CyberArk Privileged Account Security Reviews

4.3 out of 5 stars
 (33)
Filter by:Reset all filters
industry
Filter Unavailable
Company Size
Filter Unavailable
Job Level
Filter Unavailable
rating
Filter Unavailable
3ff6f1d1 706f 47bc ae09 1a9a7e36bae4 avatar
Real User
Consultant at a tech company with 1,001-5,000 employees
Sep 25 2016

What is most valuable?

I think that one of the advantages of the CyberArk PAS suite is that it is modular. On top of the basics, you can implement modules to: * Manage (verify, change and reset) privileged passwords and SSH keys * Manage (isolate and monitor)... more»

How has it helped my organization?

I see companies that already have thought about their privileged accounts, while others have not? And so on. Thinking about these things helps customers to organize their data/privilege accounts in the CyberArk solution. It then helps the... more»

What needs improvement?

With every version, I can see that the product wins on functionality and user experience. On the latter though, I hear from customers that on the UI level, things could be better. CyberArk continuously asks for feedback on the product (e.g.,... more»
Jeffrey everling li?1422123501
Real User
Security Expert at SecurIT
Sep 13 2016

What is most valuable?

As a security engineer, I mostly implement the Enterprise Password Vault Suite (Vault Server, Central Policy Manager, Password Vault Web Access) as this is the base upon which every additional component is built. I am using and implementing... more»

How has it helped my organization?

When implementing CyberArk, I see that a lot of security issues are addressed by the solution. For example, audit issues for privileged (non-personal) accounts, which have a sufficient amount of impact on the organization when being... more»

What needs improvement?

In every product, there is room for improvement. Within CyberArk, I would like to see more support for personal accounts. It can be done right now, but I can imagine changing a few aspects would make this easier and more foolproof. Next to... more»
Identity and access management %28iam%29 report from it central station 2018 05 05 thumbnail
Find out what your peers are saying about CyberArk, BeyondTrust, Cisco and others in Identity and Access Management (IAM).
270,647 professionals have used our research since 2012.
89343959 c66d 4e1d a2f5 d1c0d2b63f32 avatar
Real User
Cyber Security Consultant at a tech services company with 1,001-5,000 employees
Feb 14 2017

What is most valuable?

* Client-less feature * Flexible architecture support * High level of customization for maximize utilization * User friendly and Flexibility of multiple choice * Adhere to Security Compliance

How has it helped my organization?

This tool is in Leader's quadrant in Gartner Quadrant report. Not just because it has more features than other but also it improves the way organization function. CyberArk can be used as many as you can think of. Such Granular ways of... more»

What needs improvement?

Since this tool major utilizing modules are PAM and PSM, hence AIM and OPM are least considered by client. Client is somehow reluctant to use these features. Yes, i do agree that these Modules are not that friendly but also CyberArk do not... more»
Anonymous avatar x80
Real User
Information Security Advisor at a insurance company with 1,001-5,000 employees
Sep 25 2016

What is most valuable?

Account discovery, account rotation, and account management features make it a well-rounded application. Account discovery allows for auto-detection to search for new accounts in a specific environment such as an LDAP domain. This allows... more»

How has it helped my organization?

In the past, standard practice was to assign role-based rights to standard accounts. Moving away from this structure allows us to require that all heightened access accounts be “checked out” and only operate within a set window. CyberArk... more»

What needs improvement?

Like any software, improvements and upgrades are a necessity. As CyberArk is used by many Fortune 100 and Global 2000 companies, they offer custom solutions that need to be continuously improved as the company changes. I am looking forward to... more»
5a00a002 1a46 4d2e b8fb 5f0ea82ff632 avatar
Consultant
IT Security Consultant at a tech services company with 1,001-5,000 employees
Sep 11 2016

What is most valuable?

Every feature of this product - Password Management, Session Management and so on has its own value depending on different use cases, but I like: * It's a clientless product and does not require any third-party product for any of its... more»

How has it helped my organization?

Due to regular growth of an organization infrastructure, managing passwords within the organization becomes extremely difficult. In larger organizations with a large user and infrastructure base, it can be very difficult to ensure that the... more»

What needs improvement?

CyberArk has evolved a lot in the last 16 years and has nearly all the features required for effective operation. The only area for improvement is using a native client while connecting to the target device instead of the current method of... more»
See 28 more reviews

Articles

User Assessments By Topic About CyberArk Privileged Account Security

Identity and access management %28iam%29 report from it central station 2018 05 05 thumbnail
Find out what your peers are saying about CyberArk, BeyondTrust, Cisco and others in Identity and Access Management (IAM).
270,647 professionals have used our research since 2012.

CyberArk Privileged Account Security Questions

CyberArk Privileged Account Security Projects By Members

CyberArk Privileged Account Security Consultants

What is CyberArk Privileged Account Security?

CyberArk is the trusted expert in privileged account security. Designed from the ground up with a focus on security, CyberArk has developed a powerful, modular technology platform that provides the industry's most comprehensive Privileged Account Security Solution.

Also known as
SSH Key Manager, Privileged Session Manager, Privileged Threat Analytics, Application Identity Manager, On-Demand Privileges Manager, Endpoint Privilege Manager
CyberArk Privileged Account Security customers
Rockwell Automation
Vendor 7132 screenshot 1526145151
BUYER'S GUIDE
Not sure which Identity and Access Management (IAM) solution is right for you?

Download our free Identity and Access Management (IAM) Report and find out what your peers are saying about CyberArk, BeyondTrust, Cisco, and more!
Identity and access management %28iam%29 report from it central station 2018 05 05 thumbnail

Sign Up with Email