CyberArk PAS Primary Use Case

Sumit-Srivastava
Associate Vice President & Head of Apps Support at a tech services company with 10,001+ employees
Our primary use of CyberArk Privileged Access Manager is to bring control on to the privileged access. For a while, there were individual IDs having privileged access. We wanted to restrict that. We implemented the solution so that it can be more of internal control. We can have session recordings happening and reduce our attacks. View full review »
BridgitAmstrup
Cyber Security Manager at a hospitality company with 10,001+ employees
So far, CyberArk has done everything that we've needed it to. We are growing and moving into the cloud. We have a pretty complex environment. Everything that we've needed it to do in terms of managing our privileged accounts, it has done. View full review »
reviewer1384200
Threat Protection Architect at a consumer goods company with 10,001+ employees
Our primary use case is to control the technical accounts used in our DevOps environnment. The primary goal was to automate to the maximum all privileged accounts used by applications. It was a big issue because al dev guys were always using the same account/password couple. CyberArk is doing this for them transparently. Through time the scope was extended to all interactive users with the target to avoid them knowing the password. The automated password change was implemented to 99% of all accounts inside the company. View full review »
Learn what your peers think about CyberArk PAS. Get advice and tips from experienced pros sharing their opinions. Updated: April 2020.
443,152 professionals have used our research since 2012.
Rodney Dapilmoto
Systems Admin Analyst 3 at CPS Energy
We use this solution for privileged systems access with a high emphasis on security. End users are required to go through a process of being vetted in our NERC environment in order to use the solution. This product has been used by my company for about 3 years now. View full review »
Maarten22
User at Liberty Global
The main usage of our implementation is to limit the credentials exposure to our third-party teams. They are able to connect to the end-points in a secure and isolated manner without needing to know any end-point credentials. View full review »
Varun_Sahu
Senior Associate at a consultancy with 10,001+ employees
My primary use case for this solution is to prevent privileged access, privilege accounts, and to mark all of those for future ordering proposals. It is to limit their access. View full review »
Dan Hines
Senior Technologist at a retailer with 1,001-5,000 employees
Primary use case is for compliance, SOX, PCI, HIPAA, and securing privileged access accounts. It seems to be performing well. We have had pretty good success with it. We plan to utilize CyberArk to secure infrastructure and applications running in the cloud with AWS Management Console. We are testing it right now, so we hopefully it will be ready in about two months. View full review »
reviewer990873
Information Security Engineer at a international affairs institute with 1,001-5,000 employees
The main purpose of getting CyberArk was to control the use of the shared passwords. Secondly, we needed to take out the secrets from the applications' source code (database connection strings). Thirdly, we wanted to improve the network segmentation and reduce the number of firewall exceptions. We're doing that by assigning a PSM per network zone and limiting the exceptions to its connections. View full review »
HimanshuPandey
Lead Consultant at a tech services company with 10,001+ employees
Our primary use case for this solution is privileged threat management and session management. View full review »
Randhir-Singh
Principal Consultant, IAM Projects at a tech services company with 201-500 employees
The primary use case is password management. View full review »
reviewer990921
IT Support Specialist / Project Lead at a energy/utilities company with 10,001+ employees
Used to allow the removal of local administrators from 12,000 endpoints and yet still allows users to have the applications they need with the proper permissions required. View full review »
Je’rid Mccormick
Associate Engineer I at COUNTRY Financial
To securely manage privileged accounts within the enterprise and automate password compliance where possible. View full review »
reviewer990912
Senior Manager - Privileged Access Management at a tech services company with 10,001+ employees
* PAM interface for staff to support customers which may include CyberArk solutions of their own. * Managing large environments with varied and diverse environments. View full review »
reviewer991878
Senior IT Security Engineer at a insurance company with 5,001-10,000 employees
We are using the solution for privileged account management. (Rotation, session isolation, checkout, etc.) View full review »
reviewer988578
Snr Technical Consultant at a tech services company with 10,001+ employees
Managing passwords to infrastructure and applications, keeping those accounts “safe,” and being able to audit their use. View full review »
José Luis Llorente Rey
Senior Specialist Identity System Support at Roche
We are using CyberArk to store credentials of privileged assets in a secure way. In addition, CyberArk helps us to meet our security policy effortlessly, defining the complexity of the passwords, rotation period, etc. We are also using the Privileged Session Manager to provide remote access to servers with security controls in place (session isolated and recorded). View full review »
Gautam Mishra
IT Analyst at a tech services company with 10,001+ employees
We have different privileged accounts in our enterprise. All of the application owners and the stakeholders want to store those accounts CyberArk privileged security, so they can connect to the target systems. It also allows for session recordings at the time of auditing. View full review »
reviewer1052523
User with 10,001+ employees
It provides a tamper-proof solution for privileged accounts and third-party access to corporate assets. View full review »
Review874
Vice President - Cyber Security at a tech services company with 10,001+ employees
We primarily use this product for privileged identity management, restricting privileged IDs, and governance. This is the primary function of the program, and what we expect from it within the broad business level. View full review »
identity989526
Identity and Access Management Analyst at a financial services firm with 1,001-5,000 employees
We use CyberArk to manage anything privileged including our admin IDs, AWS root credentials, service accounts, etc. View full review »
reviewer990891
Information Technology Specialist (Contract role) at a tech services company with 10,001+ employees
Primary use case: having privileged access management and ingress into customer networks and infrastructure. View full review »
reviewer990891
Information Technology Specialist (Contract role) at a tech services company with 10,001+ employees
Privileged account access into customer environments. View full review »
Learn what your peers think about CyberArk PAS. Get advice and tips from experienced pros sharing their opinions. Updated: April 2020.
443,152 professionals have used our research since 2012.