Make your privileged data safe using CyberArk
August 21, 2018

Make your privileged data safe using CyberArk

Sujeet Swain | TrustRadius Reviewer
Score 9 out of 10
Vetted Review
Verified User
Review Source

Overall Satisfaction with Cyberark Enterprise Password Vault

We are using CyberArk to manage the privilege accounts in our organization. It is being used by a specific department that deals with critical data sources.
  • Identify and reduce the number of privileged accounts
  • Eliminate shared/service accounts having non-expiring passwords
  • Automatically changing privileged account passwords
  • Automate password verification and reconciliation
  • Frequently identify, change and verify hardcoded passwords
  • Connect Target Systems directly without displaying passwords to users
  • The initial product cost is a little on the higher side, which might turn off small & medium enterprises.
  • As it talks about security, it has a lot of hardware/software requirements for the initial setup, which might make the rollout timeline a little lengthy.
  • Product should be easy to customize based on different industry's needs.
  • Decreased the probability of an external cyber attack to privileged accounts..
  • Management can control privileged account life cycle management more effectively
  • Recording privileged sessions allows our organization to play back exactly the point of a breach or malicious behavior
  • Automated system to manage and verify passwords, as privileged accounts are constantly created and deleted
  • Automatic PWD change functionality will substantially decrease probability of PWD theft or misuse.
CyberArk Enterprise Password Vault is number 1 in the world for privileged account management landscape. CyberArk EPV Solution has out of the box functionalities to achieve the above best practices across your organization and around the globe. The solution is quite intuitive in nature, and can be easily rolled out across an organization quickly with out doing any major change management. They also have a strong technical support team that helps organizations, starting from requirement initiation until production rollout, followed by ongoing continuous support.
It should be used by organizations who are dealing with customer- or finance-related data, where there is a lot of focus on managing regulatory compliance. Organizations who outsource their IT/Marketing activities to vendors must use CyberArk to control any potential data leakage or theft, which can reflect a very negative brand image.