CyberArk is a privileged account and access security suite issued by the company of the same name in Massachusetts . The Core Privileged Access Security Solution unifies Enterprise Password Vault, Privileged Session Manager and Privileged Threat Analytics to protect an organization’s most critical assets.
N/A
Keeper
Score 8.3 out of 10
N/A
Keeper's password security and management platform boasts millions of people and thousands of businesses as users, who manage, secure and enforce strong passwords across all employee logins, applications and sites. Employees can access Keeper natively on all mobile operating systems, desktops and browsers. Keeper enables businesses to auto-generate high-strength passwords, protect sensitive files in an encrypted digital vault, securely share records with teams and integrate with SSO, LDAP and…
$2
per month per user
Pricing
CyberArk Privileged Access Management
Keeper
Editions & Modules
No answers on this topic
Keeper Business Starter
$2.00
per month per user
Keeper Enterprise
Contact Keeper for pricing
Offerings
Pricing Offerings
CyberArk Privileged Access Management
Keeper
Free Trial
Yes
Yes
Free/Freemium Version
No
No
Premium Consulting/Integration Services
No
Yes
Entry-level Setup Fee
No setup fee
No setup fee
Additional Details
CyberArk offers a variety of Identity Security packages for different user types within an organization.
The system is great for enterprise or larger IT departments or teams where temporary or full access may be given using privileged IDs. Requirements for needing local admin access is also eliminated which can help with specific Windows workstation related tasks. It can be very useful when working with remote teams or contractors who may need temporary access to a system when required.
I can only think of scenarios where Keeper is well-suited, in my experience. I work in small business (i.e., sole proprietor, 1 employee) environments and Keeper is well-suited to my needs. I imagine it would also be well-suited to multi-user environments, but would require a great deal more management and organization in such environments.
I think CyberArk is a great product and there are many different modules to incorporate. There are many great feature sets available right out of the box and you feel safer just implementing some of the basics. The more features you implement the better the product performs. There are definitely some implementation hurdles, but typically they are too difficult to figure out.
It's just easy to use, plain and simple. It has the complexity and user-interface that gives you confidence in its build but the ease-of-use that keep things from getting too complicated. A huge plus when you have to onboard new members of the team or summer interns when you need them to step in and make orders on your behalf.
I've been an engineer and architect in the Identity space for many years and CyberArk is the #1 tool I've found to help me secure accounts and credentials. I've architected CyberArk and built the implementation from the ground up twice in previous roles and found it here upon my arrival at my current job. I wouldn't want to have to live without it as it helps me sleep at night
It is known as one of the safest products in the market. It has good support and is also available as on-premise. You can run it virtually on VMWare (and probably on other hypervisors as well). You can have a second instance on bare metal and that makes it a very safe system.
I have used the Apple cloud, but if you forget your password into that, once again, you’re at the mercy of calling customer service. With Keeper, you can use the thumbprint option to log on, and there’s any of your needed passwords. It’s fast and simple, and you don’t have to wait online to unlock the app you’ve locked yourself out of.
A positive impact is passing SOX audits when it comes to privileged account management. Making sure we are compliant with password expiration policies and complexities.
The spreadsheets and printed papers being passed around the office with passwords on them have gone! This is a huge security hole plugged.
Users actively use the software which says something - it is easy to use and intuitive. When software is not intuitive, it tends to not get used.
It gives IT control over who does what with passwords, and while difficult to quantify it is certainly a dramatically positive impact on the organization.