2016-04-16T14:05:00Z

What is your primary use case for CyberArk Privileged Access Manager?

2

How do you or your organization use this solution?

Please share with us so that your peers can learn from your experiences.

Thank you!

ITCS user
Guest
99 Answers

author avatar
Top 5LeaderboardReseller

We sell this solution to our partners. We are not currently using the application for our own use — we're consultants.

2021-03-11T09:18:30Z
author avatar
Top 5LeaderboardReseller

Our primary use case for this solution is business and client management. Our clients are mostly from the banking sector.

2021-02-19T09:15:00Z
author avatar
Top 5LeaderboardReseller

We are a system integrator. We are selling its latest version to customers who are new to PAM or are coming from an older PAM.

2021-02-16T19:01:41Z
author avatar
Top 5LeaderboardReseller

I am a consultant. We are in the process of using this in our clients' companies.

2021-02-04T07:52:57Z
author avatar
Top 5LeaderboardConsultant

I primarily use the solution to record any actions taken on specific important targets. It allows management to look at actions and play them back to see what was done within the environment.

2020-12-08T05:35:26Z
author avatar
Top 5LeaderboardReal User

Our primary use case is to control the technical accounts used in our DevOps environnment. The primary goal was to automate to the maximum all privileged accounts used by applications. It was a big issue because al dev guys were always using the same account/password couple. CyberArk is doing this for them transparently. Through time the scope was extended to all interactive users with the target to avoid them knowing the password. The automated password change was implemented to 99% of all accounts inside the company.

2020-07-08T14:17:00Z
author avatar
Top 20Real User

So far, CyberArk has done everything that we've needed it to. We are growing and moving into the cloud. We have a pretty complex environment. Everything that we've needed it to do in terms of managing our privileged accounts, it has done.

2019-12-15T09:11:00Z
author avatar
Top 20Consultant

Managing passwords to infrastructure and applications, keeping those accounts “safe,” and being able to audit their use.

2019-01-12T11:39:00Z
author avatar
Top 10LeaderboardReal User

We use this solution for privileged systems access with a high emphasis on security. End users are required to go through a process of being vetted in our NERC environment in order to use the solution. This product has been used by my company for about 5 years now.

2016-04-16T14:05:00Z
Learn what your peers think about CyberArk Privileged Access Manager. Get advice and tips from experienced pros sharing their opinions. Updated: September 2021.
534,226 professionals have used our research since 2012.