CyberArk Privileged Access Manager Previous Solutions

SatishIyer - PeerSpot reviewer
Assistant Vice President at a financial services firm with 10,001+ employees

I have used a similar solution, but it was closer to a desktop password manager kind of tool. It was made by IBM and it was something you could actually install on your desktop and manage your passwords around that.

Later on IBM developed the tool into something more enterprise-oriented, and it turned into what we would classify as a privileged access management solution. But otherwise, CyberArk was probably the first fully-fledged solution in this sphere that I have used.

View full review »
Jonathan Hawes - PeerSpot reviewer
CyberArk PAS Administrator at L3Harris Technologies

This was an initial implementation to meet the regulatory requirements of a federal customer.

View full review »
Jonathan Hawes - PeerSpot reviewer
CyberArk PAS Administrator at L3Harris Technologies

Prior to the implementation of the CyberArk Privileged Access Manager, the security operations utilized unencrypted spreadsheets to store privileged passwords, which became a POAM when discovered during a routine security audit.

View full review »
Buyer's Guide
CyberArk Privileged Access Manager
April 2024
Learn what your peers think about CyberArk Privileged Access Manager. Get advice and tips from experienced pros sharing their opinions. Updated: April 2024.
767,847 professionals have used our research since 2012.
TD
IT Manager at BCBS of MI

I did not previously use a different solution.

View full review »
RB
IT Manager at a tech services company with 10,001+ employees

The company was probably using LockBox before using CyberArk Privileged Access Manager, but I'm not sure about that.

View full review »
reviewer907214 - PeerSpot reviewer
Director, CyberSecurity at Ashburn Consulting LLC

I did not previously use a different solution. 

View full review »
NM
Information Security Leader at a government with 10,001+ employees

I've used Thycotic and Hitachi HiPAM, and we've used some custom in-house build solutions.

The reason we switched is that Thycotic opened up the door to that possibility when we talked about pricing. The price came out to be something similar to what we were spending. We were basically going to have to redeploy the whole Thycotic solution to get what we needed, and that opened it up for us to evaluate the landscape.

View full review »
reviewer990891 - PeerSpot reviewer
Information Technology Specialist (Contract role) at a tech services company with 10,001+ employees

I have not worked with a solution with a focus explicitly for PAM.

View full review »
KD
Network Engineer at CalSTRS

We weren't using anything before. 

View full review »
MM
Security Advisory Services (SAS) Business Growth Lead for Iberia at a computer software company with 10,001+ employees

I have been working with CyberArk and with the CyberArk teams for years. They have been able to adapt the solutions that they have developed or bought. They have grown a lot with the acquisition of different companies. They have been able to adapt them, make them valuable, and helpful.

View full review »
Meo Ist - PeerSpot reviewer
Senior Product Manager and Technology Consultant at Barikat

We did use Delinea, formally Thycotic. That solution is really good, however, not fully secure. CyberArk is a more secure product - much better than Thycotic. Thycotic may be better in terms of its admin-friendly interface and integration, however, CyberArk offers more than vendor integration. It has massive integration capabilities.

View full review »
reviewer988578 - PeerSpot reviewer
Snr Technical Consultant at a tech services company with 10,001+ employees

Our previous solution was not a PAM solution and these days you can't afford to not use one.

View full review »
AI
Technical Manager at Gulf IT

We previously used BeyondTrust.

View full review »
IB
Security Architect at a tech services company with 1,001-5,000 employees

We had clients who had quite a lot of SAP systems, something like 900. At first, their change management practice, i.e., the changing of the administrators' passwords was not so frequent, e.g., once a year instead of once a month or every two months. Their password management was usually done by storing those passwords on an Excel. Therefore, if they needed to connect to a system, they had to access the Excel file to find the machine and accounts to then receive the passwords for access to the system. This was unwieldy since they needed to look through an Excel spreadsheet with more than 900 entries. This is also not very secure since you have an Excel file with a clear password on your workstation. 

View full review »
Iordanidis Iordanis - PeerSpot reviewer
Procurement Manager at OTE Group

I can't speak to what solutions, if any, we used previously. 

View full review »
KC
Corporate Vice President at a insurance company with 10,001+ employees

We did not use a different product. We had an in-built vaulting system for managing our own credentials. We've been a CyberArk customer for a while. We had the document vault. Privileged Access had just come out and CyberArk was one of the easiest choices we could make at that time. That's how we decided to go with it.

View full review »
DK
Manager at a financial services firm with 1,001-5,000 employees

I have not used other solutions.

View full review »
it_user519366 - PeerSpot reviewer
Information Security Advisor at a insurance company with 1,001-5,000 employees

With data breaches and ransomware becoming the standard that companies now face, a more elegant solution was desired from standard network and physical security. Accounts that can be found or socially engineered out of people has been a long-standing tradition for criminals and bored teenagers. Reducing the window any account can be used provides a more secure network.

View full review »
Muamer Riza Gani - PeerSpot reviewer
Assistant Vice President for Cyber Security Project at a financial services firm with 1,001-5,000 employees

I was previously using MEGA HOPEX.

View full review »
Syed Javid - PeerSpot reviewer
Security Consultant at a financial services firm with 1,001-5,000 employees

We previously had Hitachi ID PAM. We switched to CyberArk because of the features and interface, where there is a bit of distinct difference between the two solutions. Though, the architecture is the same.

View full review »
reviewer990921 - PeerSpot reviewer
IT Support Specialist / Project Lead at a energy/utilities company with 10,001+ employees

No, we used no other services/software previous to EPM.

View full review »
VA
Consultant at a recruiting/HR firm with 10,001+ employees

I’ve never had experience with any other vendors.

View full review »
ChaminiEllawala - PeerSpot reviewer
Identity and Access Management Engineer at Wiley Global Technology Pvt. Ltd.

I have worked with Thycotic before. It is not user-friendly, although it has changed a lot.

Implementation was really hard, and the reporting was not as good as the users expected. In comparison to CyberArk, Thycotic was not better.

View full review »
JP
Cybersecurity Engineer at a healthcare company with 10,001+ employees

Other than the regular Password Manager, they didn't have any real solution. They chose to look into CyberArk because it is a good security practice to have accounts automatically rotate and secure remote connections.

View full review »
MK
IT Manager at a financial services firm with 1,001-5,000 employees

We didn't previously use another solution.

View full review »
DP
Associate Director of IAM at INTL FCStone Inc.

We had no PAM program when I came to this company.

View full review »
RK
Information Security Analyst III at a healthcare company with 10,001+ employees

We did not have a previous solution, because we have always had admin rights. In fact, we did a proof of concept in CyberArk, version 1.

We needed something to manage the endpoint and to be able to empower the user. By far from not only a user's perspective on what they would be able to accomplish, but from the person who has to design the policies, it was the best. It was like working in MS-DOS compared to Windows 10. 

View full review »
Korneliusz Lis - PeerSpot reviewer
CyberSecurity Service Support Specialist at Integrity Partners

I've never used another solution that would have the same or similar capabilities.

View full review »
CF
Principal Information Security Engineer/Lead Active Directory Architect at a healthcare company with 10,001+ employees

We previously used One Identity.

View full review »
Aakash Chakraborty - PeerSpot reviewer
IEM Consultant at iC Consult GmbH

It sort of was implemented with One Identity Manager when Identity Access Management came into the picture. In early times when there was simply Excel as an identity access manager, and then there was nothing basically. Once there was the onset of proper identity access management without in-house custom tools or proper streamlining process, this solution was added. Initially, One Identity was sort of used as a Privileged Access Management also. However, soon they realized that it lacked in a lot of places for Privileged Access Management. That's when we went to CyberArk. That was way before my time.

View full review »
AP
Technical Manager at Tech Mahindra Limited

We were using the Centrify solution for managing UNIX apart from CyberArk. However, the scope of the Centrify solution is not as wide as the CyberArk solution.

View full review »
DM
Core Analyst/ Server Admin at a comms service provider with 1,001-5,000 employees

We were using KeePass before we got CyberArk, and I can't imagine trying to manage the number of accounts and credentials we have today, and the number of systems, with something like KeePass. It would be a nightmare.

We switched because of the scale of where we were going. All of our infrastructure passwords, prior to three-and-a-half years ago, were decentralized. The people who worked on a particular system managed the passwords for that system in their own particular way. There was no across-the-board system. There was no standard regarding these having to be encrypted versus those. Everybody came up with their own way of handling that. We tried to implement some standards during the years leading up, but they were not mandatory. So people ended up just doing what they wanted to do.

Now, with CyberArk, there is a mandate from upper management that we all use this tool. All the credentials go into it and they are all encrypted. Eventually, everything, 100 percent or as near 100 percent as we can get it, will be under full management.

In terms of criteria for selecting a vendor, from my perspective, I like to be able to find someone who can speak to me on a somewhat technical level and help me work through technical issues. But I also want them to give me a vision of things, the roadmap or other products and other things that are available, without getting too much of a marketing pitchor sales pitch. I don't mind a little bit of that. I know that's important. But at the same time, I don't just want a slick sales presentation. I want to know the technical end of how does this really work? I want to be able to have some vision as to how we might implement that. Not just what it can do for us, but how would we actually go through the machinery, go through the work, to make it work for us.

It's always good to have a vendor that can provide resources, that can speak to someone like me on a technical level, and that can help me work through issues, whether it's lack of experience or just lack of knowledge in a certain area; a vendor that can help me work through some of those situations and get me to where I need to be.

View full review »
SB
Security Analyst at a insurance company with 1,001-5,000 employees

We were not using a different solution before CyberArk.

View full review »
JM
Lead Automation Developer at COUNTRY Financial

We started out with CyberArk. When we started to look into using a PAM solution they were the leader in the space (and still are).

View full review »
KS
Information Security Administrator at a insurance company with 501-1,000 employees

We didn't use another solution before we bought this one.

View full review »
Maarten22 - PeerSpot reviewer
Works at Liberty Global

We did not use a PAM product before this.

View full review »
SP
Senior Security Engineer at a financial services firm with 1,001-5,000 employees

We were previously using Excel spreadsheets. We changed because of audit requirements, but a lot of times it will due to usability. We understand that having our password in a spreadsheet is a huge vulnerability, so it is one of the things that made us look for a solution to manage those credentials, and create automated workflows around it for audit requirements.

View full review »
CH
Information security engineer/ business owner

I have had experience with CA PAM. That's the only other password vaulting technology that I've used so far. I've used SailPoint IdentityIQ, but that's not really password vaulting. Apparently, there is a partnership growing that allows you to provision CyberArk through SailPoint, which I worked on with the CDM project - and it was a headache last year. So I'm excited about the new CM technology that they have that's allowing for that integration, but other than that, I haven't really done much.

View full review »
NR
Security Architect at a healthcare company with 10,001+ employees

We did not use another solution before CyberArk.

The big thing that was a catalyst for us to look at CyberArk was the Anthem breach that happened back in 2014 or 2015. Being a healthcare organization, our executive leadership realized that we are a big company. We are not immune to these sorts of attacks either. We have got to get something in place. Being best of breed, we turned to CyberArk for that. Again, it has been a fantastic partnership, and has both ways; we've been able to help them. They have been able to help us quite a bit as well. 

View full review »
TK
Cyber Security Consultant at a tech services company with 10,001+ employees

I started my career with Quest TPAM (now Dell TPAM) and also worked on BeyondTrust, CA PUPM, ARCOS, etc. BeyondTrust and ARCOS were introduced in market at that time. These tools are good but doesn't seems to be user friendly as CyberArk PAM. These solutions are bit complex to implement, configure and usage. Even if these tools have some good features which keeps them running in market but one feature in which all these tools are beaten up by CyberArk is User Friendly.

Users are more confident in using CyberArk, more convenient in installing and deployment and easier to customize as per client requirement.

View full review »
BW
Systems Admin II at a transportation company with 5,001-10,000 employees

We did not previously use another solution.

View full review »
SN
Director Information Security at a insurance company with 501-1,000 employees

We did not have a previous solution. We have always used CyberArk. 

From a risk landscape, we knew that privilege accounts were where attackers were going, doing lateral movements. These are keys of the kingdom which protect those, and that is why we focused in this area.

View full review »
KE
Security Analyst at a retailer with 10,001+ employees

We were previously using HPM.

View full review »
it_user677688 - PeerSpot reviewer
CyberArk Consultant at a comms service provider with 10,001+ employees

We did not have a previous solution.

View full review »
BA
Cyber Security Manager at a hospitality company with 10,001+ employees

We were lucky to have a board of directors who really embraced security. With their support, we were able to establish the need for a PAM solution. 

View full review »
MS
Technical consultant at a healthcare company with 1,001-5,000 employees

Before CyberArk we had a number of solutions, CA and IBM products, but CyberArk meets our requirements regarding application password management.

View full review »
MV
CyberArk PAS Solution Professional | Project Manager at a tech services company with 10,001+ employees

This is the first PAM product that I have used.

View full review »
it_user674049 - PeerSpot reviewer
Head of Technical Services at a tech services company with 51-200 employees

No previous solutions were used.

View full review »
Mammad BNB - PeerSpot reviewer
Director Of Technical Operations at BNB Security Alliance

I have used Balabit and One Identity prior to using CyberArk Privileged Access Manager. I found that CyberArk has more integration out of the box with other solutions and it solves a lot of problems for customers if they have different solutions.

View full review »
reviewer990912 - PeerSpot reviewer
Senior Manager - Privileged Access Management at a tech services company with 10,001+ employees

Yes, we decided to change to CyberArk in line with our strategic intent to provide as safe a central and customer environment as possible.

View full review »
DD
Information Security Engineer at a international affairs institute with 1,001-5,000 employees

No, we haven't used any other solution.

View full review »
it_user507834 - PeerSpot reviewer
Senior Consultant at a consultancy with 10,001+ employees

I did not previously use a different solution. I have always used CyberArk.

View full review »
MM
IT Security Analyst at a mining and metals company with 10,001+ employees

Since I started, it has always been CyberArk.

View full review »
it_user185532 - PeerSpot reviewer
Security Expert at SecurIT

My company did not previously use a different solution. My company has had CyberArk in their portfolio for more than 10 years now.

View full review »
it_user186408 - PeerSpot reviewer
Senior Manager of System Security at a tech services company with 51-200 employees

Never used a different solution.

View full review »
it_user834369 - PeerSpot reviewer
Associate Vice President & Head of Apps Support at a tech services company with 10,001+ employees

We didn't have a previous solution at the time.

View full review »
it_user514779 - PeerSpot reviewer
Project Manager at a tech services company with 10,001+ employees

We did not have a previous solution.

View full review »
it_user512265 - PeerSpot reviewer
Consultant at a tech company with 1,001-5,000 employees

I saw customers using another product for their privileged accounts. Due to its limitations (e.g., on password and session management) and stability, they decided to switch to CyberArk.

View full review »
it_user514596 - PeerSpot reviewer
Security Technical Consultant at a tech services company with 10,001+ employees

I did not previously use a different solution.

View full review »
it_user234336 - PeerSpot reviewer
Technical Manager, System Division at a tech services company with 501-1,000 employees

Most customers using a different solution switch to CyberArk because CyberArk is more user-friendly than its competitors and have more plugins compared to the others.

View full review »
it_user574734 - PeerSpot reviewer
Technology Architect at a renewables & environment company with 51-200 employees

We did not use any previous solution.

View full review »
reviewer988578 - PeerSpot reviewer
Snr Technical Consultant at a tech services company with 10,001+ employees

No Previous PAM solution used.

View full review »
it_user455391 - PeerSpot reviewer
IT Admin at a tech company with 10,001+ employees

Initially, we were using the CA ControlMinder. There were many issues with this solution, mainly in regards to no proxy solution and poor performance.

View full review »
it_user121395 - PeerSpot reviewer
ITSM & AntiFraud Consultant with 51-200 employees
KR
Technical Director at Unique Performance Techsoft Pvt Ltd

We did not previously use another solution.

View full review »
it_user685302 - PeerSpot reviewer
Technical Lead at a tech services company with 10,001+ employees

Haven’t use any solution prior to CyberArk.

View full review »
it_user507363 - PeerSpot reviewer
IT Security Consultant at a tech services company with 10,001+ employees

I was part of the PIM product evaluation team at my previous organization. I stayed with CyberArk because is it's extremely easy to implement, and very stable when implemented with well-thought-out planning and experience. It has all of the required features for a PIM product, it does not have dependencies on third-party products for it to function and it is clientless.

View full review »
it_user445038 - PeerSpot reviewer
Cyber Security Supervisor at a tech company with 1,001-5,000 employees

I did not previously use a different solution.

View full review »
it_user665142 - PeerSpot reviewer
SD/Infr Coordinator at a computer software company with 201-500 employees

We did not use a previous solution. Basically, we helped a telecom to migrate from a standard .XLS with accounts to CyberArk.

View full review »
RN
Product Manager at a tech services company with 11-50 employees

I have also worked with Thycotic, until the completion of the project.

View full review »
it_user225765 - PeerSpot reviewer
IT Security Engineer at a tech services company with 51-200 employees

I didn't use a previous solution.

View full review »
reviewer1052523 - PeerSpot reviewer
Works with 10,001+ employees

No, we didn't use any.

View full review »
it_user674070 - PeerSpot reviewer
Senior Technical Trainer at a tech services company with 501-1,000 employees

We moved from version 8 to Version 9.

View full review »
Buyer's Guide
CyberArk Privileged Access Manager
April 2024
Learn what your peers think about CyberArk Privileged Access Manager. Get advice and tips from experienced pros sharing their opinions. Updated: April 2024.
767,847 professionals have used our research since 2012.