2016-04-16T14:05:00Z

What do you like most about CyberArk PAS?


Hi Everyone,

What do you like most about CyberArk PAS?

Thanks for sharing your thoughts with the community!

Guest
3636 Answers

author avatar
Top 10LeaderboardReal User

Right off the bat, the most valuable feature is the DNA scan. It gives us the ability to scan our environment and find the accounts that we're going to need to take under control.

2019-12-15T09:11:00Z
author avatar
Top 10LeaderboardReal User

When we started with RPA, there was a requirement that every credential and the bots themselves be protected through the PAM system. From the get-go, we've had CyberArk in the middle... We've got a pretty robust RPA implementation with our PAM platform. Users, bots, the credentials — everything is managed via our PAM solution.

2019-12-15T09:11:00Z
author avatar
Top 5LeaderboardReal User

CyberArk has been easy for us to implement and the adoption has been good. We've been able to standardize a bunch of things. We've been able to standardize relatively easily with the use of the platforms and managing the policies.

2019-12-15T09:11:00Z
author avatar
Top 5LeaderboardReal User

CyberArk is a very stable product and it's a stable product because it has a simple design and a simple architecture that allows you to leverage the economies of scale across the base of your infrastructure that you already have implemented. It doesn't really introduce any new complex pieces of infrastructure that would make it that much more difficult to scale.

2019-12-15T09:11:00Z
author avatar
Consultant

For a while, there were individual IDs having privileged access. We wanted to restrict that. We implemented the solution so that it can be more of internal control. We can have session recordings happening and reduce our attacks.

2019-02-26T08:25:00Z
author avatar
Consultant

There are no issues with scalability. Our clients are very happy to use the product.

2018-12-02T07:34:00Z
author avatar
Consultant

This solution is quite stable.

2018-11-25T07:41:00Z
author avatar
Reseller

I really like the PTA (Privileged Threat Analytics). I find this the best feature.

2018-11-06T13:08:00Z
author avatar
Consultant

The most valuable feature is that it always provides flexibility, password quality and one-time user check-in and check-out.

2018-10-29T15:46:00Z
author avatar
Consultant

The threat analytics is an important feature.

2018-10-21T07:40:00Z
author avatar
Real User

Technical support is very helpful whenever we have any questions.

2018-10-08T17:34:00Z
author avatar
Reseller

It helps our customers in their software requirement imports.

2018-10-02T19:05:00Z
author avatar
Consultant

The voice technology is very good.

2018-08-16T08:28:00Z
author avatar
Consultant

The flexibility of integrating with other technologies is important because of a lot of applications - a lot of COTS products - are not supported when we are bringing the application IDs. The CyberArk platform provides a lot of opportunities to do customization.

2018-07-19T07:00:00Z
author avatar
Real User

Provides improved security around having your credentials locked down and rotated regularly.

2018-07-19T07:00:00Z
author avatar
Real User

Because we now have the ability to grant access to management utilities like DNS Manager, Sequel Studio, and MMC, in a secure fashion, without system admins being required to continually reenter various passwords that are stored who knows where, it has really made the system admin's job much easier. It has made the PSM's job much easier. It has made the auditor's job and the security team's job and the access manager's job significantly easier, because we're able to move much more quickly toward a role-based access management system, and that is really streamlining the whole onboarding/offboarding management process.

2018-07-19T07:00:00Z
author avatar
Consultant

The most important feature is managing the credentials and implementing those policies which rotate the credentials. Session Manager is also key in not letting the users have access to those credentials. Instead, CyberArk actually manages everything by itself.

2018-07-19T07:00:00Z
author avatar
Real User

I love the ability to customize the passwords: the forbidden characters, the length of the password, the number of capital, lowercase, and special characters. You can customize the password so that it tailor fits, for example, mainframes that can't have more than eight characters. You can say, "I want a random password that doesn't have these special characters, but it is exactly eight characters," so that it doesn't throw errors.

2018-07-19T07:00:00Z
author avatar
Real User

CyberArk is not just an IT security or cybersecurity tool. It's also an administrator tool. I had a fair number of systems where the passwords were not fully managed by CyberArk yet, and they were expiring every 30 or 45 days. I was able to get management turned on for those accounts. From an administrator perspective, I didn't have to go back into those systems and manually change those passwords anymore. CyberArk... lightened the load on our administrative work.

2018-07-19T07:00:00Z
author avatar
Real User

It has helped us with our adoption with other teams, and it has also helped us to integrate it at the ground level.

2018-07-18T09:22:00Z
author avatar
Real User

The central password manager is the most valuable feature because the password is constantly changing. If an outsider threat came in and gained access to one of those passwords, they would not have access for long.

2018-07-18T09:22:00Z
author avatar
Real User

We are able to rotate privileged user passwords to eliminate fraudulent use.

2018-07-18T09:22:00Z
author avatar
Top 20Real User

It enables us to secure accounts and make sure they are compliant.

2018-07-18T09:22:00Z
author avatar
Real User

CyberArk has allowed us to get the credentials and passwords out of hard-coded property files.

2018-07-18T09:22:00Z
author avatar
Real User

It has helped from an auditing perspective identify who has access to privileged accounts.

2018-07-18T09:22:00Z
author avatar
Real User

It gives us the capability to rotate passwords.

2018-07-18T09:22:00Z
author avatar
Real User

It allows users to self-provision access to the accounts that they need.

2018-07-18T09:22:00Z
author avatar
Real User

We are able to rotate credentials and have privileged account access.

2018-07-18T09:22:00Z
author avatar
Top 20Real User

We are maintaining compliance in PCI, SOX and HIPPA, which is a big thing. Auditors really like it, and it has made us stay compliant.

2018-07-18T09:22:00Z
author avatar
Real User

We can make a policy that affects everybody instantly.

2018-07-18T09:22:00Z
author avatar
Real User

You can write different types of policies for custom business needs or any developer needs. If they need certain functions allocated, they can be customized easily.

2018-07-18T09:22:00Z
author avatar
Real User

The key aspects of privileged access management are being able rotate passwords, make sure someone is accountable, and tie it back to a user (when the system is being used).

2018-07-17T08:27:00Z
author avatar
Real User

It has the ability to scale out. We have scaled out quite a bit with our product and use of it to get to multiple locations and businesses, so it has the breadth to do that.

2018-07-17T08:27:00Z
author avatar
Real User

We know when passwords will be expiring so we can force users to change their passwords, as well as requiring specific password requirements for length, complexity, etc.

2018-07-17T08:27:00Z
author avatar
Real User

We are utilizing CyberArk to secure applications, credentials, and endpoints.

2018-07-17T08:27:00Z
author avatar
Top 5LeaderboardReal User

The Password Upload Utility tool makes it easier when setting up a Safe that contains multiple accounts and has cut down the amount of time that it takes to complete the task.

2016-04-16T14:05:00Z
Learn what your peers think about CyberArk PAS. Get advice and tips from experienced pros sharing their opinions. Updated: April 2020.
442,764 professionals have used our research since 2012.