2016-04-16T14:05:00Z

What do you like most about CyberArk Privileged Access Manager?

Miriam Tover - PeerSpot reviewer
  • 0
  • 51
PeerSpot user
45

45 Answers

reviewer0275214 - PeerSpot reviewer
MSP
Top 20
2023-09-13T11:29:00Z
Sep 13, 2023

CyberArk PAM can be easily automated.

Search for a product comparison
Korneliusz Lis - PeerSpot reviewer
User
Top 10
2023-08-22T08:21:00Z
Aug 22, 2023

I like the integrations for external applications.

PG
Real User
Top 20
2023-08-21T20:45:00Z
Aug 21, 2023

With PAM in place, we've experienced a significant reduction in potential security breaches.

reviewer988578 - PeerSpot reviewer
Consultant
Top 20
2023-08-21T20:32:00Z
Aug 21, 2023

The product has allowed us to improve both the management and access to privileged credentials, while also creating a full audit trail of all activities happening within isolated sessions of all tasks and activities taking place within the solution.

TD
User
Top 20
2023-08-21T13:22:00Z
Aug 21, 2023

I find value in notifications from CyberArk when passwords fail verification and have other issues.

reviewer907214 - PeerSpot reviewer
User
Top 20
2023-08-21T12:24:00Z
Aug 21, 2023

The ability to develop and deploy applications with no stored secrets is very valuable.

Learn what your peers think about CyberArk Privileged Access Manager. Get advice and tips from experienced pros sharing their opinions. Updated: March 2024.
765,386 professionals have used our research since 2012.
TF
Consultant
2023-08-21T07:35:00Z
Aug 21, 2023

The product is an important security measure against credential theft. It ensures session isolation and password rotation including pushing passwords to the endpoints.

reviewer990891 - PeerSpot reviewer
Consultant
Top 20
2023-08-19T18:19:00Z
Aug 19, 2023

I appreciate the ease of use for support analysts.

Jonathan Hawes - PeerSpot reviewer
User
Top 5
2023-08-18T19:40:00Z
Aug 18, 2023

The implementation of the PSM proxy has reduced the specific risk of "insider attacks" on our domain controllers and SLDAP servers by eliminating direct user login by an open secure connection on the user's behalf without ever revealing the privileged credentials.

Alex Lozikoff - PeerSpot reviewer
Real User
Top 10
2023-06-12T14:36:00Z
Jun 12, 2023

It is an extremely scalable solution.

BRUNO REYNAUD - PeerSpot reviewer
Real User
Top 5Leaderboard
2023-05-12T14:29:35Z
May 12, 2023

The most valuable feature of CyberArk Privileged Access Manager is privileged threat analytics.

ProbalThakurta - PeerSpot reviewer
Real User
Top 5Leaderboard
2023-03-24T06:27:20Z
Mar 24, 2023

The integrations are the most valuable aspect of CyberArk Privileged Access Manager. The software offers pre-built integrations, and our team can also create custom connectors. This flexibility allows us to integrate with systems that we previously didn't consider integrating with, making it a significant advantage for us.

Hrushikesh Karambelkar - PeerSpot reviewer
Reseller
Top 10
2023-02-17T19:24:00Z
Feb 17, 2023

CyberArk has the ability to change the credentials on every platform.

CF
Real User
Top 20
2022-12-01T19:57:28Z
Dec 1, 2022

The password management feature is valuable.

AI
Reseller
Top 5
2022-10-06T21:49:06Z
Oct 6, 2022

Performance-wise, it is excellent.

Furqan Ahmed - PeerSpot reviewer
Real User
Top 5Leaderboard
2022-09-16T18:45:11Z
Sep 16, 2022

The solution is stable.

KL
Real User
Top 20
2022-09-02T09:06:05Z
Sep 2, 2022

CyberArk Privileged Access Manager is stable.

KD
Real User
Top 20
2022-08-15T21:20:24Z
Aug 15, 2022

We like it for the ability to automatically change passwords. At least for my group, that's the best thing.

VA
Real User
Top 20
2022-07-13T11:28:24Z
Jul 13, 2022

The solution is scalable.

Jan Strnad - PeerSpot reviewer
Reseller
Top 10
2022-07-07T15:08:12Z
Jul 7, 2022

What I found most valuable in CyberArk Privileged Access Manager is the Session Manager as it allows you to split the connection between the administrator site and the target site. I also found the Password Manager valuable as it lets you rotate the passwords of privileged users.

ChaminiEllawala - PeerSpot reviewer
Real User
Top 10
2022-06-03T15:14:46Z
Jun 3, 2022

Creating policies and the password rotation feature have been valuable. We don't have to memorize our password for the ADM account.

RB
Real User
Top 10
2022-05-11T15:10:00Z
May 11, 2022

I found it valuable that CyberArk Privileged Access Manager can be integrated with PTA (privileged threat analytics), and this means that it will tell you if there's a risk to the logins and signs of risk and if risky behavior is observed. It's a good feature.

Another good feature is the CPM (central password manager) because it helps you rotate the passwords automatically without involving the admins. It can go and update the scheduled tasks and the services. At the same time, if there's an application where it cannot do all of these, CPM will trigger an automatic email to the application owners, telling them that they should go ahead and change the password. This allows you to manage the account password that CyberArk cannot manage, which helps mitigate the risk of old passwords, where the password gets compromised, and also allows you to manage the security of the domain.

DK
Real User
Top 20
2022-04-27T11:56:40Z
Apr 27, 2022

CyberArk Privileged Access Manager's main benefit is it provides secure access to our servers. There are features to capture the user activity, it provides video recording processing. If the users are logged in to the server, we can see what activities they are performing. It's a very nice tool for Privileged Access Management. They have plenty of useful services and the solution has fulfilled our needs.

Amandeep Singh - PeerSpot reviewer
Real User
Top 20
2022-04-06T11:02:00Z
Apr 6, 2022

It is one of the best solutions in the market. Ever since I started using this solution, there has not been any compromise when it comes to our lab.

Salif Bereh - PeerSpot reviewer
Consultant
2022-03-07T19:12:00Z
Mar 7, 2022

All the features of CyberArk are useful for me, but the biggest one is that CyberArk has logs for all the features. That is important when there is a problem. You know where to look and you have the information. In cyber security, the most important aspect is information.

MV
MSP
2022-01-17T13:50:00Z
Jan 17, 2022

The biggest feature is the security of the overall solution. It's very secure. The vaulting technology and the number of security layers involved in the vault, where privileged accounts are actually stored, is the heart of the solution.

IB
Real User
2022-01-12T12:29:00Z
Jan 12, 2022

The automatic change of the password and Privileged Session Manager (PSM) are the most valuable features. With Privileged Session Manager, you can control the password management in a centralized way. You can activate these features in a session; the session isolation and recording. You apply the full intermediation principle. So, you must pass through CyberArk PAM to get access to the target system. You don't need to know the password, and everything that you do is registered and auditable. In this case, no one gets to touch the password directly. Also, you can implement detection and response behavior in case of a breach.

AM
Real User
2022-01-10T13:53:00Z
Jan 10, 2022

The automatic password management is the most important feature. The second most important feature is the ability to enforce dual control on the release of those passwords. The combination of these two features is the most important thing for us because we can show that we're in control of who uses any non-personal account, and when they do so.

NM
Real User
2021-12-19T18:34:00Z
Dec 19, 2021

We also use CyberArk’s Secrets Manager. Because AWS is the biggest area for us, we have accounts in AWS that are being rotated by CyberArk. We also have a manual process for the most sensitive of our AWS accounts, like root accounts. We've used Secrets Manager on those and that has resulted in a significant risk reduction, as well.

KS
Real User
2021-12-16T18:49:00Z
Dec 16, 2021

It has a centralized page where you can manage everything. This makes work easier. You don't have to remember different module URLs or browser applications. It is very easy to get all the secure identities of other environments into a single page, which is very important for us as it helps a lot in terms of operations, e.g., reduces management time. This is a single page where you can manage all accounts and onboard them to the CyberArk. You can then secure and see passwords from everywhere. So, there is a single pane of glass where you can manage all the identities across environments as well as across different types of identities.

JP
Real User
2021-12-14T02:29:00Z
Dec 14, 2021

The automatic rotation of credentials is probably the most useful feature.

JA
Real User
2021-10-29T13:55:00Z
Oct 29, 2021

We've written over a hundred custom connectors ourselves that allow us to do all types of privileged session management for various applications. On top of that, the rest of the API-based central credential providers allow us to get away from credentials that may be hard-coded in the script or some application.

MK
Real User
2021-10-16T07:22:00Z
Oct 16, 2021

It improves security in our company. We have more than 10,000 accounts that we manage in CyberArk. We use these accounts for SQLs, Windows Server, and Unix. Therefore, keeping these passwords up-to-date in another solution or software would be impossible. Now, we have some sort of a platform to manage passwords, distribute the inflow, and manage IT teams as well as making regular changes to it according to the internal security policies in our bank.

HT
Real User
2021-03-11T17:17:41Z
Mar 11, 2021

This is a complete solution that can detect cyber attacks well.

LT
Reseller
2021-03-11T09:18:30Z
Mar 11, 2021

Within the solution, I love the fact that everything is recorded. The configuration capabilities are great, too.

JL
Reseller
2021-02-19T09:15:00Z
Feb 19, 2021

The technical support for this solution is very good. If I was to rate it on a scale of one to five, I would give it a five.

AT
Reseller
Top 10
2021-02-16T19:01:41Z
Feb 16, 2021

Their legacy of more than 20 years is very valuable. It brings a lot of stability to the product and a wide variety of integration with the ecosystem. Because of these factors, it has also been very successful in deployment. So, the legacy and integration with other technologies make the PAM platform very stable and strong.

In terms of features, most of the other vendors are still focusing just on the privileged access management or session recording, but CyberArk has incorporated artificial intelligence to make PAM a more proactive system. They have implemented threat analytics into this, and there is also a lot of focus on domain controller production, Windows Server protection, and stuff like that. They have also further advanced it with the security on the cloud and DevOps systems.

They have a bundle licensing model, which really helps. They don't have a complex licensing model. Even though in our market, people say CyberArk is expensive as compared to some of the other products, but in terms of overall value and as a bundling solution, it is an affordable and highly scalable product.

RN
Reseller
2021-02-04T07:52:57Z
Feb 4, 2021

The most valuable feature is Special Monitoring.

KN
Real User
2020-12-08T05:35:26Z
Dec 8, 2020

The technical support is good.

YP
Real User
2020-07-08T14:17:00Z
Jul 8, 2020

The risk of lost password and forbidden access to resources has been drastically reduced which increased the security level for the entire company,

DP
Real User
2019-12-15T09:11:00Z
Dec 15, 2019

Right off the bat, the most valuable feature is the DNA scan. It gives us the ability to scan our environment and find the accounts that we're going to need to take under control.

KC
Real User
2019-12-15T09:11:00Z
Dec 15, 2019

When we started with RPA, there was a requirement that every credential and the bots themselves be protected through the PAM system. From the get-go, we've had CyberArk in the middle... We've got a pretty robust RPA implementation with our PAM platform. Users, bots, the credentials — everything is managed via our PAM solution.

BA
Real User
2019-12-15T09:11:00Z
Dec 15, 2019

CyberArk has been easy for us to implement and the adoption has been good. We've been able to standardize a bunch of things. We've been able to standardize relatively easily with the use of the platforms and managing the policies.

GO
Real User
2019-12-15T09:11:00Z
Dec 15, 2019

CyberArk is a very stable product and it's a stable product because it has a simple design and a simple architecture that allows you to leverage the economies of scale across the base of your infrastructure that you already have implemented. It doesn't really introduce any new complex pieces of infrastructure that would make it that much more difficult to scale.

RD
Real User
Top 20
2016-04-16T14:05:00Z
Apr 16, 2016

The Password Upload Utility tool makes it easier when setting up a Safe that contains multiple accounts and has cut down the amount of time that it takes to complete the task.

CyberArk Privileged Access Manager is a next-generation solution that allows users to secure both their applications and their confidential corporate information. It is extremely flexible and can be implemented across a variety of environments. This program runs with equal efficiency in a fully cloud-based, hybrid, or on-premises environment. Users can now protect their critical infrastructure and access it in any way that best meets their needs. CyberArk Privileged Access Manager possesses...
Download CyberArk Privileged Access Manager ReportRead more