What is CyberArk Access Manager?
When everything is transforming digitally – from your industry to the threats you face – you need identity Access Management (IAM) solutions designed to outpace any security risks that challenge your ability to compete.
Company Details
Need Assistance?
We're here to help you with understanding our reports and the data inside to help you make decisions.
Get AssistanceCyberArk Access Manager Ratings
Real user data aggregated to summarize the product performance and customer experience.
Download the entire Product Scorecard
to access more information on CyberArk Access Manager.
Product scores listed below represent current data. This may be different from data contained in reports and awards, which express data as of their publication date.
85 Likeliness to Recommend
1
Since last award
100 Plan to Renew
71 Satisfaction of Cost Relative to Value
3
Since last award
Emotional Footprint Overview
Product scores listed below represent current data. This may be different from data contained in reports and awards, which express data as of their publication date.
+85 Net Emotional Footprint
The emotional sentiment held by end users of the software based on their experience with the vendor. Responses are captured on an eight-point scale.
How much do users love CyberArk Access Manager?
Pros
- Efficient Service
- Includes Product Enhancements
- Reliable
- Saves Time
How to read the Emotional Footprint
The Net Emotional Footprint measures high-level user sentiment towards particular product offerings. It aggregates emotional response ratings for various dimensions of the vendor-client relationship and product effectiveness, creating a powerful indicator of overall user feeling toward the vendor and product.
While purchasing decisions shouldn't be based on emotion, it's valuable to know what kind of emotional response the vendor you're considering elicits from their users.
Footprint
Negative
Neutral
Positive
Feature Ratings
Reporting
Multi-Factor Authentication (MFA)
Identity Governance
Password Management
Privileged Access Management
Activity Monitoring Alerts
Access Request Management
Advanced Provisioning
Provisioning Deprovisioning
Web Cloud Single Sign on (SSO)
Mobility Support
Vendor Capability Ratings
Ease of Implementation
Ease of IT Administration
Breadth of Features
Availability and Quality of Training
Quality of Features
Vendor Support
Ease of Data Integration
Business Value Created
Ease of Customization
Usability and Intuitiveness
Product Strategy and Rate of Improvement
CyberArk Access Manager Reviews
Bhavik M.
- Role: Information Technology
- Industry: Education
- Involvement: IT Leader or Manager
Submitted Dec 2024
Powerful privileged access management
Likeliness to Recommend
What differentiates CyberArk Access Manager from other similar products?
CyberArk Access Manager stands out for its strong control over privileged access, secure system connections, and detailed monitoring.
What is your favorite aspect of this product?
My favorite aspect of CyberArk Access Manager is its robust session monitoring and real-time access visibility for enhanced security.
What do you dislike most about this product?
Nothing to dislike about the product
What recommendations would you give to someone considering this product?
I recommend evaluating your privileged access management needs and ensuring CyberArk's security features align with your goals and systems.
Pros
- Helps Innovate
- Performance Enhancing
- Trustworthy
- Efficient Service
Javeed Akthar S.
- Role: Information Technology
- Industry: Technology
- Involvement: IT Leader or Manager
Submitted Apr 2024
Great Passowrd management good market standerds
Likeliness to Recommend
What differentiates CyberArk Access Manager from other similar products?
Uniques style of password management
What is your favorite aspect of this product?
Password manager
What do you dislike most about this product?
Cost is bit more expensive
What recommendations would you give to someone considering this product?
Be good at data
Pros
- Effective Service
- Transparent
- Reliable
- Efficient Service
Cons
- Commodity Features
- Less Caring
- Less Friendly Negotiation
Vaibhav P.
- Role: C-Level
- Industry: Consulting
- Involvement: Business Leader or Manager
Submitted Feb 2024
Strong security, usability could improve.
Likeliness to Recommend
What differentiates CyberArk Access Manager from other similar products?
CyberArk Application Identity Manager stands out with its unique focus on securing application access. It offers granular controls, seamless integration, scalability, and comprehensive auditing. This tailored approach ensures robust privileged access management for applications, making it a standout solution in the market.
What is your favorite aspect of this product?
My favorite aspect of CyberArk Application Identity Manager is its granular access controls tailored specifically for applications. This feature ensures that organizations can enforce least privilege policies effectively, reducing the risk of unauthorized access and potential security breaches. By providing such fine-grained control over application access, CyberArk Application Identity Manager helps organizations enhance their overall security posture and mitigate the risk of cyber threats.
What do you dislike most about this product?
One aspect of CyberArk Application Identity Manager that I find challenging is its learning curve. The initial setup and configuration process can be complex, requiring a good understanding of the product's capabilities and how it integrates with existing systems. Additionally, some users may find the interface somewhat overwhelming at first, which could hinder adoption and usability, especially for less experienced users. However, with proper training and support, these challenges can be overcome, allowing organizations to fully leverage the security benefits offered by CyberArk Application Identity Manager.
What recommendations would you give to someone considering this product?
When considering CyberArk Application Identity Manager, it's crucial to thoroughly assess your organization's needs for privileged access management (PAM) in the context of applications. Plan your implementation carefully, including integration with existing systems and user training. Starting with a pilot deployment can help evaluate its performance before full-scale implementation. Take advantage of training resources and support from CyberArk to address any challenges effectively. Stay informed about updates to maximize the benefits of the product and ensure ongoing security.
Pros
- Acts with Integrity
- Reliable
- Performance Enhancing
- Enables Productivity