Skip to main content
TrustRadius
CyberArk Privileged Access Management

CyberArk Privileged Access Management

Overview

What is CyberArk Privileged Access Management?

CyberArk is a privileged account and access security suite issued by the company of the same name in Massachusetts . The Core Privileged Access Security Solution unifies Enterprise Password Vault, Privileged Session Manager and Privileged Threat Analytics to protect an…

Read more
Recent Reviews

TrustRadius Insights

Users have reported that CyberArk is a valuable tool for securely storing and accessing passwords for remote support teams and third-party …
Continue reading

Cyber Ark - Quality PAM

9 out of 10
March 01, 2018
Incentivized
Cyber Ark is being used across the entire enterprise. It is used for administration credential protection and application integration to …
Continue reading
Read all reviews
Return to navigation

Product Details

What is CyberArk Privileged Access Management?

CyberArk offers Identity Securitycentered on privileged access management. CyberArk provides a security offering for any identity – human or machine – across business applications, distributed workforces, hybrid cloud workloads and throughout the DevOps lifecycle, and their solutions are used to secure all identities and critical assets.

CyberArk PAM solutions protect sensitive access across on-premises, cloud, and hybrid infrastructures. Designed from the ground up for security, PAM solutions help organizations by measurably reducing cyber-risk. This is accomplished by managing privileged account credentials and access rights, proactively isolating and monitoring privileged account activity, and quickly responding to threats. CyberArk PAM solutions can work with CyberArk Identity Single Sign-On and Multifactor Authentication tools, to securely access to on-premises, cloud, mobile and legacy apps. CyberArk PAM also works with third party MFA and SSO solutions as well.

Customers have 350+ OOTB software integrations available in the CyberArk Marketplace, with over 235 technology vendors, ranging from security technologies, cloud service providers, IoT, OT, and web applications.

CyberArk Privileged Access Management Features

  • Supported: Manage Privileged Credentials
  • Supported: Isolate & Monitor Sessions
  • Supported: Threat Detection & Response
  • Supported: Manage Nomadic Devices
  • Supported: Remote Access to PAM
  • Supported: Adaptive MFA & SSO

CyberArk Privileged Access Management Screenshots

Screenshot of ISPSSScreenshot of Privilege CloudScreenshot of Identity Security IntelligenceScreenshot of Identity Security Intelligence

CyberArk Privileged Access Management Videos

CyberArk Privileged Access Management Integrations

CyberArk Privileged Access Management Technical Details

Deployment TypesOn-premise, Software as a Service (SaaS), Cloud, or Web-Based
Operating SystemsWindows, Linux
Mobile ApplicationApple iOS, Android, Mobile Web
Supported CountriesAmericas, Israel, UK, Canada, France, GMBH, Spain, Netherlands, Italia (Milan), Italia (Rome), Turkey, Australia, Asia Pacific, Japan, India, Denmark
Supported LanguagesArabic, German, English, Spanish, French, Italian, Japanese, Korean, Dutch, Portuguese, Brazil Portuguese, Russian, Serbian, Swedish, Thai, Vietnamese, Chinese, Simplified Chinese - Traditional

Frequently Asked Questions

CyberArk is a privileged account and access security suite issued by the company of the same name in Massachusetts . The Core Privileged Access Security Solution unifies Enterprise Password Vault, Privileged Session Manager and Privileged Threat Analytics to protect an organization’s most critical assets.

BeyondTrust Privileged Remote Access, Delinea Privilege Manager, and Broadcom DX Unified Infrastructure Management are common alternatives for CyberArk Privileged Access Management.

Reviewers rate Support Rating highest, with a score of 7.2.

The most common users of CyberArk Privileged Access Management are from Enterprises (1,001+ employees).
Return to navigation

Comparisons

View all alternatives
Return to navigation

Reviews and Ratings

(59)

Community Insights

TrustRadius Insights are summaries of user sentiment data from TrustRadius reviews and, when necessary, 3rd-party data sources. Have feedback on this content? Let us know!

Users have reported that CyberArk is a valuable tool for securely storing and accessing passwords for remote support teams and third-party vendors. It offers version control and access controls that allow users to analyze and track who is accessing what and when, providing strong delegation controls. Organizations rely on CyberArk to manage privileged accounts, service accounts, and non-IT staff sessions when remoting into servers. For instance, one department in an organization effectively uses CyberArk to manage privileged accounts dealing with critical data sources.

CyberArk addresses the need for password rotation while ensuring complexity requirements are maintained, making it useful for managing passwords to privileged accounts and non-rotating passwords for applications that require administrator-level access. It solves the problem of password storage for different applications by utilizing safes. Users find it helpful for managing local admin passwords, credentials used by multiple people, and other privileged account management tasks.

One key advantage of CyberArk is its ability to control, monitor, and govern sensitive account usage. It automatically changes passwords, reducing the risk of compromise, and provides a centralized location for rarely used passwords, simplifying administrators' tasks. To enhance security further, it can be secured through AD authentication combined with RAS two-factor authentication.

With its wide range of functionalities, CyberArk is used across entire enterprises to protect secrets, service accounts, and administration credentials. It serves as a robust and resilient solution that works well with both Windows and Linux systems, making it suitable for enterprise-level deployments. Additionally, it provides a strong audit tool for credential usage, addressing the business problem of protecting sensitive access.

By implementing features such as password expiration and limiting account activity, CyberArk scales effectively to meet the needs of the entire organization while mitigating risks associated with highly privileged accounts with static passwords.

Attribute Ratings

Reviews

Companies can't remove reviews or game the system. Here's why

No reviews found

Try adjusting your results by removing or modifying your filters.

Return to navigation