Overall Satisfaction with Cyberark Conjur
Cyberark Conjur is widely used in my organization for various authentication purposes. This could be for apps, password storage, scripts, containers, or databases giving quick access to the information we need. We also use Cyberark Conjur to verify and authenticate outside vendors giving them access to our network and highly private information. Only when they can answer several predetermined questions provided from Cyberark Conjur will a password be generated and access can be granted.
- Provide allow-list
- verifying authority
- validate access
- Searching containers can be difficult if you're not sure which you're looking for.
- Initial authorization can be slow, specifically if the first instance failed.
- Links within containers
- quick authentication
- One stop shop
- Before Cyberark we put passwords in a spread sheet - leaving exposure to theft.
- Gives security compliance to our company
- Keeps company and teams secure and safe.
- BeyondTrust Endpoint Privilege Management and AWS Identity & Access Management
Cyberark Conjur has been a great asset to our company as it is a one stop shop that holds individuals, teams, departments, and the entire company accountable for the safety network. Not only do you have to be authorized to access Cyberark Conjuryou have to reauthorize to open, copy, or see individual passwords or accounts leaving a cyber trace of all your actions. There's no way to accidently get into something you're not supposed to be in.
Do you think Cyberark Conjur delivers good value for the price?
Not sure
Are you happy with Cyberark Conjur's feature set?
Yes
Did Cyberark Conjur live up to sales and marketing promises?
I wasn't involved with the selection/purchase process
Did implementation of Cyberark Conjur go as expected?
I wasn't involved with the implementation phase
Would you buy Cyberark Conjur again?
Yes