CyberArk Privileged Access Manager Implementation Team
The first step of the implementation strategy was putting all the passwords in the vault, thereby securing them. We also had a tool called Application Identity Manager, which we used for mitigation of the hard-coded passwords. Only after the vault was in place alongside Application Identity Manager, were steps taken to deploy the PAM suite.
Back in 2015, we had about three or four full-time CyberArk Professional Services folks undertake an effort to implement it, but that project failed. All that was achieved was the central vault deployment, and I think they also had Application Identity Manager installed at the time, but nothing apart from that. So it didn't take off the way it was supposed to, possibly due to a misalignment with the top management and the enterprise architecture viewpoint. But later on, and toward the second half of 2016, things started picking up again and further steps were taken from 2017 onward to deploy the Privileged Access Management functionality.
Throughout the PAM deployment, there was a fairly large vendor team that we were working with. I reckon the vendor team size was around 45 to 50 people. Within the organization, there was another large team that was supporting with various roles, such as in engineering, architecture, operations, governance, and so on. In total, there were around 50 of the vendor's team and maybe 20 to 30 roles from within the organization. There were other layers of responsibility, such as the risk team, but all those were kind of on the outside of the deployment.
View full review »The initial implementation was a joint project with CyberArk Professional Services and our internal Systems Engineers. The Professional Services engineers were very knowledgeable regarding the implementation of their products.
View full review »Our organization utilized CyberArk's professional support team to come in and provide a local, hands-on planning and implementation approach. This implementation methodology actually reduced long-term costs by making sure the implementation was done according to CyberArk's Best Practices.
View full review »Buyer's Guide
CyberArk Privileged Access Manager
April 2024
Learn what your peers think about CyberArk Privileged Access Manager. Get advice and tips from experienced pros sharing their opinions. Updated: April 2024.
769,599 professionals have used our research since 2012.
TD
Bruce P
IT Manager at BCBS of MI
We worked with the vendor team who were very knowledgeable during the implementation.
View full review »Our environment is run in-house by a contract team with expertise in CyberArk. However, we do leverage the vendor for major upgrades and have used their technical account manager services in the past
View full review »NM
Nigel Miller
Information Security Leader at a government with 10,001+ employees
We did not use a third party for the deployment.
View full review »The majority of the setup was in-house. On occasion, we have engaged the vendor team and always had a positive outcome.
View full review »We have deployed CyberArk in both environments. We have several working calls in the cloud and some parts on-premises. The initial deployment takes about two days.
View full review »We had a third party help us with the implementation process.
View full review »We handled the initial setup in-house.
View full review »DK
Dharmendra Kumar
Manager at a financial services firm with 1,001-5,000 employees
I used a partner for the implementation of the CyberArk Privileged Access Manager.
The number of people required for the implementation of CyberArk Privileged Access Manager depends on the number of applications. However, for my team, we have two to four people who were involved in the development of our architecture.
View full review »I deployed the solution.
View full review »We use a third party to do the implementation of the solution. We purchased preventive and corrective maintenance from our partner.
View full review »For the deployment, we needed a solution architect, two consultants, and two people to work on the BAU. While it depends on your organization's size, we needed around five to 10 people to implement it.
View full review »We implemented in-house with the direction of a third-party.
View full review »DH
Dan Hines
Senior Technologist at a retailer with 1,001-5,000 employees
The vendor was retained to implement our Cyberark rollout initially.
View full review »VA
reviewer1628910
Consultant at a recruiting/HR firm with 10,001+ employees
We initiated the setup with the help of the vendor.
View full review »We got support from the CyberArk team but deployed it ourselves. It was easy to follow the documentation and user guide.
View full review »JP
reviewer1741323
Cybersecurity Engineer at a healthcare company with 10,001+ employees
We used CyberArk's professional services. They were good, and they helped get everything set up. They also helped do upgrades.
View full review »MK
Mateusz Kordeusz
IT Manager at a financial services firm with 1,001-5,000 employees
Implementation of our CyberArk instance was done by an external company. It covered all our needs and requirements.
View full review »RK
Rahsaan Knights
Information Security Analyst III at a healthcare company with 10,001+ employees
I designed the solution. Because they knew that this is a solution that no one had really seen before, they made sure they had somebody onsite throughout the entire implementation.
View full review »SY
Song Ye
Senior System Engineer at a transportation company with 10,001+ employees
Our solution architects, and some of the people on that side, did the PoC and the initially implementation. Then, they handed it off to us.
View full review »I have been through the process of implementing the solution for clients.
View full review »We had a consultant, and we were satisfied with the service. You need someone with one or two years of experience.
View full review »YP
reviewer1384200
Threat Protection Architect at a consumer goods company with 10,001+ employees
In house. Very good.
View full review »When I was an end-customer I recall using a vendor for the implementation and support. Now, I am a vender and therefore I do it by myself.
View full review »CF
reviewer1786770
Principal Information Security Engineer/Lead Active Directory Architect at a healthcare company with 10,001+ employees
We deployed the solution in-house.
View full review »We have an internal integrator for the tool.
View full review »RD
Rodney Dapilmoto
Systems Admin Analyst 3 at CPS Energy
If you are going to set up CyberArk for the first time, I highly recommend that you utilize their Professional Services. They are extremely knowledgeable and very helpful and will ensure that your implementation is a success.
View full review »KS
reviewer1745286
Information Security Administrator at a insurance company with 501-1,000 employees
RNS did the installation for us. Our experience with them was pretty good. They followed all the processes per project management standard. They tracked all the activities, making sure the project was delivered on time, which was good.
One dedicated person is enough for the solution's maintenance.
View full review »We had a combination of in-house (with training), vendor (CyberArk) and third-party vendor. The third-party vendor Computacenter helped us with creating some design and documentation. I would not recommend this third-party to other people as they did not fully work with us and listen to our requirements.
View full review »SP
Sack Pephirom
Senior Security Engineer at a financial services firm with 1,001-5,000 employees
We had someone from the CyberArk team helping us with the implementation.
View full review »KR
Identity1647
Identity and Access Management Engineer at a energy/utilities company with 10,001+ employees
CyberArk offered to help with designing the architecture. Once we got all those pieces sorted out, the implementation was easy.
View full review »NR
Securitye790
Security Architect at a healthcare company with 10,001+ employees
I was the primary engineer and lead engineer who stood up the entire solution. I was both solution architect at that time, as well as the solution engineer. I have since moved into the architect role and have backfilled my position. However, I was there at the very beginning and did all of the initial setup.
View full review »TK
Tanmay Kaushal
Cyber Security Consultant at a tech services company with 10,001+ employees
Initially, I took some help but have never got a chance to work with Vendor team. I use to implement CyberArk for my client based on their requirement. I still not consider myself as an expertise, as I am still learning this tool and it always surprise me, however I would rate myself on overall - 6 out of 10.
View full review »BW
SystemsA2327
Systems Admin II at a transportation company with 5,001-10,000 employees
CyberArk helped with the implementation.
We did not get the EPM training, so we were just flying by the seat of our pants and going with it. For the most part, we were able to figure stuff out, but some stuff gave us a little run for our money.
View full review »The solution's deployment was completed by the vendor.
A team of two to three people was required for the deployment of our solution. One of them had a high level of expertise in architecture and a thorough understanding of the solution. The remaining team members were junior-level personnel in charge of activities including connection development, data collection, and deployment. The vendor was also used by the team to help with data collection, planning, and execution.
View full review »AM
Anthony Mook
Senior Security Manager at SMU
We used a reseller, integrators, but they were useless to me.
View full review »KL
reviewer1248522
Team Lead Information Security Control at a financial services firm with 5,001-10,000 employees
We had a local third-party company help us with the implementation of CyberArk Privileged Access Manager. The maintenance is sometimes a challenge for our consulting team that does it.
View full review »We implemented through in-house specialists.
View full review »DD
reviewer990873
Information Security Engineer at a international affairs institute with 1,001-5,000 employees
Our vendor's implementation team was stellar.
View full review »I am from a vendor team that does the implementation.
View full review »I work in a vendor team, and we installed the product in a large company.
View full review »AT
ABHILASH TH
Managing Director at FOX DATA
We do inhouse.
View full review »We went with an implementation partner for the deployment which included a number of admins. Currently, there are around 60 users but they are going to be 150 plus in a month or so.
We want the implementation partner for supporting it for the next three months, and then we will make the call whether we want to continue with them or maybe our resources should be good enough internally to support it.
View full review »I was part of the implementation team with support from the vendor.
View full review »I implemented myself.
View full review »KN
reviewer1386480
Junior Product Consultant at a tech services company with 501-1,000 employees
We did not handle the entire implementation ourselves. We had assistance from an outside firm. They were helpful.
View full review »Buyer's Guide
CyberArk Privileged Access Manager
April 2024
Learn what your peers think about CyberArk Privileged Access Manager. Get advice and tips from experienced pros sharing their opinions. Updated: April 2024.
769,599 professionals have used our research since 2012.