We just raised a $30M Series A: Read our story
2016-04-16T14:05:00Z

What do you like most about CyberArk PAS?

22

Hi Everyone,

What do you like most about CyberArk PAS?

Thanks for sharing your thoughts with the community!

ITCS user
Guest
4242 Answers

author avatar
Top 5LeaderboardReseller

Within the solution, I love the fact that everything is recorded. The configuration capabilities are great, too.

2021-03-11T09:18:30Z
author avatar
Top 5LeaderboardReseller

The technical support for this solution is very good. If I was to rate it on a scale of one to five, I would give it a five.

2021-02-19T09:15:00Z
author avatar
Top 5LeaderboardReseller

Their legacy of more than 20 years is very valuable. It brings a lot of stability to the product and a wide variety of integration with the ecosystem. Because of these factors, it has also been very successful in deployment. So, the legacy and integration with other technologies make the PAM platform very stable and strong.

In terms of features, most of the other vendors are still focusing just on the privileged access management or session recording, but CyberArk has incorporated artificial intelligence to make PAM a more proactive system. They have implemented threat analytics into this, and there is also a lot of focus on domain controller production, Windows Server protection, and stuff like that. They have also further advanced it with the security on the cloud and DevOps systems.

They have a bundle licensing model, which really helps. They don't have a complex licensing model. Even though in our market, people say CyberArk is expensive as compared to some of the other products, but in terms of overall value and as a bundling solution, it is an affordable and highly scalable product.

2021-02-16T19:01:41Z
author avatar
Top 5LeaderboardReseller

The most valuable feature is Special Monitoring.

2021-02-04T07:52:57Z
author avatar
Top 5LeaderboardConsultant

The technical support is good.

2020-12-08T05:35:26Z
author avatar
Top 5LeaderboardReal User

The risk of lost password and forbidden access to resources has been drastically reduced which increased the security level for the entire company,

2020-07-08T14:17:00Z
author avatar
Top 5LeaderboardReal User

CyberArk is a very stable product and it's a stable product because it has a simple design and a simple architecture that allows you to leverage the economies of scale across the base of your infrastructure that you already have implemented. It doesn't really introduce any new complex pieces of infrastructure that would make it that much more difficult to scale.

2019-12-15T09:11:00Z
author avatar
Top 5LeaderboardReal User

CyberArk has been easy for us to implement and the adoption has been good. We've been able to standardize a bunch of things. We've been able to standardize relatively easily with the use of the platforms and managing the policies.

2019-12-15T09:11:00Z
author avatar
Top 10LeaderboardReal User

When we started with RPA, there was a requirement that every credential and the bots themselves be protected through the PAM system. From the get-go, we've had CyberArk in the middle... We've got a pretty robust RPA implementation with our PAM platform. Users, bots, the credentials — everything is managed via our PAM solution.

2019-12-15T09:11:00Z
author avatar
Top 10LeaderboardReal User

Right off the bat, the most valuable feature is the DNA scan. It gives us the ability to scan our environment and find the accounts that we're going to need to take under control.

2019-12-15T09:11:00Z
author avatar
Consultant

For a while, there were individual IDs having privileged access. We wanted to restrict that. We implemented the solution so that it can be more of internal control. We can have session recordings happening and reduce our attacks.

2019-02-26T08:25:00Z
author avatar
Real User

There are no issues with scalability. Our clients are very happy to use the product.

2018-12-02T07:34:00Z
author avatar
Consultant

This solution is quite stable.

2018-11-25T07:41:00Z
author avatar
Reseller

I really like the PTA (Privileged Threat Analytics). I find this the best feature.

2018-11-06T13:08:00Z
author avatar
Consultant

The most valuable feature is that it always provides flexibility, password quality and one-time user check-in and check-out.

2018-10-29T15:46:00Z
author avatar
Consultant

The threat analytics is an important feature.

2018-10-21T07:40:00Z
author avatar
Real User

Technical support is very helpful whenever we have any questions.

2018-10-08T17:34:00Z
author avatar
Reseller

It helps our customers in their software requirement imports.

2018-10-02T19:05:00Z
author avatar
Consultant

The voice technology is very good.

2018-08-16T08:28:00Z
author avatar
Real User

Because we now have the ability to grant access to management utilities like DNS Manager, Sequel Studio, and MMC, in a secure fashion, without system admins being required to continually reenter various passwords that are stored who knows where, it has really made the system admin's job much easier. It has made the PSM's job much easier. It has made the auditor's job and the security team's job and the access manager's job significantly easier, because we're able to move much more quickly toward a role-based access management system, and that is really streamlining the whole onboarding/offboarding management process.

2018-07-19T07:00:00Z
author avatar
Real User

Provides improved security around having your credentials locked down and rotated regularly.

2018-07-19T07:00:00Z
author avatar
Consultant

The most important feature is managing the credentials and implementing those policies which rotate the credentials. Session Manager is also key in not letting the users have access to those credentials. Instead, CyberArk actually manages everything by itself.

2018-07-19T07:00:00Z
author avatar
Real User

I love the ability to customize the passwords: the forbidden characters, the length of the password, the number of capital, lowercase, and special characters. You can customize the password so that it tailor fits, for example, mainframes that can't have more than eight characters. You can say, "I want a random password that doesn't have these special characters, but it is exactly eight characters," so that it doesn't throw errors.

2018-07-19T07:00:00Z
author avatar
Consultant

The flexibility of integrating with other technologies is important because of a lot of applications - a lot of COTS products - are not supported when we are bringing the application IDs. The CyberArk platform provides a lot of opportunities to do customization.

2018-07-19T07:00:00Z
author avatar
Real User

CyberArk is not just an IT security or cybersecurity tool. It's also an administrator tool. I had a fair number of systems where the passwords were not fully managed by CyberArk yet, and they were expiring every 30 or 45 days. I was able to get management turned on for those accounts. From an administrator perspective, I didn't have to go back into those systems and manually change those passwords anymore. CyberArk... lightened the load on our administrative work.

2018-07-19T07:00:00Z
author avatar
Real User

It gives us the capability to rotate passwords.

2018-07-18T09:22:00Z
author avatar
Real User

The central password manager is the most valuable feature because the password is constantly changing. If an outsider threat came in and gained access to one of those passwords, they would not have access for long.

2018-07-18T09:22:00Z
author avatar
Real User

We are able to rotate privileged user passwords to eliminate fraudulent use.

2018-07-18T09:22:00Z
author avatar
Real User

It enables us to secure accounts and make sure they are compliant.

2018-07-18T09:22:00Z
author avatar
Real User

CyberArk has allowed us to get the credentials and passwords out of hard-coded property files.

2018-07-18T09:22:00Z
author avatar
Real User

It has helped us with our adoption with other teams, and it has also helped us to integrate it at the ground level.

2018-07-18T09:22:00Z
author avatar
Real User

It has helped from an auditing perspective identify who has access to privileged accounts.

2018-07-18T09:22:00Z
author avatar
Real User

It allows users to self-provision access to the accounts that they need.

2018-07-18T09:22:00Z
author avatar
Real User

We are able to rotate credentials and have privileged account access.

2018-07-18T09:22:00Z
author avatar
Real User

We are maintaining compliance in PCI, SOX and HIPPA, which is a big thing. Auditors really like it, and it has made us stay compliant.

2018-07-18T09:22:00Z
author avatar
Real User

We can make a policy that affects everybody instantly.

2018-07-18T09:22:00Z
author avatar
Real User

You can write different types of policies for custom business needs or any developer needs. If they need certain functions allocated, they can be customized easily.

2018-07-18T09:22:00Z
author avatar
Real User

The key aspects of privileged access management are being able rotate passwords, make sure someone is accountable, and tie it back to a user (when the system is being used).

2018-07-17T08:27:00Z
author avatar
Real User

It has the ability to scale out. We have scaled out quite a bit with our product and use of it to get to multiple locations and businesses, so it has the breadth to do that.

2018-07-17T08:27:00Z
author avatar
Real User

We know when passwords will be expiring so we can force users to change their passwords, as well as requiring specific password requirements for length, complexity, etc.

2018-07-17T08:27:00Z
author avatar
Real User

We are utilizing CyberArk to secure applications, credentials, and endpoints.

2018-07-17T08:27:00Z
author avatar
Top 20LeaderboardReal User

The Password Upload Utility tool makes it easier when setting up a Safe that contains multiple accounts and has cut down the amount of time that it takes to complete the task.

2016-04-16T14:05:00Z
Learn what your peers think about CyberArk Privileged Access Manager. Get advice and tips from experienced pros sharing their opinions. Updated: October 2021.
543,089 professionals have used our research since 2012.