CyberArk Privileged Access Manager
What is CyberArk Privileged Access Manager?
The Core Privileged Access Security Solution unifies Enterprise Password Vault, Privileged Session Manager and Privileged Threat Analytics to protect an organization’s most critical assets.
Company Details
Need Assistance?
We're here to help you with understanding our reports and the data inside to help you make decisions.
Get AssistanceCyberArk Privileged Access Manager Ratings
Real user data aggregated to summarize the product performance and customer experience.
Download the entire Product Scorecard
to access more information on CyberArk Privileged Access Manager.
Product scores listed below represent current data. This may be different from data contained in reports and awards, which express data as of their publication date.
93 Likeliness to Recommend
1
Since last award
100 Plan to Renew
80 Satisfaction of Cost Relative to Value
1
Since last award
Emotional Footprint Overview
Product scores listed below represent current data. This may be different from data contained in reports and awards, which express data as of their publication date.
+92 Net Emotional Footprint
The emotional sentiment held by end users of the software based on their experience with the vendor. Responses are captured on an eight-point scale.
How much do users love CyberArk Privileged Access Manager?
Pros
- Reliable
- Trustworthy
- Altruistic
- Acts with Integrity
How to read the Emotional Footprint
The Net Emotional Footprint measures high-level user sentiment towards particular product offerings. It aggregates emotional response ratings for various dimensions of the vendor-client relationship and product effectiveness, creating a powerful indicator of overall user feeling toward the vendor and product.
While purchasing decisions shouldn't be based on emotion, it's valuable to know what kind of emotional response the vendor you're considering elicits from their users.
Footprint
Negative
Neutral
Positive
Feature Ratings
Multi-Factor Authentication (MFA)
Password Vaulting
Privileged Remote Access
Audit, Reporting & Compliance
Privileged Session Monitoring and Control
Privileged Account Discovery
Live Session Monitoring
Access Control
Privileged Behavioural Analytics
Privileged Password Management
Privileged Account Life Cycle Management
Vendor Capability Ratings
Breadth of Features
Quality of Features
Vendor Support
Availability and Quality of Training
Ease of Data Integration
Ease of IT Administration
Business Value Created
Product Strategy and Rate of Improvement
Usability and Intuitiveness
Ease of Customization
Ease of Implementation
CyberArk Privileged Access Manager Reviews
Anand K.
- Role: Public Sector
- Industry: Utilities
- Involvement: End User of Application
Submitted Dec 2022
Great product with great qualities.
Likeliness to Recommend
What differentiates CyberArk Privileged Access Manager from other similar products?
CyberArk provides attentive support that is always on the phone and prepared to assist us in any manner to address all of our problems. They provided us with support staff whenever we needed it. They also provided us with product information so we wouldn't run into any issues. It also helped us make better decisions that were motivated by the outcomes, which was quite beneficial.
What is your favorite aspect of this product?
CyberArk Single Connect, a powerful Privileged Access Management platform, secures connectivity for billions of devices and endpoints, hundreds of users, and identities. It establishes a layered defense security link to the secure system that is dependable, adaptable, and safe. Each user's responsibility is raised thanks to Krontech's access control and modification capabilities. However, if you need assistance, the personnel can provide it.
What do you dislike most about this product?
The program does not appear to be easily accessible, thus I would need to give end users scattered engine authorization in order to provide them access to the target server. In addition, the price is a little high compared to the competition. Setting up elevation policies may be difficult when reports are unavailable.
What recommendations would you give to someone considering this product?
This solution offers improved security and transparency systems in addition to the best level of defense for our assets and networking. CyberArkis another of the best and fastest solutions with the best access management software. It helps thwart any internet threats. Although we were a little apprehensive to use it on a wider scale, we ultimately made the decision to do so, and we were utterly happy with our choice.
Pros
- Helps Innovate
- Continually Improving Product
- Reliable
- Performance Enhancing
Hazel A.
- Role: Public Sector
- Industry: Utilities
- Involvement: End User of Application
Submitted Dec 2022
Amazing management software
Likeliness to Recommend
What differentiates CyberArk Privileged Access Manager from other similar products?
Cloud-based software that manages the network, accepts responsibility, enables for personalization, and ensures regular compliance. It protects connectivity solutions, enables speedier logoff after a predetermined optimal period. The multiplicity of its components can substantially help all enterprises in various fields.
What is your favorite aspect of this product?
All organizations throughout numerous industries benefit from its modules' versatility. Understanding of intricate telco infrastructures and a commitment to improving their product go hand in hand. The comprehensive control access coverage and built-in features of this solution, along with its cloud - based design, were the main considerations when investigating it for the PAM as a service model.
What do you dislike most about this product?
Sometimes it can be difficult to comprehend how to build a new grouping within the system, and it can take a few tries until you get it right. I also find some of the expiry restrictions and predefined intricacy annoying.
What recommendations would you give to someone considering this product?
It offers the quickest deployment times, unified strong passwords, and real-time accessing protection. One of the better options is two-factor authentication. It's useful to determine the volume needed for implementation in a business. Even so, such intricate and significant infrastructures are suited for it.
Pros
- Helps Innovate
- Continually Improving Product
- Reliable
- Performance Enhancing
Fatih K.
- Role: Information Technology
- Industry: Telecommunications
- Involvement: IT Development, Integration, and Administration
Submitted Jul 2022
Very good PAM product
Likeliness to Recommend
What differentiates CyberArk Privileged Access Manager from other similar products?
Redundancy availability
What is your favorite aspect of this product?
Safe system is easy to implement
What do you dislike most about this product?
Master password recovery
What recommendations would you give to someone considering this product?
keep your master password
Pros
- Helps Innovate
- Continually Improving Product
- Enables Productivity
- Trustworthy