Listing Thumbnail

    CyberArk Privileged Access Manager for GovCloud (US)

     Info
    Sold by: CyberArk 
    Deployed on AWS
    Enterprises can achieve the highest level of security for cloud, on-premises and hybrid environments by implementing the CyberArk Privileged Access Manager solution. This solution allows you to secure, control, monitor and audit all privileged access to your most critical systems and applications.

    Overview

    CyberArk Privileged Access Manager enables enterprises to protect both traditional and modern workloads by providing powerful solutions for securing passwords, credentials, and secrets. The solution enables enterprises to consistently enforce privileged access security policies across cloud, on-premises, and hybrid environments.

    Additionally, CyberArk cloud automation tools simplify and accelerate the deployment of CyberArk in cloud environments. See below for standard pricing. For custom orders, or orders greater than 100 named users please contact AWS-Marketplace@cyberark.com .

    Highlights

    • Discover, secure, and protect account passwords, SSH Keys, API keys, cloud console access, and other privileged credentials to reduce risk from cyber attacks and meet compliance requirements
    • Isolate, monitor and control all privileged session activity across your cloud and on-premises infrastructure and applications, including suspending or terminating high-risk privileged sessions
    • Eliminate the use of hard-coded secrets by securely storing and rotating application credentials based on policy without impacting application performance

    Details

    Categories

    Delivery method

    Deployed on AWS

    Unlock automation with AI agent solutions

    Fast-track AI initiatives with agents, tools, and solutions from AWS Partners.
    AI Agents

    Features and programs

    Financing for AWS Marketplace purchases

    AWS Marketplace now accepts line of credit payments through the PNC Vendor Finance program. This program is available to select AWS customers in the US, excluding NV, NC, ND, TN, & VT.
    Financing for AWS Marketplace purchases

    Pricing

    Custom pricing options

    Pricing is based on your specific requirements and eligibility. Request a private offer to receive a custom quote. Sign in to view any offers that have been extended to you.

    How can we make this page better?

    We'd like to hear your feedback and ideas on how to improve this page.
    We'd like to hear your feedback and ideas on how to improve this page.

    Legal

    Content disclaimer

    Vendors are responsible for their product descriptions and other product content. AWS does not warrant that vendors' product descriptions or other product content are accurate, complete, reliable, current, or error-free.

    Usage information

     Info

    Delivery details

    Software as a Service (SaaS)

    SaaS delivers cloud-based software applications directly to customers over the internet. You can access these applications through a subscription model. You will pay recurring monthly usage fees through your AWS bill, while AWS handles deployment and infrastructure management, ensuring scalability, reliability, and seamless integration with other AWS services.

    Support

    Vendor support

    Ensuring your CyberArk Privileged Access Manager solution is up-to-date and running efficiently is a priority. If you encounter a technical problem in your production environment, CyberArk's Enterprise Support Team offers expertise to assist with a resolution. Our standard maintenance offers a range of contact options and includes access to online resources. Off-hours access to support is available via the Maintenance Plus 24x7 plan. www.cyberark.com/customer-support/  Contact CyberArk for any support related questions: support@cyberark.com 

    AWS infrastructure support

    AWS Support is a one-on-one, fast-response support channel that is staffed 24x7x365 with experienced and technical support engineers. The service helps customers of all sizes and technical abilities to successfully utilize the products and features provided by Amazon Web Services.

    Product comparison

     Info
    Updated weekly

    Accolades

     Info
    Top
    10
    In Financial Services
    Top
    100
    In Infrastructure as Code

    Customer reviews

     Info
    Sentiment is AI generated from actual customer reviews on AWS and G2
    Reviews
    Functionality
    Ease of use
    Customer service
    Cost effectiveness
    19 reviews
    Insufficient data
    Positive reviews
    Mixed reviews
    Negative reviews

    Overview

     Info
    AI generated from product descriptions
    Credential Management
    Discover, secure, and protect various types of privileged credentials including passwords, SSH keys, API keys, and cloud console access credentials
    Session Control
    Isolate, monitor, and control privileged session activities across cloud and on-premises infrastructure with capabilities to suspend or terminate high-risk sessions
    Secret Rotation
    Eliminate hard-coded secrets through secure storage and automated credential rotation based on predefined policies without performance impact
    Access Policy Enforcement
    Consistently enforce privileged access security policies across cloud, on-premises, and hybrid computing environments
    Multi-Environment Security
    Provide comprehensive protection for both traditional and modern workloads across diverse infrastructure deployment models
    Identity Threat Detection
    Advanced discovery and intelligence system for detecting identity-based threats across infrastructure
    Privileged Access Management
    Comprehensive control and management of privileged passwords, accounts, credentials, and sessions for human and machine identities
    Remote Access Security
    Granular control, management, and auditing of privileged remote access for employees, vendors, developers, and cloud operations engineers
    Endpoint Privilege Control
    Dynamic least privilege enforcement across Windows, macOS, Linux, and mobile platforms to prevent malware and unauthorized access
    Cloud Entitlement Management
    Cross-cloud visibility of access permissions, detection of account permission anomalies, and guidance for privilege optimization
    Zero Trust Access Model
    Implements a dynamic access control framework based on continuous verification of user and device identity before granting resource access
    Multi-Cloud Resource Protection
    Provides secure access across AWS, on-premises, and multi-cloud environments without traditional VPN infrastructure
    Contextual Access Control
    Applies granular access rules and conditions that dynamically evaluate user and device trust before permitting workload access
    Identity Verification Mechanism
    Requires accessing entities to prove their authorization through comprehensive authentication and validation processes
    Remote Access Security Framework
    Enables secure, conditional access to corporate applications and cloud workloads with reduced attack surface exposure

    Contract

     Info
    Standard contract
    No
    No
    No

    Customer reviews

    Ratings and reviews

     Info
    0 ratings
    5 star
    4 star
    3 star
    2 star
    1 star
    0%
    0%
    0%
    0%
    0%
    0 AWS reviews
    |
    64 external reviews
    Star ratings include only reviews from verified AWS customers. External reviews can also include a star rating, but star ratings from external reviews are not averaged in with the AWS customer star ratings.
    Aditya K.

    Cyberark

    Reviewed on Jun 02, 2025
    Review provided by G2
    What do you like best about the product?
    What I love the most is that it provides a secure connection for end users without revealing the credentials. It also has integrated MFA, and we can define policies accordingly.
    What do you dislike about the product?
    Everything is good but classical UI should be more effective. It's looking old fashion.
    What problems is the product solving and how is that benefiting you?
    CyberArk understands the biggest security challenge protecting against threats — and provides a secure way to manage it. It ensures that users get exactly the level of access they need, nothing more, nothing less.
    Computer Software

    Robust PAM for Enterprise

    Reviewed on May 31, 2025
    Review provided by G2
    What do you like best about the product?
    It is SaaS based tool, where all other major PAM leaders and tools were working as on prem solution. And workflow automation and integration with IDP solution in cloud benefits us more.

    There are few I liked,

    Session recording and live monitoring
    Audit logs for any activity done within the PAM session and by PAM administrator.
    Integration with SIEM
    UBA is also presented
    What do you dislike about the product?
    While security features are top class with cyberark, the UI might feel intuitive for administrators and users.All the initial set up require significant time and technical expertise.

    And there are more I could say as dislike points,

    1. Not be able to use their administration PAM IOS or android app
    2. PAM password automation often causing issue with switches
    3. Integration with jumpcloud password automation has major risk and challenges
    4. VPN less security open nee risk to organisation
    What problems is the product solving and how is that benefiting you?
    Primarily, it helps secure, manage and monitor privilege account. Few of specific areas would be below,

    1. Centralising all privilege credentials within untouchable vault
    2. Manual credential managements
    3. Session monitoring on limited visibility privileged accounts
    4. Compliance and gaps
    Semiconductors

    Needs more maturity, too fragile!

    Reviewed on Sep 23, 2024
    Review provided by G2
    What do you like best about the product?
    It can take care of automatic password rotation and comes with good security features such as one time password, password change on check out and one can do remote connection to many protocols such as http, RDP, ssh, databse etc
    What do you dislike about the product?
    Product is too fragile, upgrades always breaks the product and never goes smoothly. Customer support needs to improve a lot. Integration was also troublesome.
    What problems is the product solving and how is that benefiting you?
    It takes care of our privileged identities and rotate their password. Also, admins do not need to see the password and they can directly connect to systems from PVWA portal. RBAC safes are desgined to seprate the roles between different levels in the team.
    Narasimha M.

    Best tool for remote access management

    Reviewed on Jul 24, 2024
    Review provided by G2
    What do you like best about the product?
    I like the way we can securely connect to the servers and perform the activity without worrying about the cyberattacks or security threats and the implementation is also very easy
    What do you dislike about the product?
    Sometimes I felt could not connect to any servers after logging into MFA with SSO. It says username or password is incorrect
    What problems is the product solving and how is that benefiting you?
    Connecting to servers securely and without worrying about sharing credentials to anyone
    JAVEED AKTHAR S.

    CyberArk is a one Stop solution for all Privilege access management related services

    Reviewed on Jun 01, 2024
    Review provided by G2
    What do you like best about the product?
    CyberArk is a SAAS based application which is used to manage all privilege application, Vaulting of secrets and other services
    What do you dislike about the product?
    The password rotation is bit need improvement compared to other privilege access management tools such as Delinea/Thycotic secret servers
    What problems is the product solving and how is that benefiting you?
    It is benifits.e to password voluting and secret creation
    View all reviews