CyberArk Privileged Access Manager Pros and Cons

CyberArk Privileged Access Manager Pros

GerryOwens
Founder at GoTab IT Risk Services
CyberArk is a very stable product and it's a stable product because it has a simple design and a simple architecture that allows you to leverage the economies of scale across the base of your infrastructure that you already have implemented. It doesn't really introduce any new complex pieces of infrastructure that would make it that much more difficult to scale.
View full review »
KunalChandel
Corporate Vice President at a insurance company with 10,001+ employees
When we started with RPA, there was a requirement that every credential and the bots themselves be protected through the PAM system. From the get-go, we've had CyberArk in the middle... We've got a pretty robust RPA implementation with our PAM platform. Users, bots, the credentials — everything is managed via our PAM solution.
View full review »
DavidPoints
Associate Director of IAM at INTL FCStone Inc.
Right off the bat, the most valuable feature is the DNA scan. It gives us the ability to scan our environment and find the accounts that we're going to need to take under control.
View full review »
Learn what your peers think about CyberArk Privileged Access Manager. Get advice and tips from experienced pros sharing their opinions. Updated: June 2021.
510,204 professionals have used our research since 2012.
ABHILASH TH
Managing Director at FOX DATA
Their legacy of more than 20 years is very valuable. It brings a lot of stability to the product and a wide variety of integration with the ecosystem. Because of these factors, it has also been very successful in deployment. So, the legacy and integration with other technologies make the PAM platform very stable and strong. In terms of features, most of the other vendors are still focusing just on the privileged access management or session recording, but CyberArk has incorporated artificial intelligence to make PAM a more proactive system. They have implemented threat analytics into this, and there is also a lot of focus on domain controller production, Windows Server protection, and stuff like that. They have also further advanced it with the security on the cloud and DevOps systems. They have a bundle licensing model, which really helps. They don't have a complex licensing model. Even though in our market, people say CyberArk is expensive as compared to some of the other products, but in terms of overall value and as a bundling solution, it is an affordable and highly scalable product.
View full review »
BridgitAmstrup
Cyber Security Manager at a hospitality company with 10,001+ employees
CyberArk has been easy for us to implement and the adoption has been good. We've been able to standardize a bunch of things. We've been able to standardize relatively easily with the use of the platforms and managing the policies.
View full review »
YP
reviewer1384200
Threat Protection Architect at a consumer goods company with 10,001+ employees
The risk of lost password and forbidden access to resources has been drastically reduced which increased the security level for the entire company,
View full review »
Rodney Dapilmoto
Systems Admin Analyst 3 at CPS Energy
The Password Upload Utility tool makes it easier when setting up a Safe that contains multiple accounts and has cut down the amount of time that it takes to complete the task.
View full review »
KN
reviewer1386480
Junior Product Consultant at a tech services company with 501-1,000 employees
The technical support is good.
View full review »
Meo Ist
Senior Product Manager and Technology Consultant at Barikat
It is useful for protecting passwords. If you need to do access security management, you can first use the CyberArk console, and after that, you can connect the firewall interface or firewall command line. Similarly, if you need to do an RDP session, you need to first log in to CyberArk before connecting to the Windows RDP session. This way, the admin doesn't know the password, and that password is changed immediately. To change the password, you first discover the old password in the network, and after that, you can change the password.
View full review »
Richard Nagygyörgy
Product Manager at a tech services company with 11-50 employees
The most valuable feature is Special Monitoring.
View full review »

CyberArk Privileged Access Manager Cons

GerryOwens
Founder at GoTab IT Risk Services
CyberArk has to continue to evolve with that threat landscape to make sure that they're still protecting those credentials that are owned by those that have privileged accounts in the firms.
View full review »
KunalChandel
Corporate Vice President at a insurance company with 10,001+ employees
The one place where we found that this product really needs to improve is the cloud. Simple integrations don't exist, even today. We don't have anything specific on CyberArk for managing, SaaS products, SaaS vendors, SaaS credentials. I understand it's a vendor-based thing and that they have to coordinate with the other vendors to be able to do that, and there are integrations coming. But these are the major places where CyberArk definitely needs to invest some more time.
View full review »
DavidPoints
Associate Director of IAM at INTL FCStone Inc.
It's a big program. To scale excessively, locally, on an on-prem application, takes a lot of servers.
View full review »
Learn what your peers think about CyberArk Privileged Access Manager. Get advice and tips from experienced pros sharing their opinions. Updated: June 2021.
510,204 professionals have used our research since 2012.
ABHILASH TH
Managing Director at FOX DATA
Their post-sale support area requires a big improvement. Customers cannot automate tickets directly with CyberArk. They have to come through the distributor or bring in partners who have access to the support portal. Basically, the support for post-sales implementation is there, but the role of CyberArk is very minimal. Customers have to rely on partners, which sometimes creates issues. Some of the vendors help you during the implementation process, but the CyberArk support team does not do that. They have 24/7 support for our region, but they help only if there is an emergency or there is a problem with their system. If the password vault is down or the system is down, they provide immediate attention. For almost everything else, they take more time to respond. They give low priority to service-related or migration-related questions.
View full review »
BridgitAmstrup
Cyber Security Manager at a hospitality company with 10,001+ employees
There is a bit of a learning curve, but it's a pretty complex solution.
View full review »
YP
reviewer1384200
Threat Protection Architect at a consumer goods company with 10,001+ employees
It needs better documentation with more examples for the configuration files and API/REST integration
View full review »
Rodney Dapilmoto
Systems Admin Analyst 3 at CPS Energy
Currently, in Secure Connect, an end user is required to enter account information manually, and cannot save any of this information for future use.
View full review »
KN
reviewer1386480
Junior Product Consultant at a tech services company with 501-1,000 employees
We found a lot of errors during the initial setup. They should work to improve the implementation experience and to remove errors from the process.
View full review »
Meo Ist
Senior Product Manager and Technology Consultant at Barikat
It can be integrated with other systems, but it is not easy to integrate. It takes too long to integrate it. Its integration should be easier and simpler.
View full review »
Richard Nagygyörgy
Product Manager at a tech services company with 11-50 employees
The authentication port is available in CyberArk Alero but not Fortinet products.
View full review »
Learn what your peers think about CyberArk Privileged Access Manager. Get advice and tips from experienced pros sharing their opinions. Updated: June 2021.
510,204 professionals have used our research since 2012.