solution is quite stable.
The most valuable feature is that it always provides flexibility, password quality and one-time user check-in and check-out.
I really like the PTA (Privileged Threat Analytics). I find this the best feature.
It's fully scalable. There is no limit. Of course, the license limits per day the number of terabytes. In my opinion, it's very flexible.
The most valuable feature is the ability to write rules and triggers for network communication, and then being able to investigate based on that.
The most valuable features are its ingestion of logs and raising of alerts based on those logs.
Their technical support responds quickly and are knowledgable.
The most valuable feature is the correlation. It can report in real-time and monitor the management.
It gives the ability to investigate into network traffic in the Net and the organization what we couldn't do before.
Currently, in Secure Connect, an end user is required to enter account information manually, and cannot save any of this information for future use.
Integration with the ticketing system should allow any number of fields to be used for validation before allowing a user to be evaluated and able to access a server.
The initial setup of CyberArk is a challenge if you do not have prior experience with it.
Make it easier to deploy.
I think having a distributed architecture would certainly help this solution.
There was a functionality of the solution that was missing. I had noticed it in Beyond Trust, but not in this solution. But, recently they have incorporated something similar.
If we could have some kind of out-of-the box feature that you can simply say "no" so they don't have to go into a development mode, that would a really helpful feature.
Tech support staff can be more proactive.
They should implement algorithms to digest that data and produce additional, more advanced reporting, alerting and support of internal security teams.
The system looks like it is a mix of a bunch of different systems, and nothing looked like it was quite together.
I'd like to see improvement in its ease of use. It's basically unusable. It's overly complex.
The initial setup was complex because it takes a lot of time to complete the implementation.
The implementation needs assistance.
We have encountered issues with unresolved crashes.
Pricing and Cost Advice
In comparison to other products on the market, CyberArk is a more costly product.
This solution is considered to be more expensive than others out there on the market today.
I do not have any opinions to add about the pricing of the product.
No, I do not have any advice on the price of the product.
Network and security licenses are currently being managed by other outsource vendors, so they are facing some type of problems in the digital aspect.
With reducing the privileged account access, there has been a huge improvement. They are now bringing more accounts on a little at a time.
If you are looking at implementing this solution, buy the training and go to it.
Our risk is definitely significantly lower. Also, our resources are low.
We have a perpetual license, so the total cost of ownership is not very expensive. It's a good investment.
This is a pricey solution; it's not cheap.
The licenses are good but the cost is very expensive.
It is cheap.
out of 22 in Privileged Access Management
Average Words per Review
out of 42 in Security Information and Event Management (SIEM)
Average Words per Review
Compared 11% of the time.
Compared 10% of the time.
Compared 9% of the time.
Compared 21% of the time.
Compared 19% of the time.
Compared 12% of the time.
Also Known As
|CyberArk Privileged Access Security, CyberArk Privileged Account Security, SSH Key Manager, Privileged Session Manager, Privileged Threat Analytics, Application Identity Manager, On-Demand Privileges Manager, Endpoint Privilege Manager||RSA Security Analytics|
CyberArk is the trusted expert in privileged account security. Designed from the ground up with a focus on security, CyberArk has developed a powerful, modular technology platform that provides the industry's most comprehensive Privileged Account Security Solution.
If you’re relying on log data to detect and prevent cyber threats, you’re in trouble. Attackers increasingly evade detection of log-centric security and network monitoring tools. But logs combined with full packet, endpoint NetFlow data are proven to provide the essential details for early threat detection. Here’s a closer look at our solution.
Learn more about CyberArk PAS
Learn more about RSA NetWitness Logs and Packets (RSA SIEM)
|Rockwell Automation||Los Angeles World Airports, Reply|
Financial Services Firm28%
Software R&D Company26%
Financial Services Firm15%
Comms Service Provider11%
Software R&D Company27%
Comms Service Provider15%
Financial Services Firm15%
See also CyberArk PAS Reviews, RSA NetWitness Logs and Packets (RSA SIEM) Reviews, and our list of Best Privileged Access Management Companies.