The best privileged account tool I've found
October 13, 2019
The best privileged account tool I've found

Score 10 out of 10
Vetted Review
Verified User
Overall Satisfaction with CyberArk Privileged Account Security
We utilize CyberArk for privileged account management for sensitive and shared accounts across our technology organization. We utilize it for local admin passwords across multiple datacenters as well as any other set of credentials that might be utilized by multiple people. We use it to control, monitor and govern sensitive account usages and to ensure that nobody knows the password as much of the time as is possible.
Pros
- Automatically discover new servers on the network and take control of the local admin password by vaulting it and ensuring nobody knows the password. A different password on every server.
- Automatically roll the password in a configurable manner - after each use, after a certain period of time, etc.
- Track and govern sensitive account usage by ensuring only properly authorized users can access the vault and obtain the credentials and then monitor usage.
Cons
- It can be hard to work with the native back end vault which is reduced and hardened OS with minimal operating capabilities.
- Reporting could be better.
- CyberArk has enabled us to better secure our privileged account credentials.
- CyberArk automatically detects new servers on our network and takes ownership of the local admin password.
- CyberArk allows us to better govern, and audit, privileged account usage in our org.
- CyberArk can be architected to be fully redundant and disaster-ready.
I've managed to compete for solutions to CyberArk in the past as a Security Program Manager and found that CyberArk is truly the best-of-breed PIM/PAM tool. Cyberark has a fuller set of supported use cases and a more mature overall operating model. Everyone else is playing catch up!
Do you think CyberArk Privileged Access Management delivers good value for the price?
Yes
Are you happy with CyberArk Privileged Access Management's feature set?
Yes
Did CyberArk Privileged Access Management live up to sales and marketing promises?
Yes
Did implementation of CyberArk Privileged Access Management go as expected?
Yes
Would you buy CyberArk Privileged Access Management again?
Yes
Comments
Please log in to join the conversation