TrustRadius
CyberArk is a privileged account and access security suite issued by the company of the same name in Massachusetts . The Core Privileged Access Security Solution unifies Enterprise Password Vault, Privileged Session Manager and Privileged Threat Analytics to protect an organization’s most critical assets.https://media.trustradius.com/product-logos/zs/OP/NH2FKXPEET8N.jpegMake your privileged data safe using CyberArkWe are using CyberArk to manage the privilege accounts in our organization. It is being used by a specific department that deals with critical data sources.,Identify and reduce the number of privileged accounts Eliminate shared/service accounts having non-expiring passwords Automatically changing privileged account passwords Automate password verification and reconciliation Frequently identify, change and verify hardcoded passwords Connect Target Systems directly without displaying passwords to users,The initial product cost is a little on the higher side, which might turn off small & medium enterprises. As it talks about security, it has a lot of hardware/software requirements for the initial setup, which might make the rollout timeline a little lengthy. Product should be easy to customize based on different industry's needs.,9,Decreased the probability of an external cyber attack to privileged accounts.. Management can control privileged account life cycle management more effectively Recording privileged sessions allows our organization to play back exactly the point of a breach or malicious behavior Automated system to manage and verify passwords, as privileged accounts are constantly created and deleted Automatic PWD change functionality will substantially decrease probability of PWD theft or misuse.,Centrify Endpoint Services,Imprivata OneSign, Oracle Service CloudCyber Ark - Quality PAMCyber Ark is being used across the entire enterprise. It is used for administration credential protection and application integration to protect secrets and service accounts. This solution is solving the business problem of ensuring our most sensitive access is protected and we have a strong audit tool for when credentials are used.,Credential Vaulting Application Integration Auditing,There needs to be a better strategy and integration on the application development secret protection High availability needs to be a constant focus,9,ROI is difficult when you consider the cost of data protection. We feel the investment has been very valuable and have a better security posture. The tool has also been helpful in educating the important of PAM.,,Duo Security, Qualysguard, Check Point 2200 AppliancesCyberARK in real world useIt is used to check out highly privileged accounts with a randomized password. Being scaled to entire organization. It solves the problem of highly privileged accounts with a static password. If one of the accounts is compromised the password has an expiration and minimizes the amount of damage that can be done by limiting the time the account is active.,Randomizes passwords Scales to enteprise level Keeps admins in check,License model The vault is difficult to patch, because it cannot have your normal patching agents on it On going costs are high,8,Positive - environment is much more secure Negative - need highly trained engineers to maintain it Negative is ongoing costs,Lieberman Enterprise Random Password Manager,Lieberman Enterprise Random Password Manager, Forefront Identity Manager, VMware ESXiMaking passwords more secure than Password123CyberArk is a great means to access and securely store passwords for a remote support team or third-party vendors. The version control and access controls help with analyzing who is accessing what and when, while having strong delegation controls. This is particularly helpful with providing access to other users or administrators to systems that may require temporary access or to a vendor to access when troubleshooting.,The user interface is intuitive and easy to use. The local server/workstation account management is great with the ability to remove local admin accounts but still leverage admin privileges. Prevents unauthorized access and meets security requirements and allowing for robust and detailed reporting and audit logs.,The copy button in a web-browser requires an add-on to the browser. The feature should be included without the add-on. Forced purchase of re-branded dell servers as account vaults is terrible. Reports are ok but requires some expertise to export data into a better reporting DB.,8,The costs to operate are high. Has been very easy to share passwords through a secure means. Valuable when compared to compromised credentials and the risks associated with PR or data breach. There are solutions out there that are more cost effective, but the additional features don't match that of CyberArk.,manage engine and pleasant solutions
Unspecified
CyberArk Privileged Account Security
19 Ratings
Score 8.5 out of 101
<a href='https://www.trustradius.com/static/about-trustradius-scoring' target='_blank' rel='nofollow'>trScore algorithm: Learn more.</a>TRScore

CyberArk Privileged Account Security Reviews

CyberArk Privileged Account Security
19 Ratings
<a href='https://www.trustradius.com/static/about-trustradius-scoring' target='_blank' rel='nofollow'>trScore algorithm: Learn more.</a>
Score 8.5 out of 101
Show Filters 
Hide Filters 
Filter 19 vetted CyberArk Privileged Account Security reviews and ratings
Clear all filters
Overall Rating
Reviewer's Company Size
Last Updated
By Topic
Industry
Department
Experience
Job Type
Role

Reviews (1-4 of 4)

  Vendors can't alter or remove reviews. Here's why.
Sujeet Swain profile photo
August 21, 2018

CyberArk Privileged Account Security Review: "Make your privileged data safe using CyberArk"

Score 9 out of 10
Vetted Review
Verified User
Review Source
We are using CyberArk to manage the privilege accounts in our organization. It is being used by a specific department that deals with critical data sources.
  • Identify and reduce the number of privileged accounts
  • Eliminate shared/service accounts having non-expiring passwords
  • Automatically changing privileged account passwords
  • Automate password verification and reconciliation
  • Frequently identify, change and verify hardcoded passwords
  • Connect Target Systems directly without displaying passwords to users
  • The initial product cost is a little on the higher side, which might turn off small & medium enterprises.
  • As it talks about security, it has a lot of hardware/software requirements for the initial setup, which might make the rollout timeline a little lengthy.
  • Product should be easy to customize based on different industry's needs.
It should be used by organizations who are dealing with customer- or finance-related data, where there is a lot of focus on managing regulatory compliance. Organizations who outsource their IT/Marketing activities to vendors must use CyberArk to control any potential data leakage or theft, which can reflect a very negative brand image.
Read Sujeet Swain's full review
No photo available
March 01, 2018

CyberArk Privileged Account Security Review: "Cyber Ark - Quality PAM"

Score 9 out of 10
Vetted Review
Verified User
Review Source
Cyber Ark is being used across the entire enterprise. It is used for administration credential protection and application integration to protect secrets and service accounts. This solution is solving the business problem of ensuring our most sensitive access is protected and we have a strong audit tool for when credentials are used.
  • Credential Vaulting
  • Application Integration
  • Auditing
  • There needs to be a better strategy and integration on the application development secret protection
  • High availability needs to be a constant focus
Cyber Ark is well suited for protecting all privileged accounts and auditing the usage of those accounts. It is an integral part of protecting sensitive credentials.
Read this authenticated review
No photo available
January 23, 2018

CyberArk Privileged Account Security Review: "CyberARK in real world use"

Score 8 out of 10
Vetted Review
Verified User
Review Source
It is used to check out highly privileged accounts with a randomized password. Being scaled to entire organization. It solves the problem of highly privileged accounts with a static password. If one of the accounts is compromised the password has an expiration and minimizes the amount of damage that can be done by limiting the time the account is active.
  • Randomizes passwords
  • Scales to enteprise level
  • Keeps admins in check
  • License model
  • The vault is difficult to patch, because it cannot have your normal patching agents on it
  • On going costs are high
It works well when an organization needs to keep track and randomize admin accounts. Also, it works better than LAPS for local workstation admin account management. It will allow for more than just one account. The auditing is robust vs. LAPS. Not a good solution for a small business. Too big of a tool for that scenario.
Read this authenticated review
Craig Lockley profile photo
January 16, 2018

CyberArk Privileged Account Security Review: "Making passwords more secure than Password123"

Score 8 out of 10
Vetted Review
Verified User
Review Source
CyberArk is a great means to access and securely store passwords for a remote support team or third-party vendors. The version control and access controls help with analyzing who is accessing what and when, while having strong delegation controls. This is particularly helpful with providing access to other users or administrators to systems that may require temporary access or to a vendor to access when troubleshooting.
  • The user interface is intuitive and easy to use.
  • The local server/workstation account management is great with the ability to remove local admin accounts but still leverage admin privileges.
  • Prevents unauthorized access and meets security requirements and allowing for robust and detailed reporting and audit logs.
  • The copy button in a web-browser requires an add-on to the browser. The feature should be included without the add-on.
  • Forced purchase of re-branded dell servers as account vaults is terrible.
  • Reports are ok but requires some expertise to export data into a better reporting DB.
The system is great for enterprise or larger IT departments or teams where temporary or full access may be given using privileged IDs. Requirements for needing local admin access is also eliminated which can help with specific Windows workstation related tasks.

It can be very useful when working with remote teams or contractors who may need temporary access to a system when required.
Read Craig Lockley's full review

CyberArk Privileged Account Security Scorecard Summary

About CyberArk Privileged Account Security

CyberArk is a privileged account and access security suite issued by the company of the same name in Massachusetts . The Core Privileged Access Security Solution unifies Enterprise Password Vault, Privileged Session Manager and Privileged Threat Analytics to protect an organization’s most critical assets.

CyberArk Privileged Account Security Technical Details

Operating Systems: Unspecified
Mobile Application:No