CyberArk Enterprise Password Vault Primary Use Case

Joble John - PeerSpot reviewer
Vice President - Global Head of Privilege Access Management, Data Services and Certification at Barclays Capital

We use the product to store system accounts. 

View full review »
Omar_Jaimes - PeerSpot reviewer
Cybersecurity Architecture Manager at Data Warden

The most common use case is when you need to hide the management for the servers, switches, routers, et cetera. You can use privileged access for remote use cases.

View full review »
IS
Program Manager at a recruiting/HR firm with 5,001-10,000 employees

I've deployed Password Vault for various use cases across different industries from finance to healthcare and manufacturing. 

View full review »
Buyer's Guide
CyberArk Enterprise Password Vault
April 2024
Learn what your peers think about CyberArk Enterprise Password Vault. Get advice and tips from experienced pros sharing their opinions. Updated: April 2024.
768,415 professionals have used our research since 2012.
Anil Kumar 1 - PeerSpot reviewer
PAM Security Consultant at Cybersec Consulting

I use the solution for administration. If the customer requires Alero or HTML, we will deploy the solution in that particular environment. Otherwise, if the end users are accessing the solution via VPN or from inside the network, we will not deploy Alero or HTML. We will instead focus on CyberArk's core PAM, which includes the vault password rotation component, the web interface component, the jump server, and PPA. These are CyberArk's four main components which we deploy for every customer.

View full review »
TM
Manager at OIB

My company uses CyberArk Enterprise Password Vault for our servers and when our IT partners try to access our mission critical systems. We have also integrated the product with software tools used for authentication purposes. Our company's IT uses LDAP credentials to log in to the PVWA application while also being able to use granted privileges on one or more servers.

View full review »
Vishnu Ramachandra - PeerSpot reviewer
Security Engineer at Suraksha

My company uses CyberArk Enterprise Password Vault for privileged access management, a domain that the product fits under. CyberArk Enterprise Password Vault involves password rotations, recording of sessions, keystrokes, and securing sessions, which all come under the same category in the solution.

View full review »
Meo Ist - PeerSpot reviewer
Senior Product Manager and Technology Consultant at Barikat

We use the solution for cybersecurity and regulation.

View full review »
Aakash Chakraborty - PeerSpot reviewer
IEM Consultant at iC Consult GmbH

We use the solution as a vault for whatever passwords we use for connecting to an API or job services. The admin passwords we store in Password Vault. Via CyberArk, we have made a use case where we can track the session, keep a record, and log it, to whoever is logging into the servers.

View full review »
CD
Senior Leader at a financial services firm with 5,001-10,000 employees

CyberArk Enterprise Password Vault can be used for password vaulting and purpose session management.

View full review »
SS
Manager Engineering at a comms service provider with 1,001-5,000 employees

We Enterprise Password Vault to manage privileged credentials as well as some server and activity logging.

View full review »
it_user887514 - PeerSpot reviewer
Works at a pharma/biotech company with 5,001-10,000 employees

Our primary use case of this solution is for elevated access.

View full review »
DH
Technologist - Specialty in Identity and Access Management at Sears Technology Services Incorporated
  • This product provides accountability and audit trails for privileged account access. 
  • Automatic password rotation every 24 hours to adhere to our internal compliance guidelines.
View full review »
IkedeEbhole - PeerSpot reviewer
Pre sales Engineer (West Africa) at StarLink - Trusted Security Advisor

Our primary use case for his solution is privileged identity and application identity management, and we deploy the solution on-premises.

View full review »
DK
Information Security Engineer II at a healthcare company with 1,001-5,000 employees

Our use case for CyberArk Enterprise Password Vault is managing privileged accounts. These are local accounts, e.g. local desktops, laptops, or servers. They have a built-in administration account, so part of the solution is to ensure that that account's username and password are stored in the vault and managed by CyberArk Enterprise Password Vault.

View full review »
MN
Manager at a consultancy with 10,001+ employees

We use CyberArk Enterprise Password Vault and we provide it to our customers.

We use this solution for password vaulting and session management.

View full review »
FP
Director / Engineer at Provincia

I have worked as a CyberArk SME, team leader, project manager in the financial industry. I've managed both the implementation and configuration of enterprise CyberArk infrastructures.

View full review »
GJ
PAM Architect at a tech services company with 11-50 employees

I'm an integrator and we identify and provide performance discovery, and we select the best product for our clients.

We have users that are administrators in the environment, and we convert them into a shared account model. Many of the organizations have two accounts. One is a regular user account and the other gives them administrative rights.

CyberArk allows for a higher degree of segregation of duties, although CyberArk itself doesn't do that. You have to have knowledge of role-based access control and least privilege principles. It supports it, but you have to implement it.

There is also service recording, service accounts on Windows Systems, and Linux systems, to rotate their passwords.

You will find service accounts with passwords that are 5,000 to 8,000 days old, but not with CyberArk. It creates a very strong service to prevent attacks. 

When passwords don't change it makes them very vulnerable and allows attackers significant lateral mobility within an organization. It gives them the necessary time to scout the environment and choose what their attack will be, whether it's going to be a ransomware attack or a data exfiltration attack or if it's going to go in to cause defamation to the company like creating a denial of service to clients. Also, hacking their Facebook page or their Twitter page are common attacks.

View full review »
CS
Manager at a financial services firm with 5,001-10,000 employees

Our clients primarily use the CyberArk Password Vault for password rotation and password management.

View full review »
FF
Senior Presale - BU Information Security at a tech services company with 51-200 employees

We implement this solution for our customers. We are system integrators, not end-users.

The main use case is for secure access, and monitoring the access by IT administrators.

View full review »
AS
System Administrator at Porto Editora

Primarily, I import accounts from our critical systems.  

View full review »
MB
Information Security Consultant at a tech vendor with 10,001+ employees

We use the solution for password vaulting, password rotation, session management, and secret management. 

View full review »
FG
Node.js Backend Developer at a tech services company with 1,001-5,000 employees

CyberArk vouches for access to domain controllers in Unix and Windows Server. 

View full review »
RS
Cyber security architect at a financial services firm with 10,001+ employees

CyberArk Enterprise Password Vault is important to do privileged session management, access a privileged access manager. Additionally, it is important to do segmentation in your core environment with the support team. For example, it is doing access monitoring support in our servers.

View full review »
PG
Technical Lead IMSS at a computer software company with 1,001-5,000 employees

We use it for storing and rotating passwords.

Within our organization, a lot of people are using this solution for a lot of projects. We have already implemented CyberArk as a SaaS solution. We are not using the core parts, but we are using the software as a service for a project.

At my previous job, there was a team of seven people who were in charge of maintenance. Mostly analysts, senior analysts, and a technical lead used this solution. 

View full review »
SS
Manager Engineering at a comms service provider with 1,001-5,000 employees

Our primary use of this solution is as a password manager.

View full review »
it_user789450 - PeerSpot reviewer
Works at a energy/utilities company with 1,001-5,000 employees
  • Vaulting of privileged credentials. 
  • Used as a jump host solution. 
  • We wanted to keep passwords from being exposed to end users and connect them seamlessly to their target devices.
View full review »
KK
SAP CRM /C4C /SAP Hybris at ATOS

This solution is used for managing all unmanaged and forgotten privileged accounts. DNA tool is amazing, far better than imaginable in previous years.

View full review »
DW
Security at a tech services company with 201-500 employees

Companies often have an enormous amount of admin credentials out there. They want to find out how many they have, start cleaning them up, and ensure they're all kept in an encrypted vault. Password Vault is probably the top product in that space, and it's a monster to implement, but CyberArk is great at what they do.

View full review »
GK
Consultant at a financial services firm with 5,001-10,000 employees

The primary use case of this solution is for third-party developers that come into our infrastructure from VPN to connect. They are organizations that are outside of our organization.

View full review »
JF
Security Architect at a financial services firm with 10,001+ employees

This solution is used primarily for privileged segment access and break-glass access. We also use it for log-on session recording and access control, where we can grant access to our key systems for ad-hoc use.

View full review »
GB
Security Delivery Analyst at a computer software company with 10,001+ employees

My primary use case is the digital identity for access management of users and the configuration of passwords, or MSA, or SSO.

View full review »
PR
Director - Enterprise Security, Fraud and Supplier Risk Management at a financial services firm with 1,001-5,000 employees

I used CyberArk for vaulting passwords.

View full review »
MH
Information Security Analyst at a financial services firm with 1,001-5,000 employees

The primary use case is to monitor the official activity of a privileged user for privilege violations.

View full review »
OZ
Lead Systems Architect at IT Specialist LLC

The primary use case of the solution is to gather privileged accounts from different systems and to contain privileged accounts in one secure place.

View full review »
it_user1333062 - PeerSpot reviewer
Director at a tech services company with 11-50 employees

There are threats that get opened because of the vulnerability of privileged access that says to directly put it in a vault.

View full review »
it_user1026123 - PeerSpot reviewer
Pre-sales Engineer at StarLink - Trusted Security Advisor

The primary use case is for storing user passwords and administration credentials.

I am the engineer for a company that sells this solution mostly to financial institutions. 

It is also useful for auditing and securing shared accounts or co-shared accounts.

View full review »
Buyer's Guide
CyberArk Enterprise Password Vault
April 2024
Learn what your peers think about CyberArk Enterprise Password Vault. Get advice and tips from experienced pros sharing their opinions. Updated: April 2024.
768,415 professionals have used our research since 2012.