CyberArk Privileged Account Security Reviews

4.2 out of 5 stars
 (32)
3ff6f1d1 706f 47bc ae09 1a9a7e36bae4 avatar
Real User
Consultant at a tech company with 1,001-5,000 employees

What is most valuable?

I think that one of the advantages of the CyberArk PAS suite is that it is modular. On top of the basics, you can implement modules to: * Manage (verify, change and reset) privileged passwords and SSH keys * Manage (isolate and monitor)... more»

How has it helped my organization?

I see companies that already have thought about their privileged accounts, while others have not? And so on. Thinking about these things helps customers to organize their data/privilege accounts in the CyberArk solution. It then helps the... more»

What needs improvement?

With every version, I can see that the product wins on functionality and user experience. On the latter though, I hear from customers that on the UI level, things could be better. CyberArk continuously asks for feedback on the product (e.g.,... more»
Jeffrey everling li?1422123501
Real User
Security Expert at SecurIT

What is most valuable?

As a security engineer, I mostly implement the Enterprise Password Vault Suite (Vault Server, Central Policy Manager, Password Vault Web Access) as this is the base upon which every additional component is built. I am using and implementing... more»

How has it helped my organization?

When implementing CyberArk, I see that a lot of security issues are addressed by the solution. For example, audit issues for privileged (non-personal) accounts, which have a sufficient amount of impact on the organization when being... more»

What needs improvement?

In every product, there is room for improvement. Within CyberArk, I would like to see more support for personal accounts. It can be done right now, but I can imagine changing a few aspects would make this easier and more foolproof. Next to... more»
Identity and access management %28iam%29 report from it central station 2018 01 27 thumbnail
Find out what your peers are saying about CyberArk, BeyondTrust, Oracle and others in Identity and Access Management (IAM).
253,234 professionals have used our research since 2012.
89343959 c66d 4e1d a2f5 d1c0d2b63f32 avatar
Real User
Cyber Security Consultant at a tech services company with 1,001-5,000 employees

What is most valuable?

* Client-less feature * Flexible architecture support * High level of customization for maximize utilization * User friendly and Flexibility of multiple choice * Adhere to Security Compliance

How has it helped my organization?

This tool is in Leader's quadrant in Gartner Quadrant report. Not just because it has more features than other but also it improves the way organization function. CyberArk can be used as many as you can think of. Such Granular ways of... more»

What needs improvement?

Since this tool major utilizing modules are PAM and PSM, hence AIM and OPM are least considered by client. Client is somehow reluctant to use these features. Yes, i do agree that these Modules are not that friendly but also CyberArk do not... more»
Anonymous avatar x80
Real User
Information Security Advisor at a insurance company with 1,001-5,000 employees

What is most valuable?

Account discovery, account rotation, and account management features make it a well-rounded application. Account discovery allows for auto-detection to search for new accounts in a specific environment such as an LDAP domain. This allows... more»

How has it helped my organization?

In the past, standard practice was to assign role-based rights to standard accounts. Moving away from this structure allows us to require that all heightened access accounts be “checked out” and only operate within a set window. CyberArk... more»

What needs improvement?

Like any software, improvements and upgrades are a necessity. As CyberArk is used by many Fortune 100 and Global 2000 companies, they offer custom solutions that need to be continuously improved as the company changes. I am looking forward to... more»
5a00a002 1a46 4d2e b8fb 5f0ea82ff632 avatar
Consultant
IT Security Consultant at a tech services company with 1,001-5,000 employees

What is most valuable?

Every feature of this product - Password Management, Session Management and so on has its own value depending on different use cases, but I like: * It's a clientless product and does not require any third-party product for any of its... more»

How has it helped my organization?

Due to regular growth of an organization infrastructure, managing passwords within the organization becomes extremely difficult. In larger organizations with a large user and infrastructure base, it can be very difficult to ensure that the... more»

What needs improvement?

CyberArk has evolved a lot in the last 16 years and has nearly all the features required for effective operation. The only area for improvement is using a native client while connecting to the target device instead of the current method of... more»
See 27 more reviews

Articles

User Assessments By Topic About CyberArk Privileged Account Security

Identity and access management %28iam%29 report from it central station 2018 01 27 thumbnail
Find out what your peers are saying about CyberArk, BeyondTrust, Oracle and others in Identity and Access Management (IAM).
253,234 professionals have used our research since 2012.

CyberArk Privileged Account Security Consultants


Request a call with one of our top consultants and experts in CyberArk Privileged Account Security. (Add me to this list.)
Birzu alexandru adrian li?1414334311
6,058

3
TOP 5POPULAR
ITSM & AntiFraud Consultant
After an experience of 7 years in the IT gaming field, the next period was filled with a lot of new informations and oportunities of developement. Working for a leading system integrator and provider of IT services, has many advantages as access to new technologies, and the ability to learn new... more>>
Reviewed McAfee Complete Endpoint Protection: If a client needs new components, ePO helps them to...
2be514f8 31cd 4ee4 b367 0ebf2d21b38d avatar
4
CyberArk Consultant
LinkTo ►► yuqaili@hotmail.com ◄◄ All invitations to connect on LinkedIn are welcome - LION - 7K+ Never I D K Mohammad is a seasoned IT Security Professional with 10+ years of hands on IT experience, He has actively worked on multiple IT Security & Infrastructure Projects for major... more>>
Reviewed CyberArk Privileged Account Security: Helped us to identify, store, protect, and monitor...
Baa7dec6 0e6a 4b0b 97f6 60fe478bc4fe avatar
137
Senior Consultant
KEY STRENGHS • Proficiency in business process mapping, requirement study, client interaction for finalizing requirements and defining functional specifications for application implementation • An effective communicator with relationship management and problem solving skills • Ability to... more>>
Reviewed CyberArk Privileged Account Security: The combination of CPM and PSM resolves a lot of use...
5889e19e 4af9 4472 bd37 19370fa30e57 avatar
6
Senior Consultant - Information Security Engineering
CISSP with 15+ years of enterprise-level experience in Information Security and Identity & Access Management, specializing in Directory Services, Provisioning, Single Sign-on technologies, RBAC, Access Governance, Privileged Identity Management (certified in CyberArk), File Integrity... more>>
Reviewed CyberArk Privileged Account Security: Can provide transparent connection to targeted...
5a00a002 1a46 4d2e b8fb 5f0ea82ff632 avatar
288
IT Security Consultant
Information Technology and IT Security professional with 7.6 year experience in planning, solution designing implementation/deployment of Privileged Identity management, Security Support and Operations, Process implementation and documentations, LDAP Directories, Privilege Single Sign-On (PSSO),... more>>
Reviewed CyberArk Privileged Account Security: It is clientless, and does not require any...
Anonymous avatar x100
51
CyberArk Consultant
Reviewed CyberArk Privileged Account Security: The password management component (CPM) is the most...

What is CyberArk Privileged Account Security?

CyberArk is the trusted expert in privileged account security. Designed from the ground up with a focus on security, CyberArk has developed a powerful, modular technology platform that provides the industry's most comprehensive Privileged Account Security Solution.

Also known as
SSH Key Manager, Privileged Session Manager, Privileged Threat Analytics, Application Identity Manager, On-Demand Privileges Manager, Endpoint Privilege Manager
CyberArk Privileged Account Security customers
Rockwell Automation
Vendor 7132 screenshot 1515259305
BUYER'S GUIDE
Not sure which Identity and Access Management (IAM) solution is right for you?

Download our free Identity and Access Management (IAM) Report and find out what your peers are saying about CyberArk, BeyondTrust, Oracle, and more!
Identity and access management %28iam%29 report from it central station 2018 01 27 thumbnail

Sign Up with Email