CyberArk Privileged Access Security Reviews

Filter by:Reset all filters
industry
Filter Unavailable
Company Size
Filter Unavailable
Job Level
Filter Unavailable
rating
Filter Unavailable
Real User
Core Analyst/ Server Admin at a comms service provider with 1,001-5,000 employees
Jul 24 2018

What is most valuable?

The basic features are, themselves, highly useful. I was just saying to some CyberArk people that I came to understand fairly early on that CyberArk is not just an IT security or cybersecurity tool. It's also an administrator tool. I had a... more»

How has it helped my organization?

It has given us a common environment where all of our critical infrastructure credentials can be stored. From the pure usability and administrative perspective, I can't imagine doing what we do without it. And we're a fairly small business.... more»

What needs improvement?

Things that they were speaking about, here at the Impact 2018 conference, are things that we've already been looking it. They have been on our radar, things like OPM. We're beginning to use PSMP a little bit ourselves. We already have that... more»
Real User
Security Architect at a healthcare company with 10,001+ employees
Jul 22 2018

What is most valuable?

It has an automatic password rotation. We have so many accounts, and being such a large organization, it helps take a lot of maintenance off of our plates, as well as automating a lot of those features to help increase our security. Having... more»

How has it helped my organization?

Right out of the gate, three years ago, we secured all of our Windows Servers and all of our local administrator accounts. We followed that with all of their root accounts for our Unix servers. We were able to greatly increase our posture... more»

What needs improvement?

One of the things that I have been wanting is that we use the Privileged Threat Analytics (PTA) solution, and it is a complete standalone solution, but they will be integrating it into the vault and into the PVWA. So, we will have that... more»
Find out what your peers are saying about CyberArk, BeyondTrust, Cisco and others in Identity and Access Management (IAM).
288,321 professionals have used our research since 2012.
Real User
Information security engineer/ business owner
Jul 22 2018

What is most valuable?

I love the ability to customize the passwords: the forbidden characters, the length of the password, the number of capital, lowercase, and special characters. You can customize the password so that it tailor fits, for example, mainframes... more»

How has it helped my organization?

It increases the security posture across the entire enterprise because it's not only helping to secure those infrastructure accounts but it's also helping to secure our user accounts as well. It requires a lot more auditing and monitoring and... more»

What needs improvement?

We had an issue with the Copy feature. Of course when we do the password rotation we restrict users' ability to show a copy of their passwords for some cases, and in other cases they actually need that ability, but we would prefer them to... more»
Real User
Information Security Analyst III at a healthcare company with 10,001+ employees
Jul 23 2018

What is most valuable?

* I love the interface because it is colorful, easy to read, easy to see, and how easy it is to make policies. * I love how we can make a policy that affects everybody instantly, which is great. * I love the reporting features, so it is easy... more»

How has it helped my organization?

We are stripping administrative rights, and we have implemented a special ID to help folks that lose administrative rights. Maybe it broke something, so while we design policies and try to get them where they need to be, they will have this... more»

What needs improvement?

I want some of the things which are glitching out there for me to be fixed. I have heard that there is something in the works, that they will be putting a feature in the help desk where they will have a message board now. So, I could... more»
Real User
Senior server administrator at a financial services firm with 1,001-5,000 employees
Jul 22 2018

What is most valuable?

Number one would be the company, CyberArk, itself. The support, the ongoing assistance that is there, the ongoing ideas that are out there from champions, and from the other community forums that are out there, is just phenomenal.

How has it helped my organization?

Because we now have the ability to grant access to management utilities like DNS Manager, Sequel Studio, and MMC, in a secure fashion, without system admins being required to continually reenter various passwords that are stored who knows... more»

What needs improvement?

My list of enhancement requests on the portal is quite extensive. My goal as a system administrator is to enable people to do their jobs more easily, more efficiently. So, I'm looking for ways to enable people to leverage the security posture... more»
See 50 more reviews

Articles

User Assessments By Topic About CyberArk Privileged Access Security

Find out what your peers are saying about CyberArk, BeyondTrust, Cisco and others in Identity and Access Management (IAM).
288,321 professionals have used our research since 2012.

CyberArk Privileged Access Security Questions

CyberArk Privileged Access Security Projects By Members

CyberArk Privileged Access Security Consultants

What is CyberArk Privileged Access Security?

CyberArk is the trusted expert in privileged account security. Designed from the ground up with a focus on security, CyberArk has developed a powerful, modular technology platform that provides the industry's most comprehensive Privileged Account Security Solution.

Also known as
CyberArk Privileged Account Security, SSH Key Manager, Privileged Session Manager, Privileged Threat Analytics, Application Identity Manager, On-Demand Privileges Manager, Endpoint Privilege Manager
CyberArk Privileged Access Security customers

Rockwell Automation

BUYER'S GUIDE
Not sure which Identity and Access Management (IAM) solution is right for you?

Download our free Identity and Access Management (IAM) Report and find out what your peers are saying about CyberArk, BeyondTrust, Cisco, and more!

Sign Up with Email